I need help on the 6. 1. 5: Circle Pyramid 2. 0 on codehs HELP!

Answers

Answer 1

You can create a circle pyramid in problem 6.1.5: Circle Pyramid 2.0 on CodeHS.

Problem 6.1.5: Circle Pyramid 2.0 on CodeHS. Here's a step-by-step explanation to create a circle pyramid in this coding exercise:

1. First, understand the problem statement. You need to create a circle pyramid with each row having circles of the same size, but with a smaller size as you move upwards.

2. Initialize the necessary variables for the circle radius, number of rows, and starting position (x, y coordinates).

3. Use a loop (for example, a "for" loop) to iterate through the number of rows.

4. Within the loop for rows, create another loop to draw circles in each row. This loop should iterate based on the current row number (for example, the first row has one circle, the second row has two circles, and so on).

5. Calculate the x and y positions for each circle based on the current row number, circle radius, and any necessary padding or spacing.

6. Use the `circle()` function to draw a circle at the calculated x and y positions with the specified radius.

7. After drawing all the circles in a row, update the radius, x, and y positions for the next row.

Following these steps should help you create a circle pyramid in problem 6.1.5: Circle Pyramid 2.0 on CodeHS.

Learn more about circle pyramid visit:

https://brainly.com/question/23572624

#SPJ11


Related Questions

Write a short program in assembly that reads the numbers stored in an array named once, doubles the value, and writes them to another array named twice. Initialize both arrays in the ram using assembler directives. The array once should contain the numbers {0x3, 0xe, 0xf8, 0xfe0}. You can initialize the array twice to all zeros

Answers

Answer:

Assuming it's talking about x86-64 architecture, here's the program:

section .data

once:   dd 0x3, 0xe, 0xf8, 0xfe0

twice:  times 4 dd 0

section .text

global _start

_start:

   mov esi, once    ; set esi to the start of the once array

   mov edi, twice   ; set edi to the start of the twice array

   mov ecx, 4       ; set the loop counter to 4 (the number of elements in the arrays)

loop:

   mov eax, [esi]   ; load a value from once into eax

   add eax, eax     ; double the value

   mov [edi], eax   ; store the result in twice

   add esi, 4       ; advance to the next element in once

   add edi, 4       ; advance to the next element in twice

   loop loop        ; repeat until ecx is zero

   ; exit the program

   mov eax, 60      ; system call for exit

   xor ebx, ebx     ; return code of zero

   syscall

Explanation:

The 'dd' directive defines the once array with the specified values, and the 'times' directive defines the twice array with four zero values.

It uses the 'mov' instruction to set the registers 'esi' and 'edi' to the start of the once and twice arrays respectively. Then it sets the loop counter 'ecx' to 4.

The program then enters a loop that loads a value from once into 'eax', doubles the value by adding it to itself, stores the result in twice, and then advances to the next element in both arrays. This loop will repeat until 'ecx' is zero.

Hope this helps! (By the way, the comments (;) aren't necessary, they're just there to help - remember, they're not instructions).

You have been enlisted to design a soda machine dispenser for your department lounge. Sodas are partially subsidized by the student chapter of the ieee, so they cost only 25 cents. The machine accepts nickels, dimes, and quarters. When enough coins have been inserted, it dispenses the soda and returns any necessary change. Design an fsm controller for the soda machine. The fsm inputs are nickel, dime, and quarter, indicating which coin was inserted. Assume that exactly one coin is inserted on each cycle. The outputs are dispense, returnnickel, returndime, and returntwodimes. When the fsm reaches 25 cents, it asserts dispense and the necessary return outputs required to deliver the appropriate change. Then it should be ready to start accepting coins for another soda

Answers

Sure, I can help you design the FSM controller for the soda machine. Here is one possible solution:

State 0: Initial state

Inputs: None

Outputs: None

Next states: State 0 (stay in this state)

State 1: Accepting nickels

Inputs: nickel

Outputs: returnnickel

Next states: State 2 (when total input is 5 cents), State 1 (otherwise)

State 2: Accepting dimes

Inputs: dime

Outputs: returndime, returnnickel (if necessary)

Next states: State 3 (when total input is 10 cents), State 2 (otherwise)

State 3: Accepting quarters

Inputs: quarter

Outputs: dispense, returntwodimes (if necessary), returndime (if necessary), returnnickel (if necessary)

Next states: State 0 (after dispensing soda)

In this FSM controller, each state represents the amount of money that has been inserted so far. State 0 is the initial state, where the machine is waiting for the first coin to be inserted. State 1 accepts nickels and moves to state 2 when the total input reaches 5 cents. State 2 accepts dimes and moves to state 3 when the total input reaches 10 cents. State 3 accepts quarters and dispenses the soda when the total input reaches 25 cents. If change is necessary, it returns two dimes, one dime and one nickel, or one nickel as appropriate. After dispensing the soda and returning any necessary change, the FSM controller returns to state 0 to accept coins for another soda.

Learn more about FSM controller here:

brainly.com/question/32059496

#SPJ11

If you play video games, please answer these questions it’s for a survey for my game development class!!

Why do you play video games?
What types of games do you play?
How long have you been playing video games?
How do you think video games will be played in the future?
Do you think video games will converge to a single platform in the future?

Answers

Answer:

Doom, fortnlte, mlnecraft, ark survival evolved, ark survival of the fittest, terraria, raft, among us, ect.

First person shooters, Third person shooters, Creative games

8-10 years

More VR, better graphics, more realistic

Maybe, not anytime soon.

Explanation:

In terms of technolagy, soft wear is defined as

Answers

Answer:

the programs and other operating information used by a computer.

Explanation:

somthing like windows or linux.

In which number system do the digital computer work​

Answers

The numbers that are operated on by a digital computer is known as the binary number system; binary digits, or bits. These are 0's and 1's.

Plz help asap
I'm giving 20 points to whoever answers it right

Plz help asap I'm giving 20 points to whoever answers it right

Answers

Answer:

A pneumatic system is a system that uses compressed air to transmit and control energy. Pneumatic systems are used extensively in various industries. Most pneumatic systems rely on a constant supply of compressed air to make them work. This is provided by an air compressor.

A hydraulic system is a drive technology where a fluid is used to move the energy from e.g. an electric motor to an actuator, such as a hydraulic cylinder. The fluid is theoretically uncompressible and the fluid path can be flexible in the same way as an electric cable.

Explanation:

Examples of pneumatic systems and components Air brakes on buses and trucks. Air brakes on trains. Air compressors. Air engines for pneumatically powered vehicles. Barostat systems used in Neurogastroenterology and for researching electricity. Cable jetting, a way to install cables in ducts. Dental drill.

Hydraulic systems use the pump to push hydraulic fluid through the system to create fluid power. The fluid passes through the valves and flows to the cylinder where the hydraulic energy converts back into mechanical energy. The valves help to direct the flow of the liquid and relieve pressure when needed.

What threat do insiders with authorized access to information systems pose.

Answers

Answer:

The Cyber and Infrastructure Security Agency (CISA) defines insider threat the threat that an insider will use his or her authorized access, wittingly or unwittingly, to do harm to the Department's mission, resources, personnel, facilities, information, equipment, networks, or systems.

to recognize users across different devices, what is required for user id?

Answers

Answer:

To recognize users across different devices, Sign-in is required for User ID

Hope it helps

what type of activities are performed with the help of the software used in hospitals?

Answers

Answer:

Xrays, Ultrasounds, managing patient records, communicating with colleagues, etc.

xrays ultrasounds lasers

Q2 Mr. Amit wants to buy a computer system and recently visited a newly opened electronic show room Called Impel Infosys. He wanted to find out about the computers but came out totally confused by the

Answers

Amit realizes he needs a mouse, but he is unsure what for. Here's an explanation of why a mouse is required and descriptions of different types of mice:

What is the computer system

Amit acknowledges his requirement for a mouse, but remains uncertain about its intended use. Discover the reason why a mouse is necessary and explore diverse types of mice.

A computer system requires a mouse as a crucial tool for its input operations. Users can control graphical user interfaces (GUIs) by using a cursor to navigate the screen and make selections or adjustments to objects. The standard mouse comprises a pointing device and buttons that sense its motion.

Learn more about computer system  from

https://brainly.com/question/22946942

#SPJ4

Mr. Amit wants to buy a computer system and recently visited a newly opened electronic show room Called Impel Infosys. He wanted to find out about the computers but came out totally confused by the "computerese" he heard. He has made a list of questions he needs answer and has come to you for help. Answer the question below: •Amit realizes he needs a mouse, but he is unsure what for. Explain why mouse is required and describe a mouse with a trackball, an infrared mouse, a mouse with a scroll wheel and cordless mouse. [10 Marks]

Which of the following is one of the tools in REPL.it that helps prevent syntax errors?
It adds closing quotes and parentheses if you type the opening ones.
It changes your binary input to the decimal system.
It allows you to see the interpreter’s algorithm.
It limits the pixel resolution.

Answers

Answer:

A. It adds closing quotes and parentheses if you type the opening ones.

Explanation:

Answer:

Yes the answer is A got a 100% hope you get a 100% too have a good day:)

Explanation:

Why is the ISPM 15 Code/Marking used?

Answers

The ISPM 15 (International Standards for Phytosanitary Measures No. 15) code/markings are used for a specific purpose related to international trade and the movement of wood packaging materials (WPM). The primary objective of ISPM 15 is to prevent the spread of pests and diseases that can be carried by wood packaging materials.

Wood packaging materials, such as pallets, crates, and dunnage, can harbor harmful insects and pathogens. When these materials are transported across international borders, there is a risk of introducing pests or diseases to new regions, which can have devastating consequences for agriculture, forestry, and ecosystems.

To address this risk, the ISPM 15 code/markings set out guidelines for treating WPM through approved methods such as heat treatment or fumigation. Treated WPM is then marked with a specific stamp or branding that certifies its compliance with ISPM 15 standards. This marking serves as evidence that the wood packaging has undergone appropriate treatment, reducing the risk of pest or disease transmission.

The use of ISPM 15 code/markings promotes phytosanitary measures and helps ensure that international trade involving wood packaging materials is conducted in a manner that protects plant health and minimizes the spread of pests and diseases across borders.

To learn more about phytosanitary, visit:

https://brainly.com/question/33281097

#SPJ11

elizabeth is explaining various hacking terms to a class. she is in the process of discussing the history of phone system hacking. what is the term for hacking a phone system?

Answers

To a group of students, Elizabeth is defining several hacking concepts. She is currently talking about the background of phone system hacking. Phreaking is the phrase for breaking into a phone system.

What is the name of the hacking approach that involves convincing someone to divulge information?

Attacks by Phishers: Phishing attackers act as a reliable organization or person in an effort to get you to reveal personal information and other valuables. Phishing attacks are focused in one of two ways: Mass phishing, often known as spam phishing, is a common attack that targets numerous victims.

Pharming is a sort of phishing attack that switches users from a trustworthy website to one that is fraudulent by poisoning the DNS cache. This is done in an effort to deceive people into entering their personal login information on the bogus website.

To learn more about hacking visit:

brainly.com/question/14835601

#SPJ4

Can someone help me with Unit 7 of cmu cs academy python. PLSS EMERGENCYY

Answers

Carnegie Mellon University's CMU CS Academy is an online, graphics-based computer science curriculum taught in Python.

Why is Phyton important?

Python has become a data science industry standard, allowing data analysts and other professionals to do complicated statistical computations, produce data visualizations, design machine learning algorithms, handle and analyze data, and accomplish other data-related jobs.

Development time is far more essential than computer run time in today's society. Python just cannot be beat in terms of time-to-market. Python is also efficient and dependable, allowing developers to design complex programs with minimal effort.

Learn more about Phyton:
https://brainly.com/question/31768977
#SPJ1

The computer code behind password input can be modified to force people to change their password for security reasons. This is known as “password expiration,” and some websites and companies use it regularly. However, people tend to choose new passwords that are too similar to their old ones, so this practice has not proven to be very effective (Chiasson & van Oorschot, 2015). Your friends have a hard time remembering passwords. What method can you devise for them so that they can remember their new passwords AND make them very different from the old ones?

Answers

Answer:

to remember the passwords you could either make a little rhyme to "help" remember it or you could be like everyone else and write it down on a piece of paper. you could also write the password over and over again to make it stick. a way to make a password different from an old one is to use completely different wording and completely different numbers.

Explanation:

Television, video, computers, radios, and magazines used by target audiences are all what types of channels?

Answers

The target audiences' use of television, video, computers, radios, and periodicals all fall under the category of influence channels.

What are influence channels?Theoretically, how members interpret the channel or the world leads to channel impact. In terms of management, becoming more conscious of "the sensible worlds" in which oneself and others behave is the first step toward being able to analyze and potentially modify preexisting influence patterns. Humans are extremely complicated beings. We are the result of all the influences in our life, including those from our families, schools, churches, social groups, governments, and organizations.

Cialdini's "6 Principles of Influence," which are:

reciprocity, commitment/consistency, social evidence, authority, liking,scarcity,were the most important parts of this book.

To learn more about influence types of channels, refer to:

https://brainly.com/question/6641095

#SPJ4

write a brief memo (ga-2) highlighting what you believe are potential problem areas. include tickmarked printouts of your calculations as support (ga-2-1, ga-2-2, etc.). dw

Answers

Memo: Potential Problem Areas - GA-2

Date: [Insert Date]

From: [Your Name]

To: [Recipient's Name]

Subject: Potential Problem Areas

After careful analysis and calculations, I have identified several potential problem areas that require attention. These areas are outlined below, along with supporting documentation:

[Problem Area 1]

[Problem Area 2]

[Problem Area 3]

[Problem Area 4]

[Problem Area 5]

Please refer to the attached printouts (GA-2-1, GA-2-2, etc.) for detailed calculations and further explanation of each problem area. These findings should be thoroughly reviewed and addressed to mitigate any negative impact on our operations.

[Problem Area 1]: Detailed calculations in GA-2-1 highlight a potential issue regarding budget allocation, indicating that certain departments may be experiencing insufficient funding, which could hinder their performance and productivity.

[Problem Area 2]: GA-2-2 demonstrates a discrepancy in inventory management, with an excess of certain items and shortages of others. This could lead to operational inefficiencies, increased costs, and customer dissatisfaction.

[Problem Area 3]: GA-2-3 showcases a decline in customer satisfaction scores over the past quarter. It is crucial to investigate the root causes behind this decline and take necessary actions to enhance customer experience.

[Problem Area 4]: GA-2-4 reveals a spike in employee turnover rates in specific departments. Addressing this issue is vital to retain skilled employees, maintain morale, and ensure consistent productivity.

[Problem Area 5]: GA-2-5 indicates a decline in website traffic and conversion rates. It is essential to assess the website's performance, identify potential usability issues, and implement strategies to attract and engage more visitors.

By focusing on these potential problem areas, we can proactively address the underlying issues and work towards their resolution. I recommend convening a cross-functional team to further investigate these areas and develop appropriate action plans.

Please feel free to reach out if you require any additional information or clarification.

Attachments:

GA-2-1: Budget Allocation Analysis

GA-2-2: Inventory Management Discrepancies

GA-2-3: Customer Satisfaction Score Trend

GA-2-4: Employee Turnover Rates by Department

GA-2-5: Website Traffic and Conversion Analysis.

Learn more about traffic click here:

brainly.com/question/29989882

#SPJ11

You need to implement the following models to forecast next day VaR and Backtest the VaR on
data of your choice.
1. Historical simulation
2. Monte Carlo simulation
3. Simple Variance based approach (backtesting using 250 days and 125 days’ data)
4. RiskMetrics
5. GARCH model with all six distributions
6. GJR-GARCH model with all six distributions
7. EGARCH model with all six distributions
You need to prepare a Table at the end where you need to compare the %age breaches, total
excess capital and total excess loss of the given models to identify the best performing

Answers

In order to forecast next day Value at Risk (VaR) and backtest it, several models were implemented and compared. These models include Historical Simulation, Monte Carlo Simulation, Simple Variance-based approach, RiskMetrics, GARCH model with all six distributions, GJR-GARCH model with all six distributions, and EGARCH model with all six distributions. The performance of each model was evaluated based on the percentage of breaches, total excess capital, and total excess loss.

To forecast next day VaR and backtest it, various models were employed. Historical Simulation involves using historical data to estimate VaR. Monte Carlo Simulation generates multiple future scenarios based on historical data and estimates VaR from the distribution of outcomes. The Simple Variance-based approach calculates VaR based on the variance of returns.

RiskMetrics is a widely used VaR model that incorporates volatility clustering and captures tail risk. GARCH (Generalized Autoregressive Conditional Heteroskedasticity) models, including GARCH, GJR-GARCH, and EGARCH, are econometric models that capture time-varying volatility and asymmetric effects. These models were implemented with six different distributions.

After implementing these models, their performance was assessed by comparing the percentage of breaches, total excess capital, and total excess loss. The percentage of breaches indicates the proportion of times the VaR was exceeded, while the total excess capital and total excess loss measure the financial impact of breaches.

By analyzing these performance metrics across the models, we can determine which model performs the best in terms of accurately forecasting VaR and effectively capturing downside risk. The table at the end provides a comprehensive comparison of the models based on these metrics, aiding in the identification of the best-performing model.

Learn more about forecast here:

https://brainly.com/question/28588472

#SPJ11

which of the following protocols can detect and correct link failures in milliseconds? a. TRILL
b. SPB
c. RSTP
d. CARP

Answers

The protocol that can detect and correct link failures in milliseconds is c. Rapid Spanning Tree Protocol (RSTP).

RSTP is an evolution of the standard Spanning Tree Protocol (STP), which was designed to prevent network loops by blocking redundant links. However, STP had a slow convergence time, which made it unsuitable for modern networks that require high availability and fast failover times.

RSTP reduces the convergence time by quickly detecting and reacting to link failures, and by enabling port states to change from blocking to forwarding in milliseconds.

This means that RSTP can provide a nearly seamless failover in case of a link failure, allowing the network to continue functioning without interruption. TRILL, SPB, and CARP are also protocols that provide redundancy and failover capabilities, but they are not as fast as RSTP in detecting and correcting link failures.

Therefore the correct option is c. RSTP

Learn more about Rapid Spanning Tree Protocol:https://brainly.com/question/29749550

#SPJ11

attacks that are so new that they have not been clearly identified, and so have not made it into security screening systems are called

Answers

Organizations ask ethical hackers to find potential security holes that nefarious hackers could take advantage of. The goal of ethical hacking is to assess the security of target systems, networks, or system infrastructure and find flaws. State-sponsored attacks are extremely sophisticated, expensive to develop, and may only have a short shelf life.

Criminals that attempt to hack an organization won't, unless absolutely necessary, reinvent the wheel: They'll use widely used hacking methods that are well-known to be very successful, such malware, phishing, or cross-site scripting (XSS). Understanding the many attack vectors a malicious actor may employ to hurt someone is helpful whether you're attempting to make sense of the most recent data breach headline in the news or evaluating an occurrence in your own organization. Here is a summary of some of the most prevalent attack types in use today.

learn to know more about cybercrime:

https://brainly.com/question/13109173

#SPJ4

Which of the following is an example of an Internet of Things technology?

Answers

Answer:

IoT connects a variety of sensors, alarms, cameras, lights, and microphones to provide 24/7/365 security—all of which can be controlled from a smart phone. For example, the Ring doorbell camera security system allows users to see, hear, and speak to visitors at their door via a computer, tablet, or mobile phone

Please, put the option’s

Assignment 4: Divisible by Three
ProjectSTEM
hello! I have no clue at all how to do this and need help.

Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.
Assignment 4: Divisible by Three ProjectSTEMhello! I have no clue at all how to do this and need help.

Answers

For iterating through a series, use a for loop. This functions more like an iterator method seen in other object-oriented programming languages and is less like the for keyword found in other programming languages.

How to write program in loop ?

A high-level, all-purpose programming language is Python. Code readability is prioritised in its design philosophy, which makes heavy use of indentation. Python uses garbage collection and has dynamic typing. It supports a variety of programming paradigms, such as functional, object-oriented, and structured programming.

A while loop in Python is used to repeatedly run a block of statements up until a specified condition is met. And the line in the programme that follows the loop is run when the condition changes to false.

We can write the code in a simple way like this below :

n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

 num = int(input("Enter number: "))

 if num % 3== 0:

     divisible += 1

     print(str(num)+" is divisible  by 3")

 else:

     notdivisible += 1

     print(str(num)+" is not divisible by 3")

print("You entered "+str(divisible )+" even number(s).")

print("You entered "+str(notdivisible )+" odd number(s).")

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ1

Answer:n = int(input("How many numbers do you need to check? "))

divisible  = 0

notdivisible  = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

    divisible += 1

    print(str(num)+" is divisible  by 3.")

else:

    notdivisible += 1

    print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")

Explanation:

For that one that's I'm on python <3

Why gasoline cars shouldn’t be banned?

Answers

Answer:

By restricting the use of gasoline, environmentalists increase the demand for electricity. This in turn increases the price of coal, which incentives production of coal, a fossil fuel that produces more CO2 emissions than gasoline.Oct 9, 2020

Explanation:

pls mark brainliest

Convert the following C code to MIPSzy assembly. Presume that the array's base address is at address 2000 and that its variable is stored at address 4000 . You may choose the registers to use for values (20 pts): int x[8]; x[7]=25;

Answers

MIPS assembly code typically consists of multiple lines of instructions to accomplish the desired functionality. Here's the MIPS assembly code that corresponds to the given C code:

```assembly

   .data

x:  .space 32          # Reserve 32 bytes of memory for the array 'x'

   .text

   .globl main

main:

   la $t0, x                # Load the base address of array 'x' into register $t0

   li $t1, 7                # Load the index 7 into register $t1

   li $t2, 25           # Load the value 25 into register $t2

   add $t0, $t0, $t1   # Add the base address and index to get the address of x[7]

   sw $t2, 0($t0)      # Store the value 25 at address x[7]

   # End of the program

   li $v0, 10

   syscall

```

In this MIPS assembly code, the base address of the array 'x' is loaded into register `$t0` using the `la` (load address) instruction. The index 7 is loaded into register `$t1`, and the value 25 is loaded into register `$t2`. The base address and index are added using the `add` instruction to calculate the address of `x[7]`. Finally, the value 25 is stored at the calculated address using the `sw` (store word) instruction.

Please note that the given MIPS assembly code assumes the use of a data segment `.data` and a text segment `.text` for separating data and instructions. The `.data` segment declares the space for the array 'x', and the `.text` segment contains the main program logic.

To know more about functionality visit-

brainly.com/question/30802109

#SPJ11

Convert the following C code to MIPSzy assembly. Presume that the array's base address is at address

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

What type of variable is “a” in : a=x/4 (in C++ programming language?)

Answers

Answer:

In C++ programming language, "a" would be a variable of type integer or floating-point number depending on the type of "x".

Name one common framework that is used by web developers to build responsive websites​

Answers

Answer:

Twitter Bootstrap

Explanation:

Bootstrap is a popular, modern front-end/UI development framework.

Old systems can be useful when designing new computer software.
True or False

Answers

True! Just ask Apple incorp
correct answer:
True

The Interpreter reads the code you have written and executes it line-by-line. A. True B. False

Answers

Answer:

A, True

Explanation:

Got it right on my test

The Interpreter reads the code you have written and executes it line-by-line. A. True B. False

Answer:

True

Explanation:

I got it right on the test

Thank you person above me

Select the correct answer from each drop-down menu.
Which US government departments fund the Global Positioning System?
The Global Positioning System is funded by the Department of ____
A. Information
B. Defense
C. Tourism

and the Department of ____
A. Intellengence
B. Consumer Affairs
C. Transportation


Please answer!!! Please dont answer if you dont know the answer
.

Answers

the global posting system is funded by the department of Defense

Answer: 1. Defense 2. Transportation

Explanation:

Other Questions
GivenAa set of whole positive numbers. Show that there is a non-empty subset such that the sum of all elements ofBis divisible bym.[Suggestion: Considering A={ }, suppose that no sum of the form , is divisible bym][as an example of the intended, consider setA={3,9,14,18,23} with 5 elements. If you consider for example.I={3,14,18} you have 3+14+18=35, which is divisible by 5]Note: I don't know why, but Latex equations arenot showing up. In the last 3 weeks , Ben saw 3 films, then4 films and then 3 films . Is there a constant rate ? Help please What is the slope of the line:3y - 4 = 5 (x + 2) "There is a direct link between healing the individual and healing this planet. We will not have healthy individuals, healthy families, and healthy communities if we do not have clean air, clean water and healthy soil. Itis our core business to minimally impact the environment and to provide an optimum health[y] and safe environment for our workers and our patients."LloydDean, President and CEO of Catholic Healthcare WestAlthough a key mission of the healthcare sector is to improve peoples health, medical activities contribute to pollute the environment and cause climate change to get worse. This adversely affects human health and imposes additional burdens on the healthcare system. Therefore, it is the sole responsibility of large, profitable healthcare providers to take actions to slow down climate change.RequiredCritically explore the ideas expressed above. 2. Select in the following list which property is related tofriction in a fluid motion.a. Viscosityb. Conductivityc. Diffusivityd. Density I need help with #7 #11 #12 #13 and #14 please and ASAP James has 861 feet of rope. There are 14 teams of hikers.If James gives an equal amount of rope to each team, how much rope will each team receive? Thu has read that book twice->That book Simplify the expression. 5^3 7^0a)15b)0c)125d)1/125 Why were mortality rates of slaves so high on the slave ships during the "Middle Passage?"Illness-- The conditions on the ships were not suitable for the number of people aboard or their bodily functions.Disease ran rampant among all on board the slave ships of the "Middle Passage."Illness- The mental health of the crew often deteriorated during a long voyage. Hallucinations would occur thatwould lead to mass executions of slaves on board during the "Middle Passage."Illness-- The Africans were not immune to European diseases and would contract the disease when first makingcontact with European slavers at the trade ports in Africa. The disease would manifest itself weeks later duringthe "Middle Passage."OIllness-- The mental health of people locked to a boat for weeks on end often deteriorated and they would jumpoverboard during the "Middle Passage." 500 is decreased by 40%. The result is then decreased by 40%, and so on. In total, the decrease is applied 10 times. Write an expression to represent the final result of this process. I need help asap!!!!! A student pushes a wheeled cart eastward.Another student pushes the cart westward. Thecart's position will change only if which of thefollowing is true?(Show proof for brainliest)!!!! your sick grandma has been admitted at the hospital.write a letter to your brother describing the state of her health when u visited her. In which area of an EMR will you find the patient's vital signs?Select one:Medication orderLabs & medical testsPatient care teamMedical history Identify the correct number of protons, neutrons, and electrons of an element with the following informationprotons:neutrons:electrons: Someone plz help me :( bc = ad solve for a merchandise (invoice amount) freight paid by seller freight terms returns and allowances (invoice amount) a. $24,000 $300 fob destination, 1/10, n/30 $2,000 b. 31,500 250 fob shipping point, 2/10, n/30 2,500\ what was nigeria's government like after it gained independence (from 1966 to 1999)? URGENT