What does this code print?
int main()
{ auto p1 = make_shared(42);
auto p2 = p1;
cout << *p1 << endl;
cout << *p2 << endl;
(*p2)++;
cout << *p1 << endl; }
A. 424343
B. Does not compile (illegal)
C. 424242
D. Undefined behavior
E. 424243

Answers

Answer 1

The output of the code is: 424243

So, the correct answer is E.

The `auto p1 = make_shared(42)` statement initializes the p1 pointer with a shared_ptr to a dynamically allocated int of value 42.

The `auto p2 = p1` statement creates a new shared_ptr p2 which points to the same memory location as p1, and the reference count of the shared object is incremented by 1.

The `cout << *p1 << endl;` and `cout << *p2 << endl;` statements output the value of the int, which is 42, twice because both pointers point to the same location.

The `(*p2)++;` statement increments the value of the int to 43. Finally, `cout << *p1 << endl;` outputs the value of the int, which is 43, because both pointers point to the same memory location.

Therefore, the output of the code is option E: 424243.

Learn more About codes at:

https://brainly.com/question/32481498

#SPJ11


Related Questions

Question 12 (1 point)
Generally, each pixel in an image creates 25 bytes of data.
True
False

Answers

Answer:

This is B: False

Explanation:

Each pixel of an image creates 24 bits, or 3 BYTES of data for color, and 1 byte for black and white.

I'm getting pretty desperate plz help me, I'll give brainiest, and ill make a free question worth 100 points this is for coding FLVS fine ill put it 100 plz help meee





Part 1: Plan and Write the Pseudocode
Using pseudocode, write an algorithm that someone else can follow.
Decide on a question to ask the user. Some ideas include:
What grade are you in?
What sport do you play?
Where did you go on vacation?
Use one variable to store the response.
Use one if-else statement to make a decision based on the user's input.
Display two messages; one for each condition (True and False).
Insert your pseudocode here: (you only need to do one)
Flowchart
Write it out

Get input:

If statement:

Print if true:

Print if false:


Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Write one if-else statement using user input.
Include a print message for both conditions (True and False).
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question
Response
What was the purpose of your program?

How could your program be useful in the real world?

What is a problem you ran into, and how did you fix it?

Describe one thing you would do differently the next time you write a program.




Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.

you can also give me a link to your work and ill use it as a guide I will not copy
my g mail is my user name

Answers

Answer:

give other guy brainliest

_______ sensors are sensors that measure single locations and do not attempt to create imagery.

Answers

The correct answer is Utilizing imaging geometry data, such as the separation between the sensor and the item, the orientation and location of the sensor, and the internal geometry of the

Conclusion. Everywhere in the real world, geometry is used. Radiology makes extensive use of geometry through the use of transformations, magnification, sin, cos, and tan,... An at least somewhat diffuse reflecting surface is a condition for using the laser light section method. By CY Chou Referenced 20 times An ideal mirror would not reflect any. — The goal of quantitative in-line X-ray phase-contrast imaging techniques is to reconstruct independent images that show the projected absorption and refractive characteristics of an object. RSM determines each sphere's true 3D location from its 2D shadow using the projection lines, creating the object's six potential degrees

To learn more about Utilizing imaging geometry click on the link below:

brainly.com/question/11704167

#SPJ4

When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representing the direction and position of the sprite, performing an algorithm to update these values, and changing the display in the window to match the updated state of the program. All of these actions are represented by just one single block.

Which of the following terms names the phenomenon which is best described by this statement?

a) Iteration
b) Sequencing
c) Compilation
d) Abstraction

Answers

Sequencing is the term that names the phenomenon which is best described by the given statement.

Sequencing refers to the order of logical arrangement whereby an instruction is executed in the proper order. This means that one process must be completed before the next command becomes valid and executes.

From the given statement, the computer is performing various operations in sequence which are:

Retrieving values from memoryPerforming algorithmChanging the display

These functions are done by order, using a single block.

Read more here:

https://brainly.com/question/18744767

what are different features of ms access​

Answers

1. Tables: Access allows users to create tables to store and organize data. Tables have rows and columns, and provide a structured structure for storing data.

2. Forms: Access provides a form builder that simplifies data entry and improves the user interface. Forms allow users to enter data into tables in a simple and structured way.

3. Reports: Access enables users to create professional-looking reports based on data stored in tables. Reports can include charts, graphs, summaries, and other visual elements to present data in a meaningful way.

4. Queries: Access provides a query building tool that allows users to extract specific information from tables. Queries help retrieve data, perform calculations, and create new tables or views based on specified criteria.

5. Relationships: Access methods allow users to establish relationships between tables. This ensures data consistency and allows data recovery and maintenance across multiple tables.

6. Macros and Visual Basic for Applications (VBA): Access supports automation through macros and VBA. Macros provide a way to automate common tasks, while allowing for advanced flexibility and programming capabilities in VBA Access.

7. Security: Access provides security features to protect databases and control user access. Users can set permissions, passwords and encryption to ensure data privacy and integrity.

8. Integration with other Microsoft Office applications: Access seamlessly integrates with other Microsoft Office applications such as Excel, Word, and Outlook to share, import, and export data

These are just some of the features that make Microsoft Access a powerful tool for database management and data analysis.

[x] is an online software company that specialize in selling ad spaces in their parent company’s magazine. [x] manages an online database that allows their customers to upload and pay for their business ads for magazine placement. because [x]’s database needs to connect to the parent company’s database, the parent company has requested that [x] system be assessed and verified as secure.

Answers

The following are some helpful database security procedures that can shield the database from threats and enable safe connections to any other system's database:

Logical and physical database structure securityFor databases and Web applications, use firewalls.Database value reductionControl tight database accessAnalyze and monitor database operations

How to illustrate the information?

A technique that assesses the vulnerability of databases at a specific time is security evaluation of databases. The initial risk component is evaluated by determining how vulnerable a dataset is to a collection of patched security defects and attack scenarios.

The dataset's review identifies the databases' advantages and disadvantages for users. Experts recommend taking preventative measures to address any shortcomings and build capacity as a result. Priorities for necessary modification and potential enhancements will be suggested by the evaluation.

Learn more about database on

https://brainly.com/question/518894

#SPJ1

What are the useful practices for database security that can help protect the database from attackers?

Which of the following is a benefit of display advertising over search advertising?

A
Display advertising is cheaper than search advertising

B
Appearing on relevant websites offering advertising space

C
Ads can appear at the top of search engine results pages

D
Display ads are more likely to be clicked on​

Answers

Answer:

D.

Explanation:

I NEED HELP ASAP.
Choose the term to complete the sentence.
Python is a
(High or low)
-level language.
Machine language is a (high or low)
-level language.

Answers

Answer:

Python is a High level language

Explanation:

Python is a High level language and it is a pure object oriented programming language however ,programs in python can be written using two approaches.

Structured programming approach which makes use of only functions.Object oriented approach which makes use of class and object.

Machine language: is a low level language which consists of machine language instructions.

Answer:

Python is a high-level language.

Machine language is a low-level language.

Explanation:

I NEED HELP ASAP.Choose the term to complete the sentence.Python is a (High or low)-level language.Machine

Gina is using Outlook in the default cached mode and is connected to an Exchange server. What is the default file type used to store a cached version of Gina’s mailbox?

PST
OST
MSG
XML

Answers

Answer:

Its C. MSG

Explanation:

On edg

Answer:

c

Explanation:

took the test

20 POINTS! Which music making software is better? Ableton Live or Logic Pro? Name the advantages and disadvantages of each one!

Answers

Answer:

ok, so logic pro is an apple software that you can get on your macbook.

this one is much more organized, and you can see the amount of sound you are making. is kinda like apple music maker on an i pad and stuff.

now, ableton live is kinda messy. this one is definitely for people who have more experience in music software since there is something everywhere. but, once you get the basics down you can learn to do the harder stuff on the music software.

i dont favor any of these over the other, since they both have the flaws, but if i were to choose, you should do logic pro x since this is much more simple than chrome music lab.

https://www.ableton.com/en/

https://www.apple.com/logic-pro/

What does "idle" mean in google slides?

Answers

They tab is still open but they’re not on the slides

In Go. ogle Slides, "idle" refers to a state where the user is inactive or not interacting with the presentation.

What is go. ogle slides?

When a user remains idle for a certain period of time, Go. ogle Slides may automatically transition into a screensaver-like mode, where the presentation is paused or displayed in a reduced activity state.

This feature helps conserve system resources and prevents the screen from being static for extended periods.

To resume normal functionality, the user can simply interact with the presentation again.

Learn more about go. ogle slides at:

https://brainly.com/question/19250114

#SPJ6

What is NOT a service commonly offered by unified threat management (UTM) devices?A. URL filteringB. Wireless network accessC. Malware inspectionD. Content inspection

Answers

The answer is B. Wireless network access is not a service commonly offered by unified threat management (UTM) devices.

UTM devices usually offer services such as URL filtering, malware inspection, and content inspection as part of their threat management capabilities.


Wireless network access is NOT a service commonly offered by unified threat management (UTM) devices. UTM devices typically focus on providing security services such as URL filtering, malware inspection, and content inspection to protect networks from various threats.

Learn more about network click here:

brainly.com/question/14276789

#SPJ11

Steve wants to publish a portfolio online. He use Mozilla Firebug. What will it help him do?

Steve wants to publish a portfolio online. He use Mozilla Firebug. What will it help him do?

Answers

Mozilla Firebug is a web development tool used to inspect, edit, and debug HTML, CSS, and JavaScript in real-time. It is an extension of the Mozilla Firefox web browser and allows users to analyze and modify web page content on the fly.

For Steve, Firebug can be an extremely useful tool in creating and publishing his portfolio online. By using Firebug, he can inspect the HTML and CSS of his portfolio website to identify any errors, bugs, or issues that may be affecting its functionality or appearance. Additionally, he can edit the code directly within Firebug to test out new changes and see how they affect the website in real-time.

Overall, Firebug is a powerful tool for web developers like Steve who want to ensure that their website is functioning optimally and delivering the best possible user experience.

For more questions on HTML:

https://brainly.com/question/4056554

#SPJ11

Python plese help 4.2 projectstem

it keeps saying error


pet=input("What pet do you have? ")

c=1

while(pet!="rock"):

print("You have a " + pet + " with a total of " + str(c) + " pet(s)")

pet = input("What pet do you have?")

c = c + 1

Python plese help 4.2 projectstemit keeps saying errorpet=input("What pet do you have? ")c=1while(pet!="rock"):
Python plese help 4.2 projectstemit keeps saying errorpet=input("What pet do you have? ")c=1while(pet!="rock"):

Answers

Answer: while(pet!="stop"):

Explanation:

here was my code for that lesson

pet = input("What pet do you have? ")

total = 0

while pet!="stop":

   total+=1

   print("You have one " + pet + ". Total # of Pets: " + str(total))

   pet = input("What pet do you have? ")

Where are MAC addresses stored for future reference?
a. MAC cache
b. Ethernet cache
c. ARP cache
d. NIC

Answers

The MAC addresses are stored for future reference in the (C) ARP cache.

This cache is a table that maps the IP addresses to the corresponding MAC addresses on a network.

Whenever a device needs to communicate with another device on the network, it first checks the ARP cache to see if it already has the MAC address of the destination device.

If the MAC address is not found in the cache, the device sends out an ARP request to obtain the MAC address from the device with the corresponding IP address.

Once the MAC address is obtained, it is stored in the ARP cache for future reference.

This process helps to improve the efficiency of network communication by reducing the number of ARP requests that need to be sent out.

Know more about MAC addresses here:

https://brainly.com/question/13267309

#SPJ11

Robots are more prevalent today than they were just a few years ago, tackling tasks that range in importance from cleaning floors to teaching students to diagnosing illnesses. With this progress comes possible job loss for janitorial personnel, educators, doctors, and others. Discuss some areas where you find this technology helpful as well as areas you feel more confident in human decision making. List some pros and cons of robotic technology and provide real life examples. For instance, many people would relish the thought of owning a robotic sweeper but would cringe if their children were being taught by a robot sporting a face and using personalized conversation.

Answers

Answer: Some areas that technology would be useful are Agriculture, Health Care, and the Military.

But some jobs that humans are better at could be jobs that require Creativity and strategic thinking

Explanation:

Hope this helped

var w=20;
var h = 15;
rect (10, 10, w, h);
ellipse (10, 10, w, h);
How tall is each one of the shapes?

Answers

The rectangle is 20 units tall and the ellipse is 15 units tall.

How to calculate the height of each of the shapes?

The height of the rectangle is defined by the variable 'h' and is set to 15. The height of the ellipse is also defined by the variable 'h' and is set to 15. So the height of each shape is 15 units.

What is ellipse ?

An ellipse is a geometrical shape that is defined by the set of all points such that the sum of the distances from two fixed points (the foci) is constant. It can be thought of as an oval or a "squashed" circle. In the context of computer graphics and drawing, an ellipse is often used to represent the shape of an object or an area.

Learn more about ellipse in brainly.com/question/14281133

#SPJ1

what is a compter crime?​

Answers

Answer:

Cy***rcrime, also called computer cr**me, the use of a computer as an instrument to further illegal ends, such as committing fr4ud, traf**icking in child por****graphy and intellectual property, stealing id

What does ""we have received notice that the originating post is preparing to dispatch this mail piece"" mean (from USPS)?

Answers

It indicates that the item or items you are shipping through the USPS have had tracking information generated for them, have typically been scanned into the system, and that the originating post, which serves as the starting point for those packages, is preparing to move that shipment through the USPS infrastructure.

What is USPS (U.S. Postal Service)?

The U.S Post Office, also referred to as the United States Postal Service (USPS).

The delivery of mail service throughout the United States, including its associated states and insular territories, is the responsibility of U.S. Mail, an independent executive branch organization.

It is one of the few governmental organizations that the US Constitution expressly grants authority to.

516,636 career employees and 136,531 non-career employees work for the USPS as of 2021.

To know more about USPS, visit: https://brainly.com/question/28163049

#SPJ4

Which command would you use to evenly distribute your table within the margins of the page?

Answers

Click the Table Layout tab after selecting the columns or rows you wish to be the same size. Select Distribute Rows or column distribution under cell size

How do you add a margin to a table in HTML?

Using a::before or::after pseudo-element is another approach to add some margin to a body element. By doing this, we essentially add a new row that is empty and that we can use to add some space before our tbody> items.

What is meant by the layout tab?

You can arrange the pages of your document exactly how you like by using the choices found on the Page Layout tab. You can modify page size and orientation, add divisions and line spacing, display line numbers, set section indentation and lines, and define margins. You can even apply themes.

To know more about layout tab visit:

https://brainly.com/question/12684913

#SPJ1

Write a PingPong class that implements the Runnable interface and will write ping or pong in a console window. Have it print the word (ping or pong) at least 10 times before it terminates. Write a program that creates and runs two threads using the PingPong class. One that prints ping, one that prints pong

Answers

Java program with console messages and Runnable interface implementation. Code image is attached.

Java code

import java. io.*;

import javax. swing. JOptionPxne;

public class Main implements Runnable {

   Override

   public void run() {

       String[] options = { "Ping", "Pong"};

       int selection = JOptionPane. showOptionDialog(null, "Select one:", "Write ping or pong?", 0, 2, null, options, options[0]);

       if (selection == 0) {

           for (int i = 0; i < 11; i++) {

               System.out.println("Ping");

           }

       }

       if (selection == 1) {

           for (int i = 0; i < 11; i++) {

               System.out.println("Pong");

           }

       }

   }

   public static void main(String[] args) {

       Main ex = new Main();

       Thread t1= new Thread(ex);

       t1.start();

   }

}

To learn more about Runnable interface and console window in java see: https://brainly.com/question/14214278

#SPJ4

Write a PingPong class that implements the Runnable interface and will write ping or pong in a console

what is the predefined business logic within a blockchain called?

Answers

Smart contracts: With so much being said and published about blockchain, it appears that the technology may be misunderstood by the general public. They see it as a one-man band that can do everything, including enabling bitcoin, safeguard data, brew coffee, and more, rather than a technology.

Blockchain is a distributed, immutable database that simplifies the tracking of assets and the recording of transactions inside a business network. An asset may be tangible (such a home, automobile, sum of money, or plot of land) or intangible (intellectual property, patents, copyrights, branding). A blockchain network allows for the recording and trading of practically everything of value, lowering risk and increasing efficiency for all parties. Business depends heavily on information, which is why blockchain technology is significant. It is preferable if it is received promptly and accurately.Because it provides real-time, shareable, and fully transparent data that is recorded on an immutable ledger and only available to users of a permissioned network, blockchain is the perfect technology for delivering such information.

To learn more about " database " Click on below link brainly.com/question/28391263

#SPJ4

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

Select the correct answers.
Which are the benefits of leveraging web technologies?
processing of large amounts of data
more manpower
better marketing and customer service
increased production costs
difficulty in handling customer complaints

Select the correct answers.Which are the benefits of leveraging web technologies?processing of large

Answers

Answer:

Explanation:

Select the correct answers.

Which are the benefits of leveraging web technologies?

1) Processing of large amounts of data

2) Better marketing and customer service

what are the advantages of hybrid computer

Answers

The advantages of hybrid computers are:

They have a large amount of computing speed speed that is often helped by the all-parallel configuration made by the analog subsystem. It is very useful in terms of numerical solutions for any work of differential equations and also in flight simulation.

What is an advantage of hybrid computing?

Hybrid cloud computing is known to be one that gives businesses a lot of control over their data and it is one that have a good or better security as it tends to lower the risk of exposure of data.

Note that,The advantages of hybrid computers are:

They have a large amount of computing speed speed that is often helped by the all-parallel configuration made by the analog subsystem. It is very useful in terms of numerical solutions for any work of differential equations and also in flight simulation.

Learn more about hybrid computing from

https://brainly.com/question/21474132

#SPJ1

which feature allows you to upload a csv file that contains your item data to join with analytics data?

Answers

Data Import feature allows you to upload a csv file that contains your item data to join with analytics data.

What are the various methods for data upload and definition?

The Sheets function IMPORTDATA imports data from a specified URL in either CSV (comma-separated value) or TSV (tab-separated value) format. As a result, you can import data into Sheets using published CSV/TSV files from the internet.

Sending data via a network from one computer system to another is referred to as uploading. Web browsers, FTP clients, and terminals (SCP/SFTP) are all frequent ways to upload files. When clients transfer files to a central server (perhaps simultaneously), this is referred to as uploading.

To learn more about Data import, visit:

brainly.com/question/30021977

#SPJ4

Jeanne writes a song, and Raul wants to perform
it. What should Raul do?
A. Copy the music and lyrics and take them to
the show to use.
B. Ask Jeanne for permission to use her song in
the show
C. Claim that he wrote the song
D. Have his teacher copy the song and give it to
Raul.

Answers

B) ask jeanne for permission

Answer- B: Ask Jeanne for permission to use her song in the show.

Explanation:

which of the following best defines blockchain? a type of cryptocurrency designed to secure the transactions and verify the transfer of funds. a public database storing digital information that is shared among multiple parties. a distributed ledger using consensus mechanism to improve centralized controls over data. a piece of digital information owned by miners within a distributed ledger.

Answers

The best defines blockchain is a. distributed ledger that allows the recording and processing of transactions between several parties in a transparent and reliable manner.

Blockchain technology has two distinct characteristics: it is distributed and decentralized. Therefore, there is no need for a central authority to manage the network because all participants in the system have the same rights and can monitor all transactions. The information stored in a blockchain is protected by cryptography and is distributed across multiple computers that are referred to as nodes or peers. A blockchain is made up of a series of blocks that are linked together in a chain. Each block contains several transactions that are confirmed by other nodes on the network. When a block is verified, it is added to the existing blockchain, forming a permanent record of all transactions.

Learn more about  blockchain: https://brainly.com/question/29993320

#SPJ11

help me answer this economic question

help me answer this economic question
help me answer this economic question
help me answer this economic question
help me answer this economic question
help me answer this economic question

Answers

1. Government discourages monopoly in order to create competition and allows demand and supply to function normally. The Option C is correct.

Why do most Government discourages monopoly?

Monopolies are discourgaes in free-market economies because they stifle competition and limit consumer substitutes. Antitrust legislation is in place in the United States to limit monopolies, ensuring that one company cannot control a market and then exploit its customers.

2. A market dominated by a few large powerful firm that produce between 70 and 80 percent of the total output is known as oligopoly. The Option B is correct.

What does oligopolistic market means?

Oligopolistic markets are characterized by a small number of suppliers. They can be found in all countries and in a wide range of industries. Some oligopoly markets are highly competitive, while others are significantly less so, or appear to be.

Read more about monopoly

brainly.com/question/5832236

#SPJ1

Long answer questions.
1. Explain the various methods of communication.
2. Explain the elements of communication cycle.
3. Explain the factors affecting perspective in communication.
4. Explain the meaning of phrase with example.​

Answers

Answer:

ans-I have outlined four types of communication, but I believe there are actually five types of communication: verbal, non-verbal, written, listening, and visual.
Other Questions
What do you respond to "tell me about yourself" Sunglow estimates that each blocked road results in lost revenue of $4,500 per event unless all three roads are blocked. When all three roads are blocked, the estimated lost revenue is $35,000 for that day. Sunglow estimates that weather will be similar in Year 2. It can retain a snowplow service for $50,000 annually to clear blocked roads. The variable cost of operating the snowplow is $500 per day per blocked road. If Sunglow uses a snowplow service in Year 2, the estimated benefit would be -185 = -5 - 9bHow to find the answer to this problem above? What was one of Portugals main goals in exploring the west coast of Africa?to find the northernmost point of the continentto claim territory along the coastto find a sea route to North Americato complete maps of the continent Wynona is a Type A personality, and she started having physical problems from the stress. According to the text, Wynona should try to do which of the following to reduce stress?Engage in conversation while eatingeat in solitudeeat on the wayeat extreme food A country would increase its physiological density by decreasing the size of its population a) true b) false What can you tell about the time period of the selection based on theillustrations when previewing a text? Study these equations:f(x) = 2x 8g(x) = 5xWhat is h(x) = f(x)g(x)?h(x) = 10x2 40xh(x) = 10x2 + 40xh(x) = 10x + 40h(x) = 10x 40 Simplify each trigonometric expression. sin+cos+tan Please help me solve I forgot how to solve this using the bedmas/pemdas form: 3x10+2xnegative2=??? In Texas, criminal appeals involving the death penalty are heard by1. superior courts.2. the Court of Appeals.3. the Supreme Court4. district courts5. the Court of Criminal Appeals. Which of the following factors can affect the solubility of a substance? select all that applyTemperature.The size of the containerThe amount of soluteThe amount of solventThe amount of water presentSize of the solute, smaller size dissolve fasterPresence of a catalyst.Pressure. discovery occurs before trial and involves identifying and locating books, documents, or other tangible things and persons relating to the subject matter at issue. true false The 'Tools of Science' (ToS) is a series of educational videos and hands-on lessons designed to help students explore the nature and process of science. These short videos are designed to introduce the science and engineering practices from the point of view of practicing scientists. This exercise explores a few of the ToS videos, to understand different facets of the scientific process. Please watch the videos and answer questions below. Be sure to answer all parts of the questions for full credit.1) During our class lecture, we discussed the multidisciplinary nature of Oceanography and explored the nature of collaborations and how they are necessary to answer complex processes in the ocean. What is meant by multidisciplinary? What disciplines encompass oceanography? Watch the ToS video on Collaborations. How was the North Atlantic Virus Infection of Coccolithophores Expedition (NA-VICE) a multidisciplinary project? What big question(s) did this expedition address? Why were different disciplines and institutions needed? (10 points)2) Scientists have to ask testable questions. Watch the ToS video on Asking Testable Questions. What is the SMART acronym and how does it help scientists formulate good testable questions?Is the following question a good testable question for Dr. Munroe to ask in her research? Why or why not? If not, can you make it into a better testable question? (10 pts)Which clams are the best at eating plankton?3) Now watch the ToS video on Proxies. What is a 'proxy'? How is it used in science? Why are proxies important to science? Give an example of a proxy that was discussed in for the NA-VICE expedition. Be sure to explain what was being measured and what process it represents (10 points) Use the trapezoidal rule to approximate the value of ^4xdx for n = 4 NO LINKS!! A blimp, suspended in the air of 500 feet, lies directly over a line from Soldier Field to the Adler Planetarium on Lake Michigan (see the figure). If the angle of depression from the blimp to the stadium is 32 and from the blimp to the Planetarium is 23, find the distance between Soldier Field and the Adler Planetarium. Reduce 65 in ratio 5:2 What are the three methods for conducting a functional assessment? The lemonade stand at the country fair sells the lemonade at a price of two cups for $3.00. Complete the table to find Paula's family will pay to buy lemonade for all eight members of the family. Describe the end behavior of the given function. F(x) = (2/3)^x - 2