You should use linux programming.
a) Write a program/script which allows creation of 10 users
having as UserId U1,U2,U3.....U10. U1 to U5 users should be in
group G1 folder which is in home directory

Answers

Answer 1

#!/bin/bash

# Create users U1 to U10

for ((i=1; i<=10; i++))

do

   username="U$i"

   useradd $username

done

# Create group G1 and add users U1 to U5

groupadd G1

for ((i=1; i<=5; i++))

do

   username="U$i"

   usermod -a -G G1 $username

done

# Create G1 folder in the home directory

mkdir /home/G1

chgrp G1 /home/G1

chmod 770 /home/G1

To achieve the given task using Linux programming, we can write a shell script. The script starts by using a for loop to create 10 users with usernames U1 to U10 using the `useradd` command.

Next, we create the group G1 using the `groupadd` command. Then, within another for loop, we add users U1 to U5 to the G1 group using the `usermod` command.

Finally, we create the G1 folder in the home directory (/home) using the `mkdir` command. We set the group ownership of the G1 folder to G1 using the `chgrp` command, and set the permissions of the folder to read, write, and execute for the owner and group, using the `chmod` command.

By executing this script, 10 users will be created with usernames U1 to U10. Users U1 to U5 will be added to the G1 group, and a G1 folder will be created in the home directory with appropriate permissions.

Learn more about Groupadd.

brainly.com/question/32117804

#SPJ11


Related Questions

computer operates nearly 100% accurately but why is the phrase'garbage in garbage out'(GIGO) associated with their use?Describe
plssssss helpppp meeeee or I am gonnaa dieeee​

Answers

___________ is the number of pixels per inch

Answers

Answer:

Explanation:

What ever the number is inches is divide it by pixels

PLATO
Unit Activity
Unit: Browsing and Communicating Using the Internet
This activity will help you meet these educational goals:
. Content Knowledge-You will determine the role of the Internet and various social
networking platforms.
Inquiry-You will conduct online research in which you will collect information, make
observations, and communicate your results in written form.
21 Century Skills--You will use critical thinking and problem solving skills, and
communicate effectively.
.
Introduction
In this activity, you will analyze the role of social networking sites, and compare the different
features of these sites.
Directions and Analysis
Task: Comparing Social Networking Sites
In this activity, you will conduct research about any six social networking websites that have
achieved immense popularity in the past decade. Then, write about the unique role of these
social networking sites by completing the following tasks:
Compare and contrast the features of these social networking sites.
Discuss how each site serves a unique purpose for its user base. No

Answers

Answer: here is the answer ☀️keep on shining☀️

Explanation:

PLATOUnit ActivityUnit: Browsing and Communicating Using the InternetThis activity will help you meet

anyone know how to do this

anyone know how to do this

Answers

The completed program that finds the area and perimeter of the rectangle using a C Program is given below:

The Program

// C program to demonstrate the

// area and perimeter of rectangle

#include <stdio.h>

int main()

{

int l = 10, b = 10;

printf("Area of rectangle is : %d", l * b);

printf("\nPerimeter of rectangle is : %d", 2 * (l + b));

return 0;

}

Output

The area of the rectangle is : 100

The perimeter of the rectangle is : 40

If we make use of functions, it would be:

// C program to demonstrate the

// area and perimeter of a rectangle

// using function

#include <stdio.h>

int area(int a, int b)

{

int A;

A = a * b;

return A;

}

int perimeter(int a, int b)

{

int P;

P = 2 * (a + b);

return P;

}

int main()

{

int l = 10, b = 10;

printf("Area of rectangle is : %d", area(l, b));

printf("\nPerimeter of rectangle is : %d",

 perimeter(l, b));

return 0;

}

Output

The area of rectangle is : 100

The perimeter of rectangle is : 40

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

What will you see on the next line? >>> int(6.5)

Answers

Answer:

6

Explanation:

The int functions founds down to the nearest whole number, which in this case would be 6.

Answer:

6

Explanation:

How can you protect against client-side injection attacks? Check all that apply. - Use input validation- Use data sanitization

Answers

To protect against client-side injection attacks, we can use both input validation and data sanitization. Therefore the correct option is C and D.

Input validation is the process of checking that the data entered by a user is in the correct format and within the allowed limits. Data sanitization is the process of removing or replacing any potentially harmful characters from the user input before it is used in a query or command. Both of these techniques can help prevent client-side injection attacks by ensuring that the data entered by the user is safe and cannot be used to compromise the system.

Here you can learn more about client side injection https://brainly.com/question/30562245

#SPJ11

Write a half page summary on how to clean a Gaming PC properly.

Answers

Answer:

As a responsible PC gaming enthusiast, you simply cannot wait for spring to do a little routine cleaning on your PC. Regardless of whether you casually play or professionally game, all gaming computers are susceptible to dirt, dust, and other contaminants that can severely impact performance. Dust buildup can cause PC components to retain heat, making it difficult for internal fans to keep the system cool. As a result, the system can become less efficient and unusually slow. However, there are steps you can take to keep your gaming computer in great condition. In this article, we explain how to clean the inside of your gaming computer, so you can keep on fighting the good fight in digital worlds.Assemble the Right ToolsGaming desktops are very complex pieces of technology. Be smart by assembling the necessary tools and supplies before you begin the deep-clean process. Most of the products you need might already be sitting around the house, including compressed air cans, rubbing alcohol, white vinegar, distilled water, microfiber cloths, ear swabs, and tape.How to Clean a Gaming PCFollow these 10 steps to get back on good terms with your gaming rig.1. Disconnect the power cable, USB peripherals, as well as any audio equipment attached to your computer and safely discharge the remaining power.2. Take the computer case outside, so the dust doesn’t settle in the same room that your gaming setup is located.3. Wipe the exterior and interior of the computer case.4. Detach the dust filters and wipe away any accumulated dust. We recommend using compressed air for full coverage. If you have foam filters, gently rinse with water and leave them to dry.5. Wipe down the inside of the case by hand after disconnecting the graphics cards and RAM modules.6. If possible, remove the heatsink entirely to scrub away any gunk or debris.7. Clean off any dust hidden between the cracks of the graphics cards, so you can easily clean the motherboard.8. Remove any big clumps of dust by using a cloth dampened with rubbing alcohol.9. Use the compressed air can to clean nooks, crannies, and the motherboard. For stubborn dust spots, just dampen an ear swab with rubbing alcohol or use a gentle toothbrush to clean.10. Once the case interior is completely clean and free of dust, you can put each component back where it belongs.Routine cleaning and maintenance are important to the health of your gaming PC. We recommend using compressed air every three to six months to prevent dust buildup from impacting your PC components. You should also make an effort to clean your mouse, headphones, keyboard, and monitor to keep your gaming setup looking like new.

Explanation:

Facility Layout: Create a fast food or manufacturing plant layout, identify, and draw the particular facility. Describe the nature of your production and the importance of the layout setting. Consider and describe the activities that take place in that facility. Why are things set up as they are? Be creative.

Answers

A facility layout, also known as plant layout, refers to the arrangement of machinery, equipment, workstations, storage areas, offices, and other items that make up a facility.

A well-designed facility layout is critical for both manufacturing plants and fast-food restaurants. This is because the layout sets the tone for the activities that occur in the facility, such as the movement of goods, customer service, and employee interaction.
Fast Food Layout
A fast-food layout comprises several elements that come together to form an efficient and functional system. The layout must provide the best possible service to customers, maintain high levels of efficiency, and ensure that the facility is clean and hygienic. The kitchen layout should include workstations for preparing different types of food. For example, there should be a station for preparing burgers, a station for preparing fries, and a station for preparing drinks.
The layout of the kitchen should also consider the traffic flow and the sequence of operations. For example, the layout should place the refrigerator next to the preparation area for quick access. The layout of the restaurant must provide for a pleasant environment for the customers, and it should enable them to move around quickly.
Manufacturing Plant Layout
A manufacturing plant layout should provide for a smooth flow of work and maximize productivity. The facility should include storage areas, workstations, and other necessary equipment. The layout should also consider the nature of the production process.
For example, a manufacturing plant layout for a car assembly plant will have different features from a manufacturing plant layout for a pharmaceutical plant. The layout of a car assembly plant will focus on the flow of the assembly line, while the layout of a pharmaceutical plant will prioritize safety and cleanliness.
In conclusion, a facility layout is essential in both fast-food restaurants and manufacturing plants. A good layout should provide for efficiency, functionality, and productivity. By creating a facility layout that takes into account the flow of goods, customer service, and employee interaction, businesses can ensure that they achieve optimal performance.

Learn more about workstations :

https://brainly.com/question/13085870

#SPJ11

Dan is working as an electrical engineer. Which devices would he most likely he use to prevent current from exceeding the safer limit?

Answers

Since Dan is working as an electrical engineer. The devices that he would most likely he use to prevent current from exceeding the safer limit is called a fuse.

What tool is employed to safeguard electrical current?

A safety device called an electric fuse is used to control the amount of electricity flowing through an electric circuit. The circuit and the linked appliances are protected from damage by the use of fuses. Due to its low melting point and high resistivity, a lead-tin alloy is utilized as a fuse material.

Therefore, A fuse is a type of electrical safety device that can shield an electrical circuit against too much current flow. It is intended to enable current to flow through the circuit, but if the current exceeds a certain limit, it will open and cut off the circuit.

Learn more about electrical engineer  from

https://brainly.com/question/27548434

#SPJ1

what is the importance of keeping information private and secure online​

Answers

Keeping information private and secure online can ensure your safety. Many people can figure out your full name, address, school name, etc through the internet.

Drag each label to the correct location on the image.
Match the different types of mounting techniques with their definitions.
uses triangular pockets
to hold the corners of a
photograph to the mount
board
uses wet glue to stick
the print to a mount
board
uses a heat-activated
adhesive to permanently
stick the photograph to
a rigid backing board
uses different patterns
of tape to create hinges,
which attach the print to
a mount board
dry mount
photo corners

Answers

Answer: uses a heat activated.... the answer is dry mount

Use triangular pockets to hold the corners....the answer is photo corners

Use different patterns of tape.....hinge mount

Uses wet glue to stick the print....wet mount

Explanation: I got this right on a post test

The matchup of the mounting techniques are:

uses a heat activated-  dry mountUse triangular pockets to hold the corners-  photo corners Use different patterns of tape-h/in/ge mountUses wet glue to stick the print- wet mount

What is the mounting techniques

Mounting could be a handle by which a computer's working framework makes records and registries on a capacity gadget (such as difficult drive, CD-ROM, or organize share) accessible for clients to get to through the computer's record system.

There are diverse sorts of strategies in mounting craftsmanship work, exhibition hall mounting and dry mounting. Gallery mounting is authentic and reversible and dry mounting is authentic (in most cases) and non-reversible.

Read more about mounting techniques here:

https://brainly.com/question/20258766









Which of the following is not a type of external data? a) Demographics b) Household c) Socioeconomic d) Promotion History Q8 Does a data warehouse? a) Improve data access b) Slow data access c) Makes

Answers

The answer to the first question is "d) Promotion History" as it is not typically categorized as a type of external data.  Regarding the second question, a data warehouse is designed to improve data access rather than slow it down

External data refers to information that is obtained from sources outside of an organization. It provides valuable insights into external factors that can influence business operations and decision-making. The options provided in the question are all types of external data, except for "d) Promotion History." While demographic data, household data, and socioeconomic data are commonly used to understand consumer behavior, market trends, and target audience characteristics, promotion history typically falls under internal data. Promotion history refers to the records and data related to past promotional activities, campaigns, and strategies employed by the organization itself.

Moving on to the second question, a data warehouse is a centralized repository that is specifically designed to improve data access. It is a large-scale storage system that integrates data from various sources, such as transactional databases, spreadsheets, and external data feeds. The purpose of a data warehouse is to provide a structured and optimized environment for data storage, organization, and retrieval. By consolidating data into a single location, a data warehouse facilitates efficient access to information for analysis, reporting, and decision-making. It eliminates the need to query multiple systems and allows for faster and more streamlined data retrieval and analysis processes. Therefore, the correct answer to the question is "a) Improve data access."

Learn more about external data here : brainly.com/question/32220630

#SPJ11

What is the Turing machine and how does it work?As for example how does it work out questions like 4+2 and 3+3.

Answers

Answer:

I have photographic memory, and I memorized this from Wikipedia; I hope it can help! "A Turing machine is mathematical model of computation that defines an abstract machine, which manipulates symbols on a strip of tape according to a table of rules. Despite the model's simplicity, given any computer algorithm, a Turing machine capable of simulating that algorithm's logic can be constructed."

which of the following version of the ‘ls’ command displays the hidden files and folder?

Answers

The version of the ‘lscommand that displays hidden files and folders is ‘ls -a’. The ‘-a’ option stands for ‘all’ and it shows all files and folders, including the hidden ones, which are identified by a dot (.) before their names.

By default, the ‘lscommand does not display hidden files and folders, but it can be useful to view them, especially when troubleshooting or managing system files. It is important to note that hidden files and folders are usually hidden for a reason, and modifying or deleting them can potentially harm the system or applications that rely on them. Therefore, it is recommended to exercise caution and use this option only when necessary.

To know more 'lscommand visit:

https://brainly.com/question/29603028

#SPJ11

Which media vehicle uses the Dreamweaver software for its design? A(n) "blank" uses the Dreamweaver software for its design.

Answers

Answer: Websites

Explanation: Adobe Dreamweaver CC is a web design and an Integrated Development Environment (IDE) application that is used to develop and design websites.

The media vehicle that uses the Dreamweaver software for its design is a website.

What is Dreamweaver software used for?

Adobe Dreamweaver is known to be a kind of a website creation software that is made to help one to create and publish web pages in anywhere when one has the software that aids HTML, CSS, etc.

Therefore, The media vehicle that uses the Dreamweaver software for its design is a website is the correct choice.

Learn more about website from

https://brainly.com/question/13171394

#SPJ2

methods of preventing denial of service attack

Answers

Denial of service (DoS) attacks can be prevented using several methods, including:

Implementing network filtering and access control lists (ACLs) to block traffic from known malicious IP addresses.Deploying intrusion detection and prevention systems (IDS/IPS) to detect and block DoS attacks.Enabling rate limiting and traffic shaping mechanisms to prevent excessive traffic from overwhelming the system.Implementing load balancing to distribute traffic across multiple servers to prevent overloading of a single server.Regularly updating and patching software and operating systems to ensure they are secure and protected against known vulnerabilities.

What is Denial of service (DoS)?

A denial-of-service attack is a type of cyberattack used in computing in which the attacker attempts to render a machine or network resource unavailable to its intended users by irreparably interrupting the operations of a host that is linked to a network.

Read more about denial of service attack here:

https://brainly.com/question/29992471

#SPJ1

Program and data of secondary storage are also transferred in the memory unit before being used by the computer. is it true or false ​

Answers

Answer:

it's true. that's the way it works

b. Differentiate between static and dynamic WebPages?in computer ​

Answers

Static websites appear the same for every user that accesses them and only change when a developer modifies the source files, whereas dynamic websites can present different information to different visitors.

describe how serial communication is done using uart protocol? (4 points)

Answers

Serial communication using the UART (Universal Asynchronous Receiver/Transmitter) protocol involves transmitting and receiving data one bit at a time over a single communication line. This method allows for simpler and cost-effective connections between devices.

In UART communication, data is organized into packets, each containing a start bit, a specific number of data bits, an optional parity bit, and one or more stop bits.

The start bit signals the beginning of a data packet, while the stop bits mark the end. The optional parity bit is used for error checking, ensuring data integrity.Data transmission begins with the sender converting parallel data into a serial format. It then sends the start bit, followed by the data bits, the parity bit (if used), and the stop bits. The receiver's UART module detects the start bit and begins reading the data bits one at a time, reconstructing the original parallel data.The UART protocol requires both the sender and receiver to agree on specific settings, such as the data rate (bits per second), number of data bits, and parity mode. These settings are commonly known as "baud rate" and must match for successful communication.One advantage of UART is its simplicity, as it requires minimal hardware and software resources. However, it is generally slower than parallel communication methods and may be less suitable for applications requiring high-speed data transfers.

Know more about the Serial communication

https://brainly.com/question/13014495

#SPJ11

Look at the slide.

An example of a slide. There is a title. There is one main bullet entry with 3 subentries below it. There is a lot of text on the slide. There is no image. The background is dark red and the text is black.

How could the slide best be improved?

by choosing a better font
by providing more information
by using a lighter background
by enlarging the heading

Answers

Answer:

c

Explanation:

Answer:

the answer is c

Explanation:

100%

Hyperlinks can only point to webpages.

True or False

Answers

Answer:

I believe thats false

PLS HELP SOON

Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.

Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.

Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.


Write your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output

The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!


When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Answers

Answer:

Explanation:

I will answer Part 1 and you can go on from there.

Decide on a list of items the program will ask the user to input.

Your program should include at least four interactive prompts.

Input from the user should be assigned to variables and used in the story.

"What is your favorite animal?"

Variable: animal

"What word best describes your favorite animal?"

Variable: description

"What does your favorite animal like to eat?"

Variable: food

"Where do your favorite animal live?"

Variable: location

A system operating with a low superheat and a low subcooling most likely has:
An over feeding refrigerant metering device

Answers

A system operating with a low superheat and a low subcooling most likely has an overfeeding refrigerant metering device.

This is the main answer. Here's an A refrigeration system that is operating with a low superheat and a low subcooling likely has an overfeeding refrigerant metering device. This is because an overfeeding refrigerant metering device is responsible for the additional refrigerant that is delivered to the evaporator.

Therefore, the term to complete the answer is "overfeeding refrigerant metering device." It is important to note that the superheat and subcooling are related to the refrigerant charge, as well as the metering device. If the metering device is not functioning correctly, the refrigerant may not be distributed properly, causing low superheat and subcooling values to occur.

To know more about refrigeration visit:

https://brainly.com/question/33631335

#SPJ11

I need help!!! i will make you a brainliest!!

I need help!!! i will make you a brainliest!!

Answers

Answer:

What you have is correct

Explanation:

3.
Read the test again and write words which mean the following.
(a) The putting and keeping of things in a special place for use in the future

Answers

Answer:

File Or Folder I think it is

Is training necessary for technicians working in community
pharmacies today? Why / why not?
280 words

Answers

The field of pharmacy is constantly evolving, with new medications, regulations, and technologies emerging. Technicians need ongoing training to stay updated on these changes and ensure they can effectively and safely support pharmacists in providing patient care.

Pharmacy technicians play a critical role in medication safety. They assist in dispensing medications, managing inventory, and ensuring proper labeling. Training helps them understand medication interactions, side effects, storage requirements, and proper handling techniques, reducing the risk of errors and promoting patient safety.

Community pharmacies are subject to strict regulations and standards to ensure patient well-being. Technicians must be familiar with these regulations and comply with them. Training provides the necessary knowledge and understanding of legal and ethical considerations, privacy laws, controlled substance handling, and documentation requirements.

Learn more about pharmacy technician https://brainly.com/question/30388127

#SPJ11

How will i go about the investigation considering all the pat requirements

Answers

Investigations can vary widely in their scope and requirements, depending on the situation and the goals of the investigation. However, there are some general steps that can be helpful in conducting a thorough and effective investigation:

Define the scope and purpose of the investigation: Before starting an investigation, it is important to define what you hope to achieve and what the investigation will cover. This could include defining the timeframe, identifying key players, and establishing the boundaries of the investigation.Gather information and evidence: This step involves collecting information and evidence that is relevant to the investigation. This could include interviewing witnesses, reviewing documents and records, and collecting physical evidence.Analyze the information and evidence: Once you have collected the information and evidence, you will need to analyze it to identify patterns, inconsistencies, and potential leads. This may involve using data analysis tools, creating timelines, and conducting background research on individuals and organizations involved in the investigation.Draw conclusions and make recommendations: Based on the analysis, you will need to draw conclusions about what happened and make recommendations for how to proceed. This could include recommending further investigation, disciplinary action, or changes to policies and procedures.Communicate findings: Finally, you will need to communicate the findings of the investigation to relevant stakeholders. This could include writing a report, giving a presentation, or testifying in court.Throughout the investigation, it is important to maintain a clear and objective perspective, follow established protocols and procedures, and ensure that all relevant legal and ethical requirements are met.

To learn more about Investigations click the link below:

brainly.com/question/29659466

#SPJ4

The pile-up of sand and silt at the site where a river discharges into the ocean forms a _____

AND DON'T PUT THE ANSWER RIVER MOUNTH

Answers

Answer:

delta I think

Explanation:

HELP PLEASE!
I dowloaded this app and it gave me a virus. DOES ANYONE HAVE ANY IDEA HOW TO DELETE IT? I have an apple laptop and I don't know how. My laptop send me a message telling me a have a virus and this laptop has MANY IMPORTANT FILES. PLEASE HELP ASAP. I'LL GIVE BRAINLIEST. DONT GIVE LINKS OR LEAVE IT BLANK.

Answers

Answer:

It probably is fake. Send me a screenshot. Also, just saying if it asks you to download a app of something, dont do it its just a scam to make you panic.

Explanation:

During active listening, which response is NOT an example of providing feedback to the speaker to show that you understand his or her thoughts?
A.
nodding your head
B.
turning your back to the speaker
C.
saying, "You're saying that his reaction made you feel appreciated?"
D.
saying, "Sorry to interrupt, but can you explain that part again?"

Answers

Answer:

The answer is D.

Explanation:

They/you are asking the speaker to clarify what they just said.

Answer:

B. turning your back to the speaker

Explanation:

Other Questions
What are three major responsibilities of the Fed ?. Preventive maintenance is characterized bya Routinely checking for any damageb Directing regular maintenancec Scheduling an appointment by specialistd Inspections, lubrication, minor repairs or adjustmentsplease do this mcq as soon as possible.. Advice Pacific Basin Shipping on the best course of actions to undertake with regards to its: fleet should the company take its ships out of active supply, sell/demolish existing ships and/or add new ships? Provide justifications to support your reasoning. Which statement is true?This table does not show a probability distribution.This table shows a probability distribution. Convert 302 K into C Which of the following empires in the period 1450-1750 engaged in a type of territorial expansion most similar to that depicted in Map 1 ?AThe Spanish EmpireBThe Portuguese EmpireCThe British EmpireDThe Mughal Empire ms danvers wants her three virtual machines ip address to be kept private but she also wants them to communicate on the host machines network using its ip address. which virtual nic type should she configure on them Part A: Describe a transformation (or series of transformations) that one could do to get from theoriginal to image below. Be as specific as possible.Part B: Are these figures congruent? how do you know? I NEED HELP plzzzzzzHow does Aeneas' piety pay off when they get to Italy? in book 7please don't get from the internet A startup software company's total investment for the first two years is $22,894. Write and solve an equation to find the investment for the second year if the first year's investment is $13,205. 13,205 + x = 22,894 The investment for the second year is $11,447. 13,205 + x = 22,894 The investment for the second year is $9,689. 13,205 + x = 22,894 The investment for the second year is $22,894. 13,205 + x = 22,894 The investment for the second year is $36,099. At which of the following angles will the sunlight received at a location on Earth spread out over the largest area? 90 70 40 10 Please upload one function m-file for the linear least-squares regression and quadratic least-squares regression. The function should satisfy the following: 1. Take input arguments of (1)x (n by 1), (2) v (n by 1), (3) n (size of the matrix, but it can be omitted), (4) option for either linear or quadratic 2. Return (1) an array containing the coefficients of the polynomial What is one thing that is the same about a mole of sodiums and a mole of carbons? A) The weightB) All of theseC) The total number of atomsD) The mass A company estimates that warranty expense will be 2% of sales. The company's sales for the current period are $146,000. The current period's entry to record the warranty expense is:___. genetic methods of detecting microorganisms reveal that the number of bacterial species in nature exceeds previous estimates by several orders of magnitude. in the human mouth, for example, it is estimated that 500-700 microbial species are normally present. explain why previous estimates were low. Which of the following is a disadvantage of electronic communication What elaborative techniques are used in this response? Check all that apply.an explanation of nature and nurturean example of Frankensteins rejectiona paraphrasing of a secondary sourcea description of the creatures appearancean example of the creatures actions 4. The order of zero at the origin of f(x) = (e^z - 1) tan z is _____ 5. The maximum value of |z + 2iz i| on |z| is attained at z0 = ______ What is an informative essay? Look at the diagram Which structure holds the original code from the DNA gene?