Please help me solves this for the teen talk string part is the teen tester java page correct

Please Help Me Solves This For The Teen Talk String Part Is The Teen Tester Java Page Correct
Please Help Me Solves This For The Teen Talk String Part Is The Teen Tester Java Page Correct

Answers

Answer 1
Use the replace method:
text.replace(‘.’, ‘!!);
text.replace(‘!’, ‘!!’);
Or go to javadoc for replacing string function.

Related Questions

If you enter the search "genetically modified foods" in a database, the double quotes around the three words will:

Answers

Answer:

Have a more specified search

Explanation:

If you do this in G0OGLE Then it will be the same thing all it basically does it narrow down the search to find more of what you want

Programmers often build trapdoors into programs during system development. Which of the following is a reason for doing so?
a. Enhancing program security
b. Improving program performance
c. Facilitating program debugging
d. Ensuring program compatibility

Answers

Programmers often build trapdoors into programs during system development. The following are the reasons for doing so: Facilitating program debugging.

However, it is important to note that building trapdoors into programs is generally discouraged and may even be illegal in some cases.

A trapdoor is a method that enables somebody to bypass normal security provisions in a software program or operating system.

It's a bit like creating a secret backdoor entrance that only a select few people know about, allowing them to gain access to a system without having to go through the normal login or security measures.

Trapdoors are usually hidden or encoded, making them extremely difficult to locate or exploit unless you know what you're looking for.

In conclusion, trapdoors may be added to software during development to facilitate debugging.

Know more about Programmers  here:

https://brainly.com/question/23275071

#SPJ11

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

Write is an ipo cycle? Describe with figure ​

Answers

Answer:

The input–process–output (IPO) model, or input-process-output pattern, is a widely used approach in systems analysis and software engineering for describing the structure of an information processing program or other process.

PLEASE MARK ME AS BRAINLIEST
Write is an ipo cycle? Describe with figure

¿Por qué es importante usar adecuadamente el celular?

Answers

Answer:

to stop it from breaking

Explanation:

assume the variables x and y have each been assigned an integer. write a fragment of code that assigns the greater of these two variables to another variable named max.

Answers

The code that assigns the greater of these two variables to another variable named max is: if (x > y) { int max = x;} else { int max = y;}

What's a variable?

In a computer program, a variable is a named memory location used to temporarily store data while the program is running. One way to think of a variable is as a container that holds a value that can change as the program runs.

Before they can be used in a program, variables must be declared or defined, and each variable must have a unique name. The data type of the variable is what determines the kind of data it can hold. Integers, floating-point numbers, characters, and strings are all common data types. Variables are necessary for programming because they are used to store data in memory.

Learn more about variables:

brainly.com/question/29614058

#SPJ4

Outline the steps for logging into E-mail account​

Answers

Answer:

go to your email service provider, type in your username(email) and password click the log in or sign in button to continue

Which of the following is the type of system that uses electrical signals sent through wires? = digital
= local loop
= analog
= microwave

Answers

Analog Data is the type of system that uses electrical signals sent through wires. Thus, option C is correct.

What are electrical signals?

Electrical signals can contain any quantity from a vast variety of possible values. These signals are often created with the help of the transmission of the signals that will help in conveying the message that is present.

Data that's also physically recorded is referred to as analog data. Analog information is kept on USB sticks, digital data is indeed a collection of distinct characters. Therefore, option C is the correct option.

Learn more about electrical signals, here:

https://brainly.com/question/20506284

#SPJ1

Most job applications are online. True Fals

Answers

Answer:

True

Explanation: In this day and age everyone uses the computer to find jobs. Newspaper job ads are not really a thing anymore that most people use.

Answer:

A. True

Explanation:

Question # 5 Multiple Choice What benefit do internal networked e-mail systems provide over Internet-based systems? Responses They allow files to be shared by sending attachments. They allow files to be shared by sending attachments. They enable the transmission of videos. They enable the transmission of videos. They provide increased security. They provide increased security. They allow e-mail to be sent to coworkers. They allow e-mail to be sent to coworkers.

Answers

The benefit that  internal networked e-mail systems provide over Internet-based systems is that they provides increased security.

What is  Networked email system?

The term networking emails are emails you send to forge new connections or strengthen ones you already have. There are numerous scenarios that can be covered in networking emails.

You might be emailing someone you only know online who is a complete stranger. Additionally, networking computers can help you increase communication so that employees, suppliers, and consumers can more easily exchange information.

Therefore,  The benefit that  internal networked e-mail systems provide over Internet-based systems is that they provides increased security.

Learn more about Internet-based system from

https://brainly.com/question/2780939
#SPJ1

The network administrator should always keep the software on the
computers of the weather bureau updated.
10.5.1 A weather analysis application is returning incorrect results
after a recent update.
Give a term for the cause of the problem AND suggest a
solution

Answers

Cause:

The cause may have been an unsupported PC or OS that may not be able to run an updated version of the weather analysis application.

Solution:

There are many solutions to installing new hardware and updating the OS to just simply restarting the PC.

Recommend Solution:

Try looking at the requirements for the new updated version of the application and try to match the requirements.

An auditing team has found that passwords do not meet best business practices. Which of the following will MOST increase the security of the passwords? (Select TWO). A. Password Complexity B. Password Expiration C. Password Age D. Password Length E. Password History

Answers

An auditing team has found that passwords do not meet best business practices. The two options that would increase the security of the passwords that do not meet the best business practices are "Option A. Password Complexity and Option D. Password Length."

1. Option A. Password Complexity: Increasing the complexity of passwords by enforcing rules such as requiring a combination of uppercase and lowercase letters, numbers, and special characters can make passwords more resistant to brute-force attacks and dictionary-based attacks. By expanding the character set used in passwords, the possible combinations increase, making it harder for attackers to guess or crack passwords.

2. Option D. Password Length: Increasing the length of passwords adds an additional layer of security. Longer passwords are generally more secure as they provide a larger pool of possible combinations for an attacker to guess or crack. A longer password increases the computational effort required for brute-force attacks, making it more time-consuming and resource-intensive for attackers.

3. While the other options (B. Password Expiration, C. Password Age, and E. Password History) can also be important aspects of password management, they do not directly impact the strength or security of passwords themselves and therefore, An auditing team has found that passwords do not meet best business practices.

B. Password Expiration: This refers to regularly requiring users to change their passwords after a certain period. While this practice can help mitigate the impact of compromised passwords, it does not necessarily guarantee stronger passwords.

C. Password Age: This refers to the duration for which a password can be used before it must be changed. Similar to password expiration, it focuses on the frequency of changing passwords rather than the actual strength of the passwords.

E. Password History: This refers to preventing users from reusing previous passwords. While it helps prevent the reuse of compromised passwords, it does not directly address the strength or complexity of passwords.

To learn more about passwords visit :

https://brainly.com/question/32669918

#SPJ11

Identify a characteristic that is a disadvantage of cloud-based hosting.

Answers

The characteristic that is a disadvantage of cloud-based hosting is  loss of control over data location.

What is Cloud hosting?

This is known to be a kind of applications and websites that often makes them accessible via cloud resources. Here, a network of linked virtual and physical cloud servers is said to be the one that host the application or website.

The Disadvantages of cloud computing are:

There is a data loss or theft.There is also data leakage.There is account or service hijacking, etc.

See options below

a. ongoing support costs

b. increased management requirements

c. significant development effort

d. loss of control over data location

Learn more about cloud-based hosting from

https://brainly.com/question/19057393

Select the correct navigational path to hide a worksheet.
Click the ____ tab on the ribbon to the Cells gallery.
Select ___ and use that drop-down menu to select ____.
Then Hide sheet.

Answers

Answer:

Home, Format, Hide & Unhide.

Explanation:

A person with a low number of white blood cells could have difficulty in fighting infections and A decrease in the number of lymphoid stem cells could result in a decrease in red blood cell.

What is nucleotide?

It is the sub units and buIlding blocks of DNA. It is made up of a five-sided sugar, phosphate group and then a nitrogen base.

These groups make the backbone of the DNA helix. If you look at a DNA helix, they make the side of the ladder or the side portion. They connect to a nitrogen base which make the steps of the ladder.  The type of sugar that is used in a DNA helix is called deoxyribose.

Nitrogen bases are the molecules that make up the steps of the ladders. There are four different nitrogen bases, namely; Guanine, Thymine,Adenine and Cytosine.

Pyrimidines are compounds that make a single 6-sided ring. Examples of pyrimidines are Cytosine and Thymine. Purines on the other hand make 5-sided and 6-sided rings.

Therefore, A person with a low number of white blood cells could have difficulty in fighting infections and A decrease in the number of lymphoid stem cells could result in a decrease in red blood cell.

Learn more about white blood cells on:

https://brainly.com/question/19202269

#SPJ5

V. ASSESSMENT (Time Frame:
(Learning Activity Sheets for Enrichment, Remediation, or Assessment to be given
Direction: Choose the letter of the correct answer. Use another
1. These are materials or substances such as minerals, fore
used for economic gain.
A. Natural resources
C. Non renewable
B. Renewable resources
D. Minerals
2. In which way can we protect our environment?
A. Littering
C. recycling
B. Polluting
D. contaminating
3. Which of these is the primary cause of land pollution?
A. Improper garbage disposal C. Recycling mate
B. Planting of trees
D. Waste segrega
4. Your community is rich in metallic materials. Which of
conserve such precious mineral deposits?​

Answers

Answer:

1. A. Natural resources

2. C. Recycling

3. A. Improper garbage disposal

4. C. Formulate laws and ordinances to regulate the mining of minerals

Explanation:

Question; Obtained from a similar posted question

1. These are materials or substances such as minerals, forest, water, and fertile land that occur in nature and can be used for economic gain

4. Options

A. Use all of them to earn money

B. Put up tunnels to harvest all metallic minerals

C. Formulate laws and ordinances to regulate the mining of minerals

D. Use dynamite to clear out the area and reveal the mineral deposits

1. A. natural resources

The materials that come from nature and can be found in an area owned by a person and are economically valuable are known as A. natural resources

2. C. recycling

The environment is protected by reducing the consumption of the vital resources that ensure sustainability through the use of C. recycling already produced items as raw materials to produce new items rather than making use of raw materials naturally present in the environment

3. A. improper garbage disposal

Land pollution which is the introduction of potentially harmful, and unsightly materials on the surface soil or under the surface, is caused primarily by A. improper garbage disposal

4. C. Formulate laws and ordinances to regulate the mining of minerals

The metallic materials, which are mineral resources are located under the ground and are extracted from different locations in an area, therefore, they are mined at different times by different methods

To ensure that the precious mineral deposits are conserved, they require laws and ordinance for the regulation of mineral mining

Therefore; the correct option is;

C. Formulate laws and ordinances to regulate the mining of minerals

write a javascript program to calculate and display the product of all odd numbers from 4 to 11. you need to use a for loop to perform your calculation (3 marks)

Answers

Using javascript, we initialize the product variable to 1. Then, we use a for loop to iterate over the numbers from 4 to 11. Inside the loop, we check if the current number is odd by using the modulo operator (%) to check if it's not divisible by 2. If the number is odd, we multiply it with the product variable. Finally, we display the calculated product using console.log().

What is the JavaScript program to calculate and display the product of all numbers from 4 to 11?

The JavaScript program to compute all odd numbers from 4 to 11 using loop is given as;

let product = 1;

for (let number = 4; number <= 11; number++) {

 if (number % 2 !== 0) {

   product *= number;

 }

}

console.log("Product of odd numbers from 4 to 11:", product);

Learn more on javascript here;

https://brainly.com/question/17115519

#SPJ4

list the steps involved in cutting and pasting in a different document​

Answers

To cut or copy, hold down Ctrl and press X or C. Choose Paste from the menu bar when you right-click the item's destination. You can right-click almost anywhere, including inside a document or folder. To paste, hold down Ctrl and press V on the keyboard.

Select the correct answer.
Lionel writes for his personal blog. He would like to know how many users visit his blog. Which tool will help him to know the number of users visiting his blog?
A.
Microsoft Word
B.
Antiword
C.
StatsCounter
D.
pdftohtml
E.
Cron

Answers

The answer is B I did the test

Answer:

Antiword is your answer

Explanation:

The term for letters and other symbols used to convey information is _____.

Answers

The term for letters and other symbols used to convey information is called "characters".

The term for letters and other symbols used to convey information is called "characters". Characters are the basic units of written communication, and they can include letters, numbers, punctuation marks, and special symbols. Here is a more detailed explanation of the concept:

Characters are the building blocks of written language. They are combined to form words, sentences, paragraphs, and other structures that convey meaning.

Characters can be represented in various ways, depending on the medium and the technology being used. For example, in print media, characters are typically represented by ink on paper. In digital media, characters are represented by binary code that can be interpreted by computer software.

The use of characters has evolved over time as language and communication technologies have developed. For example, ancient writing systems used pictographs and ideographs to represent concepts, while modern writing systems use alphabets and other phonetic scripts to represent the sounds of language.

Characters can have different meanings and connotations depending on the context in which they are used. For example, the same letter or symbol can have different meanings in different languages or cultural contexts.

The use of characters is an essential aspect of communication, and the ability to read and write characters is a foundational skill for literacy and education.

Know more about the symbols click here:

https://brainly.com/question/9718834

#SPJ11

What statement best describes operating systems?
O It's possible for modern computers to function without operating systems.
O Most operating systems are free or very inexpensive.
Operating systems are managed by the computer's microprocessor (CPU).
O Operating systems manage the computer's random access memory (RAM).

Answers

Answer: D) Operating Systems manage the computer's random access memory (RAM)

Explanation:

It's not A because all modern computers use some form of an Operating System.

It's not B because some Operating Systems can cost hundreds of dollars.

While C has some truth to it, it's reversed. Operating Systems are there to manage and allocate system resources, and D is the better choice.

The statement that best describes operating systems is D. Operating systems manage the computer's random access memory (RAM).

Operating systems simply means the software which supports the basic functions of a computer like scheduling tasks and the control of peripherals.

An operating system is a system software that helps in managing computer hardware and software resources. It's vital in managing the computer's random access memory.

Read related link on:

https://brainly.com/question/18978060

question number 1) how do you open a new finder window in the macos mojave operating system? click the file menu and click new finder window. click the new finder window menulet. click the file menu and click duplicate.\

Answers

In order to open a new finder window in the MacOS Mojave Operating system: "click the Finder icon in the Dock, then choose File > New Finder Window or press Command-N."

What is the MacOS Mojave Operating System?

MacOS Mojave is Apple Inc.'s desktop operating system for Macintosh computers. It is the fifteenth major edition of macOS. Mojave was unveiled on June 4, 2018 at Apple's Worldwide Developers Conference and was made available to the public on September 24, 2018.

We expect that, in accordance with Apple's release schedule, macOS 10.14 Mojave will no longer get security updates beginning in November 2021. As a result, we are discontinuing software support for all systems running macOS 10.14 Mojave, with support ending on November 30, 2021.

Learn more about Operating Systems:
https://brainly.com/question/22811693
#SPJ1

What is the purpose of a Post Mortem Review? (5 points)

Answers

Answer:

The interpretation of the discussion is characterized throughout the explanation portion below.

Explanation:

A post-mortem investigation, as well widely recognized as the autopsy, has become a post-mortem assessment of that same body. This same goal of some kind of post-mortem should be to investigate what happened. Post-mortems have been performed by pathologists (Physicians specializing in considering the mechanisms as well as tends to cause including its illness).

whats a drone cause i have no idea

Answers

Answer:

A small camera wielding controllable robot that flies in the hair

Explanation:

Answer:

you will be my friend please

TRUE or FALSE. solid state storage devices (ssds) store data in hard disk drives or optical media rather than memory chips.

Answers

False. Solid state storage devices (SSDs) store data in memory chips, not in hard disk drives or optical media.

Solid state storage devices (SSDs) are a type of data storage device that uses NAND-based flash memory to store data. Unlike traditional hard disk drives (HDDs), which use rotating magnetic disks to store data, SSDs have no moving parts and instead use memory chips to store data. This means that SSDs can access data much faster than HDDs, and are less prone to physical damage and data loss due to mechanical failure.

Optical media, such as CDs, DVDs, and Blu-ray discs, also use different technology to store data. They use laser technology to write and read data to and from a reflective layer on the disc.

In summary, SSDs store data in memory chips, while HDDs store data in rotating magnetic disks, and optical media store data using laser technology.

Learn more about SSDs here:

https://brainly.com/question/30121535

#SPJ4

which one of the following allows the user to delete a record from a table, even if rows in another table reference the record through a foreign key constraint? group of answer choices drop delete on cascade on delete cascade cascade cascade on delete

Answers

The answer is "ON DELETE CASCADE" is the one of the following allows the user to delete a record from a table, even if rows in another table reference the record through a foreign key constraint.

What is the "ON DELETE CASCADE" option?

The "ON DELETE CASCADE" option is used to ensure referential integrity when a foreign key constraint is defined between two tables. When a record is deleted from the parent table, all the corresponding records in the child table that reference the deleted record are also deleted automatically, thus maintaining referential integrity.

Using the "ON DELETE CASCADE" option ensures that a record can be deleted from the parent table, even if it has child records in the child table that reference it through a foreign key constraint. This is in contrast to the "ON DELETE RESTRICT" option, which prevents the deletion of a record from the parent table if it has child records in the child table that reference it through a foreign key constraint.

The "CASCADE" keyword is used in combination with the "ON DELETE" or "ON UPDATE" clause to specify the action to be taken when a referenced record is deleted or updated. The "CASCADE" keyword instructs the database to propagate the delete or update operation to all child records that reference the deleted or updated record.

To learn more about foreign key, visit: https://brainly.com/question/29346666

#SPJ4

___________ software helps organizations manage portfolios of projects and the dependencies among them

Answers

Project management software helps organizations manage portfolios of projects and the dependencies among them

What is software for PMOs?

The project management office (PMO) uses PMO Software as a type of technology to manage the operational and financial facets of the projects for which it is accountable. PMO software tools help the PMO achieve its objectives of successfully and efficiently managing the projects of the enterprise.

Therefore, one can say that Software for project management is used to organize, plan, and allocate resources. It facilitates teamwork and allows for the tracking of project progress while specifying tasks and responsibilities.

Learn more about Project management from

https://brainly.com/question/6500846
#SPJ1

suppose that ram can be added to your computer at a cost of $50 per gigabyte. suppose also that the value to you, measured in terms of your willingness to pay, of an additional gigabyte of memory is $800 for the first gigabyte, and then falls by one-half for each additional gigabyte. a. how many gigabytes of memory should you purchase?

Answers

Random access memory is referred to as RAM. In essence, the RAM in your computer serves as short-term memory, storing information as the processor requests it.

Contrast this with persistent data, which is kept on your hard drive and is accessible even when your computer is off. For quick data storage and retrieval, RAM is used. Depending on the technology and task, your RAM can process information twenty to one hundred times faster than data on a hard disk. Memory is divided into two categories: SRAM (static random access memory) and DRAM (dynamic random access memory). A memory cell with six transistors is used for data storage in SRAM. SRAM is usually utilized as the processor's (CPU) cache memory and is typically not user-replaceable.

Learn more about memory here-

https://brainly.com/question/14829385

#SPJ4

When creating a Dashboard in Excel you
don't want to:
A.
Copy & paste pivot charts
B.
Consistent formatting
C.
Copy & paste pivot tables as pictures
D.
Interactive slicers

Answers

When creating a dashboard in Excel, use consistent formatting and filters instead of interactive slicers, avoid copying and pasting pivot charts, and pivot tables as pictures to avoid the problems that come with them.

When creating a dashboard in Excel, you don't want to copy and paste pivot charts, copy and paste pivot tables as pictures, or interactive slicers. The explanation of the options available to use and not to use while creating a dashboard in Excel is as follows:Copy & paste pivot charts should not be used because when you copy and paste a pivot chart, it will not adjust to the new data, and you will need to adjust the chart each time. Instead, create a pivot chart by selecting the pivot table and inserting a chart on the same sheet. Consistent formatting is required in creating a dashboard. Always maintain the same formatting throughout the workbook to create a consistent and professional look and feel.Copy & paste pivot tables as pictures should not be used because when you copy and paste a pivot table as a picture, it is no longer interactive and can't be updated. Instead, copy and paste the pivot table and use Slicer to filter data. Interactive slicers should not be used in a dashboard because slicers are beneficial, but they can consume a lot of screen real estate and make the dashboard look crowded. Use the filter option to filter data.

To know more about Excel visit:

brainly.com/question/3441128

#SPJ11

Which computer specifications would be best suited for the following scenario? The marketing department wants to buy two new computers. One computer will be used for their graphic artist to create graphics and videos for the Web, and a second one for the secretary to keep track of billing and hours. What would you advise the department to purchase? Two computers with identical specifications A computer with a high-capacity CMOS RAM chip for the graphic artist and a computer with multiple sockets for the secretary A computer with a large power supply for the graphic artist and a computer with multiple internal buses for the secretary A computer with a multicore, high-speed processor for the graphic artist and a computer with a slower processor for the secretary

Answers

Answer:

A computer with a large power supply for the graphic artist and a computer with multiple internal buses for the secretary.

for each of the following sources of information, identify whether they are analog or digital and explain why

Answers

Human voice is analog signal and computer key board is digital signal.

What are signals?

There are two different types of signals: analog and digital. Information is transferred between devices via signals. A continuous wave that continuously changes over time is an analog signal. The essence of a digital signal is discrete.

Information is sent using analog and digital signals, typically by electric signals. Information, including any audio or video, is converted into electric impulses in each of these systems. The way information is translated into electric pulses of variable amplitudes in analog technology differs from how it is translated into digital signals. Information is translated into binary format (zero or one) in digital technology, where each bit represents one of two different amplitudes.

To know more about Signals Visit:

https://brainly.com/question/29867764

#SPJ1

Q)for each of the following sources of information, identify whether they are analog or digital and explain why

1) human voice

2)computer keyboard

Other Questions
36 inch board is to be cut into three pieces so that the second piece is three times as long as the first piece and the third piece is five times as long as the first piece if X represents the length of the first piece find the length of all three pieces Nos Examples of absolute age Which of the following Second New Deal measures came closest to meeting the demands of the Congress of Industrial Organizations for workplace democracy?a. Social Security.b. Federal Housing Administration.c. The Wagner Act.d. The Works Progress Administration.e. The Security and Exchange Commission. Bunnell Corporation is a manufacturer that uses job-order costing. On January 1, the companys inventory balances were as follows: Raw materials $ 40,000 Work in process $ 18,000 Finished goods $ 35,000 The company applies overhead cost to jobs on the basis of direct labor-hours. For the current year, the companys predetermined overhead rate of $16.25 per direct labor-hour was based on a cost formula that estimated $650,000 of total manufacturing overhead for an estimated activity level of 40,000 direct labor-hours. The following transactions were recorded for the year: a. Raw materials were purchased on account, $510,000 b. Raw materials use in production, $480000. All of of the raw materials were used as direct materials. c. The following costs were accrued for employee services: direct labor, $600,000; indirect labor, $150,000; selling and administrative salaries, $240,000. d. Incurred various selling and administrative expenses (e.g., advertising, sales travel costs, and finished goods warehousing), $367,000 e. Incurred various manufacturing overhead costs (e.g., depreciation, insurance, and utilities), $500,000. f. Manufacturing overhead cost was applied to production. The company actually worked 41,000 direct labor-hours on all jobs during the year. g. Jobs costing $1,680,000 to manufacture according to their job cost sheets were completed during the year. h. Jobs were sold on account to customers during the year for a total of $2,800,000. The jobs cost $1,690,000 to manufacture according to their job cost sheets. Question: 3. What is the journal entry to record the labor costs incurred during the year? 4. What is the total amount of manufacturing overhead applied to production during the year? 5. What is the total manufacturing cost added to Work in Process during the year? 6. What is the journal entry to record the transfer of completed jobs that is referred to in item g above? 7. What is the ending balance in Work in Process? 9. Is manufacturing overhead underapplied or overapplied for the year? By how much? 12. What is the ending balance in Finished Goods? 13. Assuming that the company closes its underapplied or overapplied overhead to Cost of Goods Sold, what is the adjusted cost of goods sold for the year? 14. What is the gross margin for the year? 15. What is the net operating income for the year? Mr. Thurgood gave his students a math quiz last Friday. Each question on the quiz was worth 3 points, and the quiz was worth 45 points in all. which of the following is a physical security measure? a. secured socket layer b. full disk encryption c. industrial camouflage d. packet analysis Russell wants to manage his emotions better, especially so he doesn't say things in anger. When he takes the 16 Personalities Test, which category should Russell examine for help with his emotions? Tactics : Judging vs prosecting Energy : Observant vs Intuitive Nature : Thinking vs FeelingMind : Introverted vs extroverted (\iiint_{E}^{} x^2e^y dV) Evaluate the triple integral where Eis bounded by the parabolic cylinder z=1y2 and the planes z=0,x=1,and x=1. Suppose heights of 6th graders are normally distributed with mean 159.6 and standard deviation 5.4 What is the 84.13th percentile of height? Answer: Who is your favorite character from marvel? Your firm has sales of $47,000, current assets of $5,100, current liabilities of $6,200, net fixed assets of $51,500, and a profit margin of 5 percent. The firm has no long-term debt and does not plan on acquiring any. The firm does not pay any dividends. Sales are expected to increase by 7 percent next year. If all assets, short-term liabilities, and costs vary directly with sales, how much additional equity financing is required for next year _7. Find the vector v with the given magnitude [v] = 185 and the same direction as u = (-11, 8) a) (11( 13.675), 8( 13.675) b) (8 (13.601), -11 (13.601)) c) (-11 (13.601), 8( 13.601)) d) (8 (13.675), 20QuestionMrs Holland wants to paint her garage wall.The wall measures6 m by 31mEach can of paint covers 5m2Each can costs 7.50How much will it cost Mrs Holland to paint her garage wall? Donna jogs to work, a distance of 3 km, at anaverage speed of 8 km/h. If she leaves home at8:00am, at what time will she arrive at work? how does cloud computing improve the performance and user experience of an online version of office productivity tools? 1. Why Isn't Hess's law helpful for calculating the heat of reaction Involved in the conversion of diamond to graphite? what action by the psychiatric mental health nurse best demonstrates the behaviorist theories of b. f. skinner? PLEASE HELP! WILL MARK BRAINLIEST!!! What if you worked in the Treasury Department as an anti-terrorist funding expert? What challenges would the Hawala system present to you? How would you track the funds?