CLS
N-8
C-1
DO
P-N MOD C
IF F-0 THEN PRINT C
N=N1
C-Cri
LOOP WHILE

Answers

Answer 1

This snippet of code was created in a computer language, and it stores the value of N modulo C in P. The value of C is displayed if F is zero. Until a particular condition is satisfied, N is updated to N1, and C is decreased by 1 in a cycle.

What purpose does the CLS instruction serve in basic?

CLS. The monitor screen is cleared by this instruction. It typically occurs in the first line of a program, leaving a blank screen at the start of the programme's execution.

What three categories do QBASIC programmers fall under?

The five arithmetic operators + (addition), - (subtraction), * (multiplication), / (division), and  can be used in math expressions in QBASIC. (exponentiation).

To know more about snippet visit:

https://brainly.com/question/30772469

#SPJ9


Related Questions

Computers are because they can perform many operations on their own with the few commands given to them

Answers

Computers are programmable because they can perform a wide range of operations on their own with just a few commands given to them. They are designed to carry out different functions through the execution of programs or software, which comprises a sequence of instructions that a computer can perform.

The instructions are expressed in programming languages, and they control the computer's behavior by manipulating its various components like the processor, memory, and input/output devices. Through these instructions, the computer can perform basic operations like arithmetic and logic calculations, data storage and retrieval, and data transfer between different devices.

Additionally, computers can also run complex applications that require multiple operations to be performed simultaneously, such as video editing, gaming, and data analysis. Computers can carry out their functions without any human intervention once the instructions are entered into the system.

This makes them highly efficient and reliable tools that can perform a wide range of tasks quickly and accurately. They have become an essential part of modern life, and their use has revolutionized various industries like healthcare, education, finance, and entertainment.

For more questions on Computers, click on:

https://brainly.com/question/24540334

#SPJ8

What does the abbreviation JPEG stand for?
A. Japanese Photographic Examination Group
B. Joint Photo Examination Group
C. Joint Photographic Expert Group
D. Jefferson Photo Exclusive Group
E. Jacket Photo Extension Group

Answers

Answer:

c) giant photographic experts group

Answer:

C

Explanation:

(often seen with its file extension stands for

"Joint Photographic Experts Group",

HLP Ltd. has already set up a private web server for its corporate network with Windows as an operating system, and now they have contacted you to make their network remotely accessible to a certain group of employees. They have also requested you to ensure that the selected protocol provides secured and encrypted transmissions. Which of the following protocols would you apply so that the employees can have secured remote access to the computer server?
a. the telnet protocol
b. RDP
c. the SSH protocol
d. POP3

Answers

I would advise using the Remote Desktop Protocol to grant secure remote access to the Windows server (RDP). Microsoft created the RDP proprietary protocol, which allows for secure, encrypted remote access

Remote access is the ability to use a computer, network, or application from a distance utilising an internet-based communication channel. Users can work remotely from any location, at any time, and on any device, increasing flexibility and productivity. Many technologies including Remote Desktop Protocol (RDP), Virtual Private Networks (VPNs), and Remote Access Services, can be used to provide remote access (RAS). If not done correctly, remote access can potentially provide security threats like malware infestations, unauthorised access, and data theft. Thus, it is crucial to guarantee that remote access solutions are safe, dependable, and sufficiently shielded from potential

Learn more about remote access here:

https://brainly.com/question/29850968

#SPJ4

With clear examples, describe how artificial intelligence is applied in fraud detection

Answers

Answer:

AI can be used to reject credit transactions or flag them for review. Like at Walmart

Explanation:

I work with AI, i know what i'm talking about.

what would be an ideal scenario for using edge computing solutions?​

Answers

Answer:

Edge computing is ideal for scenarios where there is a need for real-time processing of large amounts of data, such as IoT, HPC, video and audio processing, AR/VR, and healthcare applications. It can help reduce latency, improve reliability, and conserve bandwidth.

can be an unintentional cyber breach.
Software bugs
Replay attacks
Spoofing
HELP ME PLEASE!?!

Answers

Answer:Cybersecurity risks can be broadly segmented into two types: passive and active attacks. In a passive attack, no modification of data occurs and the target does not

Explanation:

bc i know

You should write the client so that it sends 10 ping requests to the server, separated by approximately one second. Each message contains a payload of data that includes the keyword PING, a sequence number, and a timestamp. After sending each packet, the client waits up to one second to receive a reply. If one second goes by without a reply from the server, then the client assumes that its packet or the server's reply packet has been lost in the network.Hint: Cut and paste PingServer, rename the code PingClient, and then modify the code. The two programs follow very similar process.You should write the client so that it starts with the following command:java PingClient host portwhere host is the name of the computer the server is running on and port is the port number it is listening to. Note that you can run the client and server either on different machines or on the same machine.The client should send 10 pings to the server. Because UDP is an unreliable protocol, some of the packets sent to the server may be lost, or some of the packets sent from server to client may be lost. For this reason, the client cannot wait indefinitely for a reply to a ping message. You should have the client wait up to one second for a reply; if no reply is received, then the client should assume that the packet was lost during transmission across the network. You will need to research the API for DatagramSocket to find out how to set the timeout value on a datagram socket.When developing your code, you should run the ping server on your machine, and test your client by sending packets to localhost (or, 127.0.0.1). After you have fully debugged your code, you should see how your application communicates across the network with a ping server run by another member of the class.Message FormatThe ping messages in this lab are formatted in a simple way. Each message contains a sequence of characters terminated by a carriage return character (r) and a line feed character (n). The message contains the following string:PING sequence_number time CRLFwhere sequence_number starts at 0 and progresses to 9 for each successive ping message sent by the client, time is the time when the client sent the message, and CRLF represent the carriage return and line feed characters that terminate the line.

Answers

Answer:

figure it out urself

Explanation:

Write a program that declares and initializes a variable representing the weight in milligrams from the keyboard. The program displays the equivalent weight in kilograms, grams, and milligrams. For example, 1050042 milligrams are equivalent to 1 kilogram, 50 grams, and 42 milligrams.

Answers

Answer:

weight = int(input("Enter weight in milligrams: "))

kilograms = int(weight / 1000000)

grams = int((weight - (kilograms * 1000000)) / 1000)

milligrams = weight - ((kilograms * 1000000) + (grams * 1000))

print("{} milligrams are equivalent to {} kilogram(s), {} gram(s), and {} milligram(s)".format(weight, kilograms, grams, milligrams))

Explanation:

*The code is in Python.

Ask the user to enter the weight and set it to the variable weight

Calculate the kilograms, divide the weight by 1000000 and cast the result to the int (If the weight is 1050042, kilograms would be 1050042/1000000 = 1)

Calculate the grams, subtract the kilograms from the weight, divide it by 1000 and cast the result to the int (If the weight is 1050042, grams would be int((1050042 - (1 * 1000000)) / 1000) = 50)

Calculate the milligrams, subtract the kilograms and grams from the weight (If the weight is 1050042, milligrams would be 1050042 - ((1 * 1000000) + (50 * 1000)) = 42)

Print the weight, kilograms, grams, and milligrams in the required format

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

Some important information informed in the statement that we have to use in the code is:

Calculate the kilograms, divide the weight by 1000000 and cast the result.Calculate the grams, subtract the kilograms from the weight, divide it by 1000 and cast the result.Calculate the milligrams, subtract the kilograms and grams from the weight.

So to make it easier the code can be found at:

weight = int(input("Enter weight in milligrams: "))

kilograms = int(weight / 1000000)

grams = int((weight - (kilograms * 1000000)) / 1000)

milligrams = weight - ((kilograms * 1000000) + (grams * 1000))

print("{} milligrams are equivalent to {} kilogram(s), {} gram(s), and {} milligram(s)".format(weight, kilograms, grams, milligrams))

See more about python at brainly.com/question/26104476

Write a program that declares and initializes a variable representing the weight in milligrams from the

Which term describes a protocol to manage a network able to configure out a network monitor activity and control devices

Answers

Answer:

im not sure but my brother told me it's Simple Network Management Protocol

Answer:

Simple Network Management Protocol (SNMP)

(Confirmed on EDGE)

I hope this helped!

Good luck <3

Which era marked a switch from agricultural practices to industrial practices?

Answers

The Industrial Revolution is the era that is marked a switch from agricultural practices to industrial practices.

What was the Inductrial revolution?

The Industrial revolution is the transition period between 1820 to 1840. The era was the development of new industries and manufacturing of products and goods in Great Britain.

Thus, the Industrial Revolution is the era that is marked a switch from agricultural practices to industrial practices.

Learn more about Inductrial revolution

https://brainly.com/question/1617908

#SPJ1

Which TWO objects are likely to have SSD chips in them?
office access card
bank debit card
food service token
discount coupon
business card

Answers

Bank card and discount coupon

Answer:

Bank card and discount coupon

Explanation:

The Greater Than sign (>) is an example of
operator.

Answers

Answer:

logical

Explanation:

the greater than sign (>) is an example of logical operator.

A > sign asks if the first value is greater than the second value. That is, is the value or expression to the left of the > sign greater than the value or expression to the right side? For example, the statement (A > B) is true if A is greater than B

https://brainly.in/question/6901230

To help insure that an HTML document renders well in many web browsers it is important to included which at top of file

Answers

Answer:

<!DOCTYPE html>

Explanation:

This tells the browseer that the code is HTML5 format

This assignment deals with Logical Equivalences. Review section 1.7 of the text before completing the assignment. The assignment may be handed in twice before it is graded. Consider the statements in the left column of the tables below. Translate each into a propositional statement. In the box below, indicate which two statements are logically equivalent. The gray shaded box is the Equation editor that should be used to enter the propositional expression.
Question 1
Statement Reason
Whenever there is a puppy in the house, I feel happy
If I am happy, then there is a puppy in the house
If there is not a puppy in the house, then I am not happy.
If I am not happy, then there is no puppy in the house
Question 2
Statement Reason
If I am in school today, then I am in CSC231 class
If I am not in school today, then I am not civics class
If I am not in CSC231 class, then I am not in school today
If I am in CSC231 class, then I am in school today

Answers

Answer:

Question (1) the statements (i) and( iv) are logically equivalent and statements (ii) and (iii) are logically equivalent. Question (2) the statements (i) and (iii) are logically equivalent.

Explanation:

Solution

Question (1)

Now,

Lets us p as puppy in the house, and q as i am happy

So,

p : puppy in the house,  and q : i am happy

Thus,

The Statements

(i) so if there is a puppy in the house, I feel happy :  p -> q

(ii) If I am happy, then there is a puppy in the house : q -> p

(iii) If there is no puppy in the house, then I am not happy.   : ~ p -> ~q

(iv) If I am not happy, then there is no puppy in the house : ~q -> ~p

Hence, the statements (i) and( iv) are logically equivalent and statements (ii) and (iii) are logically equivalent.

Question (2)

Let us denote p as i am in school today, and q as i am in CSC231 class, and r as i am in civics class,

So,

p: i am in school today, q: i am in CSC231 class, r: i am in civics class,

Now,

(i) if I am in school today, then I am in CSC231 class  :p -> q

(ii) If I am not in school today, then I am not civics class  :~p -> ~r

(iii) If I am not in CSC231 class, then I am not in school today  :~q -> ~p

(iv) If I am in CSC231 class, then I am in school today  : q -> p

Therefore, the statements i) and iii) are logically equivalent.

True/False: not is evaluated first; and is evaluated next; or is evaluated last.
Is the answer True or False

HELP PLS THIS IS DUE TODAY!!!

Answers

Evaluation should be first when approaching a new method

Why when I send a message on iOS it says the person’s notification is silenced, and the message isn’t delivered?

Answers

Answer:

This is because the other person has "Focus Mode" turned on. When this is turned on, all of your messages that you send to him/her will be silenced.

1. How many bits would you need to address a 2M × 32 memory if:
a) The memory is byte addressable?
b) The memory is word addressable?
2. How many bits are required to address a 4M × 16 main memory if:
a) Main memory is byte addressable?
b) Main memory is word addressable?
3. How many bits are required to address a 1M × 8 main memory if:
a) Main memory is byte addressable?
b) Main memory is word addreeable?

Answers

Answer:

a) 23       b) 21a) 43        b) 42a) 0          b) 0

Explanation:

1) How many bits is needed to address a 2M * 32 memory

2M = 2^1*2^20, while item =32 bit long word

hence ; L = 2^21 ; w = 32

a) when the memory is byte addressable

w = 8;  L = ( 2M * 32 ) / 8 =  2M * 4

hence number of bits =  log2(2M * 4)= log2 ( 2 * 2^20 * 2^2 ) = 23 bits

b) when the memory is word addressable

W = 32 ; L = ( 2M * 32 )/ 32 = 2M

hence the number of bits = log2 ( 2M ) = Log2 (2 * 2^20 ) = 21 bits

2) How many bits are required to address a 4M × 16 main memory

4M = 4^1*4^20 while item = 16 bit long word

hence L ( length ) = 4^21 ; w = 16

a) when the memory is byte addressable

w = 8 ; L = ( 4M * 16 ) / 8 = 4M * 2

hence number of bits = log 2 ( 4M * 2 ) = log 2 ( 4^1*4^20*2^1 ) ≈ 43 bits

b) when the memory is word addressable

w = 16 ; L = ( 4M * 16 ) / 16 = 4M

hence number of bits = log 2 ( 4M ) = log2 ( 4^1*4^20 ) ≈ 42 bits

3) How many bits are required to address a 1M * 8 main memory

1M = 1^1 * 1^20 ,  item = 8

L = 1^21 ; w = 8

a) when the memory is byte addressable

w = 8 ; L = ( 1 M * 8 ) / 8 = 1M

hence number of bits = log 2 ( 1M ) = log2 ( 1^1 * 1^20 ) = 0 bit

b) when memory is word addressable

w = 8 ; L = ( 1 M * 8 ) / 8 = 1M

number of bits = 0

An internet filter is firewall software used to block a users access to specific internet content. An internet filter can be installed on which three of the following

Answers

An internet filter can be installed on a variety of devices, including:Computers: Internet filters can be installed on individual computers, whether they are desktops, laptops, or tablets.

This allows users to control their own access to certain websites or types of content.Routers: Some routers have built-in internet filtering capabilities, which allow network administrators to control access to specific websites or types of content for all devices connected to the network.Mobile devices: Internet filters can also be installed on smartphones and other mobile devices, which can be particularly useful for parents who want to restrict their children's access to certain types of content while using their mobile devices. internet filters can be installed on a range of devices, depending on the specific needs of the user or organization. By blocking access to certain websites or types of content, internet filters can help to protect users from harmful or inappropriate content, and promote responsible internet use.

To learn more about laptops click the link below:

brainly.com/question/30551024

#SPJ1

please answer fast computer picture above​

please answer fast computer picture above

Answers

Answer:embedded computers are found in cats, appliances like light switches and voic actived tvs, security cameras, dvd players and elevators

Explanation:

A team of engineers have done the root cause analysis of all identified defects of Release 1. To prevent such defects occurring in the next release, they have proposed a few changes to the process.

Answers

The team of engineers have conducted a root cause analysis of all identified defects in Release 1. They have proposed process changes to prevent these defects from occurring in the next release.

What is an engineer?

An engineer is a professional who applies scientific, mathematical, and technical knowledge to design, develop, and improve products, systems, and processes. Engineers use their knowledge and skills to solve practical problems and meet the needs of society.

What is root cause?

A root cause is the fundamental reason or underlying factor that leads to a problem or issue. Identifying the root cause is important for developing effective solutions and preventing the problem from occurring again.

To know more about engineer's analysis visit:

https://brainly.com/question/19819958

#SPJ9

Four actions that can be implemented on a database to autocorrect violations of referential integrity, and the outcomes of the actions are listed below. Match the violation with the corrective action Instructions: Choose your responses from the drop-down menus below. Response options cannot be used more than once.
a. Sets invalid foreign keys to a default primary key value, specified in SQL
b. Propagates primary key changes to foreign keys
c. Rejects an insert, update, or delete
d. Sets invalid foreign keys to NULL
1. Restrict
2. Set Null
3. Set Default
4. Cascade

Answers

Answer:

Follows are the matching to this question:

\(Option \ a \to \ Option \ 3\\\\Option \ b \to \ Option \ 4\\\\Option \ c \to \ Option \ 1\\\\Option \ d \to \ Option \ 2\\\)

Explanation:

While time-consuming or prone to errors mechanical adjustments to both the referential, databases could be configured with four measures to engine violations. The restricted action causes the insert, update, and removes to only be denied. Set Null to NULL sets the invalid external key, whereas Set Default to a specific core consideration specified in SQL sets a default foreign key. Its Cascade operation spreads the main changes in external keys.

The COOJA simulator is a utility to simulate wireless sensor systems. It serves as tool
to verify the operability of applications on target systems without having physical
access to these systems. Starting COOJA is as simple as double-clicking the COOJA
symbol on the virtual machine's desktop.
Compiling and running Contiki OS code in COOJA works by creating virtual sensor devices whose behavior can be specified by pointing COOJA to the .c files that
contain the corresponding program code.
a) Create a new simulation in COOJA (Menu item: File → New simulation... ). Enter a name of your choice, leave the default settings unchanged, and click Create. Next, add some motes with the hello-world
implementation to your simulation. To this end, navigate to the following menu item: Motes → Add motes → Create new mote type → Z1
mote. In the appearing window, navigate to the hello-world.c file in
the /home/student/contiki-ng/examples/hello-world directory and click
Compile, then Create. Increase the number of nodes to create to 20, and
keep the option for random positioning. Finally, click Add motes.
Unless already active, activate the Mote IDs option under the View menu
of the simulator's Network window. Twenty numbered circles will now occur, each one representing a single node with the given firmware. The number
in the circle specifies the node address. Furthermore, activate the Radio environment option in the View menu and then click on one of the nodes;
a green circle will appear around it. Click on the start button in the Simulation control window next, let the application run for about ten seconds
while taking note of the speed value displayed in the same window, then
click pause.
b) State an approximate average value of the observed simulation speed. Can
you think of what a speed over 100% might mean, and what speed values below 100% indicate?
c) Deduce from the observations in the Network window what the green circles
around nodes (after having clicked on the node) indicate. Try to drag-and-drop
nodes around to see if/how the circles change. Explain your observations.
d) Create a new simulation in COOJA. This time, load one node with the
udp-server from /home/student/contiki-ng/examples/rpl-udp and five
nodes with the udp-client from the same directory. Run the simulation to
verify that nodes exchange data with each other. For this purpose, set the required options under the View menu.
Using your mouse, drag one of the receiver motes in the Network window
far away from the remaining nodes such that its green and gray circles contain
no other nodes (you may need to enlarge the Network window to this end
and/or move other nodes to accomplish this task). In the Timeline window,
locate the entry for this particular node (hint: Look for the entry with the ID
of the node which you can find in the Network window).
Compare this node's activity (represented by the colors in the timeline and the
log output) with the activity of all other nodes. What are your observations?
Can you explain them? Hint: you may find it useful to enable further event

Answers

a) The simulation speed in COOJA refers to the speed at which the simulation is running compared to real-time. The average value of the observed simulation speed will vary depending on the specifications of the computer being used to run the simulation. A simulation speed over 100% means that the simulation is running faster than real-time. On the other hand, speed values below 100% indicate that the simulation is running slower than real-time.

What is the simulator  about?

b) The green circles around nodes in the Network window indicate the range of the radio signal of each node. The green circle represents the area where other nodes can be reached by a node with the corresponding radio signal. By dragging and dropping nodes, you can observe how the green circle changes to show the new range of the node's radio signal.

c) To verify that nodes are exchanging data with each other, a new simulation was created and one node was loaded with the udp-server and five nodes with the udp-client. By observing the Timeline window, it is possible to locate the activity of each node and compare it to the activity of all other nodes. When a node is dragged far away from the other nodes, the activity of this node (represented by the colors in the timeline and the log output) will be different compared to the activity of the other nodes. This observation can be explained by the fact that the node is now out of range of the radio signals of the other nodes, and therefore cannot exchange data with them.

d) To understand the observations, it is important to keep in mind that COOJA is a tool used to simulate wireless sensor systems, and the data exchange between nodes is simulated according to the specifications defined in the code. The observed differences in activity between nodes can be attributed to differences in the range of their radio signals, as well as other factors such as the timing of the data exchange between nodes.

Learn more about simulator  form

https://brainly.com/question/24912812

#SPJ1

Pls help I'm trying not to fail.​

Pls help I'm trying not to fail.

Answers

Answer:

18

Explanation:

tryIt(2) will return 9 because 2+7 is 9 (7 is the default value of b)

9 * 2 = 18.

You can try this yourself at replit.

Pls help I'm trying not to fail.

Is it possible to compare 2 pre-packaged versions in cpi?

Answers

Yes, it is possible to compare two pre-packaged versions in the Consumer Price Index (CPI), but it can be challenging due to certain limitations of the index.

The CPI is designed to measure changes in the overall price level of a basket of goods and services consumed by households.

It focuses on broad categories and representative items within those categories, rather than specific versions of products.

When it comes to pre-packaged versions of products, there can be variations in size, quality, branding, and other attributes that may affect their prices differently.

These variations make direct comparisons complex within the framework of the CPI.

To compare two specific pre-packaged versions within the CPI, it would require detailed data on their specific characteristics and how they align with the representative item in the CPI basket.

This level of granularity may not be readily available in the public domain or within the CPI methodology.

For more questions on Consumer Price Index

https://brainly.com/question/8416975

#SPJ8

To make a window wider, you would move the pointer until it changes to the horizontal resize shape and then

Answers

Answer:double click it .

Explanation:

Technician A says that long hair should be secured to avoid entanglement. Technician B says that hairnets are NOT an effective means to secure hair. Who is correct? Select one: a. Technician A b. Technician B c. Both A and B Or d. Neither A nor B​

Answers

Answer:

technician A if you use the net it still saves the hair than letting it long and exposed

Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?

Answers

It should be noted that the intention for the creation of the internet was simply for resources sharing.

The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.

It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.

Learn more about the internet on:

https://brainly.com/question/2780939

The total number of AC cycles completed in one second is the current’s A.timing B.phase
C.frequency
D. Alterations

Answers

The total number of AC cycles completed in one second is referred to as the current's frequency. Therefore, the correct answer is frequency. (option c)

Define AC current: Explain that AC (alternating current) is a type of electrical current in which the direction of the electric charge periodically changes, oscillating back and forth.

Understand cycles: Describe that a cycle represents one complete oscillation of the AC waveform, starting from zero, reaching a positive peak, returning to zero, and then reaching a negative peak.

Introduce frequency: Define frequency as the measurement of how often a cycle is completed in a given time period, specifically, the number of cycles completed in one second.

Unit of measurement: Explain that the unit of measurement for frequency is hertz (Hz), named after Heinrich Hertz, a German physicist. One hertz represents one cycle per second.

Relate frequency to AC current: Clarify that the total number of AC cycles completed in one second is directly related to the frequency of the AC current.

Importance of frequency: Discuss the significance of frequency in electrical engineering and power systems. Mention that it affects the behavior of electrical devices, the design of power transmission systems, and the synchronization of different AC sources.

Frequency measurement: Explain that specialized instruments like frequency meters or digital multimeters with frequency measurement capabilities are used to accurately measure the frequency of an AC current.

Emphasize the correct answer: Reiterate that the current's frequency represents the total number of AC cycles completed in one second and is the appropriate choice from the given options.

By understanding the relationship between AC cycles and frequency, we can recognize that the total number of AC cycles completed in one second is referred to as the current's frequency. This knowledge is crucial for various aspects of electrical engineering and power systems. Therefore, the correct answer is frequency. (option c)

For more such questions on AC cycles, click on:

https://brainly.com/question/15850980

#SPJ8

QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin

Answers

Answer:

Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.

Explanation:

Komunikasi, dengan program ini kita juga bisa berkomunikasi dengan pengguna lain.Program ini sudah dirancang untuk bisa saling bertukar informasi dalam bentuk jaringan dimana orang lain bisa membuka lembar kerja kita dari terminal (komputer) yang berlainan,bahkan ia juga bisa melakukan perubahan pada lembar kerja yang sama pada saat yang bersamaan pula. Kata pengguna lain dapat disebut dengan kata:_____________

Answers

Answer:

what language is this?

Explanation:

Other Questions
PLZ HELP!!!!!! I NEED TO FINISH THE DIAGNOSTIC TODAY!!!!! A $30 maximum charge on an automobile inspection is an example of a price ceiling.FalseTrue in the raven the speakes responses to the raven change as the poem progresse why does the speaker become so angry with the raven Who determines what is produced?O CompaniesO The GovernmentO Society The exponential function y(x) = Cea satisfies the conditions y(0) = 9 and y(1) = 1. (a) Find the constants C and a. NOTE: Enter the exact values, or round to three decimal places. C: = = (b) Find y( In a raffle where 6000 tickets are sold for $2 each, one prize of $6600 will be awarded. What is the expected value of a single ticket in the raffle? A cube has a volume of 8 ft to the third power. What is its edge length? HELP I BEED THIS ASAP!!!!!!!Read the following scenarios. Which adolescent may be ready to enter into a relationship?Becky does not personally know the person who has been eyeing her, but she hears that he is on the football team and also made the honor roll. He is very cute.Someone very popular told Stephen that he better make up his mind about getting into a relationship with her. She says if he does not want her, someone else will like his bestfriend)One of Sherry's friends asked her out. She feels very comfortable talking to him but doesn't know if they have enough common interests. She wonders if they'll start havingdisagreementsRich just spent an hour having a conversation with someone he met at a party. They really clicked, and when they kissed, it felt right The length of a rectangle is 3 1/6 cm longer than the width. The perimeter of the rectangle is 15 1/3 cm. What are the width and length of this rectangle?PLS HELP ASAP!!!!!!!!!!!!!!!!! PLZ HELP I SUCK AT MATH Write one example of direct characterization and one example of indirect characterization A boy rides his bicycle 2.08 km. The wheels have radius 25.5 cm. What is the total angle (in rad) the tires rotate through during his trip? HELP PLEASE : Is this statement true or false? !!WORTH 15 POINTS!!The difference between the Declaration of Independence and the Constitution is the Declaration states goals or philosophy and the Constitution puts the ideals into action. Jenna created the graph below to represent the solution to the inequality Negative 6 less-than x.A number line going from negative 9 to positive 1. A closed circle is at negative 6. Everything to the right of the circle is shaded.What error did she make?She should have used an open circle at the end of the ray.She should have pointed the arrow to the left.She should have ended the ray with a circle at 5.She should have ended the ray with a circle at 7. radial lines on the complex plane (i.e. lines of constant phase or angle) are associated with what characteristic of underdamped 2nd order response? constant exponential decay rate constant natural frequency constant damping ratio constant frequency of oscillation Explain what demonstration and definition speeches are. Thenprovide examples of each type from your own experience. You may useeither speeches you have presented or ones you have viewed. In yourans The equation for the least-squares regression line to this data set is y with hat on top equals 13.198 x plus 153.6. what is the predicted number of total calories for a food item that contains 25 grams of fat? What should someone do if they suspect a friend is being trafficked through forced labor?reach out to authoritiesconfront the suspected traffickerstop talking to the possible victimtry to keep it from the public The axon of a resting neuron has gates that do not allow positive sodium ions to pass through the cell membrane. What is this characteristic called?. How many hour is 4:30 until 6:00