C++ InsertHead
program to create a linked list of integers and insert an element to the head of the linked list. Multiple elements can be inserted several times UNTIL a 0 is received.
#include
typedef int ElemType;
typedef struct LNode {
ElemType data;
struct LNode* next;
}LNode, *linkedList;
void showList(linkedList l) {
while (NULL != l) {
printf("%d\n", l->data);
l = l->next;
}
}

Answers

Answer 1

This program first defines the LNode struct, which represents a node in the linked list. The LNode struct has two members: data The C++ code for the insert head program:

C++

#include <iostream>

using namespace std;

typedef struct LNode {

 int data;

 struct LNode* next;

} LNode, *linkedList;

void showList(linkedList l) {

 while (l != NULL) {

   cout << l->data << endl;

   l = l->next;

 }

}

void insertHead(linkedList* head, int data) {

 LNode* newNode = new LNode();

 newNode->data = data;

 newNode->next = *head;

 *head = newNode;

}

int main() {

 linkedList head = NULL;

 int data;

 while (true) {

   cin >> data;

   if (data == 0) {

     break;

   }

   insertHead(&head, data);

 }

 showList(head);

 return 0;

}

This program first defines the LNode struct, which represents a node in the linked list. The LNode struct has two members: data, which stores the data of the node, and next, which points to the next node in the linked list.

The program then defines the showList() function, which prints the contents of the linked list. The showList() function takes a pointer to the head of the linked list as input and prints the data of each node in the linked list.

The program then defines the insertHead() function, which inserts a new node at the head of the linked list. The insertHead() function takes a pointer to the head of the linked list and the data of the new node as input.

The insertHead() function creates a new node, sets the of the new node to the data that was passed in, and sets the next pointer of the new node to the head of the linked list. The insertHead() function then updates the head of the linked list to point to the new node.

The main function of the program first initializes the head of the linked list to NULL. The main function then enters a loop where it prompts the user to enter a data value. If the user enters 0, the loop terminates.

Otherwise, the main function calls the insertHead() function to insert the data value into the linked list. The main function then calls the showList() function to print the contents of the linked list. The program will continue to run until the user enters 0.

To know more about data click here

brainly.com/question/11941925

#SPJ11


Related Questions

7. Write long answer of the following questions. a. Explain the various tabs used by Microsoft Office Word 2010.
b. What is design template? How to create a template? Write with proper steps.
c. What is watermark text? What is the purpose of using it? Write proper steps to insert watermark in your document​

Answers

try searching the first few ones the answer should show up and the rest should be easy to search

Explanation:

Which type of system is not proprietary?

Answers

Nonproprietary software is open source and accessible for free download and usage. It also makes its source code completely available. Software that is not proprietary can also be referred to as open-source.

Due to the fact that Linux and Android are not proprietary, there are several variations of both operating systems. A system, tool, or program that is solely owned by an organization is referred to as proprietary technology. In most cases, the proprietor develops and employs them domestically in order to manufacture and offer goods and services to clients. From the foregoing, it can be inferred that Microsoft Windows is an example of proprietary system software. Linux is an open-source, free operating system that was made available under the GNU General Public License (GPL). The source code may be used, examined, altered, and distributed by anybody, and they may even sell copies of the altered code. computer operating system that is specific to a certain class of computers

Learn more about software here:

https://brainly.com/question/1022352

#SPJ4

What is the most likely reason for protecting a worksheet?

to track all changes made by editors to a worksheet
to stamp the worksheet with an individual’s information
to prevent email programs from sending the worksheet
to prevent unauthorized users from modifying the worksheet

Answers

Answer: D, to prevent unauthorized users from modifying the worksheet.

Explanation:

Answer:

D. to prevent unauthorized users from modifying the worksheet

Explanation:

hope this helps :)

how many mail servers does the use of e-mail involve?

Answers

The use of email typically involves multiple mail servers. Email communication follows a client-server model, where the email client interacts with the mail server to send and receive emails.

When you send an email, your email client communicates with your outgoing mail server (SMTP server) to deliver the message. The outgoing mail server then communicates with the recipient's incoming mail server (POP or IMAP server) to store the email. The recipient's email client retrieves the email from the incoming mail server. In addition to these two mail servers involved in the direct exchange of emails, there may be intermediate mail servers and relay servers that handle the routing and delivery of emails across different networks and domains. These servers work together to ensure the successful transmission of emails between senders and recipients.

Learn more about mail servers  here:

https://brainly.com/question/30159736

#SPJ11

Read each example and then select what it is describing. Jackie sends Margot a text to “watch her back” at school. Casey follows Joel to chat rooms and discussion forums to make fun of him, even after Joel asks Casey to stop. Xavier hacks into Kaleb’s social media account. Xavier begins posting inappropriate updates, pretending to be Kaleb. Samuel and Jessica have created a website about Rochelle where people can post unflattering pictures of her.

Answers

Answer:

first one is power imbalance

second one is cyber stalking

third one is impersonation

the forth one is harassment

Explanation:

I know because I got it right on edginuity.

1) Assume you are adding an item 'F' to the end of this list (enqueue('F')). You have created a new linear node called temp that contains a pointer to 'F'. Also assume that in the queue linked list implementation, we use the variable numNodes to keep track of the number of elements in the queue.

Answers

When a new item 'F' is added to the end of the queue list (enqueue('F')), a new linear node is created called temp that contains a pointer to the new element. In a queue linked list implementation, the variable numNodes is used to keep track of the number of elements in the queue.

As a result, we increment the numNodes variable by 1 since a new item has been added to the queue list. The pointer at the tail of the queue is then updated to the newly added node temp. We can do this by assigning the new node temp to the current node that is being referenced by the tail pointer.

Next, if the queue was previously empty, then we set both the head and tail pointers to temp. If the queue wasn't empty, we leave the head pointer unmodified, since the element added is being added to the end of the queue. We then return the updated queue list with the newly added item 'F'.In summary, when adding a new item 'F' to the end of a queue list implementation, we first create a new node that points to the new element.

To know more about mplementation visit:

https://brainly.com/question/32092603

#SPJ11

to copy the contents of a cell to the cell directly below it, click the target cell and press ____.

Answers

To copy the contents of a cell to the cell directly below it, click the target cell and press Ctrl+ D. Press "Ctrl" and "D" keys to copy contents of a cell to the cell below it.

To copy the contents of a cell to the cell directly below it in Microsoft Excel, there are several ways to do it. One of the easiest ways is to use the keyboard shortcut keys. Click on the cell that contains the content you want to copy and press the "Ctrl" and "D" keys simultaneously.

This will automatically copy the contents of the cell and paste it in the cell directly below it. Another way to do this is to use the "AutoFill" feature in Excel. Click on the cell that contains the content you want to copy and drag the fill handle (a small square located at the bottom right corner of the cell) down to the cell where you want to paste the content. This will also copy the content to the cell below.

Learn more about shortcut keys here:

https://brainly.com/question/30630407

#SPJ11

the military has two different programs for training aircraft personnel. a government regulatory agency has been commissioned to evaluate any differences that may exist between the two programs. 55

Answers

The government regulatory agency has been commissioned to evaluate any differences that may exist between the two training programs for aircraft personnel in the military.

The military has two distinct training programs for aircraft personnel, and the government regulatory agency has been tasked with evaluating these programs to identify any differences between them. The agency will likely conduct a comprehensive analysis, comparing various aspects such as curriculum, training methods, duration, instructor qualifications, and evaluation procedures. By assessing these factors, the agency can determine whether there are significant variations in the two programs and identify areas of improvement or standardization if necessary.

The evaluation conducted by the government regulatory agency is crucial to ensure the effectiveness, consistency, and compliance of the training programs for aircraft personnel in the military. It aims to identify any discrepancies, gaps, or potential areas of improvement, ultimately contributing to the enhancement of training standards and the overall performance of personnel.

You can learn more about training standards at

https://brainly.com/question/20520200

#SPJ11

The two programs of training aircraft personnel in the military are compared by the government regulatory agency to evaluate any differences that may exist between the two programs. As per the given statement, we can assume that the two programs of training aircraft personnel in the military are quite different from each other.

Training programs in the military are very different from other training programs as they are designed to prepare individuals to work in a specific and critical environment.Training aircraft personnel in the military is important for the successful operation of aircraft. This training should be comprehensive, in-depth, and designed for hands-on training in the field. The two programs in the military might have different training methods, instructors, resources, and techniques.

The government regulatory agency will look into all these factors to evaluate any differences between the two programs. This will help them to determine which program is more effective and which one needs improvement. Moreover, the evaluation will provide information on the effectiveness of each program in terms of developing the skills and knowledge of the personnel.

Once the evaluation is done, the military will be able to make necessary changes to the programs to enhance the skills and knowledge of the personnel. The evaluation will help the military to provide better training to its personnel and ensure the successful operation of aircraft.

In conclusion, the evaluation of the two programs will help the government regulatory agency to identify the differences between them and provide valuable information to the military on how to improve their training programs.

To know more about  government regulatory agency visit:

https://brainly.com/question/5063270

#SPJ11

Security awareness and training and workforce security standards are examples of which of the following?A) Administrative safeguardsB) Physical safeguardsC) Technical safeguardsD) Organizational requirements

Answers

Security awareness and training and workforce security standards are examples of Administrative safeguards.

So, the correct answer is A.

Administrative safeguards refer to policies and procedures that manage the selection, development, implementation, and maintenance of security measures to protect the confidentiality, integrity, and availability of electronic protected health information (ePHI).

These safeguards include security management processes, security personnel, information access management, workforce training and management, and contingency planning.

Security awareness and training and workforce security standards fall under the workforce training and management category of administrative safeguards.

These measures help ensure that the workforce is aware of security risks and trained to handle ePHI securely, thereby reducing the risk of breaches and safeguarding the privacy and security of patient information.

Hence the answer of the question is A.

Learn more about administrative safeguard at

https://brainly.com/question/24924687

#SPJ11

2. Which pattern microphone should Jennifer take to the press conference? Jennifer is a journalist with one of the leading newspapers in LA. She has been assigned the coverage of a press conference for the launch of a latest phone. She placed her microphone right in front of the speaker. Her boss had asked her to take a ______ microphone.​

Answers

Answer:

dynamic

Explanation:

which of the following are benefits of the domain name system (dns)? select all that apply. 1 point it provides addresses that are easier for people to remember. it helps automate network configuration. it assigns internet protocol (ip) addresses. it provides network address translation (nat).

Answers

The correct answers are:

It provides addresses that are easier for people to remember.It helps automate network configuration.

The benefits of the Domain Name System (DNS) include:

It provides addresses that are easier for people to remember: DNS enables the mapping of domain names (e.g., www.stat.com) to their corresponding IP addresses. This allows users to access websites or services using human-readable domain names instead of having to remember complex IP addresses.It helps automate network configuration: DNS simplifies network configuration by automatically resolving domain names to IP addresses. Instead of manually configuring IP addresses for each device or service, DNS enables automated lookup and resolution of domain names, making network administration more efficient.It assigns Internet Protocol (IP) addresses: DNS does not directly assign IP addresses, but it plays a critical role in the resolution of domain names to their associated IP addresses. DNS servers store and distribute IP address information, facilitating the proper routing and delivery of network traffic.

To know more about Domain Name System (DNS)

brainly.com/question/32768737

#SPJ11

One benefit proprietary licensed software is that it

One benefit proprietary licensed software is that it

Answers

Answer:C

Explanation:

Which of these would make text on a slide difficult to read?
Ohigh contrast between text and background
Olow contrast between text and background
O a sans serif font
O a large font when the presentation is in a large room

Answers

Low contrast between your text and the background


Airspace safety and security systems for counter UAV technology1. The paper should be about Airspace safety and security systems for counter UAV technology 2. Include the following sections:  Reference, Summary & Reaction section.  The summary section should include the main elements of the paper while the reaction section is where you put your personal feedback to the article your critiquing.

Answers

Your paper should demonstrate a clear understanding of the main elements of airspace safety and security systems for counter UAV technology, as well as thoughtful analysis and evaluation of the article.

Airspace safety and security systems for counter UAV technology involve the implementation of measures to protect airspace from unauthorized or malicious unmanned aerial vehicles (UAVs). These systems are designed to ensure the safe and secure operation of aircraft and prevent any potential threats posed by UAVs.

1. Reference: In this section, you need to provide the citation or reference for the paper you are summarizing and reacting to. Make sure to follow the appropriate citation style (e.g., APA, MLA) specified by your instructor or institution.

2. Summary: The summary section should provide a concise overview of the main elements discussed in the paper. Here, you need to outline the key points related to airspace safety and security systems for counter UAV technology. These may include:

  - Importance of airspace safety: Highlight the significance of protecting airspace to ensure the safety and security of manned aircraft, infrastructure, and individuals on the ground.
  - UAV threats: Discuss the potential threats posed by unauthorized UAVs, such as surveillance, privacy invasion, smuggling, or even terrorist activities.
  - Counter UAV technology: Explain the various systems and technologies used to counter UAV threats. This may include detection, identification, tracking, and neutralization methods.
  - Detection systems: Describe the different sensors and techniques employed to detect UAVs in airspace, such as radar, radio frequency (RF) scanners, acoustic sensors, and electro-optical systems.
  - Identification and tracking systems: Discuss how UAVs can be identified and tracked using technologies like transponders, radio frequency identification (RFID), or computer vision algorithms.
  - Neutralization methods: Explain the methods used to neutralize UAV threats, such as jamming communication signals, disabling control systems, or even physical interception.

3. Reaction: In the reaction section, you should provide your personal feedback and critique of the article. This is where you can express your thoughts, opinions, and evaluation of the information presented. Consider addressing the following points:

  - Effectiveness of the discussed airspace safety and security systems: Evaluate the effectiveness of the counter UAV technologies discussed in the paper. Are they practical and reliable in real-world scenarios?
  - Limitations and challenges: Identify any limitations or challenges associated with the implementation of airspace safety and security systems for counter UAV technology. This may include technological limitations, legal and regulatory issues, or costs.
  - Future developments: Discuss potential advancements or future directions in counter UAV technology. Are there any emerging technologies or approaches that could enhance airspace safety and security?

Remember to provide evidence or examples to support your reactions and opinions. It's important to maintain an objective and critical perspective while providing constructive feedback.

Learn more about UAV technology here :-

https://brainly.com/question/32274165

#SPJ11

HELP ASAP
please will mark brainliest

HELP ASAP please will mark brainliest

Answers

Answer:

123

Explanation:

Answer:

The top one is patent

the middle one is copy right

the last one is trademark

Which of these might be an example of an advertiser's target group? A. People who watch a variety of TV shows B. People the advertiser knows nothing about C. People who live in the same region of the country D. People who have no access to media

Answers

An example of an advertiser's target group is: B. People the advertiser knows nothing about.

What is an advertisement?

An advertisement can be defined as a group of consumer promotions programs which is designed and developed with the sole intention of making the various goods or services that are being offered by a business firm to become known, popular and familiar to all of its customers and potential customers.

This ultimately implies that, consumer promotions programs such as online display and television advertisements, can help a business firm in the following positive ways:

To generate store traffic.To enhance brand loyalty.To facilitate and influence the final decision of a customer to purchase an item.

In this context, we can infer and logically deduce that an example of an advertiser's target group is people the advertiser knows nothing about.

Read more on advertisements here: https://brainly.com/question/1658517

#SPJ1

derived attributes are stored in a special database table.

Answers

Derived attributes are not typically stored in a separate database table in a relational database model. Derived attributes are computed or derived from other attributes in the database. They are not stored directly in the database but can be calculated or derived when needed using queries or functions.

Derived attributes are derived based on the values of other attributes or data in the database. They can be calculated dynamically when a query or operation is executed, rather than being stored as persistent data in a separate table.

For example, if you have a database table with attributes like "height" and "weight," you can calculate the BMI (Body Mass Index) as a derived attribute based on the formula: BMI = weight / (height * height). The BMI value is not stored as a separate attribute in the table but can be computed on-the-fly when needed using a query or calculation.

So, in summary, derived attributes are not stored in a special database table but can be calculated or derived from other attributes during query execution or through functions and expressions.

) A block of byte long data residing in between and including the consecutive addresses $1000 to $4FFF are to be used to turn on two LEDs that are individually connected to two separate output ports of a system designed around the 68000 microprocessor. Each data byte has a logic 'l' for bit 7 and bit 0 to turn on the LEDs. However, it is known that only bits 7 and 0 of all of the byte long data set in the memory block is corrupted. Write an assembly language program for the 68k that checks the values of bits 7 and 0 of each data byte residing in the memory block in question. The program must change the value of bit 7 and 0 to '1'if they are '0', resulting in a new data value that must be restored back at same address position. On the other hand, if bits 7 and 0 are already '1', the data byte should be retained. The program must also indicate the number of bit 7 and 0 that has been corrected from the data block. The BTST instruction may not be used in your program.

Answers

Here's an assembly language program for the 68000 microprocessor that checks and corrects the values of bits 7 and 0 of each data byte in the memory block while keeping track of the number of corrections made:

```assembly

ORG $1000    ; Start address of the memory block

DATA_BLOCK  DC.B $00,$00,$00,$00   ; Initialize the data block with zeros

RESULT      DC.B $00,$00,$00,$00   ; Resultant data block with corrected bits

CORRECTIONS DS.W 1                 ; Variable to store the number of corrections made

START:

   MOVEA.L #$1000, A0             ; Address of the start of the memory block

   MOVEA.L #$1000, A1             ; Address of the resultant data block

   MOVE.W #0, CORRECTIONS         ; Initialize the corrections counter

   

LOOP:

   MOVE.B (A0)+, D0               ; Get a byte from the memory block

   MOVE.B D0, D1                  ; Make a copy of the byte

   

   ANDI.B #$81, D0                ; Mask out all bits except 7 and 0

   BNE NO_CORRECTION              ; Skip correction if bits 7 and 0 are already '1'

   

   ORI.B #$81, D1                 ; Set bits 7 and 0 to '1' in the copy

   

   ADD.W #1, CORRECTIONS          ; Increment the corrections counter

   

NO_CORRECTION:

   MOVE.B D1, (A1)+               ; Store the corrected byte in the resultant data block

   

   CMPA.L #$5000, A0              ; Check if the end of the memory block has been reached

   BLO LOOP                       ; Repeat the loop if not

   

   RTS                            ; Return from subroutine

```

The program starts at the label `START`, which sets up the necessary registers and initializes the corrections counter.The memory block starts at address `$1000`, and we use the `A0` register to point to the current byte in the memory block.

The `A1` register is used to point to the current byte in the resultant data block, where the corrected bytes will be stored.The `CORRECTIONS` variable is initially set to zero using the `MOVE.W #0, CORRECTIONS` instruction.

Inside the `LOOP`, each byte from the memory block is loaded into the `D0` register using `MOVE.B (A0)+, D0`. A copy of the byte is made in the `D1` register using `MOVE.B D0, D1`. The `ANDI.B #$81, D0` instruction masks out all bits except 7 and 0, allowing us to check their values.

If the result of the `ANDI` operation is nonzero (i.e., bits 7 and 0 are already set to '1'), the program branches to `NO_CORRECTION` to skip the correction step. If the result of the `ANDI` operation is zero (i.e., bits 7 and 0 are '0'), the program proceeds to `NO_CORRECTION` and sets bits 7 and 0 to '1' using `ORI.B #$81, D1`.

After the correction (or no correction), the corrected byte in `D1` is stored in the resultant data block using `MOVE.B D1, (A1)+`. The program then checks if the end of the memory block ($4FFF) has been reached using CMPA.L #$5000, A0 and repeats the loop if it hasn't.

Once the end of the memory block is reached, the program returns from the subroutine using RTS. The number of corrections made is stored in the CORRECTIONS variable, which can be accessed after the program finishes execution.

Learn more about assembly language: https://brainly.com/question/13171889

#SPJ11

consider the following program, which is intended to display the number of times a number target appears in a list.

Answers

The given program aims to count the number of times a specific target number appears in a list.

The provided program likely involves iterating through each element in the list and comparing it to the target number. By keeping a count variable, the program increments it each time the target number is found in the list. The final count represents the number of occurrences of the target number in the list.

This program is useful when there is a need to determine the frequency of a particular number within a given list. It can be applied in various scenarios, such as analyzing data sets, processing user inputs, or performing statistical calculations.

To implement this program effectively, it is crucial to ensure that the list and target number are properly defined and accessible within the program. Additionally, appropriate loop constructs or list iteration methods should be utilized to iterate through the list elements. Each element should be checked against the target number, and the count variable should be updated accordingly.

By executing this program, one can obtain the desired count of occurrences of the target number in the list, providing valuable information about the data distribution or helping in decision-making processes.

Learn more about  program

brainly.com/question/30613605

#SPJ11

Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device?A. -fB. -pC. /allD. -gE. -t

Answers

use the "-t" parameter with the ping command on a Windows device.

What is ping command?

On a Windows device, the "ping" command can be used to test network connectivity by sending ICMP packets to a destination host. To send a constant stream of packets using the ping command, you can use the "-t" parameter.

The "-t" parameter in the ping command tells it to send packets continuously until interrupted by the user, as opposed to the default behavior of sending four packets and then stopping.

Here's an example of how to use the "-t" parameter with the ping command on a Windows device:

ping -t <destination IP address or hostname>

This command will continuously send ICMP packets to the specified destination until the user interrupts it by pressing Ctrl+C.

To know more about ping command, visit: https://brainly.com/question/24181922

#SPJ4

The _______ is used to change the date Auto Fill option.
A. Fill Tag
B. Tag
C. Smart Fill
D. Smart Tag

Answers

I assume you are talking about Excel?. You first--enter your initial date on the first cell and click the cell with the first date to select it, then drag the fill handle.

Authoring, maintaining or adding an article to an existing blog is called ___________

Answers

Answer:

"post"

I am not sure so, sorry about that

QUESTION:

\(\rm \tiny \color{red}Authoring \: maintaining \: or \: adding \: an \: article \: to \: an \: existing \: blog \: is \: called\)

ANSWER:

Authoring, maintaining or adding an article to an existing blog is called Post

\( \tt \small \color{green}by \: : \: denfor \\ \tt \: brainlyeveryday :)\)

:

What finger should be on the Y key?
1. Left Middle finger
2. Right Index finger
3. Left Index finger
4. Right Middle finger

Answers

Answer:

Right index

Explanation:

it's 2, right index finger

If your e-mail program has a spell checker, you don't have to proofread your e-mail messages. Spell checker does it for you and is better at it than humans.


True

False

Answers

Answer:

False you would still have to proof read to make sure you don't sound dum⁶ saying what ever your trying to say and spell check doesn't always correct things

Which HTML Tag Contains Cell Tags Besides the Table Tag?

Answers

The HTML tag that contains cell tags besides the table tag is the "tr" tag, which stands for "table row." Within the "tr" tag, the "td" tag is used to define individual table cells, while the "th" tag is used for table header cells.

The "tr" tag is used to create a row within a table, with each "td" or "th" element representing a cell within that row. These tags allow for the organization and display of tabular data on a webpage, making it easier for users to read and understand. By using these tags correctly, developers can create well-structured and visually appealing tables on their websites.

To learn more about data click here: brainly.com/question/29117029

#SPJ11

a specific type of data stored for a record
options:
A. Table
B. Field
c. Cell

Answers

Answer:

Table

Explanation:

A set of data is stored in a table.

Do you think social media has helped polarize the nation? Why or why not?

Answers

Answer:

Yes, it makes many people hide their lives or what they like to do. I say this because social media may say things are unacceptable, so then people will believe and try to hide their personality.

what is a file named TR/Dldr.Adload.ugkeo doing on my computer

Answers

Answer:

That's brainly's way of making sure you're not a bot

Explanation:

I don't actually know

Answer:

did you download any file from this user or this similar link look at the picture below. If you please take it to someone who know how to get rid of viruses

what is a file named TR/Dldr.Adload.ugkeo doing on my computer

The location is part of the Post-Production stage of creating a video.
True or
False

Answers

The correct answer is true!!!!!!!!!

Wearables, video playback and tracking devices can help athletes because

Answers

Answer: rap accusations

Explanation:

Other Questions
Aubrey bought a pepperoni pizza. It was served on a metal tray with a radius of 3 inches. What is the tray's area?Use 3.14 for . If necessary, round your answer to the nearest hundredth. square inches PLEASE HELP ME Im Stuck on this What is the common ion in a solution prepared by mixing 0.10 m nach3co2 with 0.10 m ch3co2h? a) h3o b) ch3co2- c) na d) oh- Put the following equation of a line into slope-intercept form, simplifying allfractions. 3x = 21PLS HELP ASAP the principles of deep learning theory: an effective theory approach to understanding neural networks pdf a)For the last 200 million years the amount of carbon dioxide in the atmosphere hasremained almost the same.Describe the natural processes which remove carbon dioxide from the atmosphere.To gain full marks in this question you should write your ideas in good English,Put them into a sensible order and use the correct scientific words. Jasmine left school and traveled toward the dump at an average speed of 40 km/h. Anjali left two hours later and traveled in the opposite direction with an average speed of 60 km/h. How long does Anjali need to travel before they are 380 km apart? A city currently has 133 streetlights. As part of an urban renewal program, the city council has decided to install 2 additional streetlights at the end of each week for the next 52 weeks. Use this information to complete the following statements. Round to the nearest whole number as needed.The city will have (blank) streetlights at the end of 49 weeks.The city will have 191 streetlights at the end of (blank) weeks. Sacagawea and Charbonneau were invited to join the Corps of Discovery as:A. NavigatorsB. DoctorsC. TranslatorsD. Negotiators Choose the correct category that matches this word: Natural RightsA: State of natureB: Social contractC: Both Transcribe the following sequence.5' TCGGCGCTATACTTT 3b. What enzyme does transcription? What does limited liability mean? The personal assets of the owners cannot be claimed if the business is bankrupt. The owners of the business are personally responsible for paying expenses incurred by the business. Anybody with a liability against a firm can claim only what their liability refers to. Only employees can have a claim on the assets of the business. Which graph shows a system with no solutions? The budget line shows: a. all possible combinations of two goods which yield the same level of satisfaction to the consumerb. possible combinations of two products which a consumer can purchase, give her income and the prices of the products. c. all equilibrium point on an indifference curve d. the amount of product A which a consumer is willing to give up in order to obtain one more unit of product B Indicate how many stereoisomers are possible for each compound. help 7th grade math! What am I supposed to say ,Iwant to thank my freind for spending a lot of time with me during lockdown From a Word ProblemAn online camera store charges $3 for every8x10 picture that you order. Theshipping cost is $8. Write an equation tomodel this situation. How much will it cost toget 5 pictures printed? 1. people cannot deliver introductory speeches about themselves because as speakers they are not objective. Find each percent of change.1. 40 to 262. 75 to 813. 25 to 194. 68 to 345. 45 to 186. 50 to 297. 64 to 488. 50 to 739. 65 to 5210. 25 to 2811. 80 to 5612. 50 to 5113. 15 to 2114. 60 to 6315. 50 to 4316. 50 to 5817. 75 to 5118. 12 to 319. 20 to 3620. 80 to 24