In how many ways can we select a chair person, vice president, secretary and treasurer from a group of 12 people?

Answers

Answer 1
To determine the number of ways we can select a chairperson, vice president, secretary, and treasurer from a group of 12 people, we can use the concept of permutations. First, we need to understand that the order in which the positions are filled matters. 1. For the chairperson position, we have 12 options since any of the 12 people can be chosen. 2. For the vice president position, after selecting the chairperson, we have 11 remaining options since one person has already been chosen. 3. For the secretary position, after selecting the chairperson and vice president, we have 10 remaining options. 4. For the treasurer position, after selecting the chairperson, vice president, and secretary, we have 9 remaining options. To find the total number of ways, we multiply the number of options at each step: 12 * 11 * 10 * 9 = 11,880. Therefore, there are 11,880 ways to select a chairperson, vice president, secretary, and treasurer from a group of 12 people. In summary, the number of ways we can select these positions is 11,880.
Answer 2

There are 11,880 ways to select a chairperson, vice president, secretary, and treasurer from a group of 12 people. The number of ways can be found using the concept of permutations.

Steps can be given as :
1. To determine the number of ways to select a chairperson, we have 12 options initially. After selecting a chairperson, we have 11 people remaining.

2. Next, for the vice president position, we can choose from the remaining 11 people, giving us 11 options. After selecting a vice president, we have 10 people remaining.

3. For the secretary position, we can choose from the remaining 10 people, resulting in 10 options. After selecting a secretary, we have 9 people remaining.

4. Finally, for the treasurer position, we can choose from the remaining 9 people, giving us 9 options.

5. To find the total number of ways, we multiply the number of options for each position:

6. 12 options for the chairperson x 11 options for the vice president x 10 options for the secretary x 9 options for the treasurer = 11,880 ways.

Learn more about permutations

brainly.com/question/1216161

#SPJ11


Related Questions

What causes electrical interference?

A. Radio frequencies
B. Mic placement
C. Multiple signal wave forms interacting
D. Crossed cables

What causes electrical interference?A. Radio frequenciesB. Mic placementC. Multiple signal wave forms

Answers

Answer:Radio Frequencies

Explanation: This is because electrical interference is caused by another electric device.

which of the following can you apply to change the way a smartart graphic looks? question 11 options: a) smartart border b) smartart theme c) smartart design d) smartart style

Answers

The option to change the way a SmartArt graphic looks is d) SmartArt style. SmartArt styles allow customization of the overall appearance, including color, shape, layout, and formatting effects.

The correct answer is d) SmartArt style. SmartArt styles allow you to change the appearance of a SmartArt graphic by applying different combinations of color, shape, and formatting effects. By selecting a SmartArt graphic and applying a different style, you can quickly change its overall look and feel. SmartArt styles provide options for different color schemes, layouts, and other design elements that can enhance the visual impact of the graphic.

Learn more about SmartArt graphics here:

https://brainly.com/question/14311044

#SPJ11

A computer scientist creates a necklace to celebrate the birth of her daughter. The necklace encodes her daughter's birthday in binary using silver 111 and 000 beads. The part of the necklace that encodes the day of the month is 110101101011010. A string of beads with either 1 or 0 on them, in the order 11010. What is the decimal equivalent of that binary number?.

Answers

The decimal equivalent of that binary number of 11010 that encodes the day of the month is found to be 26.

How to calculate the decimal equivalent of binary numbers?

The decimal equivalent to binary numbers may be calculated by multiplying the individual digits by lowers of 2 raised to the position of the digit in the number.

To convert the binary numbers 11010 positional notation is used where the powers of two are written down to correspond to the number of binary digits given, i.e:

1 1 0 1 0

1 1 0 1 0

1 1 0 1 0 16 8 4 2 1

The decimal equivalent = 16 + 8 + 2 = 26.

Therefore, the decimal equivalent of the binary number 11010 that encodes the day of the month is found to be 26.

To learn more about the Decimal equivalent, refer to the link:

https://brainly.com/question/26279367

#SPJ1

Why is cyber security an important part of sending information using digital signals

Answers

Cyber security is an important part of sending information using digital signals. Because it keeps data safe while stored in the cloud and when they are transmitted. Option D is correct.

What are cybersecurity functions?

Analysts in cybersecurity defend an organization's hardware and network infrastructure against hackers and cybercriminals looking to harm them or steal confidential data.

When conveying information via digital signals, cyber security is a crucial component. because it protects data as it is sent and stored in the cloud.

Hence, option D is correct.

To learn more about cybersecurity  refer;

https://brainly.com/question/27560386

#SPJ1

Why is cyber security an important part of sending information using digital signals

(Interest Calculator) The simple interest on a loan is calculated by the formula interest = principal * rate * days / 365;
The preceding formula assumes that rate is the annual interest rate, and therefore includes the division by 365 (days). Develop a program that will input principal, rate and days for several loans, and will calculate and display the simple interest for each loan, using the preceding formula. Here is a sample input/output dialog:
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .1
Enter term of the loan in days: 365
The interest charge is $100.00
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .08375
Enter term of the loan in days: 224
The interest charge is $51.40
Enter loan principal (-1 to end): -1

Answers

The program calculates and displays the simple interest in Python for several loans by taking input of principal, rate, and days, and using the formula interest = principal * rate * days / 365.

What is Python?

Python is a high-level, interpreted programming language that is widely used for various purposes such as web development, data analysis, machine learning, and artificial intelligence.


Here's the Python code to implement the interest calculator:

while True:

   principal = float(input("Enter loan principal (-1 to end): "))

   if principal == -1:

       break

   rate = float(input("Enter interest rate: "))

   days = int(input("Enter term of the loan in days: "))

   interest = principal * rate * days / 365

   print("The interest charge is ${:.2f}".format(interest))



1) The program uses a while loop to repeatedly prompt the user for input until they enter -1 to end the program.

2) Inside the loop, the program uses input() to get the principal, interest rate, and loan term in days from the user, and stores them in variables.

3) The program then calculates the simple interest using the formula given in the problem statement: interest = principal * rate * days / 365.

4) Finally, the program uses print() to display the calculated interest to the user.

Sample output:
Enter loan principal (-1 to end): 1000.00

Enter interest rate: .1

Enter term of the loan in days: 365

The interest charge is $100.00

Enter loan principal (-1 to end): 1000.00

Enter interest rate: .08375

Enter term of the loan in days: 224

The interest charge is $51.40

Enter loan principal (-1 to end): -1


To know more about loans visit:
https://brainly.com/question/9471571
#SPJ1

What is typeface
A. A family of fonts in a certain style
B. The spacing between individual letters
C. The tapered feature at the end of strokes
D. The logo and tagline that represent a company
E. The spacing between lines in a paragraph

Answers

Answer:

the answer is A - family of fonts.

Explanation:

plato/edmentum users! i got it correct on the test.

a fellow analyst believes that an attacker briefly authenticated to your company wifi network and might have compromised some machines. your colleague collected network traffic and ran two splunk queries that might be helpful in your investigation. attached are resources provided by the analyst for your evaluation. course hero

Answers

You can always choose to perform a Windows reinstall (clean install/reformat) instead, which would delete all dangerous files associated to ransomware and destroy all of your computer's data, including all of your files, installed programs, and settings, so make a backup of your crucial information first.

How to illustrate the information?

It is malware that corrupts files and spreads when the infected file or another application runs it. The impact of hostile code can be innocuous or can result in the loss of data and resources.

Simply reinstalling the operating system won't be able to unlock your files because the ransomware (as it is typically understood) has encrypted all of your crucial documents, pictures, videos, and other types of files while typically leaving your operating system operational.

The best way to recover from a disk image backup is to simply restore the disk image, overwriting any existing data to get back what you had before the backup.

Therefore, you can fully re-install Windows on the victim machine by destroy all of your computer's data, as reinstalling.

Learn more about Window on:

https://brainly.com/question/25243683

#SPJ1

A fellow analyst believes that an attacker briefly authenticated to your company wifi network and might have compromised some machines. your colleague collected network traffic and ran two splunk queries that might be helpful in your investigation. attached are resources provided by the analyst for your evaluation

Why should you fully re-install Windows on the victim machine?

An office building has two floors. A computer program is used to control an elevator that travels between the two floors. Physical sensors are used to set the following Boolean variables.
The elevator moves when the door is closed and the elevator is called to the floor that it is not currently on.
Which of the following Boolean expressions can be used in a selection statement to cause the elevator to move?

answer choices
(onFloor1 AND callTo2) AND (onFloor2 AND callTo1)
(onFloor1 AND callTo2) OR (onFloor2 AND callTo1)
(onFloor1 OR callTo2) AND (onFloor2 OR callTo1)
(onFloor1 OR callTo2) OR (onFloor2 OR callTo1)

Answers

The following Boolean expressions, "onFloor1 AND callTo2" or "onFloor2 AND callTo1," can be used in a selection statement to move the elevator.

The commands to move the lift may be simply determined based on the other commands designed to be provided and received by the lift, which indicate what operation it is engaged in.

When the elevator is on the first floor and has to be taken to the second floor, the order "onFloor1 AND callTo2" can be used. The order "onFloor2 AND callTo1" would serve as the reverse of the previously given instruction and cause the lift to operate in the exact opposite manner.

To know more about elevator visit:-

https://brainly.com/question/2168570

#SPJ4

The different between a compiler and a translaror

Answers

Answer:

Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. A translator usually has a fixed body of code that is required to translate the program.

Answer:

Answer: Compiler converts the program from one computer language to another computer language that is translating from a higher level language to a lower level language. ... A translator usually has a fixed body of code that is required to translate the program.

Explanation:

write the step by approach to re saving a document using the save as option

Answers

Press save as and then choose your location to save it and then click save

A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of customers in their teens (ages 13 to 19).

What is the missing line of code to count the number of customers in their teens?

customerAges = [13, 3, 11, 24, 35, 25, 15, 18, 1]
countTeens = 0
for item in customerAges:
_____:
countTeens = countTeens + 1

if 13 <= item <= 19

if 13 < item < 19

if 13 <= item[0] <= 19

if 13 < item[0] < 19

Answers

Answer:

if 13 <= item <= 19

Explanation:

Edge 2021

The missing line of code to count the number of customers in their teens is if 13 <= item <= 19. The correct option is b.

What is programming?

A form of computer programming language known as procedural programming describes a number of well-planned actions and processes during the course of its development.

It includes statements, functions, and commands that are organized systematically to finish a computing task or program. Its main focus is on developing procedures.

While object-oriented programming is a type of programming where the emphasis is on generating objects as opposed to actions and data or logic. Inheritance, polymorphism, abstraction, and encapsulation are its four guiding concepts.

Therefore, the correct option is b, if 13 <= item <= 19

To learn more about programming, refer to the link:

https://brainly.com/question/14368396

#SPJ2

Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called

Answers

Analysis tools such as query-by-example and a specialised programming language called SQL facilitate examining all or selected data, querying the database, and generating reports.

Data collection and analysis technologies are used to collect, evaluate, and present data for a range of applications and industries. They take unprocessed data and turn it into meaningful knowledge that businesses can use to make better choices. A data analyst may operate in a range of sectors, including operations, marketing, and finance. For instance, their findings might result in lower shipping costs. different viewpoints on consumer behaviour. Among the numerous types of data analysis tools, three categories stand out as particularly essential: Applications for Excel, R, Python, and business intelligence (BI).

Learn more about Analysis tools from

brainly.com/question/13994256

#SPJ4

Should variable names have logical identifier to provide some sort of context for what they will store?

Select one:
a. Yes
b. No

Answers

Answer: Yes

Explanation:

what process will remove all private and public keys along with the user's identification information in the ca?

Answers

The process that will remove all private and public keys along with the user's identification information in the CA is called revocation.

This is done to ensure that the user's information and keys are no longer accessible by anyone who might use them maliciously. Revocation is typically initiated by the user or the CA administrator, and involves invalidating the certificate associated with the user's keys and information. Once the certificate is revoked, the private and public keys become unusable and the user's identification information is no longer associated with the keys. This is an important step in maintaining the security and integrity of the CA system, and ensures that unauthorized access to sensitive information is prevented.

learn more about public keys here:
https://brainly.com/question/29044236

#SPJ11

which button is used to run the program in QBASIC

Answers

Answer:

S key

Explanation:

(Alternative) Hit the S key (or just hit Enter) to run the program. The menu shows shortcuts to do the same thing, Shift+F5 or just F5 alone. The program runs: Since the program was run once before, the first output (the first "Hello") remains on the screen.

describe how technological development has been evolutionary. cite examples of how products have evolved

Answers

Answer:

Technology spawns new generations of products by using existing components, a phenomenon he calls combinatorial evolution. The change in 'species' can thus be quite radical in a short period of time. The rules of Technological evolution thus make a strong argument for accelerating evolution.

Some are The Internet,  Genetic engineering, Digital media, Personal computers, Space flight, Mobile phones, Nuclear power, and Electronic funds transfer.

Explanation:

Evolutionary trend describes the changes undergone by a particular component or phenomenon over a certain period of time.

The concept of evolutionary change can be attributed to the technological changes or development whigh has been witnessed over time as preexisting concept are modified and revamped to increase capability and productivity.

Communication as gone from postal services to fax ; mail and even instant messaging

Transportation as eclipsed from the use of animals to cars ; ships, airplane and now hyperloops on the horizon

Therefore, modification to already existing technological footprints marks evolution.

Learn more :https://brainly.com/question/14563812

What device connects a network to the internet through an internet service provider.

Answers

The device that connects a network to the internet through an internet service provider is MODEM.

Which device connects a network to the Internet?

A modem is known to be a toll that helps a computer to be able to link up to the internet over any kind of telephone line.

Note that A modem changes digital signals from a computer to that of analogue signals  and as such, The device that connects a network to the internet through an internet service provider is MODEM.

Learn more about MODEM from

https://brainly.com/question/7320816

#SPJ1

6x-7=2x +1 someone help​

Answers

6x-7=2x+1

-2x. -2x

4x-7=1

+7. +7

4x=8

÷4. ÷4

x=2

the answer is 2 !!!!!!

what is the answer i need help asap

what is the answer i need help asap

Answers

Answer:

A

Explanation:

Transformers are used on power lines to take high voltage and powerful electricity and turn it into safe electricity.

Answer:

Transformer

Explanation:

It makes sense!  A transformer like, changes the power, so if they needed to reduce the power, they use a transformer!

Why would you expect CRC to detect more errors than simply using a parity bit?

Answers

CRC (Cyclic Redundancy Check) is expected to detect more errors than simply using a parity bit due to its mathematical properties and the size of the check sequence it generates.

CRC is a more robust error-detection technique compared to a simple parity bit because of the following reasons:

Check Sequence Size: CRC generates a longer check sequence than a parity bit. A parity bit only adds one additional bit to the data, while CRC appends a check sequence that is typically several bits long. The larger check sequence increases the likelihood of error detection since it provides more possible error patterns to detect.

Polynomial Division: CRC uses polynomial division to generate the check sequence. This process introduces a more complex mathematical calculation that spreads the error-detection capability throughout the data. It can detect burst errors, which are consecutive errors that are more likely to occur in real-world transmission scenarios.

Error Detection Efficiency: CRC has a higher probability of detecting errors than a simple parity bit due to its mathematical properties. It can detect a broader range of errors, including both single-bit errors and some multiple-bit errors. The specific CRC polynomial used and its properties influence the error-detection efficiency.

Overall, CRC is designed to provide better error detection capabilities by generating a larger check sequence and employing more sophisticated mathematical techniques. It is widely used in communication protocols, storage systems, and digital networks to ensure data integrity.

Learn more about CRC and error detection techniques here: brainly.com/question/33326994

#SPJ11

you are purchasing a hard disk from an online retailer over the internet. what does your browser use to ensure that others cannot see your credit card number on the internet?

Answers

When a customer purchases a hard disk or any other item online, one of the primary concerns is the protection of sensitive information such as credit card details. To ensure this, internet browsers utilize a technology called Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols to encrypt the data transmitted between the customer and the server. This encryption process is often represented by a padlock symbol that appears in the address bar of the browser.
The SSL and TLS protocols work by using a complex system of public and private keys to scramble the data, which can only be unscrambled using the correct key. This ensures that the data cannot be accessed by any third party, and if it is intercepted by an unauthorized person, they will not be able to read it.

It is important for customers to also take steps to ensure their own safety when shopping online. This includes making sure that the website they are using is legitimate, checking for the padlock symbol and the "https" in the URL, using strong passwords, and keeping their software up-to-date. By taking these precautions, customers can minimize the risk of their sensitive information being compromised while shopping online.

To know more about  customer visit:

https://brainly.com/question/31192428

#SPJ11

Distortion in mrp systems can be minimized when safety stock is held at the __________.

Answers

Distortion in MRP systems can be minimized when safety stock is held at the optimal level.

Distortion in MRP (Material Requirements Planning) systems can be minimized when safety stock is held at the "right levels" or "optimal levels." By maintaining appropriate levels of safety stock, MRP systems can account for variability in demand, lead time, and other factors, reducing the impact of distortions on the planning process. The optimal level of safety stock will depend on factors such as desired service levels, lead time variability, and demand variability, among others. Finding the right balance in safety stock levels is crucial for minimizing distortion and improving the accuracy of material planning in MRP systems.

To learn more about Distortion visit: https://brainly.com/question/15319807

#SPJ11

Imagine that you’re partner in a business firm that sells computers and other electronic goods. As part of your business organization’s Corporate Social Responsibility drive, you have to present a slide show to the retailers (and the general public) about how to dispose of end-of life electronic goods in an eco-friendly manner. Perform online research and describe available media options to present the slide show.

Answers

The best way to dispose of electronic goods is by recycling raw materials and correctly disposing of the remaining hazardous materials.

What does eco-friendly disposal imply?

This implies using disposal practices that have a low negative impact on the environment.

How do you dispose electronic goods?

The best way to do this is:

Appropiately collect electronic goods that cannot be used anymore.Identify the materials or parts that can be recycled as this reduces the number of new parts that will be manufactured.Separate the recycling materias from those that cannot be recycled.Dispose of the remaining materials in the best way depending on the material as some of these are hazardous and require special disposing practices.

Learn more about recycling in: https://brainly.com/question/11861824

please answer as soon as possible a. A= (A+ 9) Discuss the purpose of Variables in programming languages. 101 Differen CHL

Answers

Variables are essential elements in programming languages. They are the data containers that hold the data types, such as numbers, strings, and boolean values. The primary purpose of variables in programming languages is to store data or information so that it can be used throughout the program.

They provide a way of keeping a value within a program and referring to it at different points of the program. Variables are assigned names and values. These values can change, or they can be constant, depending on how the programmer codes them. The name of the variable is used to refer to its value throughout the program.

It is best practice for variable names to be descriptive of their content so that it is clear what the variable represents. In the given code, A is a variable that is being assigned the value of A+9, which means that whatever the initial value of A is, it will be increased by 9 and stored in the variable A. This value of A can be used throughout the program, as needed, by referring to its variable name.

To know more about programming visit:

https://brainly.com/question/14368396

#SPJ11

Question 1 of 19
What element is not a selection in the Interface preferences?
O UI Character Presets
OUI Font Size
OUI Language
OUI Scaling

Answers

Answer:

UI Character Presets

Explanation:

User Interface is an option or go-to menu in a desktop application. For example, Photoshop. It allows a user to tweak the outlook to his or her own preference rather than the default settings.

To do this, a user is often tasked to do the following:

1. Click on the "Edit" menu

2. Navigate and click on "Preferences"

3. Select the "Interface" link

The options available to change includes:

a. UI Scaling

b. UI Font Size

c. UI Language.

Hence, in this case, the element that is not a selection in the Interface preferences is "UI Character preset"

what process might have been responsible for the formation of the vishnu schist?

Answers

The Vishnu Schist is primarily formed through the process of metamorphism under high pressure and temperature conditions.

The Vishnu Schist, which is part of the Vishnu Basement Rocks in the Grand Canyon, is a result of metamorphism.

This process involves the alteration of pre-existing rock, known as the protolith, under intense heat and pressure deep within the Earth's crust. In the case of the Vishnu Schist, its protolith was originally sedimentary and volcanic rocks that were subjected to these extreme conditions.

Over time, the minerals within the protolith re-crystallized, forming the metamorphic rock we now know as the Vishnu Schist. This formation process is significant as it provides insight into the geological history and evolution of the Grand Canyon region.

Know more about Vishnu Schist, here :

https://brainly.com/question/17153286

#SPJ11

Unit 4: Lesson 2 - Coding Activity 1
Ask the user for two numbers. Print only the even numbers between them. You should also print the two numbers if they are even.

Starter code:
import java.util.Scanner;

public class U4_L2_Activity_One{
public static void main(String[] args){

Scanner scan = new
Scanner(System.in);
System.out.println("Enter two numbers:");
int num1 = scan.nextlnt();
int num2 = scan.nextlnt();
while (num1 <= num2){
if (num1 %2==0){
system.out.print(num1="");
}
num+=1;
}
}
}

Answers

The program illustrates the use of loops.

Loops are used to perform repetitive and iterative operations.

Aside few errors that can easily be corrected, the starter code you added to the question is not totally incorrect.

So, the corrected code is:

import java.util.Scanner;

public class U4_L2_Activity_One{

   public static void main(String[] args){

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter two numbers:");

       int num1 = scan.nextInt();

       int num2 = scan.nextInt();

       while (num1 <= num2){

           if (num1 %2==0){

               System.out.print(num1+" ");

           }

           num1+=1;

       }

}

}

The above program is the same as the starter code, you included.

I only made corrections to lines 6, 7, 9, 10 and 15

Read more about similar programs at:

https://brainly.com/question/19270993

how to make a script that checks if any files in a directory have changed using sha1sum

Answers

To create a script that checks if any files in a directory have changed using sha1sum, follow these steps:


1. Open a text editor and create a new file named "check_changes.sh".
2. Add the following lines of code to the file:

```bash
#!/bin/bash

# Set the directory to be checked
directory="/path/to/your/directory"

# Set the file to store the previous sha1sum results
sha1sum_file="previous_sha1sum.txt"

# Generate the current sha1sum results
find "$directory" -type f -exec sha1sum {} \; > current_sha1sum.txt

# Check if the previous sha1sum file exists
if [ ! -f "$sha1sum_file" ]; then
   echo "Initial run. Storing sha1sum results."
   mv current_sha1sum.txt "$sha1sum_file"
   exit 0
fi

# Compare the current and previous sha1sum results
if diff -q "$sha1sum_file" current_sha1sum.txt; then
   echo "No changes detected."
else
   echo "Changes detected in the directory."
fi

# Update the previous sha1sum file
mv current_sha1sum.txt "$sha1sum_file"
```

3. Replace "/path/to/your/directory" with the actual path to the directory you want to monitor.
4. Save and close the file.
5. Make the script executable by running the command:

```bash
chmod +x check_changes.sh
```

6. Run the script by executing the command:

```bash
./check_changes.sh
```

The script will now generate and compare sha1sum results for the files in the specified directory, indicating if any changes have been detected.

To know more about sha1sum, click here

https://brainly.com/question/28325558

#SPJ11

the wireless technology that can be used to transmit data between 2 different network​

Answers

Answer:

most probably that's wifi.

Wifi is the correct answer

Write a Java program which declares and populates an array with some values (at least 5 values). Then it should call a method passing it the array. The method should modify the array values using a loop. Lastly, after the program calls the method, it should display the modified array contents to the console.

Answers

Answer:

CODE IN JAVA :

import java.util.*;

public class Main

{

public static void modifyArray(int[] arr, int n){

for(int i = 0; i < n; i++){

arr[i] = -1; // each value is modified to -1

}

}

public static void main(String[] args) {

int n;

System.out.print("Enter size of array(atleast 5): ");

Scanner sc = new Scanner(System.in);

n = sc.nextInt();

int array[] = new int[n]; // array with size n declared

// populating the array

System.out.print("Enter array elements: ");

for(int i = 0; i < n; i++){

array[i] = sc.nextInt();

}

// modifying array via a function

modifyArray(array, n);

// printing array values after modifiction

System.out.print("Array after modification: ");

for(int i = 0; i < n; i++){

System.out.print(array[i] + " "); // space separated

}

}

}

Explanation:

Other Questions
Efficiency of home furnace can be improved by preheating combustion air using hot flue gas. The flue gas has temperature of Tg = 1000C, specific heat of c = 1.1 kJ/kgC and is available at the rate of 12 kg/sec. The combustion air needs to be delivered at the rate of 15 kg/sec, its specific heat is ca 1.01 kJ/kgC and its temperature is equal to the room temperature, i.e. Tair,in = 20C. The overall heat transfer coefficient for the heat exchanger is estimated to be U = 80 W/m2C. (i) Determine size of the heat exchanger (heat transfer surface area A) required to heat the air to Tair,out 600C assuming that a single pass, cross-flow, unmixed heat exchanger is used. (ii) Determine temperature of flue gases leaving heat exchanger under these conditions. (iii) Will a parallel flow heat exchanger deliver the required performance and if yes, will it reduce/increase its size, i.e. reduce/increase the heat transfer area A? (iv) Will use of a counterflow heat exchanger deliver the required performance and, if yes, will it reduce/increase its size, i.e. reduce/increase the heat transfer area A? What are the correct coefficients when this chemical equation isbalanced? *P4 + 02 P2O5 vegas company has the following unit costs: variable manufacturing overhead $ 25 direct materials 20 direct labor 19 fixed manufacturing overhead 12 variable marketing and administrative 7 vegas produced and sold 10,000 units. if the product sells for $100, what is the contribution margin? multiple choice $170,000 $240,000 $290,000 $360,000 A B Hint it is the same stuff you did above How long is line A? If this shapes is 5"long x 3 high How long is line B? If this shape is 5long x 3 high Place the steps of a PCR \& restriction-enzyme cloning workfiow into the correct order by dragging and dropping the text boxes to the correct position. 15-36 Find the limit. 1 15. lim *-** 2x + 3 1 - x - x2 17. lim ** 2x2 - 7 x3 + 5x 2x3 x2 + 4 19. lim Solve the things on the board and show work its triangles and angles rewrite the following sentences using parallel structure to be more balanced: 1. willy enjoys riding his bicycle, dancing at clubs, and to hike up to bear's mountain. For each image, determine if you have enough information to find the missing lengths. If so, find them. If not, explain why. 1. DE is parallel to AC. Find the lengths of DE || AC AC and AD. B 2 D t 5 E 6 the bell-like effects in the above excerpt indicate that the piece is: 2. Solve for 3 (a) g In x = 2, (b) e24 eln 3 = 1, (c) ln(x + 2) In(x+1) = 2. 2 : PLEASE EXPLAIN HOW YOU GOT ANSWER. A school administrator tells everyone in the building that they will be having a fire drill randomly sometime during the school day which is from 8 a.m. to 3 p.m. If second period is from 9:00 a.m. to 10:00 a.m., what is the probability of the fire drill happening during second period? describe the differences and similarities between chemical and physical properties explain how volume is quoted for stocks, bonds, futures, andoptions. How did Latin American nations struggle for stability, and how did industrializednations affect them? If A and B are supplementary angles and A is 78, what is the measure of B? 3. What does the phrase "ignited the long smoldering resentments" in paragraph 13 suggest about the black grassroots organizations? A. Their discontent with apartheid had developed over time and the new laws only made their hatred of it even stronger. B. They had a desire to attack government and burn down government buildings because of the new law.C. They became jealous over the wealth of white men in South Africa and wanted some of the riches for themselves.D. The new laws inspired a strange and sudden frustration with the South African government. use information taken from news reports, speech, informative talks, paneldiscussion, etc., the resting heart rate of an adult is usually about 60 beats per minute. how many minutes will it take for the average resting heart to beat 1,000,000 times? round up to the nearest ones place and do not include the unit of measurement). What were the last two cities in the south to be captured? *