BRAINLIEST How come when I run out of answers on one Brainly account and I go to the other I'm already out of my daily limit of answers? I'm trying to catch up in my courses, I'll do brainliest if you give me a solution to this, I really need to fix my grades.

Answers

Answer 1

Answer:

You just need to skip by watching a video. Its not that long, be patient its only 30 seconds

Explanation:

Answer 2

Answer:

.

Explanation:

I mean if you don't want to wait for adds you could always ask someone for extra help. I am a sophomore and I have all A's in my subjects but I ask my teachers for help when I need it. You could email anyone for help to. I can also help you if you are a sophomore or below.


Related Questions

Social media marketers need the ability to do what?
Code in JavaScript
Collaborate across teams
Communicate with customers
Make a website useful

Answers

Communication with customers
I believe the answer is communicate with customers

Using the toggle switches and the 4-bit digit to represent input and output. Note that for the 4-bit digit output, you won't need to use all four of the inputs, and can leave the last one empty. Design a full- adder which can accept two two-bit inputs, add them together, and display the result as a decimal number on the 4-bit digit output. Remember, the full-adder makes use of a carry output, and you will be feeding the final carry into the 4-bit digit output. Capture screenshots of the shown inputs, and the resulting outputs. 1: First number: 00, Second Number: 00 2: First number: 01, Second Number: 01 3: First Number: 10, Second Number: 10

Answers

A full-adder circuit is used to add two binary numbers together, with the additional capability of handling a carry input from a previous addition operation. The full-adder circuit makes use of three inputs (two binary inputs and a carry input) and two outputs (a sum output and a carry output). In this case, we will be using toggle switches to represent the inputs, and a 4-bit digit to represent the output.

Here is the design of the full-adder circuit for the given inputs:

1: First number: 00, Second Number: 00
- Input: 0000 (two 2-bit inputs and a carry input)
- Output: 0000 (4-bit digit output)

2: First number: 01, Second Number: 01
- Input: 0101 (two 2-bit inputs and a carry input)
- Output: 0010 (4-bit digit output)

3: First Number: 10, Second Number: 10
- Input: 1010 (two 2-bit inputs and a carry input)
- Output: 0100 (4-bit digit output)

The full-adder circuit adds the two 2-bit inputs together, along with the carry input, and produces a sum output and a carry output. The sum output is displayed on the 4-bit digit output as a decimal number, while the carry output is fed into the 4-bit digit output as the final carry. By using toggle switches to represent the inputs and a 4-bit digit to represent the output, we can easily visualize the addition operation and the resulting outputs.

Learn more about full-adder circuit:

https://brainly.com/question/25711608

#SPJ4

A full-adder circuit is used to add two binary numbers together, with the additional capability of handling a carry input from a previous addition operation.

The full-adder circuit makes use of three inputs (two binary inputs and a carry input) and two outputs (a sum output and a carry output). In this case, we will be using toggle switches to represent the inputs, and a 4-bit digit to represent the output.

Here is the design of the full-adder circuit for the given inputs:

1: First number: 00, Second Number: 00

- Input: 0000 (two 2-bit inputs and a carry input)- Output: 0000 (4-bit digit output)

2: First number: 01, Second Number: 01

- Input: 0101 (two 2-bit inputs and a carry input)- Output: 0010 (4-bit digit output)

3: First Number: 10, Second Number: 10

- Input: 1010 (two 2-bit inputs and a carry input)- Output: 0100 (4-bit digit output)

The full-adder circuit adds the two 2-bit inputs together, along with the carry input, and produces a sum output and a carry output. The sum output is displayed on the 4-bit digit output as a decimal number, while the carry output is fed into the 4-bit digit output as the final carry. By using toggle switches to represent the inputs and a 4-bit digit to represent the output, we can easily visualize the addition operation and the resulting outputs.

Learn more about full-adder circuit:

brainly.com/question/25711608

#SPJ11

What is the use of adding tags to servers in the Windows Admin Center?
Question options:
a) Tags allow you to upload and download files to and from the file systems on the server.
b) Tags allow you to monitor and manage DHCP server configuration.
c) Tags help configure additional areas of the system via MMC tools.
d) Tags help identify servers and can be searched using the Search dialog box.

Answers

Tags help identify servers and can be searched using the Search dialog box is the use of adding tags to servers in the Windows Admin Center.

To help identify servers and make management of them simpler, tags can be added to servers in the Windows Admin Center. When you add tags to a server, you can use the Search dialogue box to look for servers and filter results by tags to identify certain servers or collections of servers that you need to manage. When managing a big number of servers, this can reduce time spent and increase productivity. In order to manage and maintain the servers, tags can also be used to organise and categorize servers according to particular characteristics, such as location, function, or owner.

Learn more about Windows here:

https://brainly.com/question/8112814

#SPJ4

for what work photoshop is used?

Answers

its for making commercials and background that look cool
Adobe Photoshop is a software used for editing photographs, compositing digital art, animating, and graphic design

5.6 what advantage is there in having different time-quantum sizes at different levels of a multilevel queueing system?

Answers

The advantage that is there in having different time-quantum sizes at different levels of a multilevel queueing system is that operations that require servicing more often, such as interactive processes like editors, can be placed in a queue with a tiny time quantum.

What occurs when the time quantum is enlarged or reduced?

In an interactive setting, a process's reaction time may not be acceptable if the time quantum is too large. A too-small time quantum results in needlessly frequent context switches, additional overheads, and worse throughput.

Note that the time quantum should, as a general rule, be smaller than the minimum duration during which contention is possible.

Therefore,  The majority of researchers that study computer design usually set the time quantum to one or a few cycles since it produces the most accurate simulation outcomes.

Learn more about queueing system from

https://brainly.com/question/28787946
#SPJ1`

_____moves the head to proper track

a.
Seek
b.
Data transfer
c.
Rotate
d.
Settle

Answers

to what it seems like the answer would be C
i believe the answer is C

Which three devices can perform both input and output operations

Answers

Answer:

router ,speaker, and nic card

Explanation:

shivam has a broken laptop screen and needs to replace the screen. while doing research to find a new screen, he discovers that the laptop screen he is replacing does not have a backlight. what kind of screen does shivam need to order for his laptop?

Answers

OLED would be the next logical jump, but the per-inch cost is still massive and it'll probably be usurped by LED-backlit for consumer goods. Perhaps you could investigate the few remaining SED manufacturers…

Credit: https://superuser.com/questions/149355/are-there-computer-monitors-that-dont-use-backlight-technology

The location is part of the Post-Production stage of creating a video.
True or
False

Answers

The correct answer is true!!!!!!!!!

solve the following equations and check your result 1) 3x=2x+18​

Answers

Answer:

x = 18

Explanation:

3x = 2x+18

3x-2x = 18

x=18

Answer:

Explanation:

3X-2X=2X-2X+18

X=18

If C2=20 and D2=10 what is the result of the function = mathcal I F(C2=D2,^ prime prime Ful "Open")?
Open
Unknown
Full
10​

Answers

Excel IF functions are used to test conditions.

The result of the IF function is (a) Open

The function is given as: = IF(C2 = D2, "Full","Open")

Where: C2 = 20 and D2= 10

The syntax of an Excel IF conditional statement is: = IF (Condition, value_if_true, value_if_false)

The condition is: IF C2 = D2

The values of C2 and D2 are: 20 and 10, respectively.

This means that, 20 does not equal 10.

So, the value_if_false will be the result of the condition.

In other words, the result of the IF function is (a) Open

Read more about Excel functions at:

https://brainly.com/question/10307135

manipulators are defined in the _____ and _____ libraries in namespace std.

Answers

Manipulators are defined in the <iomanip> and <ios> libraries within the namespace std. These libraries provide various manipulators for input/output formatting and general-purpose manipulations in C++.

The <iomanip> library provides manipulators specifically related to input/output formatting, such as std::setw for setting the width of output, std::setprecision for controlling the precision of floating-point numbers, and std::setfill for setting the fill character.

The <ios> library contains general-purpose manipulators like std::boolalpha for displaying boolean values as "true" or "false", std::showpos for always displaying the plus sign for positive numbers, and std::fixed for displaying floating-point numbers in fixed-point notation. These libraries and their manipulators are part of the Standard Library (std) in C++.

To learn more about namespace: https://brainly.com/question/23921351

#SPJ11

Which PowerPoint feature will you use to apply motion effects to different objects of a slide? A. Slide transition B. Slide design C. Animation movement D. Animation effects

Answers

Answer:

D. animation effects

can someone give me an window blur code in javascript like i mean full coding

Answers

Answer:

uh wha- what?!?!

Explanation:

no

find it urself

:P

jekqfjewil bored anyways

What is the primary browser of Windows 10?

Answers

Answer:

Microsoft Edge

Explanation:

The new and updated Microsoft Edge is the main browser of the Windows 10. Hope this helps!

Write ten sentences each and explain. What are the benefits of technology in teaching-learning? Give at least five benefits.
How technology enhance cognitive supports to students?
Can technology engage students in learning? How? Why?
Can technology engage students in learning? How? Why?
How students with no access to technology cope with their learnings?

Answers

The benefits of technology in teaching and learning are numerous. Here are five key benefits:


Access to information: Technology allows students to access a vast amount of information quickly and easily. With the internet, students can conduct research, explore different perspectives, and access educational resources that were once limited to textbooks or the classroom.

In conclusion, technology brings numerous benefits to teaching and learning. It enhances access to information, promotes interactive and personalized learning, facilitates collaboration and communication, establishes real-world connections, and supports cognitive development. Additionally, technology engages students through interactive experiences, multimedia resources, and personalized learning opportunities.

To know more about technology visit:

https://brainly.com/question/9171028

#SPJ11

compare and contrast science and technology

Answers

Answer:

Comparisons: Science and technology are always two things that are being constantly refined. They are also quite useful things to know in day to day life. However, technology depends on science. Science is more conceptual than technology; technology is a thing, while science is a concept of knowledge.

Loops are very useful for doing the same calculation over and over, very quickly.
In this problem, we will use a loop to call a function with different inputs, and store the result in an array.
You are doing an experiment where you are trying to experimentally calculate the air resistance on falling objects. To calculate this resistance, you build an apparatus that will release objects with different initial velocities at different distances. You also set up a system for measuring the exact time it takes each object to fall.
To do your air resistance calculation, you need a theoretical comparison for the amount of time it takes an object to fall in a vacuum. Thankfully you already have that function (please download fallTime.m from Canvas)! What you do not have yet is a way to call that function repeatedly for all of the distance and velocity data you have!
Write a function called timeLoop. It should take two inputs, arrays for initial velocity and distance. These two input arrays will always have equivalent lengths, as the indices of these arrays correspond to the same data point from your experiment. It should return one output, an array for the theoretical amount of time it would take for the object moving at that initial velocity to fall that distance. To accomplish this task, you should call fallTime.m inside of a loop.
For example, if you called timeLoop with the input array [2 -3 5] for initial velocities (negative numbers mean the object was moving upwards initially) and [100 150 300] for distances, your function call and resulting output would look like this:
IN Matlab
%This function calculates how long it takes an object to fall a certain
%distance given a certain initial velocity and a distance
function time = fallTime(startVelocity,distance)
g = 9.81; %m/s^2
finalVelocity = sqrt(startVelocity^2 + 2*g*distance); %m/s
time = (finalVelocity - startVelocity)/g; %s

Answers

we can use a loop to call the function 'fallTime.m' with the different inputs and store the result in an array.


The code for the 'timeLoop' function would look like this:
function time = timeLoop(velocity,distance)
% This function takes two input arrays for initial velocity and distance and
% returns an array of the theoretical amount of time it would take for the
% object moving at that initial velocity to fall that distance

% Initialize time array
time = [];

% Loop through the velocity and distance arrays
for i = 1:length(velocity)
   % Calculate the theoretical time using the fallTime.m function
   t = fallTime(velocity(i),distance(i));
   % Store the theoretical time in the time array
   time = [time t];
end


In this code, the 'timeLoop' function takes two input arrays (for initial velocity and distance) and returns an output array for the theoretical amount of time it would take for the object moving at that initial velocity to fall that distance.

It does this by looping through the velocity and distance arrays and calling the 'fallTime.m' function to calculate the theoretical time for each combination. The result is then stored in the 'time' array.

To know more about time loop function: https://brainly.com/question/24213966

#SPJ11

A student was asked to describe how a Huffman tree could be created for the string in Figure 2. Her response was: "I would count the number of times each character appears in the string and create a frequency table sorted alphabetically. For example, the letter S has the highest frequency in Figure 2. Next I would take the two characters with the highest frequencies and combine them into a new node. The new node would be added to the end of the frequency table. The two characters with the lowest remaining frequencies are now combined into a new node and the process is repeated until all the characters have been added to nodes and the tree created. " State four mistakes the student has made in her response

Answers

1. The student incorrectly listed the frequency table for the provided string. 2. The student left out instructions on how to handle ties in the frequency table. 3. The student failed to describe how to give binary codes to characters in the Huffman tree.

3. The student did not explain how to assign binary codes to the Huffman tree's characters. 4. The student left out the last step of utilising the created Huffman tree to encode the string. In total, the student's attempt to construct a Huffman tree had four errors. These omissions include failing to provide the proper frequency table, failing to address how ties should be handled, failing to describe how to assign binary codes to characters, and failing to bring up the string's final encoding phase. The two lowest frequency characters are combined to form a new node, and this process is repeated until only one root node remains, creating a Huffman tree. Characters are given binary codes based on the route taken from the root to the leaf node. The encoded text is then created by replacing each character in the Huffman tree with its appropriate binary code.

learn more about frequency table here:

https://brainly.com/question/28931302

#SPJ4

declare and create a two-dimensional array of ints, plan, with 2 rows, and initialize the first row to 8, 20, 50 and the second row to 12, 30, 75.

Answers

To declare and create a two-dimensional array of integers called plan with 2 rows, you can use the following code:

int[][] plan = new int[2][3];

To initialize the first row of plan to the values 8, 20, 50, you can use the following code:

plan[0][0] = 8;

plan[0][1] = 20;

plan[0][2] = 50;

To initialize the second row of plan to the values 12, 30, 75, you can use the following code:

plan[1][0] = 12;

plan[1][1] = 30;

plan[1][2] = 75;

Code is a set of instructions or statements that are written in a computer programming language. It is used to create software and applications that can be run on computers, smartphones, and other devices. Code typically consists of commands, variables, and other elements that are written using a specific syntax and structure according to the rules of the programming language. It is used by programmers to create and control the behavior of computer programs.

Learn more about code, here https://brainly.com/question/497311

#SPJ4

The library is purchasing Argus TL2530P All-In-One Thin clients. What does it mean that the thin clients are 802.3at compliant?

Answers

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

Learn more about server on:

https://brainly.com/question/29888289

#SPJ1

how to paste text without changing the style

Answers

Explanation:

left click on the text and move the mouse icon

EXERCISE
Fill in the blanks for the following sentences. (Note: This exercise will not be graded and does
not have to be handed in.)
1. The physical parts or components of a computer 2system is called
2. The provides access to the Internet, may also be internal.
3. The contains the computer's "brain," the central processing unit (CPU).
4. Software that instructs the computer how to run applications and controls the display/keyboard
is know as the
5. A/An is a series of instructions or commands that a computer follows; used to create
software

Answers

1. Hardware

2.lan

3. cu

4.utility software

5.A

What he name given to a cell with a green border around it?​

Answers

Answer:

Active cell

Explanation:

I will assume this question is about spreadsheet programs (Microsoft Office Excel, for instance).

In Microsoft Office Excel, a cell that has border around it means that the cell is currently selected. The proper word for a selected cell is an active cell.

Hence, an active cell answers the question.

PLZ HELP ASAP

Jaelyn is working late at night on a project that is due the next day. She is not sure how to add a picture to her document, and it is too late to call or text her teacher or friends. What is the best option for Jaelyn?
1-Decide not to use a border.
2-Provide negative feedback to Office Online.
3-Type a question in the “Tell me what you want to do” box.
4-View accessibility options.

Answers

Answer:

its accessibility options

Explanation:

because on office that's were you go to view what you can do

Answer:

its accessibility

Explanation:

I took the test


Selah is organizing all of the folders on her computer so she can find everything faster. She decides to make a "Work" folder, which she puts inside a "2021" folder, which she puts inside a "Budget" folder. Which method of organization is she using?

Answers

Answer:

Explanation:

 Use Subdirectories

The simplest and most obvious advice. Whichever organization system you choose, you'll have to create folders to put your files in. Get in the habit of creating new directories constantly.

C://Budget/2021/Work

Selah is organizing all of the folders on her computer so she can find everything faster. She decides

For a new version of processor, suppose the capacitive load remains, how much more energy will the processor consume if we increase voltage by 20% and increase clock rate by 20%?

Answers

Answer:

The answer is below

Explanation:

The amount of power dissipated by a processor is given by the formula:

P = fCV²

Where f = clock rate, C = capacitance and V = Voltage

For the old version of processor with a clock rate of f, capacitance C and voltage of V, the power dissipated is:

P(old) = fCV²

For the new version of processor with a clock rate of 20% increase = (100% + 20%)f = 1.2f, capacitance is the same = C and voltage of 20% increase = 1.2V, the power dissipated is:

P(new) = 1.2f × C × (1.2V)² = 1.2f × C × 1.44V² =1.728fCV² = 1.728 × Power dissipated by old processor

Hence, the new processor is 1.728 times (72.8% more) the power of the old processor

8.6 Code Practice: Question 2

Instructions

Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.


After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.


Sample Run

How many values to add to the array:

8

[17, 99, 54, 88, 55, 47, 11, 97]

Total 468

Answers

Answer:

import random

def buildArray(a, n):

   for i in range (n):

      a.append(random.randint(10,99))

     

arr = []

def sumArray(a):

   tot = 0

   for i in range(len(a)):

       tot = tot + a [i]

   return tot

       

   

arr = []

numbers = int(input("How many values to add to the array:\n"))

buildArray(arr, numbers)

print(arr)

print("Total " + str(sumArray(arr)) )

Explanation:

The program is an illustration of lists

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This gets the number of inputs to the array

n = int(input("How many values to add to the array: "))

#This initializes the sum to 0

sumArray = 0

#This initializes a list

myList = []

#This iterates through n

for i in range(n):

   #This gets input for the list elements

   num = int(input())

   #This appends the input to the list

   myList.Append(num)

   #This calculates the sum

   sumArray+=num

#This prints the list elements

print(myList)

#This prints the sum of the list elements

print("Total",sumArray)

Read more about lists at:

https://brainly.com/question/24941798

A nonprofit called the Gun Violence Archive has been tracking school shootings in the United States, and since 2014, they have counted 239 school shootings. What do statistics like these regarding school shootings have to do with video games?

a - Every single school shooter in all 239 shootings was a verified violent video game addict.
b - Several companies have distastefully created violent video games based on some of the worst school shootings that occurred.
c - Violent video games have been blamed for this gratuitous violence, with critics arguing that violent games form violent habits and help train school shooters.
d - Every single school shooter in all 239 shootings was verified to have rarely or never played a violent video game in their entire life.

Answers

Violent video games have been blamed for this gratuitous violence, with critics arguing that violent games form violent habits and help train school shooters. Therefore, the correct option is (c).

Violent video games have been blamed for this gratuitous violence, with critics arguing that violent games form violent habits and help train school shooters.

Statistics on school shootings are often brought up in discussions about the influence of video games on violence.

Some critics claim that exposure to violent video games desensitizes individuals to violence, promotes aggression, and contributes to real-world acts of violence, such as school shootings.

However, it's important to note that there is a lack of consensus among researchers on this topic, and many studies have found no direct causal link between violent video games and real-world violence.

It's a complex issue with various factors at play, including mental health, access to firearms, and societal influences.

For more such questions on Violent games:

https://brainly.com/question/14465019

#SPJ11

A database in which OS X saves encrypted passwords for a single computer. The first keychain, login, is created for each user and associated with the user's login password is called

Answers

OS X stores encrypted passwords for a single computer in a database. Each user receives a unique login keychain, which is known as a keychain and is connected to the user's login password.

What is database?Typically kept electronically in a computer system, a database is a well-organized collection of structured data. Database management systems typically have control over databases. (DBMS). People's personal data, including that of clients or users, is frequently stored in databases. For example, social media networks use databases to store user information, such as names, email addresses and user behaviour. In order to enhance user experience, the data is used to propose content to users. Software for spreadsheets, not databases, is Excel. It has significant limitations in that area, despite the fact that many users attempt to make it behave like a database. The most obvious limitation is that databases don't have such limitations, whereas Excel is limited to 1M rows of data.

To learn more about database, refer to:

https://brainly.com/question/28033296

The database in which OS X saves encrypted passwords for a single computer is called the keychain.

The first keychain, login, is created for each user and associated with the user's login password. The keychain acts as a secure repository for passwords and other sensitive information, allowing the user to access them without having to remember each individual password. The keychain is specific to each computer and user, ensuring that the passwords and other data are kept secure and private.
Hi! The database in which OS X saves encrypted passwords for a single computer is called the "Keychain." Specifically, the first keychain created for each user, named "login," is associated with the user's login password.

Learn more about database here:

https://brainly.com/question/30634903

#SPJ11

Other Questions
Annes potato salad recipe requires one pound of potatoes for every four people served. How many pounds of potatoes will Anne need to serve 14 people at her picnic? Suppose f(x) is a polynomial of degree 4 or greater such that f(1) = 2, f(2) = 3, and f(3) = 5. Find the remainder when f(x) is divided by (x-1)(x-2)(x-3). gertrude, a returning student in her sixties, gave a speech to her classmates, who were traditional college freshmen. she focused on the qualities to look for when purchasing a fur coat. partway through, she realized that most of the audience was not paying attention. what principal demographic trait did she fail to consider fully when preparing her speech? If 1/2 cup of beans contains 430 milligrams of sodium how much sodium is in 3/4 cup? Which phrase best describes abigail williamss character in act i of the crucible?. help me please !!! (Multiple choice ) Outline some of the major pros and cons of building theShinkansen network. Could such a rail network be effective in theUnited States? Find the midpoint of the segment with endpoints of (-2,-2) and (4,6) andenter its coordinates as an ordered pair. If necessary, express coordinates asfractions, using the slash mark (/) for the fraction bar. Mateo begins his dive at sea level. He dives down 15 meters, and then rises up 4 meters. He dives again, going down 7 meters. Which equation models Mateo's movements, and uses the commutative property? (15) + 4 + (7) = (7) + (15) + (4) (15) + 4 + (7) = 7 + 15 + (4) (15) + 4 + (7) = 4 + (15) + (7) (15) + 4 + (7) = 4 + 15 + 7 PLSSSSSSSSSSS HELPPPPPP A submarine was situated 760 feet below sea level. If it goes 320 feet up and then down 80 feet, what is the submarines new position? 105:6 List three equivalent ratios that compare the number of w's below to the number of g's.wwwwwwww gggggggggggggggggggggggg 73 POINTS FOR ANSWERSunset Vista High School has recently proposed the idea of constructing an on-campus coffee shop for students and teachers. Each student would need to contribute five dollars towards the construction cost. The student committee that is working to get the idea approved created the two graphical representations below. Examine both of the items, and answer the questions that follow.How might each of the graphical representations above be used? What would the specific purpose of each be? Who might the intended audience be for each? How do you know?Write a paragraph summarizing your answers to the questions above. Your paragraph should be a minimum of 100 words. Which of these are equivalent to -11/4? how justified were lincoln's wartime abridgements of civil liberities and his treatment of copperheads? True or false? The greater a fractional part of a circle an angle takes up, the smaller its measurement will be. "As viewed from a cliff 360 m above sea level, the angle of depression of a ship is 28. How far is the ship from the shore? Show one line of work and then state your answer. Use either Law of Sines" Elizabeth works for the lawn care company and earns $15 per day plus $35 for every lawn mows. Let x be the amount of lawns she mows and y be the total money she made for the day. Write the linear equation that models her total pay for the day. Using the information provided, how many money would she make if she mows eight lawns today? what is the name of the enormous coral reef off coast of Queensland If 0. 025 ev neutrons were fired through a double slit so that the first order interference occurred at 10, what is the slit spacing?