Which term describes a type of game that simulates skill needed to perform a job?

1. social networking
2. task training
3. recreation
4. therapy ​

Answers

Answer 1
Answer
Trash talking

Related Questions

Circle the portion of the IP address that would be invalid if it were assigned to a host, and then explain why it is invalid: 131. 107. 256. 80 222. 222. 255. 222 0. 127. 4. 100 190. 7. 2. 0 127. 1. 1. 1 198. 121. 254. 255 255. 255. 255. 255

Answers

The portion of the IP address that would be invalid if it were assigned to a host are:

0. 127. 1. 1.255 255. 255. 255. 255.

What is an IP address?

An IP address is the abbreviation for internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer or other network devices, so as to successfully differentiate them from one another in an active network system.

In Computer networking, the internet protocol (IP) address comprises two (2) main versions and these include;

Internet protocol version 4 (IPv4).Internet protocol version 6 (IPv6).

In this scenario, the portion of the IP address that would be invalid if it were assigned to a host are:

0. 127. 1. 1.255 255. 255. 255. 255.

In conclusion, the host portion of a valid IP address must not have all of its unique numbers as ones (1s) or zeros (0s).

Read more on IP address here: https://brainly.com/question/24812743

what protocol does the ping command use to test network connectivity?

Answers

The ping command uses the Internet Control Message Protocol (ICMP) to test network connectivity.

ICMP is a protocol that allows network devices to communicate with each other for various purposes, such as reporting errors, sending control messages, and testing network connectivity. When you use the ping command, it sends an ICMP echo request message to the specified destination, and waits for an ICMP echo reply message to come back.

The ping command sends ICMP echo request packets to the target IP address, and the target device then sends ICMP echo reply packets in response. By analyzing the round-trip time and any potential packet loss, the ping command helps determine the network connectivity and performance between the source and target devices.

To know more about Control Message Protocol visit:-

https://brainly.com/question/32319377

#SPJ11

Who should you not contact if you think you are the victim of identity theft or fraud?​

Answers

Dont contact people that believe ur story and don’t contact snitches

Refer to the Agile Development Manifesto where the authors identify the advantages of the Agile Software Development, ASD, over the classical software development, CSD: Using what was discussed in class for very large software systems, VLSS, state a reasonable position regarding the Manifesto in the following two points/questions.
1. Working software over comprehensive documentation
Here the authors refer to "working software"? Given the fact that there is not a single possibility to deliver non-working software, i.e., no matter what the software developer is delivering, it has to be "working software". So, how does this relate to "comprehensive documentation in very large software systems?
2. Customer collaboration over contract negotiation
Is it the case that the authors are making a general statement regarding "contract negotiation" affecting all sizes of software? Specifically, what are the authors talking about and when is this "no contract negotiation" (if that is what this point means) acceptable or not acceptable?

Answers

1. In the context of very large software systems, this principle suggests that while documentation is necessary, the focus should be on delivering functional software rather than solely relying on extensive documentation.

2. The manifesto promotes customer collaboration over contract negotiation, indicating that active involvement and communication with customers are crucial.

1. The Agile Development Manifesto emphasizes the importance of working software over comprehensive documentation.

The principle of "working software over comprehensive documentation" recognizes that documentation is important but should not be prioritized over delivering functioning software. In the context of very large software systems, comprehensive documentation is typically necessary to ensure effective collaboration among the development team, stakeholders, and future maintainers of the system. Given the complexity and scale of such systems, documentation becomes crucial for understanding system architecture, design decisions, and maintenance procedures. While the manifesto emphasizes the value of working software, it does not imply that documentation is unnecessary. Rather, it suggests that the emphasis should be on delivering functional software while maintaining a balance with the appropriate level of documentation needed for a complex system.

2. The principle of "customer collaboration over contract negotiation" emphasizes the importance of actively involving customers throughout the development process. However, the applicability of this principle to very large software systems may vary depending on the specific context and requirements. In the context of very large software systems, where multiple stakeholders and complex requirements are involved, collaboration with customers becomes essential for aligning the system with their evolving needs. However, it is important to note that contract negotiation can still play a role in formalizing the relationship and expectations between the development team and the customer, particularly in contractual agreements. The manifesto encourages a collaborative approach, but it does not dismiss the need for contractual agreements altogether. The extent of contract negotiation may vary depending on factors such as the project's scope, legal requirements, and the level of trust established between the parties. In situations where the customer's requirements are rapidly changing or the project involves an agile and iterative development approach, the manifesto suggests that ongoing collaboration and communication are more effective than relying solely on rigid contract negotiation.

To learn more about software, click here: brainly.com/question/28224061

#SPJ11

Which action is taken by a layer 2 switch when it receives a layer 2 broadcast frame?.

Answers

Answer:

When a Layer 2 switch receives a frame with a broadcast destination address, it floods the frame to all ports except the port on which it received the frame.

Explanation:

i finished all my final exams 100 on math 100 on science and 94 on language arts.

Answers

Answer:

GOOOD JOBBB !! congrats :D

Explanation:

Answer:

hmmm

Explanation:

I think 294 cause it makes since

the line assortment / line plan in yunique plm a. can be created from existing styles b. are customized by the plm administrator c. can be used to create style folders from an existing line plan d. all of the above e. none of the above

Answers

The line assortment / line plan in yunique plm is option d. all of the above

Can be created from existing stylesIs customized/formatted by the PLM AdministratorCan be used to create Style Folders from an existing Line Plan

A line assortment serves what purpose?

The developers of the market-leading YuniquePLMTM product lifecycle management software, Yunique Solutions, have released the most recent version of their PLM solution, which includes powerful costing capabilities for planning and financial teams as well as improved line planning functionality for merchandisers and designers.

Although it does not offer a large number of products in each product line, it aims to offer a greater variety in the product lines that are offered. An example of a business using a wide assortment strategy is a grocery store that sells a variety of goods but only carries one or two brands of each kind of item.

Learn more about assortment from

https://brainly.com/question/27499240
#SPJ1

Write a C++ program to add two integers. Make a function add() to add integers and display sum in main() function.

Answers

Answer:

In C++:

#include <iostream>

using namespace std;

int add(int a, int b){

   int c = a + b;

   return c;

}

int main(){

   int a, b;

   cout<<"Enter two numbers: ";

   cin>>a;

   cin>>b;

   cout<<add(a,b);

   return 0;

}

Explanation:

The add() function begins here

int add(int a, int b){

This adds the two integers

   int c = a + b;

This returns the sum of the two integers

   return c;

}

The main begins here

int main(){

This declares two numbers

   int a, b;

This prompts user for two numbers

   cout<<"Enter two numbers: ";

The next two lines gets the two numbers

   cin>>a;

   cin>>b;

This gets the sum of the two numbers from the add() function. The sum is also printed

   cout<<add(a,b);

   return 0;

}

What makes this information systems environment unique? (3 points)

Answers

Information technologies are unique not just because of their growing use in decision-making and knowledge management systems, important as that is. Their use has also yielded significant improvements in the efficiency of energy and materials use.

Help Pleaseeee? Which tool is used to create the World Wide Web? A. HTML B. Web Coder C. Application Software D. JavaScript

Answers

The correct answer would be A, I did it and A was right. :)

Fill in the blanks

1. A group of computers connected with each other, make a ____________ .
2. A computer or a device connected to a network is called __________ .​

Answers

Answer:

1.Local Area Network

2.network host

Fitst one is Local area network

And the second it could be network host

Do you think employers are impressed with someone who knows how to use Excel? Why or Why not?

Answers

Answer:

Explanation:

Yes, but it depends on who your applying your job for. If it's a computer based job than they will be impressed.

in class we discussed the streamlet protocol where nodes notarize a block if it has 2/3rd of the vote, and finalize a chain up to the second to last block if the chain ends with three notarized blocks from consecutive epochs

Answers

The Streamlet protocol is a consensus protocol used in distributed systems where nodes work together to reach an agreement on the state of a blockchain.

In this protocol, nodes notarize a block if it receives at least 2/3rd of the vote from the participating nodes.

To understand the process, let's break it down step by step:

1. Notarization: When a node creates a new block, it broadcasts it to the network. Other nodes then vote on whether to notarize the block or not.

For a block to be notarized, it needs to receive at least 2/3rd of the vote from the participating nodes. If the block achieves the required number of votes, it is considered notarized.

2. Finalization: Once a block is notarized, it becomes part of the blockchain. In the Streamlet protocol, a chain is considered finalized up to the second to last block if the chain ends with three notarized blocks from consecutive epochs.

This means that if the last three blocks in the chain have been notarized and belong to consecutive epochs, the chain is considered finalized up to the second to last block.

By using this protocol, the nodes in the network can come to a consensus on which blocks are valid and should be added to the blockchain.

The notarization process ensures that the blocks have received enough votes to be considered valid, and the finalization rule helps to ensure the stability and integrity of the chain.

To know more about Streamlet protocol, visit:

https://brainly.com/question/30547558

#SPJ11

The question is,

Streamlet. In class we discussed the StreamLet protocol where nodes notarize a block if it has 2/3rd of the vote, and finalize a chain up to the second to last block if the chain ends with three notarized blocks from consecutive epochs, e.g. 7-8-9. Suppose we relax the Streamlet finalization rule so that nodes consider a chain finalized up to the second to last block if the chain ends with three notarized blocks from four consecutive epochs, e.g. 7-8-10. Come up with an adversary that can break consistency. Here you may assume that the network is not synchronized so honest nodes can receive blocks out of order.

Who invented slide Rule and when?​

Answers

Invented by William Oughtred in the 1600s but only used in the mid 1800s
A slide rule is used for multiplication and division, invented by William Oughtred in 1622. Used until 1970s. Straight up looks like a ruler.

the program associates placeholders in the cursor with pl/sql variables. a. parse b. bind variable c. close cursor d. execute

Answers

The process of associating placeholders in the cursor with PL/SQL variables is called b.binding variables.

The parsing step involves checking the syntax of the SQL statement and generating an execution plan. Once the placeholders are bound to variables, the cursor is ready to be executed. After execution, the cursor should be closed to release resources. A variable is a named storage location in a program where a value or object can be stored and retrieved as needed.

Binding a variable involves assigning a value or object to the variable name so that it can be referenced later in the program. Binding variables is an essential concept in computer programming, as it allows programs to store and manipulate data, and to create more complex algorithms and data structures.

Learn more about binding variables: https://brainly.com/question/30418967

#SPJ11

you are tasked with improving the performance of a functional unit. the computation for the functional unit has 4 steps (a-d), and each step is indivisible. assume there is no dependency between successive computations. (5pts) what is the greatest possible clock rate speedup possible with pipelining? you do not need to worry about the register timing constraints (e.g., delay, setup, hold). explain your reasoning. (5pts) for maximizing the clock rate, what is the minimum number of pipeline registers you would use? where would you insert the registers (draw or describe) into the datapath provided for this functional unit? why not use fewer or more pipeline stages?

Answers

2.5 is the greatest possible clock rate speedup possible with pipelining.The minimum number of pipeline registers you would use 3 registers.

What is pipeline?

A pipeline, also known as a data pipeline, is a succession of data processing devices connected in computing, where the output of one is the input of the next. Pipeline elements are frequently processed in parallel or in a time-sliced fashion. Between elements, some buffer storage is frequently inserted.

Execution time for 1 instruction in Non-pipeline

=(5+8+4+3)

=20ns

Execution time for I instruction in pipeline.

= Max (5,8,4,3)

= 8 ns

Speedup= 20/8

=2.5

Minimum number of pipeline registers= 3

Each register stores intermediate result of 2 steps in pipeline. Hence, only 3 registers is needed.

To learn more about pipeline
https://brainly.com/question/10854404

#SPJ4

which feature should you use to check for certain types of data stored in documents, such as hidden properties and personal information, that you do not want others to see?

Answers

So can find & hidden properties data in files that your plan to share by using the Doc Inspect tool in Word, Axles, Ppt, or Visio. Hidden data may consist of: In Word docs, there may be classified info or secret data that you don't want to share.

How can all properties be displayed in Excel?

On the File tab, click. You examine the workbook's characteristics, click Info. Mouse your finger over the parameter you wish to edit and input the information to add and otherwise change it.

How do you examine properties that are hidden?

Select the File tab from the previous document's copy, and then select Info. Click Inspection Documents after selecting Check for Issues. Check the boxes in the Content Inspector dialog box.

To know more about hidden properties visit:

https://brainly.com/question/12991415

#SPJ4

Checking a website author’s credentials is one way to establish a site’s _________. Group of answer choices security information literacy credibility copyright

Answers

Answer:

The answer is "Credibility".

Explanation:

By assessing the excellently-intended, factual, or unbiased" a Site is, users, assess reliability. It can be achieved by developers, which provides a useful set of information sections, and responses to the links for external sources or resources must be provided.  The credibility of its website is mostly about making the site accurate and accurate. Only 52.8% of internet users agree that digital information is consistent, and the incorrect choice can be defined as follows:

Information on security is used in designing, that's why it's wrong.literacy is used in understanding, that's why it's incorrect.copyright refers to the legal right, that's why it's incorrect.

Toothpicks are used to make a grid that is60toothpicks long and32toothpicks wide. How many toothpicks are used altogether?

Answers

Answer:

184 toothpicks

Explanation:

60 toothpicks+60 toothpicks+32 toothpicks + 32 toothpicks = 184 toothpicks

Answer:

3932

Explanation:

So, For 60×32 grid toothpicks required = 2x60x32 +60+32 = 3932*

Please help with this code!

Please help with this code!

Answers

import random

months = ["jan", "feb", "mar", "apr", "may", "june", "july", "aug", "sept", "oct", "nov", "dec"]

pick1 = random.choice(months)

pick2 = random.choice(months)

if months.index(pick1) < months.index(pick2):

   print(pick1)

   print(pick2)

else:

   print(pick2)

   print(pick1)

Since the months are already in chronological order in the list, we can compare their index and print the string with the smaller index first. I wrote my code in python 3.8. I hope this helps.

there are no loops in the agile life cycle. that would defeat the purpose of agile - to get quickly from start to finish. group of answer choices true

Answers

The given statement of agile life cycle is false.

What is agile life cycle?

The Agile life cycle will differ differently based on the project management technique that a team chooses. Scrum teams, for example, work in short time periods known as sprints, which are analogous to iterations. They also have distinct duties, such as Scrum master. Kanban teams, on the other hand, have a more continuous flow with no needed roles. Another example is Extreme Programming, in which teams work in shorter iterations and place a special emphasis on engineering principles. However, the goal of all software development teams is the same: to provide users with functional product on schedule.

To learn more about agile life cycle

https://brainly.com/question/13668097

#SPJ4

Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard

Answers

maybe a sketchbook:))))

Answer:

Your answer is D Storyboard

Explanation:

Storyboarding is a process where you plan how things will look on your website just as described.

How does the brain influence your emotions, thoughts, and values?

Answers

Amygdala. Each hemisphere of the brain has an amygdala, a small, almond-shaped structure. The amygdalae, which are a part of the limbic system, control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" reaction when someone senses a threat.

What are the effects of the brain?Serotonin and dopamine, two neurotransmitters, are used as chemical messengers to carry messages throughout the network. When brain areas get these signals, we recognize things and circumstances, give them emotional values to direct our behavior, and make split-second risk/reward judgments.Amygdala. The amygdala is a small, almond-shaped structure found in each hemisphere of the brain. The limbic systems' amygdalae control emotion and memory and are linked to the brain's reward system, stress, and the "fight or flight" response when someone perceives a threat.Researchers have demonstrated that a variety of brain regions are involved in processing emotions using MRI cameras. Processing an emotion takes happen in a number of different locations.

To learn more about Amygdala, refer to:

https://brainly.com/question/24171355

#SPJ1

Explain how a layered security strategy throughout the seven domains of a typical IT infrastructure can help mitigate risk exposure for loss of privacy data or confidential data from the System/Application Domain

Answers

A layered security strategy throughout the seven domains of a typical IT infrastructure can help mitigate risk exposure for loss of privacy data or confidential data from the System/Application Domain by implementing a number of measures.

The seven domains of a typical IT infrastructure:

1. Access Controls: Access controls should be implemented to control user access to the system or application. Access controls should be based on the user's role and their need to access the data. This helps to ensure that only authorized users have access to the data.2. Data Encryption: Data encryption should be used to protect the data stored on the system or application. This will ensure that the data cannot be accessed or read by unauthorized users.3. Network Security: Network security measures should be implemented to secure the network from external threats. This includes firewalls, intrusion detection systems, and virtual private networks (VPNs).4. Security Monitoring: Security monitoring should be used to detect any suspicious activity on the system or application. Security monitoring can also be used to detect any malicious activity or attempts to access the data.5. Security Testing: Security testing should be performed on the system or application to identify any potential vulnerabilities. This will help to ensure that the system or application is secure and that any potential risks are identified and mitigated.6. Identity and Access Management: Identity and access management should be implemented to ensure that only authorized users have access to the data. This will help to ensure that the data is secure.7. Data Loss Prevention: Data loss prevention measures should be implemented to prevent accidental or intentional loss of data. This can include encryption, backup solutions, and other data protection measures.

Learn more about security strategy:

https://brainly.com/question/27993255

#SPJ4

Question 14 of 25
A computer programmer will often use a
by other programmers.
, which includes code written

Answers

A computer programmer often uses a programming language to write code that other programmers can understand and utilize.

How is this so?

Programming languages provide a set of syntax and rules that allow programmers to create software and applications.

By using a standardized programming language, programmers can communicate their ideas effectively and share code with others.

This promotes collaboration,reusability, and efficiency in software development, as code can be easily understood, modified, and built upon by different programmers.

Learn more about computer programmer at:

https://brainly.com/question/29362725

#SPJ1

Three identical div boxes with the following CSS class properties are placed inside of a container. What must the width of the container be so that all three boxes

can be displayed side by side??

boxes

wide 50x

height: 100%

margin: 0px 0px 20px 10px

padding: 5px

float le

Answers

To display three identical div boxes side by side, the container must have a width of at least 180px.

To display three identical div boxes side by side within a container, you need to calculate the total width required for the container. Here are the relevant properties for each box:

- Width: 50px
- Padding: 5px on each side (left and right)
- Margin: 10px on the left side only

To calculate the total width, we need to consider the width, padding, and margin for each box:

Box width: 50px
Total padding for each box: 5px (left) + 5px (right) = 10px
Total margin for each box: 10px (left)

Now, multiply the total width, padding, and margin for a single box by the number of boxes (3), and subtract the margin of the last box since it doesn't require spacing on the right:

(50px + 10px + 10px) * 3 - 10px = 180px

So, the container must have a width of at least 180px to display all three boxes side by side.

Know more about the width click here:

https://brainly.com/question/30173060

#SPJ11

you know that installing windows server includes storage services by default. why can't you then create and manage smb shares using server manager? what must be installed first? question 9 options: server for nfs role service file and storage services role advanced storage services role service file server role service

Answers

File Server role service is installed initially. In order to store and make data BLOBs accessible to clients, the file server assumes the role of a computer or server, acting as a hub for the storage and file sharing of networked files.

What is local area network?A local area network is a type of computer network that connects computers in an area that is relatively small, like a home, school, lab, university campus, or office building. A wide area network, on the other hand, typically uses leased telecommunications circuits and spans a greater geographic area. Local area network is what it means. A LAN is a network that is contained inside a small geographic region, typically within the same building, while a network is a group of two or more connected computers. Common instances of LANs include WiFi networks in homes and small business networks.A local area network, or LAN, is a type of computer network made up of access points, cables, routers, and switches that allow devices to connect to web servers and internal servers located within a single structure or campus. They could be restricted to a single local area network (LAN) or accessible through the internet.

To learn more about local area network, refer to:

https://brainly.com/question/8118353

what does the preprocessor command #include my-functions.hpp do?

Answers

The preprocessor command #include my-functions.hpp is used to add the contents of the file my-functions.hpp to the current file at the point where the command is placed.

What is command ?

Command is a directive or instruction that is given to a computer to perform a specific task. It is a way for a user to interact with a computer operating system or software by issuing a line of text commands to make the computer perform a certain action or answer a query. Commands are typically entered into a command line interface, such as a shell or command prompt. These commands are then interpreted and executed by the computer, which will then produce a response or take an action based on the command. Commands can be simple, such as a single word or phrase, or complex, consisting of multiple words and options.

This file is usually a header file, which contains declarations of functions, classes, and variables that can be used in the current file. By including the header file, the code in the current file can access the functions, classes, and variables declared in my-functions.hpp. This is an important part of the C++ programming language, as it allows code to be reused in multiple files and makes it easier to maintain a large project.

To learn more about command
https://brainly.com/question/25808182
#SPJ4

A search expression entered in one search engine will yield the same results when entered in a different search engine.
A. True
B. False

Answers

Answer:

false

Explanation:

which component of the oracle cloud infrastucre identiy and access management service can be used for controlling access to resources for authentuicated pricakpls

Answers

Oracle Cloud Infrastructure Identity and Access Management (IAM) service component that can be utilized for controlling access to resources for authenticated principals is called policy.What is Oracle Cloud Infrastructure Identity and Access Management (IAM) service?Oracle Cloud Infrastructure Identity and Access Management (IAM) service allows managing users, groups, compartments, and policies in Oracle Cloud Infrastructure (OCI).

It offers a centralized, cloud-based way to authorize and authenticate applications and services to access your cloud resources. It provides the following features:Identity ManagementAccess ManagementIntegration and Federation PolicyComponents of Oracle Cloud Infrastructure Identity and Access Management (IAM) ServiceThere are three components of Oracle Cloud Infrastructure Identity and Access Management (IAM) Service:UsersGroupsPoliciesThe Policies component of the Oracle Cloud Infrastructure Identity and Access Management (IAM) Service is utilized for controlling access to resources for authenticated principals.Explanation:The Policies component of the Oracle Cloud Infrastructure Identity and Access Management (IAM) Service is utilized for controlling access to resources for authenticated principals. You can utilize policies to enforce compliance, to grant or restrict access to resources, to organize users, and to support auditing and monitoring activities.In Oracle Cloud Infrastructure (OCI), policies allow you to specify who can access a resource and what actions they can perform on that resource. Policies use groups and compartments to simplify administration and policy management. A policy consists of one or more policy statements, each of which specifies one or more resource types, actions, and who can access that resource and how.

Policy statements are written in Oracle Cloud Infrastructure's policy language and are applied to IAM users, groups, and compartments.Policies are composed of policy statements. Each policy statement defines one or more resource types, actions, and who can perform those actions. A policy statement can be applied to an IAM user, group, or compartment. Policies make it easy to centralize and enforce permissions across multiple services and resources.

To know more  about   Identity and Access Management (IAM) service visit :

https://brainly.com/question/32200175

#SPJ11

Other Questions
Why does it hurt more when you fall on concrete than on grass? The Boston tea party 7. Why do you think "no attempt was made to resist" In what areas is leslie's overspendinghurting her budget?select all that apply.ignore my check marks those werent right pleas help What is the function of nitrogen fixing bacteria 1) The endpoints of FCare (-2,-4 and G(1,0). Find the length of FG- List 4 reasons why natural selection cannot product perfect organisms. Consider the production department of a manufacturer of laptop computers. Classify the cost of the factory maintenance manager's salary. a. Periodb. Variablec. Indirectd. Fixede. Directf. Product In a laboratory setting, communication researchers might use __________ software to observe how people pay attention to and respond to visual messages. which of these is true about the u.s. economy in the early 21st century? (1 point) the united states has the world's largest economy. the united states exports more goods than any other nation. u.s. households enjoy the highest standard of living in the world. the united states did not participate in any international economic organizations. Hey!!! Can someone plz help me out? Heres a pic What is the function of a crop?a.keeps food coldc.stores foodb.stores waste materialsd.none of the above please can someone help my assignment in English. 1. If 4.75x = 12.35, what is the value of x? 2. What is 3x +2+ 4x - 1 after combining like terms? the mental process of inferring the causes of people's behavior is calle For each of the following: state whether or not the linear congruence relation has a unique solution and explain why or why not. If it has a unique solution or multiple solutions, find the solutions.(c) 5x7(mod14) (d) 5x1(mod14) What does it mean for a hypothesis to be testable? APEX Compare and contrast the characteristics of monopolistically competitive, monopolistic, and perfectly competitive markets. Provide an organization that is an example of each and discuss how changes in their pricing affect your purchase decisions. When producing hydrogen iodide, the energy of the reactants is 581 kJ/mol, and the energy of the products is 590 kJ/mol. The equation is shown. H2 + I2 2HI What is the total energy of the reaction? Is this an endothermic or exothermic reaction? (1 point) A. -9 kJ/mol, endothermic B. 9 kJ/mol, exothermic C. 9 kJ/mol, endothermic D. -9 kJ/mol, exothermic various influences summary Tom and Kelly competed in a race. When Kelly completed the race in 15 minutes, Tom had only finished running 2/3 of the race. Tom's average speed for the race was 10 m/min less than that of Kelly's. (a) What was the distance of the race? (b) Find Tom's average speed in meters per minute.