Which of the statements below are true? Which are false?

a. In polling, I/O devices set flags that must be periodically checked by the CPU.
b. When using interrupts, the CPU interrupts I/O devices when an I/O event happens.
c. The overhead of polling depends on the polling frequency.
d. Polling is often a viable option for slow and asynchronous devices.
e. Synchronous I/O cannot be done with interrupts.
f. User processes are always blocked during asynchronous I/O operations.
g. Traps are software-generated interrupts.
h. System-calls can be implemented using either traps or polling.
i. DMA usually improves the overall system performance.
j. DMA is necessary for asynchronous I/O transfers

Answers

Answer 1

Answer:

a. True

b. False

c. False

d. True

e. True

f. True

g. False

h. True

i. False

j. False

Explanation:

Polling is a technique in which users are connect externally and programs are run by synchronization activity. The users are allowed to set flags for devices which are periodically checked. The end user can implement system calls using the polling technique.


Related Questions

Cryptarithmetic algorithm

Answers

Answer:

CryptArithmetic or verbal arithmetic is a class of mathematical puzzles in which the digits are replaced by letters of the alphabet or other symbols. Usually it is required that each letter would be replaced by a unique digit. Each letter having different value from the other letters.

Explanation:

Cryptarithm now denotes mathematical problems usually calling for addition, subtraction, multiplication, or division and replacement of the digits by letters of the alphabet or some other symbols. ... Since D × B has only one digit, B must be 3 or less. The only two possibilities are 0 and 2.

bob is sending a message to alice. he wants to ensure that nobody tampers with the message while it is in transit. what goal of cryptography is bob attempting to achieve?

Answers

He wants to make certain that the communication through message is not tampered with while in transit. The integrity of cryptography is bob attempting to achieve.

What do you mean by message?

A message is a distinct unit of communication intended for consumption by some recipient or set of recipients by the source. A message can be conveyed via courier, telegraphy, carrier pigeon, or electronic bus, among other methods. A broadcast's content can be a message. A conversation is formed through an interactive exchange of messages. A press release is an example of a communication, which can range from a brief report or statement issued by a government body to commercial publicity material.

To learn more about message

https://brainly.com/question/25660340

#SPJ13

1. What are the first tasks the Team Leader (TL) must perform after arriving at the staging area?
O A. Assign volunteers to specific positions and prioritize response activities.
OB. Gather and document information about the incident.
O C. Take the team to the most pressing need.
O D. Communicate with emergency responders to let them know the CERT is in place.

Answers

A. Assign volunteers to specific positions and prioritize response activities.

Which one of the following statements are true about microsoft cloud storage
1.one drive servers are stored in secure data centers
2. Individual companies will have better security than the microsoft data crnters
3. You can be confident that the data is stored under the legal requirements for the country you are in

Answers

Answer:

a) OneDrive servers are stored in secured data centers.

OneDrive have one of the most safest data servers which it makes reassured for storing our items using OneDrive.

Which of the following is the best indicator that a website is reliable?

Answers

Answer:

The author of the site tells you the information is reliable. The author of the site provides contact information and his or her qualifications.

Which devices are separate pieces that when combined together make a desktop computer? Choose five answers. 0000 Scanner Monitor Keyboard Stylus External speakers Mouse Tower​

Answers

There are five devices that, when combined together, make a desktop computer. These devices include a tower, monitor, keyboard, mouse, and external speakers.

The tower, also known as the computer case or CPU, is the main component that houses the motherboard, power supply, and other important hardware components. It is responsible for processing and storing data.

The monitor is the visual display unit that allows users to see and interact with their computer. It can come in various sizes and resolutions, depending on the user's needs.

The keyboard and mouse are input devices that allow users to input data and interact with their computer. The keyboard is used to type text and commands, while the mouse is used to navigate and select items on the screen.

Lastly, external speakers can be added to a desktop computer to enhance the audio experience. They allow users to hear music, sound effects, and other audio elements more clearly.

Overall, these five devices work together to create a fully functional desktop computer. While there are other optional components that can be added, such as a scanner or stylus, these five devices are essential for any desktop setup.

For more such questions on desktop, click on:

https://brainly.com/question/29921100

#SPJ11

how do i write a program inputs are two integers, and whose output is the smallest of the two values.

Ex: If the input is:

7
15
the output is:

7

Answers

The program that selects the smaller value of two inputs is:

# Reading two integers from the user

num1 = int(input("Enter the first integer: "))

num2 = int(input("Enter the second integer: "))

# Comparing the two integers and finding the smallest value

if num1 < num2:

   smallest = num1

else:

   smallest = num2

# Displaying the smallest value

print("The smallest value is:", smallest)

How to write the program?

To write a program that takes two integers as input and outputs the smallest of the two values, you can use a simple conditional statement in Python. Here's an example program:

# Reading two integers from the user

num1 = int(input("Enter the first integer: "))

num2 = int(input("Enter the second integer: "))

# Comparing the two integers and finding the smallest value

if num1 < num2:

   smallest = num1

else:

   smallest = num2

# Displaying the smallest value

print("The smallest value is:", smallest)

In this program, we use the input() function to read two integers from the user and store them in the variables num1 and num2.

Then, we compare the values of num1 and num2 using an if-else statement. If num1 is less than num2, we assign the value of num1 to the variable smallest. Otherwise, if num2 is less than or equal to num1, we assign the value of num2 to smallest.

Finally, we display the smallest value using the print() function.

Learn more about programs at:

https://brainly.com/question/23275071

#SPJ1

How do I write: "get a random number between -10 and 11 but it cannot be 0"? (java)

Answers

Answer:

  generate a random number in a known range and map the result to the range you want

Explanation:

Use any of the usual methods to get a random number in the range 0-20, then subtract 9. Use an IF statement to test if the result is 0. If it is, replace the value with -10.

The ________ function deletes all elements of the list.

Answers

Answer:

clear

clear() :- This function is used to erase all the elements of list.

Explanation:

The clear function deletes all elements of the list. The clear method removes all the elements from a list.

What is a function?

Simply said, a function is a “chunk” of code that you may reuse repeatedly rather than having to write it out several times. Programmers can divide an issue into smaller, more manageable parts, each of which can carry out a specific task, using functions.

A list's whole contents are cleared via the clear() method. It returns an empty list after removing everything from the list. No parameters are required, and if the list is empty, no exception is raised. The clear function is present in all languages of computers but has different codes and functions.

Therefore, the list's whole contents are removed by the clear function. All of the elements in a list are removed by the clear method.

To learn more about the function, refer to the link:

https://brainly.com/question/17001323

#SPJ2

which of the following are advantages of using jupyter notebook? group of answer choices communicate and share results documentation store data code development

Answers

One benefit of utilizing a Jupyter notebook is that it enables users to combine text, code, and data to form an interactive computational tale.

Data is a group of discrete values used to represent information. These discrete values can describe amount, quality, fact, statistics, or other fundamental units of meaning. They can also just be a series of symbols that can be further understood. A datum is a specific value contained in a group of data. Typically, data is arranged into tables or other structures that provide it greater context and meaning and can be used as data in other, larger structures. It's possible to use data as variables in a computation. Data can reflect both actual measures and abstract concepts. Data are frequently employed in economics, science, and practically every other aspect of human organizational activity.

Here you can learn more about data in the link brainly.com/question/10980404

#SPJ4

which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? group of answer choices controls algorithms benchmarking'

Answers

When it comes to preventing unauthorized access, alteration, theft, or physical damage to information systems, controls are a fundamental element of any organization's security strategy.

Securing Information Systems Through Controls, Algorithms, and Benchmarking

Controls are policies, procedures, and technical measures that are designed to protect the confidentiality, integrity, and availability of data and systems. These measures can include implementing access control policies and procedures, encryption, authentication, authorization, logging and monitoring, and other security measures.

For example, access control policies and procedures can be used to ensure that only authorized personnel can access sensitive data and systems. Encryption can be used to protect data in transit and at rest. Authentication and authorization can be used to verify the identity of users and grant them access to appropriate systems. Logging and monitoring can be used to track user activity and detect any suspicious activity.

Since your question is not complete, here is the full task:

AuditsSecurity analysisIdentity managementControls

Learn more about Algorithms at: https://brainly.com/question/11302120

#SPJ4

Controls is the correct answer. Controls refer to the policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems. They are used to ensure the security and accuracy of data. Algorithms are sets of instructions used to solve a problem or perform a task. Benchmarking is a process of measuring performance against a standard or a competitor.

The Importance of Security Controls for Information Systems

Information systems are essential for businesses and organizations, as they contain valuable data and information. To ensure the safety of this data, it is important to implement security controls. Security controls are policies, procedures, and technical measures that are used to prevent unauthorized access, alteration, theft, or physical damage to information systems.

Security controls are necessary to protect data from malicious or accidental threats. It is important to use the right security controls to prevent unauthorized access to data, as this can result in significant losses. Security controls also help to protect against other threats such as data corruption and theft. They provide an extra layer of protection so that data is not compromised.

In addition to preventing unauthorized access, security controls can also be used to ensure the accuracy of data. Security controls can be used to monitor the accuracy of data, detect errors, and ensure data integrity. This helps to ensure that data is not altered or corrupted in any way.

Security controls are also important for compliance with regulations and laws. Many organizations must adhere to certain regulations or laws, and security controls help to ensure compliance. Compliance with regulations and laws is important to maintain trust and credibility with stakeholders.

Learn more about Security controls:

https://brainly.com/question/29384735

#SPJ4

Select the correct text in the passage.
Which of the following statements is true with regards to satellite Internet access?
It is cheap.
It is the slowest internet access technology.
It can be used in rural and remote areas.
It requires direct line-of-sight to work.
It requires major installation of new infrastructure.
It covers a large geographical area.

Answers

Not cheap

Actually very fast

Works anywhere that you can see the sky (e.g. not 100m underground)

Requires direct line-of-sight

Requires new infrastructure in space (satellites), but small dishes for customers on Earth (so i’d say no)

Yes, satellites of any kind cover a large geographical area

Write a program to calculate the angle of incidence (in degrees) of a light ray in Region 2 given the angle of incidence in Region 1 and the indices of refraction n1 and n2. (Note: If n2>n1, then for some angles 1, Equation 2 will have no real solution because the absolute value of the quantity will be greater than 1. When this occurs, all light is reflected back into Region 1, and no light passes into Region 2 at all. Your program must be able to recognize and properly handle this condition.) The program should also create a plot showing the incident ray, the boundary between the two regions, and the refracted ray on the other side of the boundary. Test your program by running it for the following two cases: (a) n1= 1.0, n2 = 1.7, and 1= 45°. (b) n1 = 1.7, n2 = 1.0; and 1= 45°

Answers

The program is an illustration of conditional statements

What are conditional statements?

conditional statements are statements that are used to make decisions

The main program

The program written in Python, where comments are used to explain each line is as follows

#This imports the math module

import math

#This get sthe refraction index 1

n1 = float(input("Refraction index 1: "))

#This get sthe refraction index 2

n2 = float(input("Refraction index 2: "))

#This gets the normal angle of incidence in region 1

theta1 = float(input("Normal of incidence in region 1 (degrees): "))

#If n1 is greater than n2, then there is no real solution

if n1 > n2:

   print("No real solution")

#If otherwise

else:

   #This calculates the angle of incidence

   theta2 = math.asin(n1/n2 * math.sin(math.radians(theta1))) * (180/math.pi)

   #This prints the angle of incidence

   print("Angle of incidence",round(theta2,2),"degrees")

Note that the program only calculates the angle of incidence, it does not print the plot

Read more about conditional statements at:

https://brainly.com/question/24833629

when writing a function or a formula in a spreadsheet,what is the first u should do​

Answers

Answer:

I think you need to add the equal (=) sign to start writing an equation to find the sum for example.

Write Java code to display a dialog box that asks the user to enter his or her desired annual income. Store the input in a double variable and display it in a message dialog box. public class AnnualIncome { public static void main(String[] args) { // Write your Java code here } }

Answers

Answer:

Follows are the code to the given question:

import java.util.*;//import package for user-input

public class AnnualIncome // defining a class AnnualIncome

{

public static void main(String[] as)//defining main method

{

double income;//defining double variable

Scanner obx=new Scanner(System.in);//creating Scanner class for user-input

System.out.print("Please enter your desired annual income: ");//print message

income=obx.nextDouble();//input double value

System.out.println("Your income "+income);//print value

}

}

Output:

Please enter your desired annual income: 98659.89

Your income 98659.89

Explanation:

In this code, a class "AnnualIncome" is declared, and inside the main method, the double variable "income" is defined, that uses the scanner class concept for input the value from the user-end, and in the next step, it uses the print method for asked user to enter  value and it uses the print method, that prints income value with the given message.

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

You sometimes hear, “You can’t add apples and oranges.” Show that we can and do add apples and oranges in the national accounts. Explain how.

Answers

The reason for the statement of You can’t add apples and oranges.” Show that we can and do add apples and oranges in the national accounts is that the expression "apples and oranges can't be added" is used to highlight the differences between two objects that economists believe are incomparable.

What is the expression about?

Due to the lack of an acceptable unit of measurement, it is particularly challenging to measure the national income in practice. Three approaches are used in economics to measure national income:

The Product Method, also known as the Value Output Method.The Income Method.The Expenditure Method.

Which are not enough. The national income or GDP is immaterial. Therefore, Real GDP includes thousands of other items and services that cannot be directly added in economics, in addition to apples and oranges, computers, as well as power, transportation, and also education.

Learn more about national accounts from

https://brainly.com/question/1098565
#SPJ1

How did early computing device such as Charles Babbage's analytical engine and Ada Lovelace's contributions set the foundation for modern computing

Answers

Early computing devices, such as Charles Babbage's Analytical Engine and Ada Lovelace's contributions, played a crucial role in setting the foundation for modern computing. Here's how their work contributed to computing development:

1. Charles Babbage's Analytical Engine: Babbage designed the Analytical Engine, a mechanical general-purpose computer concept, in the 19th century. Although the Analytical Engine was never fully built, its design and principles laid the groundwork for modern computers. Key features of the analytical engine include:

a. Stored Program: Babbage's Analytical Engine introduced the concept of storing instructions and data in memory, allowing complex calculations and tasks.

b.  Control Flow: The Analytical Engine could make decisions and perform conditional operations based on previous computations, resembling the modern concept of control flow in programming.

c. Loops: Babbage's design incorporated looping mechanisms, enabling repetitive instruction execution, similar to modern programming languages.

2. Ada Lovelace's Contributions: Ada Lovelace, an English mathematician, collaborated with Charles Babbage and made significant contributions to computing. Her work on Babbage's Analytical Engine included writing the first algorithm intended for machine implementation. Lovelace realized the potential of the analytical engine beyond numerical calculations and recognized its capability for processing symbols and creating complex algorithms. Her insights laid the foundation for computer programming and algorithms.

Lovelace's ideas about the analytical engine extended beyond what was initially envisioned. He stressed the importance of machines handling more than just numbers. Her contributions demonstrated computers' potential to perform tasks beyond basic calculations and numerical processing.

Collectively, Babbage's analytical engine and Lovelace's contributions provided early conceptual frameworks for modern computing. Their ideas influenced subsequent pioneers in the field, and the concepts they introduced paved the way for the development of the digital computers we use today.

Temperature converter. This program should prompt the user for two arguments, first a decimal number and second, a single letter, either C or F. The decimal represents a temperature, the character represents which system that degree is in (50.0 F would be 50.0 degrees Fahrenheit etc.). This program should take the given number and convert it to a temperature in the other system. The output string format should be degree(s) is equal to degree(s) . Eg. input 0 C would give the string 0.0000 degree(s) C is equal to 32.0000 degree(s) F. You can assume that either F or C will be given for input, no need to account for invalid input.

Answers

Answer:

\( \boxed{ \tt{I \: wrote \: the \: program \:with \:( c++)}}\)

Temperature converter. This program should prompt the user for two arguments, first a decimal number


Describe how to manage the workspace by putting each feature under the action it helps carry out

Describe how to manage the workspace by putting each feature under the action it helps carry out

Answers

Answer:

Viewing Documents one at a time:Windows+tab keys,

Windows taskbar

Viewing documents at same time:

Snap,Arrange all

Explanation:

 The workspace can be managed by putting control of the surroundings it's far important that you examine all of the factors and items found in your area.

What is the workplace for?

Workspaces had been round in Ubuntu properly earlier than the transfer to Unity. They essentially offer you a manner to organization home windows associated with comparable duties together, in addition to get "additional" screenspace.

The subsequent step is to outline a logical and optimizing feature for the factors with a view to continuing to be on your surroundings, defining that each of them may be capable of carrying out an easy and applicable project for his or her paintings.

Read more about the workspace :

https://brainly.com/question/26463698

#SPJ2

differences between the first four generations of computers​

Answers

Answer:

Explanation:

These first generation computer were mainly used for scientific computations. Some examples of these computers are ENIAC, EDVAC, EDSAC, UNIVAC I and IBM 701.

Activities Visit shops, NTC office, Electricity office, Fast food center and complete this. Write the name of the shop / office:.... Paste the computer based printed bill here:​

Answers

An example of a computer based printed bill is attached accordingly. The name of the business is national enterprise.

What is a computer based printed bill?

A digital invoice created by the provider in an accounting or financial software system is known as an e-bill (electronic bill). It is instantly provided to the payer in digital format through email or a web-based interface for electronic payment processing in their software system.

A billing machine is a machine created exclusively to produce client bills. It produces invoices and stores a copy in its database. There are several sorts of billing machines on the market, such as portable, automated, handheld devices, bus ticketing machines, and so on.

Learn more about Bills;
https://brainly.com/question/16405660
#SPJ1

Activities Visit shops, NTC office, Electricity office, Fast food center and complete this. Write the

does Assembler directives execute at runtime?

Answers

Answer:

Instructions are executed at run-time. Directives are instructions for the assembler and thus are not really executed at all.

Explanation:

directory definition please nedd it real quick

Answers

Answer:

a book listing individuals or organizations alphabetically or thematically with details such as names, addresses, and phone numbers.

Of the following, which is considered changing lanes?

Answers

Blind spots are absent from vehicles with two outside mirrors. Explanation Check your mirrors, over your left or right shoulder, and signal before changing lanes to ensure that the lane next to you is clear.

Which of the following describes how to change lanes safely?

Signal, check all of your mirrors, and check for traffic in front of and behind you before changing lanes. Make sure the lane you want is clear by looking behind you in the direction you intend to move. Verify for automobiles and motorcycles.

What does the term "changing lanes" mean?

Changing lanes The act of moving a vehicle from one lane to another where both lanes are traveling in the same direction is known as a lane change.

To know more about Blind spots visit :-

brainly.com/question/28216276

#SPJ1

The complete question is-

Before changing lanes, check your side and rearview mirrors for traffic approaching you from behind. Then, use your turn signal to let other drivers know you plan to change lanes. Check for other drivers who also may be moving into the same lane. Just before you begin moving into the other lane, quickly glance over your shoulder and check for any vehicles that may be in your blind spot.

When you are using a keyword search what are you most likely doing?

Answers

Answer:

Just typing words or answering questions

Answer:

when using a keyword search, you are looking for close results to what you are looking for.

Explanation: its a general search not specific. thus you are likely to get very many results with the same word. hope this helps. :)

What is the controller in this image know as? Choose one

What is the controller in this image know as? Choose one

Answers

Answer:

mode dial

Explanation:

Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output parameters xValNew and yValNew. The function returns void. The transformation is new = (old + 1) * 2. Ex: If xVal = 3 and yVal = 4, then xValNew is 8 and yValNew is 10.

Answers

Answer:

Check the explanation

Explanation:

#include <iostream>

using namespace std;

void CoordTransform(int x, int y, int& xValNew,int& yValNew){

  xValNew = (x+1)*2;

  yValNew = (y+1)*2;

}

int main() {

  int xValNew = 0;

  int yValNew = 0;

  CoordTransform(3, 4, xValNew, yValNew);

  cout << "(3, 4) becomes " << "(" << xValNew << ", " << yValNew << ")" << endl;

  return 0;

}

Why would an organization most likely decide to implement an Acceptable Use Policy (AUP) for its computers?

A. To allow administrators to review what users are doing online
B. To protect its computer network from the threat of malware
C. To specify how data can be used over its computer network
D. To limit the resources users are allowed to access​

Answers

An organization would most likely decide to implement an Acceptable Use Policy (AUP) for its computers to achieve B)  To protect its computer network from the threat of malware.

An AUP can be implemented to protect the organization's computer network from the threat of malware.

By establishing guidelines regarding the downloading of files, visiting potentially harmful websites, or executing suspicious software, the policy helps mitigate the risk of malware infections that could compromise the organization's data, systems, and operations.

It sets expectations for users to refrain from engaging in activities that could introduce harmful elements into the network.

For more questions on Acceptable Use Policy

https://brainly.com/question/2625500

#SPJ8

What characteristic of RAM makes it unsuitable for permanent
storage?
Volatile
too slow
all of the above
not reliable

Answers

Answer:

Volatile

Explanation:

Volatile means permenant

Other Questions
place the following factors affecting the aging process in order from most to least influential, according to the textbook authors interview with epidemiologist morgan levine.-healthy behaviors-socioeconomic status-stressful events-genetics "For which value of c does Limit of f (x) as x approaches c not exist?" evaluate the limit. lim (3n+4)(1-n)/n^2 People are looking to see why some people get bit more by mosquitos than others. Some people havewondered if the scent of their perfume can have an effect on how often they are bit.a)independent variable:b) dependent variable:c) three possible constants in thescenano Topsoil is made up mostly made up of what ingredient? HURRY PLS!!! I will give BrainiestA. rock and mineral particlesB.millions of animalsC. 5 billion microorganismsD. 100 miles of root hairsCorrect answer = Brainliest Graph A and Graph B both show the average square feet of apartment living space per person in the city of Washington for two years: 2001 and 2021 . ( Hoth graphs show exactly the same data.) The average living space was about 6 times as high in 2021 as in 2001 . The average living space was about 91as high in 2021 as in 2001. The average living space was about 31as high in 2021 as in 2001 . (b) Approximate the difference in the average living space for the two years. Write your answer to the nearest whole number, in hundreds of square feet. hundred square feet (c) Which of the two graphs is more likely to A music school wants to expand its class schedule. To better understand the current schedule, the director looked at which instruments are taught or not taught on various days of the week What are the 3 main powers of the Senate?. What is one right or freedom granted by the First Amendment?a. Trial by jury.b. To vote.c. To bear arms.d. Speech. URGENT!! ILL GIVEBRAINLIEST! AND 100 POINTS Math help please show work When cutting a FBD through an axial member, assume that the internal force is tension and draw the force arrow _______ the cut surface. Three ships, A, B, and C, are anchored in the atlantic ocean. The distance from A to B is 36.318 miles, from B to C is 37.674 miles, and from C to A is 11.164 miles. Find the angle measurements of the triangle formed by the three ships.A. mA=88.28267; mB=17.22942; mC=74.4879B. mA=74.4879; mB=17.22942; mC=88.28267C. mA=17.22942; mB=74.4879; mC=88.28267D. mA=88.28267; mB=74.4879; mC=17.22942 Marnie was used to getting her way. She had a way with people and could charm almost anyone into going along with her. Not only was she pleasant and vivacious, she had a reputation of being trustworthy that appealed to those around her. This enabled her to rely strongly on __________.referent power calculate the surface area of the shape belowplease can someone help me solve it Write the best word to complete the analogy. Use the definite article (el, la, los, or las) in your answer.el lpiz : :: el bolgrafo : el lquido corrector (white-out) On Monday, Kevin spent 4/5 of an hour working on his homework, on Tuesday he spent 2/3 of an hour on his homework and on Wednesday he finished his homework in 7/10 of an hour. How long did Kevin spend doing homework on Monday, Tuesday, and Wednesday in all? help!! what is this answer!! 10 x + 3 for x = 6 A coin is tossed and a six-sided dice is rolled. Find the probability of getting a head on the coin and a 6 on the dice. 3) You order two pizzas for you and your friends. The total comes to $24.50. Thedelivery charge is 11.5% of your total, and you need to tip the pizza delivery person20%. What is your total after delivery?$2.81$27.32$32.78