The minimum wage of a country today is $ 25,000 per month. the minimum wage has increased steadily at the rate of 3% per year for the last 10 years. write a program c to determine the minimum wage at the end of each year in the last decade. (solve using the concepts of loop controls with c programming)

Answers

Answer 1

The C program is given below that calculates the minimum wage at the end of each year for the last decade:

#include <stdio.h>

int main() {

   float wage = 25000.0;

   printf("Minimum wage at the end of each year for the last decade:\n");

   for (int i = 1; i <= 10; i++) {

       wage += wage * 0.03;

       printf("Year %d: $%.2f\n", i, wage);

   }

   return 0;

}

Explanation:

We start by initializing the minimum wage variable to $25,000.Then we use a for loop to iterate over the 10 years, using the loop variable i to keep track of the current year. Inside the loop, we update the minimum wage by adding 3% to it using the formula wage += wage * 0.03. Finally, we print out the year and the minimum wage at the end of that year using printf(). The %.2f format specifier is used to print the wage as a floating-point number with 2 decimal places.

To know more about the  for loop click here:

https://brainly.com/question/30706582

#SPJ11


Related Questions

What is the first step when designing an algorithm?

Answers

Answer:

Explanation:

This process requires the following steps:

1. Analysis of the problem.

2. Design or development of an algorithm.

3. Transformation of the algorithm into a program (coding).

4. Program execution and validation

While designing an algorithm the first step will be Analysis of the problem. Than design or development of an algorithm will be the next step.

What is algorithm?

An algorithm is the procedure used for solving the problem or performing a computation. Algorithms act as an exact list of instructions that conduct specified actions step by step in either hardware- or software-based routines.

Algorithms are widely used throughout all areas of IT. In mathematics and computer science, an algorithm usually refers to a small procedure that solves a recurrent problem. Algorithms are also used as specifications for performing data processing and play a major role in automated systems.

An algorithm could be used for sorting sets of numbers or for more complicated tasks, like recommending user content on social media. Algorithms typically start with initial input and instructions that describe a specific computation.

Therefore, While designing an algorithm the first step will be Analysis of the problem. Than design or development of an algorithm will be the next step.

Learn more about algorithm on:

https://brainly.com/question/22984934

#SPJ2

A website you can visit
online is an example
of?

Answers

Answer:

A website you can visit online is an example of a digital media.

Explanation:

Write a qbasic program to supply first , middle and last name of a person and print the output as given below :

If input is Sam Christopher Robert output should be Robert Christopher Sam.​

Answers

Answer:

The QBasic program is as follows:

10 INPUT "First name: " fName$

20 INPUT "Middle name: " mName$

30 INPUT "Last name: " lName$

40 PRINT lName$," ",mName$," ",fName$

50 END

Explanation:

This prompts the user and gets input for first name

10 INPUT "First name: " fName$

This prompts the user and gets input for middle name

20 INPUT "Middle name: " mName$

This prompts the user and gets input for last name

30 INPUT "Last name: " lName$

This prints the output in the required format

40 PRINT lName$," ",mName$," ",fName$

This ends the program

50 END

How can you tell an open innovation project from one that is not?

Answers

An open innovation project is one in which a company seeks external ideas, knowledge, and expertise from outside the organization to advance its goals, rather than relying solely on internal resources. Conversely, a project that is not open innovation relies primarily on internal resources and expertise.

Here are some characteristics of an open innovation project:

Collaboration: Open innovation projects involve collaboration between internal teams and external partners such as customers, suppliers, academic institutions, startups, and other companies.

Sharing of knowledge: An open innovation project requires sharing of knowledge, information, and expertise between the internal and external parties.

Involvement of external parties: In an open innovation project, external parties are actively involved in the innovation process, from ideation to commercialization.

Innovation ecosystem: An open innovation project is part of a larger innovation ecosystem that fosters the exchange of ideas, knowledge, and expertise.

Access to resources: An open innovation project provides access to external resources such as funding, facilities, equipment, and talent.

In contrast, a project that is not open innovation is typically driven by internal resources and expertise. Internal teams are responsible for all aspects of the innovation process, and external parties are not involved in any significant way.

In summary, an open innovation project involves collaboration, sharing of knowledge, involvement of external parties, an innovation ecosystem, and access to external resources.

plzz help me with this question.........

Write a program to input a number find the sum of digits and the number of digits. Display the output

sample input - 7359
sample digits - 24
number of digits - 4​

Answers

Answer:

str = input("Enter a number: ")

sum = 0

for c in str:

   sum = sum + int(c)

print("Sample input - {}".format(str))

print("Sum of digits - {}".format(sum))

print("Number of digits - {}".format(len(str)))

Explanation:

That's python. Was that what you were looking for?

Answer Using Java :-

import java.util.*;

public class Digit

{

public static void main(String args[ ] )

{

Scanner in=new Scanner (System.in)

System.out.print("Enter a number: ");

int n = in.nextInt();

int sum = 0, count = 0;

while (n!=0)

{

int d = n % 10;

sum + = d;

count++;

n /= 10;

}

System.out.println("Sum of digits=" +sum);

System.out.println("Number of digits=" +count);

}

}

Anything that interferes with the sender's creating and delivering a message and the receiver interpreting the message is called__
communication
distortion
distraction
netiquette

Answers

Communication distortion is any interference that affects the accurate transmission of a message.

What is communication?

Communication is the exchange of information and ideas between people, usually through speaking, writing, or body language. It is an essential part of everyday life, involving not only personal interaction but also the ability to convey thoughts and feelings to others. Communication is important for social interaction and helps us to express ourselves, build relationships, and understand the world around us. Communication is a vital part of every human relationship and helps us to form connections with others.

This interference can be caused by any number of factors and can range from a simple misunderstanding to a major disruption of the communication process. Examples of communication distortion include physical barriers, such as noise, physical distance, time, or cultural differences; psychological barriers, such as emotions, attitudes, and beliefs; and technical barriers, such as technology or language. Communication distortion can cause misunderstandings, which can lead to ineffective communication and even conflict.

By understanding the potential causes of communication distortion, leaders can take steps to reduce the risks. They can improve the physical environment to reduce distractions, such as noise and visual clutter. They can create an atmosphere of trust and respect to reduce psychological barriers, such as feelings of distrust or anger. They can also use technology and language that are common and easy to understand to reduce technical barriers. Leaders should also practice good netiquette, which is the set of guidelines for responsible and polite online behavior.

By taking steps to reduce communication distortion, leaders can ensure that their messages are accurately received and understood. This will help create a more productive and positive work environment.

To know more about communication click-

https://brainly.com/question/26152499

#SPJ4

what is a spreadsheet​

Answers

a spreadsheet function that indicates the average of a group of numbers in a range.

Design Questions Requirement 1) Implement a timer with the use of a binary up counter driven by a 1 Hz clock. The timer is activated for a duration of 10 seconds. After 10 seconds has elapsed, it should provide an output signal to the vehicle counter to request it to stop the vehicle counting process. Show the timing diagram in order to verify that it is counting up correctly. [5 Marks] 2) With the use of a binary up counter, implement a vehicle counter that will count the number of vehicles that pass by the sensor placed at the roadside. A short high pulse is produced by the sensor circuit if a vehicle is detected passing by the sensor. A simple button in Logisim can be used to simulate the pulse signal. The pulse signal causes the binary counter to count up. The counter should be able to count to a maximum of 15 vehicles. After it receives the signal from the timer to stop counting, the data related to the total detected vehicles is then displayed. The vehicle count data is in binary value. It is displayed in decimal format by the circuit that you have built in assignment 2. Recall that the assignment 2 circuit show the binary code decimal value with 7 segment display. [5 Marks] Figure 1: Overall system block diagram

Answers

Design Questions Requirement 1)Implementation of a timer using a binary up counter driven by a 1 Hz clock is as follows: The 1 Hz clock frequency is divided by 2^x to obtain a 10-second period for the timer.

To divide the frequency of the clock, a binary up counter is used. For example, a 14-bit binary up counter would count from 0 to 16,384, with an output pulse generated when it reaches its maximum count of 16,383. Since the frequency of the clock is 1 Hz, 16,384 clock cycles correspond to 16,384 seconds, or 273.07 minutes.

The timer signal is input to the vehicle counter to stop the counting process after 10 seconds. In the timing diagram below, the output pulse is shown after the counter reaches its maximum count, indicating the 10-second timing period has elapsed. Requirement

2)The vehicle counter is implemented using a binary up counter that counts up when a high pulse is detected from the sensor circuit. A short high pulse is generated by the sensor circuit when a vehicle is detected passing by the roadside sensor.

The counter is capable of counting up to 15 vehicles, after which it stops counting when a signal is received from the timer. The binary code for the detected vehicle count is then transformed to decimal format, which is displayed on a 7-segment display by the circuit built in Assignment 2. 

To know more about frequency visit:

https://brainly.com/question/29739263

#SPJ11

Read the following scenario:

A theatrical production is in rehearsal for a revival of a classic Tony Award-winning drama. The director, wanting to make the best production possible, has spared no expense. Unfortunately, the production is over budget. The director does not want to eliminate any of the design elements or special effects he has incorporated into the production. Which of the following would a production manager most likely do to get the production back on budget?

A. work with the costume designer to minimize costume changes and use cheaper materials
B. work with the lighting designer to create the effects the director wants using a minimal amount of equipment and personnel
C. eliminate some of the supporting roles
D. offer to take a pay cut

Answers

B is the answer to the question

2
ng and Upgrading Computers: Mastery Test
Select the correct answer.
Which of the following can computer maintenance software determine?
O A.
O B.
O C.
O D.
whether your hard drive is about to fail
whether your monitor or screen is drawing too much power
the humidity inside your desktop computer
the amount of dust inside your laptop
Reset
Next

Answers

whether your hard drive is about to fail can computer maintenance software determine.

What is computer maintenance software ?

Software that centralises maintenance data and streamlines maintenance operations is known as a computerised maintenance management system, or CMMS. It aids in maximising the use and accessibility of tangible assets like machines, transportation, communications, plant infrastructures, and other assets. CMMS systems, also known as computerised maintenance management information systems (CMMIS), are used in the manufacturing, energy, transportation, building, and other sectors where physical infrastructure is essential.

A CMMS's database is its fundamental component. The information regarding the assets that a maintenance organisation is responsible for maintaining, as well as the tools, supplies, and other resources needed to do so, are organised using a data model.

Read more about computer maintenance software:

https://brainly.com/question/28561690

#SPJ1

Bayley wants to connect a new external hard drive to his Windows PC. He wants the fastest connection type available because he plans to edit video directly to and from the external hard drive. Which connection type should Bayley use to get the fastest connection possible?
A. USB 3.0.
B. Thunderbolt 3.
C. eSATA v2.
D. Lightning connection.

Answers

Answer:

C

Explanation:

i think

Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features with addictive design, including rewards for completing levels and long game times with penalties for quitting early. She likes the game but doesn’t want to get sucked in and skip her homework (which has happened before)! Name two guidelines Lin should set for herself before playing the game.

Answers

Answer:

Set a time limit for herself. Ask her parents for help monitering her app usage.

Which type of computer is used microprocessor​

Answers

Assuming you mean which type of computer uses a microprocessor the answer would be: A pc and/or microcomputer which use a single chip which is a microprocessor for their CPU (central processing unit)

(Interest Calculator) The simple interest on a loan is calculated by the formula interest = principal * rate * days / 365;
The preceding formula assumes that rate is the annual interest rate, and therefore includes the division by 365 (days). Develop a program that will input principal, rate and days for several loans, and will calculate and display the simple interest for each loan, using the preceding formula. Here is a sample input/output dialog:
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .1
Enter term of the loan in days: 365
The interest charge is $100.00
Enter loan principal (-1 to end): 1000.00 Enter interest rate: .08375
Enter term of the loan in days: 224
The interest charge is $51.40
Enter loan principal (-1 to end): -1

Answers

The program calculates and displays the simple interest in Python for several loans by taking input of principal, rate, and days, and using the formula interest = principal * rate * days / 365.

What is Python?

Python is a high-level, interpreted programming language that is widely used for various purposes such as web development, data analysis, machine learning, and artificial intelligence.


Here's the Python code to implement the interest calculator:

while True:

   principal = float(input("Enter loan principal (-1 to end): "))

   if principal == -1:

       break

   rate = float(input("Enter interest rate: "))

   days = int(input("Enter term of the loan in days: "))

   interest = principal * rate * days / 365

   print("The interest charge is ${:.2f}".format(interest))



1) The program uses a while loop to repeatedly prompt the user for input until they enter -1 to end the program.

2) Inside the loop, the program uses input() to get the principal, interest rate, and loan term in days from the user, and stores them in variables.

3) The program then calculates the simple interest using the formula given in the problem statement: interest = principal * rate * days / 365.

4) Finally, the program uses print() to display the calculated interest to the user.

Sample output:
Enter loan principal (-1 to end): 1000.00

Enter interest rate: .1

Enter term of the loan in days: 365

The interest charge is $100.00

Enter loan principal (-1 to end): 1000.00

Enter interest rate: .08375

Enter term of the loan in days: 224

The interest charge is $51.40

Enter loan principal (-1 to end): -1


To know more about loans visit:
https://brainly.com/question/9471571
#SPJ1

why are wiki's not secure​

Answers

Wikipedia is not a reliable source for citations elsewhere on Wikipedia. Because, as a user-generated source, it can be edited by anyone at any time, any information it contains at a particular time could be vandalism

use a slicer to filter the data in this table to show only rows where the category value is coffee

Answers

Slicers are simply used for filtering data stored in tables. They are very efficient when used on data in pivot tables. The process involves ; Design > Tools > Insert Slicer > Category checkbox > Coffee

From the Design tab, Navigate to Tools which is where the option to insert a slicer would be found.

Select insert slicer, which then sets the different columns as categories.

Check coffee in the category list, and only rows where the category value is coffee will be displayed.

Learn more :https://brainly.com/question/25647517

Need help pleaseeee!!!!!

Need help pleaseeee!!!!!

Answers

Answer:

Attenuation

Explanation:

This means the signal is getting weaker in long cables.

Mention 2 precautionary
measures to be observed
when using ICT tools​

Answers

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage

What is one way interpreted programming languages differ from compiled programming languages? (3 points)


Interpreted languages produce translated machine code that can be saved and run later, while compiled languages cannot be saved.

Interpreted languages translate all lines of code together and execute them all at once, while compiled languages translate one line of code at a time and then execute that line before moving on.

Programs written with interpreted languages are ready to be run, but programs written with compiled languages require interpreter software to be run.

Programs written with interpreted languages require the original source code, but programs written with compiled languages can be shared with others while keeping the source code private

Answers

Interpreted programming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously.

Why is this so ?

Interpreted progra ming languages distinguish themselves from compiled programming languages in that they translate and execute code continuously while the program runs.

Whereas compiled languages transform code into machine code that computers can execute directly.

In contrast to compiled languages, interpreted languages lack a distinct executable file and interpret the language itself during runtime. Interpreted programming offers increased flexibility and reduced debugging complexity, while compiled programs create more efficient code with improved speed.

Learn more about compiled programming languages at:

https://brainly.com/question/30498060

#SPJ1

help this poped up on my pc im on my laptop what does it mean HELP rC % M i \g e - A u t o M e r g e d - b a s e ~ 3 1 b f 3 8 5 6 a d 3 6 4 e 3 5 ~ a m d 6 4 ~ ~ 1 0 . 0 . 1 0 2 4 0 . 1 6 3 8 4 . c a t rC % M i c r o s o f t - W i n d o w s - C l i e n t - F e a t u r e s - P a c k a g e - A u t o M e r g e d - n e t ~ 3 1 b f 3 8 5 6 a d 3 6 4 e 3 5 ~ a m d 6 4 ~ ~ 1 0 . 0 . 1 0 2 4 0 . 1 6 3 8 4 . c

Answers

It means you need to get a new computer
The answer




Is


Uploaded



Down




Here

Which of the following is NOT correct?
A. Computer is capable of processing only
digital signals.
B. Appropriate software is required for
processing the data.
C. Computer is capable of processing digital
as well as analog signals.
D. Computer is capable of analyzing both
quantitative and qualitative data.

Answers

Answer:A

Explanation:

Engineers use the following tools to perform their duties. A: science and math, B: math and English, C: science and English, D: math, science , and English​

Answers

Answer:

Science and math

Explanation:

Answer:

D

Explanation:

You need all 3.

When talking about the physical elements of the Internet, the term redundancy refers to:
A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

Answers

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

Which one of the above is the Internet's primary communication protocol?

Definition:The primary communication protocol for the World Wide Web is TCP/IP (Control Protocol Protocol), often known as the Internet Protocol. TCP/IP permits simultaneous communication between all Internet-connected devices.

Which one of the above was the Internet's original goal?

The Internet was initially developed for military use before being broadened to support scientific collaboration.The innovation was also influenced in part by the 1960s' rising need for computers.

To know more about  physical elements visit:

https://brainly.com/question/10973978

#SPJ4

Which of the following is NOT a method for companies to inform consumers that a product has been recalled?

make a public service announcement on radio
agree for a spokesperson to be interviewed about the recall
provide information on the packaging of the product
provide information on the company website

Answers

Answer: provide information on the packaging of the product

Explanation:

Product recalls usually happens in case of a fault or quality issue that is identified once the product has been delivered to the customer or is in transit. In these cases the company either reach out to the customers to get the product back or recall the products back midway.

This is done through various methods like announcemnts on radio, notification on the website or through some interview with a spokesperson.

As explained above the quality issues are identified later on post the product dispatch and hence no information is listed on the product itself. Also, recalls happen to rectify the mistakes and hence this is not a part of product inforamtion which is listed on the product.

The half-life of a decaying radioactive isotope is the time it takes for half of the original mass of the isotope to decay. If the mass (in grams) of a particular radioactive sample is given by M(t)=30e^(-0. 05t) where t is in years, what is the half-life of that isotope?
Round your answer to 2 decimal places. Do not include units

Answers

Answer:

Explanation:

The half-life of 20F is 11.0 s. If a sample initially contains 5.00 g of 20F, how much 20F remains after 44.0 s?

Solution

If we compare the time that has passed to the isotope’s half-life, we note that 44.0 s is exactly 4 half-lives, so we can use Equation  ???

 with  n=4

. Substituting and solving results in the following:

amountremaining=5.00g×(12)4=5.00g×116=0.313g

Less than one-third of a gram of 20F remains.

Can someone answer this for me will award brainliest lol

Can someone answer this for me will award brainliest lol

Answers

Answer: Without GUI's being developed, we most likely would still be using terminal systems. Terminals require command/text input rather than mouse or  other input. The invention of GUI's enabled people to use simpler input methods, rather then clunky text input systems. To sum, GUI's simplified the computer experience as we know today.

Hope this helped :)

what is the extension of a Microsoft access database 2013​

Answers

Answer:

Access Database (2007, 2010, 2013, 2016)..accdb

Answer:

.accdb

Explanation:

.accdb is the extension of Microsoft Access Database 2013

describe what is the generative adversarial net and how it works

Answers

A generative adversarial network (GAN) is a type of machine learning model in which two neural networks work together to generate new data.

The GAN consists of a generator and a discriminator network that is used to create artificial data that looks like it came from a real dataset. The generator network is the one that produces the fake data while the discriminator network evaluates it. The two networks play a "cat-and-mouse" game as they try to outsmart one another. The generator takes a random input and creates new examples of data. The discriminator examines the generated data and compares it to the real dataset. It tries to determine whether the generated data is real or fake. The generator uses the feedback it gets from the discriminator to improve the next batch of generated data, while the discriminator also learns from its mistakes and becomes better at distinguishing between real and fake data.

The generator's goal is to create artificial data that is similar to the real data so that the discriminator will be fooled into thinking it is real. On the other hand, the discriminator's goal is to correctly identify whether the data is real or fake. By playing this game, both networks improve their abilities, and the result is a generator that can create realistic artificial data.

Learn more about generative adversarial network (GAN) here: https://brainly.com/question/30072351

#SPJ11

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

Which subnet would include the address 192. 168. 1. 96 as a usable host address?

192. 168. 1. 64/29

192. 168. 1. 64/26

192. 168. 1. 32/27

192. 168. 1. 32/28

Answers

192.168.1.96 is not within the range of usable host addresses in this subnet. None of the given subnets include the address 192.168.1.96 as a usable host address.

To determine which subnet includes the address 192.168.1.96 as a usable host address, we need to compare the given subnet addresses and their corresponding subnet masks.

In IP addressing, the subnet mask determines the network portion and the host portion of an IP address. The usable host addresses lie within the range of host addresses in a subnet, excluding the network and broadcast addresses.

Let's examine each option:

1. 192.168.1.64/29:

  - The subnet mask /29 corresponds to a subnet with 3 bits for host addresses, allowing for 6 usable hosts.

  - The network address for this subnet is 192.168.1.64, and the broadcast address is 192.168.1.71.

  - The usable host addresses in this subnet range from 192.168.1.65 to 192.168.1.70.

  - Therefore, 192.168.1.96 is not within the range of usable host addresses in this subnet.

2. 192.168.1.64/26:

  - The subnet mask /26 corresponds to a subnet with 6 bits for host addresses, allowing for 62 usable hosts.

  - The network address for this subnet is 192.168.1.0, and the broadcast address is 192.168.1.63.

  - The usable host addresses in this subnet range from 192.168.1.1 to 192.168.1.62.

  - Therefore, 192.168.1.96 is not within the range of usable host addresses in this subnet.

3. 192.168.1.32/27:

  - The subnet mask /27 corresponds to a subnet with 5 bits for host addresses, allowing for 30 usable hosts.

  - The network address for this subnet is 192.168.1.32, and the broadcast address is 192.168.1.63.

  - The usable host addresses in this subnet range from 192.168.1.33 to 192.168.1.62.

  - Therefore, 192.168.1.96 is not within the range of usable host addresses in this subnet.

4. 192.168.1.32/28:

  - The subnet mask /28 corresponds to a subnet with 4 bits for host addresses, allowing for 14 usable hosts.

  - The network address for this subnet is 192.168.1.32, and the broadcast address is 192.168.1.47.

  - The usable host addresses in this subnet range from 192.168.1.33 to 192.168.1.46.

  - Therefore, 192.168.1.96 is not within the range of usable host addresses in this subnet.

Based on the analysis, none of the given subnets include the address 192.168.1.96 as a usable host address.

Learn more about subnets here

https://brainly.com/question/29578518

#SPJ11

Other Questions
please answer this question The characteristic that determines which generation in plants is dominant is the generation that. Customer A owes the company $1,000 and incurred $415 in the current month. The customer owes $100 that is 27 days past due. Ethan has a cupcake tray that holds 24 cupcakes. he has batter for one more cupcake. What limiting factor is this most closely relates to in the environment How are speed and velocity different from each other What are the main differences between the Canadian and American political systems? An Australian company produces boomerangs. Theycharge $24 for their standard boomerang. This coverstheir cost of materials, labor, factory, and distribution,plus 10% profit.A foreign company makes boomerangs, and they wantto export them to Australia because they want to sellthem for less than the Australian company. Perhapsthe foreign company pays its workers less...perhapsits taxes are less because the foreign country doesn'tprovide universal healthcare and quality education.Perhaps the foreign company just can get materials atlower costs. In any case, to cover its production anddistribution costs, plus profit, the foreign company onlyplans to charge $20 per boomerang.Question: If the foreign company would charge $20 per boomerang, but a25% tariff is added to the cost, how much must the foreigncompany now sell its boomerangs for to cover its costs? Choose the word that best fits the sentence 1. Grilled cheese is the perfect ________ to my tomato soup. complement compliment complicit 2. She received a B on her English paper because she forgot to ________ her sources. sight cite site resight 3. Law enforcement _________ his property after they discovered new evidence. ceased seized seasoned 4. Did you know Hong Kong is one of the world's most _______ cities which four components are present in all addictions, whether chemical or behavioral? TRUE/FALSE. in kohlberg's stage five, moral reasoning is based on universal ethical principles. Molecules that do not contain carbon are called inorganic.true or false a study by judge and cable (2010) suggests that there is a positive relationship between weight and income for a group of men. the following data is similar to what was collected in the study. to simplify the weight variable, the men are categorized into five categories that measure actual weight relative to height from 1 A 10.0 kg block is released from rest down a 30 ramp.It slides 6.0m along the ramp against a frictional forceof 16N. What is its speed after sliding 6.0m along the ramp?*SOLVE USING ENERGY Which of these groups of animals are classified as chordates? (Check all that apply) invertebrates with a notochordechinodermsmammals amphibians reptiles insects when spillovers exist (such as pollution), government can tax, regulate, or prosecute the businesses, households, or other government agencies that are involved. when spillovers exist (such as pollution), government can tax, regulate, or prosecute the businesses, households, or other government agencies that are involved. positive negative extreme floating g. Use a spreadsheet to solve the absolute value equations in part (f).Explain your method.1234567891011AX-8-7-6-5-4-3-2-10B|x + 216=abs(A2 + 2)Pls help omg If you take out a loan with a co-signer, what is your responsibility and how is the co-signer impacted?. If X and Y have joint (probability) distribution given by : f(x, y) = 21(0)(x) 1 (0,1)() Find the cov(X,Y). Let F(x)=f(g(x)), where f(9)=5,f(9)=3,f(3)=10,g(3)=9, and g(3)=8, find F(3)= Why was the MMPI revised, and what are the highlights of the changes made in creating the MMPI 2?