C Code


Write a program that creates an an array large enough to hold 200 test scores between 55 and 99. Use a Random Number to populate the array. Then do the following:


1) Sort scores in ascending order.


2) List your scores in rows of ten(10) values.


3) Calculate the Mean for the distribution.


4) Calculate the Variance for the distribution.


5) Calculate the Median for the distribution

Answers

Answer 1

An example program in Python that meets the requirements you specified is given below.

How to write the program

import random

import statistics

# Create an empty list to hold the test scores

scores = []

# Populate the list with random scores between 55 and 99

for i in range(200):

   score = random.randint(55, 99)

   scores.append(score)

# Sort the scores in ascending order

scores.sort()

# Print the scores in rows of 10

for i in range(0, len(scores), 10):

   print(scores[i:i+10])

# Calculate the mean, variance, and median of the scores

mean = statistics.mean(scores)

variance = statistics.variance(scores)

median = statistics.median(scores)

# Print the results

print("Mean:", mean)

print("Variance:", variance)

print("Median:", median)

Learn more about program on

https://brainly.com/question/26642771

#SPJ4


Related Questions

Please answer the following questions by looking at the code below
1. What is the connection between box1 and box4? What happens (memory wise) when both box1 and box 4 are declared null? (20 points)
2. In the Test2 class, there are two variables named a. What is the difference between the two variables? What concept does the output of the last three print statements demonstrate? Explain. (20 points)
3. In the Rectangle class, explain the implementation of the Rectangle(int l) constructor. (10 points)
4. In the Rectangle class, explain the implementation of the Rectangle(Rectangle other) constructor. (10 points)
Rectangle.java
public class Rectangle {
public int length;
public int width;
public Rectangle(int l, int w) {
length = l;
width = w;
}
public Rectangle(int l) {
this(l, 10);
}
public Rectangle(Rectangle other) {
this(other.length, other.width);
}
}
Test2.java
public class Test2
{
static int a;
public static void main(String[] args)
{
Rectangle box1 = new Rectangle(10,10);
Rectangle box2 = new Rectangle(box1);
Rectangle box3 = new Rectangle(10);
Rectangle box4 = box1;
box1 = null;
System.out.println("box(l,w) = (" + box2.length + "," + box2.width + ")");
System.out.println("box(l,w) = (" + box3.length + "," + box3.width + ")");
System.out.println("box(l,w) = (" + box4.length + "," + box4.width + ")");
box2 = null;
System.out.println("\n");
a = 0;
System.out.println("a = " + a);
int a;
a = 100;
System.out.println("a = " + a);
System.out.println("a = " + Test2.a);
}
}

Answers

Primitive variables containing primitive types and object or reference variables containing references to objects of a Java class.

References are how you find your item (just like a UPS tracking number helps you find your package). The basic types of Advanced Placement Computer Science A exams are:

int - stores integers (numbers like 3, -76, 20393)

double - stores floating point numbers (decimal numbers like 6,3 -0,9 and 60293,93032).

boolean - stores a Boolean value (true or false).

A String object consists of a series of characters enclosed in double quotes, such as "hello".

To create a variable, you have to tell Java its data type and name. Types are keywords such as int, double, Boolean, but you can create names for variables.

When you create a primitive variable, Java reserves enough bits in memory for that primitive type and maps that memory location to the name you used.

Computers store all values ​​in bits (binary). A bit can represent two values, and we usually say that the value of a bit is either 0 or 1. When you declare a variable, you have to tell Java what type it is.

This is because Java needs to know how many bits it uses to represent values. All three different primitive types require different numbers of bits. An integer gets 32 bits of storage, a double gets 64 bits of storage, and a boolean value can be represented with just one bit. 

Know more about Java here:

https://brainly.com/question/12978370

#SPJ4

Consider the following code segment. ArrayList numList = new ArrayList (); numList.add(3); numList.add(2); numList.add(1); numList.add(1, 0); numList.set(0, 2); System.out.print(numList); What is printed by the code segment? [1, 3, 0, 1] [2, 0, 2, 1] [2, 0, 2, 3] O [2, 3, 2, 1] O [3, 0, 0, 1]

Answers

The code segment will print [2, 0, 2, 1].

In the given code segment, an Array List named "numList" is created using the default constructor. Then, four elements are added to the list using the add() method: 3, 2, 1, and 1.

The statement "numList. add(1, 0)" inserts the element 0 at index 1, shifting the existing elements to the right. So, the list becomes [3, 0, 2, 1, 1].

The statement "numList. set(0, 2)" replaces the element at index 0 with the value 2. The list becomes [2, 0, 2, 1, 1].

Finally, the statement "System. out. print(numList)" prints the elements of the ArrayList, resulting in [2, 0, 2, 1] being displayed.

Therefore, the correct answer is [2, 0, 2, 1].

To learn more about Array List click here

brainly.com/question/31018084

#SPJ11

Add the member function heapremove () to the heap class. the heapremove() returns the value of the removed node.

Answers

To add the member function heap remove() to the heap class, you can follow these steps:

1. Declare the heapremove() function in the class definition of the heap. It should have a return type of the node value that will be removed from the heap.
2. Check if the heap is empty. If it is, return a message indicating that the heap is empty and there are no nodes to remove.
3. If the heap is not empty, store the value of the root node in a temporary variable to return it later.
4. Replace the root node with the last leaf node in the heap.
5. Decrease the size of the heap by one.
6. Perform the heapifyDown() operation on the root node to maintain the heap property.
7. Finally, return the value of the removed node that was stored in the temporary variable.

In summary, the heapremove() function in the heap class removes the root node from the heap, returns its value, and maintains the heap property. The function checks if the heap is empty and returns an appropriate message if so. Otherwise, it replaces the root node with the last leaf node, decreases the size of the heap, and performs heapifyDown() to maintain the heap property.

To know more about operation visit:

brainly.com/question/33336258

#SPJ11

You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ45 ports connected to the switch. You want to allow visitors to plug into these ports to gain internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and internet access. Which feature should you implement

Answers

Answer:

VLANs

Explanation:

Virtual LANs (VLANs) are a type of network connection or arrangement of network devices in the same broadcast domain. They are called Virtual LANs because they represent fractions or subgroups in the switch ports found in an Ethernet LAN.

Indeed, because of their topological arrangement, this reduces the security risk of unauthorized access to sensitive data or devices since the host can be placed on a different VLAN. Hence, in this scenario, using this network feature would allow visitors to plug into these ports to gain internet access, but they would not have access to any other devices on the private network.

Which should be addressed by stakeholders when reviewing the problem statement? Select all that apply.

All possible outcomes have been thoroughly researched and rejected.

The problem as they see it has been addressed.

The solution proposed will meet their needs.

The needs of their colleagues are being met.

All issues and constraints have been identified.

Answers

The statement that should be addressed by stakeholders when reviewing the problem statement are the problem as they see it has been addressed, the solution proposed will meet their needs and all issues and constraints have been identified.

What are the elements of an effective problem statement?

An effective problem statement includes the description of the problem and the method that will be used to solve the problem.

The problem as they see it has been addressed, the solution proposed will meet their needs and all issues and constraints have been identified are the statement that should be addressed by stakeholders when reviewing the problem statement.

Therefore, B, C and E are the correct options.

Learn more about problem statement here:

https://brainly.com/question/11657822

#SPJ1

When you are framing the questions you will use data analytics to answer, what is the key to how you frame your questions?

Answers

When you are framing the questions you will use data analytics to answer, the key to frame the question is make it more specific to get a specific reply.

What are analytics questions?

Analytical questions are the questions that are asked about the person, the questions can be asked in an interview.

Analytical questions are where you have worked?, what you think about yourself, etc.

Thus, the key to frame the question is to make it more specific to get a specific reply.

Learn more about analytics questions

https://brainly.com/question/3988337

#SPJ1

Select the correct answer.Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio

Answers

Anne should use B: MP3 format to save her audio files.

MP3 is a standard technology and format for compressing an audio sequence into a very small file - about one-twelfth the size of the original file - while preserving the original level of audio quality when it is played. It means that the MP3 format is only for audio files and can reduce the size of audio files substantially while barely affecting the quality of the audio.

So in the given scenario where Anne wants to share music created by her band on her website. Further, she wants to ensure that the audio file size is small enough to permit her fans to stream the music over the Internet. The appropriate file format would be MP3.

"

Complete question:

Select the correct answer.Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio

A. WMV

B. MP3

C. JPEG

D. MP4.

"

You can learn more about MP3 format at

https://brainly.com/question/29194231

#SPJ4

What do you mean by Data Types? Give Examples.
Ms Access question​

Answers

Answer:

This answer is quite late, but data types are basically categories that differentiate stuff in python.

A few examples would be:

String - Anything that has single or double-quotes around it. The input( ) function automatically returns a string, unless changed.

Int - An integer. Any whole number.

Float - Any decimal number.

List - a variable in which you can store multiple different elements. (Strings, integers, floats, tuples, lists, etc...)

Also, sorry if my English isn't perfect. English isn't my first language.

Explanation:

Don't know. Just some stuff I remember from my python class. ∞

this text command defines how text will appear

Answers

In programming, the text command is not a specific command, but rather a term used to refer to a wide range of commands and functions that manipulate or display text.

What is a text command?

Text commands may include functions for formatting, searching, replacing, and displaying text within a program or on a screen. These commands may be used in a variety of programming languages, including C, as you mentioned.

In C, for example, there are many standard library functions that can be used to work with text. Some of the most commonly used functions for working with text in C include:

printf(): used to display formatted text on the screen or in a file

scanf(): used to read formatted text from the keyboard or a file

strcpy(): used to copy one string of text to another

strcmp(): used to compare two strings of text to determine if they are equal

strlen(): used to determine the length of a string of text

Overall, text commands are a crucial part of programming and are used extensively in applications that involve working with text data.

Learn more about text on:

https://brainly.com/question/20169296

#SPJ1

For this challenge you will need to write a program that will produce the display for the individual frames, given the user inputting the number of pins knocked down in each frame of bowling.
Rules:
• The game of bowling consists of 10 frames, where a player gets 2 attempts to knock down 10 pins.
• If the player knocks down all 10 pins on the first roll, that should be displayed as X, and the next number will be the first roll of the next frame.
• If the player doesn't knock down any pins, that should be displayed as -
• If the player gets a spare (knocks down the remaining pins on the second roll of the frame, that should be displayed as /
The user will input integers tha represent the number of pins that have been kncked down on each roll. The list is not a fixed size, as bowling a perfect game requires only 12 rolls, while most games would use more rolls. Use anvil to make this and send the link.

Answers

This method takes a list of numbers that represent how many pins were knocked down on each roll and outputs a string that displays the separate frames in accordance with bowling rules.

In bowling, how many pins are there?

At the start of each frame, ten pins are placed at the end of the bowling lane. With the triangle's point towards the bowler, they are positioned in a triangle arrangement.

function score(display frames):

body num = 1

0 for roll num

Result: ""

range(len(scores)) for I

If roll num = 3 and frame num = 10:

break

If roll num = 1 and scores[i] = 10:

result += "X "

frame num plus one

if roll num == 1, then

score(s[i]) + output += str(i) + " "

roll num plus one

else:

if scores[i-1] plus scores[i] equal 10, then

result += "/ "

else:

score(s[i]) + output += str(i) + " "

frame num plus one

0 for roll num

bring back output.strip ()

# A sample of usage

Result = [10, 7, 3, 9, 0, 10, 0, 8, 8, 2, 0, 6, 10, 10, 10, 8, 1]

print(display frames(scores)) # Results: X 7/9 - X 0/8 - X X/X/X 8 1

To know more about outputs  visit:-

https://brainly.com/question/19088371

#SPJ1

One of the advantages of communicating using social media is that you can use it to

a create a fake website
b promote and share your ideas
c push someone to do something he or she doesn't want to do
dshare your personal information

Answers

Answer:

b is correct because you can promote your ides others

The attributes and relationships associated with a particular entity will be somewhat similar across databases. T/F

Answers

The attributes and relationships associated with a particular entity will be somewhat similar across databases. is false.

What are the definitions of entity attribute relationship and metadata that are particular to databases?A property of an entity is described by an attribute, which is a name and a data type combination. Relationship: A connection between two entities that the database keeps track of. Database management system (DBMS) data that specifies the tables and properties of a database is known as metadata.Each row may be used to establish a relationship between multiple tables using a foreign key, which is a reference to a primary key of an existing table. All tables in a relational database have an attribute known as the primary key, which is a unique identifier of a row.

To learn more about attributes refer to:

https://brainly.com/question/29796715

#SPJ4

The getDefaultDisplay method from the WindowManager interface returns a __________________ reference.

Answers

Answer:

the answer is "display reference"

What is the difference between an embedded image and an attached image? An embedded image is displayed as an image in the body of an email, but an attached image is not. An embedded image is displayed as a paper clip in the content of an email, but an attached image is not. An attached image takes on a larger file size due to the extra data required to create the attachment. An attached image is a smaller file size due to the compression that takes place during the attachment process.

Answers

Answer:

An embedded image is displayed as an image in the body of an email, but an attached image is not.

Explanation:

This is the answer.

Answer:

it is a

Explanation:

How are charts inserted into a PowerPoint slide?
O Open the chart in Excel, click it and drag it into the slide.
O Double-click the chart in Excel, and click inside the slide to paste it into the presentation.
O Use the Copy tool to copy the chart from Excel and the Paste tool to insert it into the slide.
O Take a screenshot of the chart from Excel and paste it into the slide using the Paste tool.

Answers

It’s the third one.

Which finger types the highlighted keys?

Which finger types the highlighted keys?

Answers

Answer:

Index

Explanation:

The index finger lays positioned upon the 4 key.

Pointer finger. It is by columns, and your pointer finger occupy those

For which of the following are music editors responsible? (Select all that apply).


editing a film’s score

structuring the soundtrack

shooting interiors

editing a film’s musical soundtrack

Answers

Answer:

A: structuring the soundtrack

B: editing a film's score

D: editing a films musical soundtrack

Explanation:

edg2021

(other test answers:

(all but "long-lasting shots of the characters speaking"

true (that film editors review footage and notes from director...)

computer graphics

it indicates an exterior shot of an urban street scene )

For which of the following are music editors responsible? (Select all that apply).editing a films scorestructuring

Write a function sqsum of type int - > int that takes a non-negative integer it and returns the sum of the squares of all the integers 0 through n

Answers

The function "sqsum" takes a non-negative integer as input and calculates the sum of the squares of all integers from 0 to the given input.

The function "sqsum" is designed to calculate the sum of the squares of integers from 0 up to the given non-negative integer, denoted as 'n'. To achieve this, the function uses a loop that iterates from 0 to 'n'. During each iteration, the current integer is squared and added to a running total. This process continues until the loop reaches 'n'. Finally, the function returns the accumulated sum of the squares.

Here is an example to illustrate how the function works: If we call the "sqsum" function with the input 'n' as 4, the function would calculate the sum of the squares of 0, 1, 2, 3, and 4. It would square each integer (0^2, 1^2, 2^2, 3^2, 4^2) and add them together (0 + 1 + 4 + 9 + 16 = 30), resulting in the returned value of 30. This process can be applied to any non-negative integer, and the function will accurately compute the sum of the squares for that range.

learn more about  function "sqsum" here:

https://brainly.com/question/28015044

#SPJ11

how drone technology can impact recreation and entertainment​

Answers

Drones are become more advanced than ever before. Are now, they are starting to impact recreation. They are small, light, and can maneuver incredibly fast. They are being used in movies, skits, short films, and even high-end videos. Here are some ways drones are changing entertainment:

- Providing high-quality filming, even from 200 feet in the air.

- Reaching spaces where bulky helicopters cannot fit into safely

- Laser shows, where drones shine lights and lasers.

Right now, if you tried to hold your phone still to capture a video, you would not be able to do it. Upon checking the footage, you would see the camera shaking, even if it's just tiny bit. While you can lean it on a surface to fix this, it simply cannot be done in the air to capture. Not to worry, though, you've got drones. They can shoot a steady shot 200 feet in the air. The only thing that could rival drones are expensive, bulky choppers. The drones are cheaper and are mass produced.

However, drones are not only being used to filming movies and films. They are also being used for a different kind of entertainment: Shows. Drones move in formation and shine lights in the night sky, like we saw in the Winter Olympics. They are truly stunning(pics attached).

how drone technology can impact recreation and entertainment

17.35 ma of current is flowing though a brown-red-brown resistor,what is v

Answers

Answer:

2.1V

Explanation:

brown-red-brown = 120Ω

V = I·R = 17.35 · 120 = 2.082V

However, the tolerance of the resistor is at least 10%, so you can't express the voltage that accurate.

Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________

Answers

Answer:

The offset

Explanation:

In the question, we understand that the original text is HELLO and the encrypted text is OLSSV.

It should be noted that O replaced H, L replaced E, S replaced L and V replacement O.

This is made possible by a term refered to as offset.

The offset is used to determine the character that will replace another when it is encrypted.

7 characters after H is O; this is same for every other characters in the text.

The example given represents a simple shift cipher encryption with each letter in the original text shifted by a fixed value. Hence, the shift value of 7 used in the cipher given is called the key.

Each alphabet on the original text, HELLO is shifted by the key 7 to produce :

H + 7 alphabets gives OE + 7 alphabets gives LL + 7 alphabets gives SL + 7 alphabets gives SO + 7 alphabets gives V

This produces the encryption OLSSV, hence, with the shift of 7 known the encryption letters are each reversed by 7 to obtain the actual phrase 'HELLO'.

LEARN more :https://brainly.com/question/20504501

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

security is not a significant concern for developers of iot applications because of the limited scope of the private data these applications handle.
T/F

Answers

The statement suggesting that security is not a significant concern is not accurate, hence it is a false statement.

While it is true that some IoT applications may handle a limited scope of private data, it does not mean that security can be disregarded. Several reasons highlight the importance of security in IoT applications:

1. Vulnerabilities Exploitation: IoT devices and networks can have vulnerabilities that attackers can exploit. These vulnerabilities can be used to gain unauthorized access, tamper with devices, or launch attacks on other systems. Ignoring security measures can lead to serious consequences.

2. Privacy Protection: Even with a limited scope of private data, user privacy is still important. IoT applications often process personal information, such as location data, health records, or behavior patterns. Failure to protect this data can result in privacy breaches and harm to individuals.

3. Botnet Formation: Compromised IoT devices can be harnessed to form botnets, which are networks of infected devices used to launch large-scale attacks. Neglecting security can contribute to the proliferation of botnets and endanger the overall stability and security of the internet.

4. System Integration: IoT applications often integrate with other systems, such as cloud platforms or backend servers. Weak security measures can create vulnerabilities in the overall system, leading to unauthorized access, data breaches, or disruption of critical services.

5. Regulatory Requirements: Many industries and regions have specific regulations and standards regarding data security and privacy. Developers of IoT applications need to comply with these regulations to ensure legal and ethical practices.

Considering these factors, security should be a top priority for developers of IoT applications. Implementing strong security measures, such as encryption, access controls, secure coding practices, and regular updates, is essential to protect the integrity, privacy, and reliability of IoT systems.

Learn more about IoT at: https://brainly.com/question/19995128

#SPJ11

50 POINTSSS!!! Select the various storage management tools.

Disk Cleanup
Cleaning a desktop
Check Disk
Checking for errors
Disk Defragmenter
Cleaning a keyboard
Windows Update

THERE ARE MULTIPLE

Answers

Explanation:

cleaning a desktop

and cleaning a keyboard

Answer:

The answer above me is wrong and Cleaning a desktop and Cleaning a keyboard have nothing to do with storage management tools.

The correct answers are:

Disk Defragmenter

Check Disk

Checking for errors

Disk Cleanup

What type of error is raised when the Python virtual machine runs out of memory resources to manage a process

Answers

Stack overflow error is the  type of error is raised when the Python virtual machine runs out of memory resources to manage a process.

How can you define a stack overflow error example?

JVM will generate a StackOverflowError during this process if there is not enough room to store the new stack frames that must be constructed. Consider this: improper or nonexistent termination conditions This is mostly what leads to the condition known as unterminated or infinite recursion.

Why do Java stack overflow errors occur?

The Javadoc description for StackOverflowError notes that the error is generated as a result of too deep recursion in a specific code snippet as the most frequent cause for the JVM to experience this circumstance.

To know more about Stack overflow visit

brainly.com/question/28198079

#SPJ4

►Write
a python program that will convert Fahrenheit Temperature to Celsius and
Celsius Temperature to Fahrenheit

►Formulae
needed:


►°C
= (°F – 32) x 5/9


►°F
= (°C × 9/5) + 32

Answers

Answer:

import math

C_or_F = input("Enter C for Celcius or F for Farenheit: ")

if C_or_F == 'F':

 F = int(input("Enter degrees in Fahrenheit: "))

 Fahrenheit =(F-32)*(5/9)

 print(Fahrenheit,"°")

if C_or_F == 'C':

 C = int(input("Enter degrees in Celcius: "))

 Celcius = (C*(9/5))+32

 print (Celcius,"°")

Explanation:

The first input determines if it is Fahrenheit or Celcius. The second inputs determine how many degrees in that unit of temperature.

what do you think of zara’s approach to it in 2003? what current or potential strengths and weaknesses do you see in zara’s approach?

Answers

Zara's approach to IT in 2003 was both innovative and controversial. The fast-fashion retailer's in-house, minimalistic IT strategy was pivotal to its operations, providing certain strengths but also revealing potential weaknesses.

One of Zara's main strengths was its ability to rapidly respond to market trends, facilitated by its streamlined IT system, which was efficiently integrated into its business model. However, its refusal to upgrade the outdated DOS-based Point of Sales systems could be seen as a weakness. This minimalistic approach risked becoming obsolete, potentially hampering scalability and exposing the company to security risks. The company would need to balance the need for cost-efficiency with the necessity of staying technologically relevant.

Learn more about technologically here:

https://brainly.com/question/9171028

#SPJ11

Which process refers to starting up a computer?
Is the process of starting a computer.
Reset
Next

Answers

The process of Starting up a computer is referred to as booting
it refers to booting

Isabela wants to edit a presentation for her science class. she is in the main view of the powerpoint application. how can she access her presentation? go to the backstage view, and click options. click the file tab, and click the open option. click the quick access toolbar, and click the open option. type in the name of the file in the search field, and click open.

Answers

The Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

What is power point presentation?

Power point presentation is a softwere which display the data with the help of collection of slides.

Isabela wants to edit a presentation for her science class. She is in the main view of the powerpoint application.

Form the main view to access her presentation, Isabela need to follow the following steps-

Click the file tab which is at the main menu.Now she need to click the open option, which appers under the file tab.

Thus, the Isabela access her presentation for her science class by clicking the file tab, and clicking the open option.

Learn more about the power point presentation here;

https://brainly.com/question/24653274

Answer: It’s B, Click the File tab, and click the open option

Explanation:

just got it right on edge

to examine the router's routing table, a cisco administrator would enter which command?

Answers

To examine the router's routing table, a Cisco administrator would enter the "show ip route" command. This command provides a detailed view of the router's routing table, including all the available routes, their metrics, and the next-hop information.  

To examine the router's routing table, a Cisco administrator would enter the command "show ip route." This command provides a detailed view of the routing table, allowing the administrator to assess the current routing configuration and troubleshoot if necessary.

To know more about  routing table visit:-

https://brainly.com/question/29654124

#SPJ11

Other Questions
6) The sum of three consecutive numbers is seventy-eight.What is the smallest of the three numbers ? What value of m would make parallelogram wxyz a square. by the end of the 19th century the sing sabha had made the khalsa standard orthodoxy for all sikhs. T/F? who are the other famous photographers that you know?what are there famous works and accomplishments? A book falls off a shelf.When is the kinetic energy of the book the highest?A. when it has just started to fall B just before it strikes the groundC after it has hit the ground and stopedD when it was sitting of the shelf You have some baseball trading cards. You give 21 baseballcards to a friend and have 9 left for yourself. How many.baseball cards were in your original deck? Write and solvean equation to find t, the number of baseball cards inyour original deck. 11r-12r+15combine like terms is this a function? leta had $45 in her account in may. how much money does she have in her account in august? What's the measure of angle DEG in a neuron with a resting membrane potential of -65mv, the distribution of which ion across the neuronal membrane represents the greatest electrical potential? joshua experiences reflexive gasping for air during sleep several times a night and frequently wakes up because of it. joshua most likely has Read the following question from the interview in "Talking to the Coach."Why did you start coaching youth baseball?Because my kids started playing baseball. Cooper started playing, and then Healy, then Spenser. After the kids had been in the league for about three years, I was pressed into service as a coach because they didnt have enough coaches.What did the interviewer learn as a result of the question? factual information about Coach Thompsonopinions Coach Thompson hashow Coach Thompson feels about somethingplans Coach Thompson has for the future Describe a happy moment from your childhood 1. What type(s) of figurative language is (are) being used in the sentence below? Jimmy and Johnny jumped like jelly beans. A Metaphor B Idiom Personification Alliteration Jennifer works at a bookstore. She earns an hourly wage plus 4% commission on her monthly sales. Her total earnings for June, July, and August are shown. In June she earned $ 1,005. In July she earned $884 and in August she earned $936. Jennifer worked 60 hours in June, and her total sales were $8,625. Find the amount she earned from commission in June and the hourly wage she is paid. A 1-bedroom apartment costs $850 and increases by $150 for each additional bedroom. Suppose that 5 years ago the Cisco Company sold a 15-year bond issue, which had a par value of $5,000 and a coupon rate of 7 percent. Interest is paid semiannually. If the required return is 12 percent, what is the price of the bond today? Under what condition is it sold?a. OR $7,276.70, discountedb. Or $7,276.70, with premiumc. Or $3,279.40, with premiumd. $3,279.40, discountede. OR $7,276.70, per pair cultural biasA factor hypothesized to be present in intelligence tests that provides an advantage for test takers from certain cultural or ethnic backgrounds but that does not reflect true intelligence. Slinky established a petty cash fund for $400. Slinky purchased 50 units of inventory from a supplier on credit. The goods cost $40 each and the credit terms were 5/10, n/30. The shipping costs, paid in cash by Slinky, were $100 under the terms FOB Shipping. Slinky received the inventory on July 3rd. Slinky returned 5 units of inventory from the July 3rd transaction to the supplier. Slinky sold 15 of the units purchased on July 3rd for $55 each to customers for cash. Slinky accepted a return of one unit of inventory from a July 6th customer for a cash refund. Slinky paid the supplier for one-half of the inventory purchased on July 3rd. Be sure to account for any returns and/or purchase discounts. Slinky used $40 out of petty cash to pay for coffee meeting (coffee expense). Slinky purchased 10 units of inventory from a supplier on credit. The goods cost $25 each and no credit terms were granted. The shipping costs were $50 under the terms FOB destination and Slinky received the inventory on November 2nd Slinky paid the remaining balance owed to the supplier from the July 3rd transaction. Slinky replenished petty cash.Required:Prepare Journal Entries for July