1. An example of a function is _________
2. What list of numbers is created by the following code: range(9)
3. What list of numbers is created by the following code: range(7,16)
4. Which range function creates the following list of numbers?
21 25 29 33 37 41

5. Which range function creates the following list of numbers?
91 86 81 76 71 66 61

Answers

Answer 1

Answer:

An example of a function is a piece of code that performs a specific task or calculation and can be called or invoked multiple times within a program.The code range(9) creates a list of numbers from 0 to 8, inclusive.The code range(7,16) creates a list of numbers from 7 to 15, inclusive.The range function range(21,42,4) creates the list of numbers 21 25 29 33 37 41.The range function range(91,60,-5) creates the list of numbers 91 86 81 76 71 66 61.

Related Questions

ieee 802.15 adopted protocols are those protocols developed by other standards groups that are used with the bt protocol stack to ensure interoperability to other devices or networks. true false

Answers

This assertion is False. The Institute of Electrical and Electronics Engineers created and maintains the IEEE 802.15 family of wireless networking standards (IEEE).

What is IEEE?

An organization of professionals, the Institute of Electrical and Electronics Engineers (IEEE), is committed to advancing technology for the benefit of people everywhere.

It is one of the biggest technical professional organizations in the world, with more than 400,000 members spread across more than 160 nations.

The IEEE is actively involved in many different endeavors, such as the creation of technical standards, the publication of scholarly journals and conference proceedings, and the coordination of conferences and workshops.

The IEEE offers a platform for technical professionals to network and collaborate as well as support education and professional development for its members.

The company's headquarters are in New York City, where it was established in 1963.

To Know More About IEEE, Check Out

brainly.com/question/13438410

#SPJ4

traditional switches operate at the ____ layer of the osi model.

Answers

Traditional switches operate at the data link layer of the OSI model.

What is data link?
Data Link
is a layer in the Open Systems Interconnection (OSI) model of communication. It is the second layer in the model, and is responsible for transmitting data frames from one node in a network to another. It provides the physical connection between two nodes and ensures that the data is transmitted correctly. Data Link also handles error detection and correction, as well as flow control, to ensure that the data is sent in an efficient manner. Data Link is also responsible for providing reliable links between nodes and for controlling access to the physical medium. Data Link is divided into two sublayers: the Logical Link Control (LLC) sublayer and the Media Access Control (MAC) sublayer. The LLC sublayer is responsible for establishing, maintaining and terminating the logical link between two nodes, while the MAC sublayer is responsible for providing access to the physical medium.

Thus, the data link layer is the correct answer.

To know more about data link
https://brainly.com/question/13439307
#SPJ4

how does a client application identify a server application on another computer on the network?

Answers

By port number, port, or port address a client application identifies a server application on another computer on the network.

TCP/IP accommodates interaction to-handle correspondence, and that implies that calls need an addressing plan that determines both the physical host connection (Host An and Host B in Figure 1) and the product cycle or application (C, D, E, F, G, and H). The way this is finished in TCP/IP is for calls to determine the host by an internet address and the cycle by a port number. You might find internet addresses likewise alluded to somewhere else as internet convention (IP) addresses or host IDs.

IP addresses

Every server or client on a TCP/IP internet is distinguished by a numeric IP (Internet Convention) address. The two sorts of IP address are the IPv4 (IP version 4) address and the IPv6 (IP version 6) address.

Port numbers (for servers)

An approaching connection demand indicates its desired server by determining the server's port number.

Port numbers (for clients)

Client applications should likewise recognize themselves with port numbers so server applications can recognize different connection demands.

to know more about the host connection click here:

https://brainly.com/question/553980

#SPJ4

Which of the following is the most important area of concern in cloud computing? (a) Security (b) Storage (c) Scalability (d) All of the mentioned

Answers

The integrity and confidentiality of information are at danger when using cloud services with insecure APIs, and your data and systems are exposed.

What is the security risk of cloud computing?You run a higher risk of having your data intercepted or misused when it moves to and resides on systems that are no longer under your control.It is a significant and crucial aspect of cloud computing. The client can use it to continuously check the server's functionality, capabilities, and allotted network storage.Cloud computing security is the main area of concern. Many IT organisations avoid using cloud computing because of this.Your data and systems may be exposed by cloud services with insecure APIs, posing a danger to information confidentiality and integrity. Brute force, denial-of-service, and man-in-the-middle attacks are the three main types of assaults that hackers typically use to try to breach APIs.

In terms of cloud computing, security comes first.

Therefore, the correct answer is option (a) Security.

To learn more about cloud computing refer to:

https://brainly.com/question/19057393

#SPJ4

What command will list only current connections, including IP addresses and port numbers?

a.
netstat -n

b.
portstat

c.
netstat -s

d.
show ip stats

Answers

Answer:

a. netstat -n

please tell us the reason behind your selection of ai models for the previous tasks.

Answers

To put it simply, an AI model is a tool or algorithm that can make decisions without the input of a human decision-maker by making use of a specific data set.

How Does AI Modeling Work?

AI models (machine learning and deep learning) make it easier to automate business intelligence's logical inference and decision-making processes. This method contributes to smarter and faster analytics by providing the flexibility to grow with the ever-increasing volumes of data.

An artificial intelligence (AI) model is a decision-making tool or algorithm based on a specific data set. A conclusion may be reached by this algorithm or tool without the intervention of a human.

AI and machine learning are complicated processes that have significant computing, storage, data security, and networking needs. Intel Xeon Scalable CPUs, Intel networking and storage solutions, and Intel AI toolkits and software optimizations provide a range of tools to assist enterprises in easily and affordably designing and deploying AI/ML systems.

To learn more about artificial intelligence visit :

brainly.com/question/25523571

#SPJ4

Question-

Please tell the reason behind  selection/using of AI models for doing  tasks ?

a user is having trouble downloading a file from a file server. a network technician checks the connection and that ping commands are receiving replies. the technician can also browse correctly to the file server using the windows explorer. what should the technician begin to troubleshoot and why? (select all that apply.)

Answers

A network specialist verifies the connection and that ping requests are responding. The technician can access the file server and browse properly. There are issues with a user's attempt to download a file from a server.

What is network technician?

A network specialist verifies the connection and the response to the ping command. All of my FTP clients are configured to connect in passive mode, but the problem persists.  commands should a technician use from the user's workstation to verify that the workstation has a working IP address. I'm not sure how to set up Windows file explorer to use passive mode. Trunking allows devices like servers and routers to coexist on many VLANs at once. We discuss the Best Network Diagnostic & Troubleshooting Tools for a jump-off point, see Ping & Tracert samples.

To learn more about Network Diagnostic from given link

brainly.com/question/12814536

#SPJ4

the 2.5" size hard drive is typically used in devices such as mp3 players.

Answers

The 2.5 sizes of hard drive usually used in devices such as MP3 Player is a True statement.

There are two regular physical sizes for hard drives: 2.5 inches and 3.5 inches. These dimensions do not correspond to the size of the hard drive mechanism, but rather to the size of the data platters. Traditionally, desktop computers utilize 3.5-inch drives whereas laptops use 2.5-inch drives.

750GB laptop-grade storage The same drive manufacturer's 2.5-inch drive is one-quarter the size of the 3.5-inch drive, measuring 2.8 inches wide, 4.0 inches long, and 0.4 inches thick. The 2.5-inch drive weighs 0.2 pounds less than the 3.5-inch drive, which weighs 0.9 pounds.

To learn more about hard drives

https://brainly.com/question/10677358

#SPJ4

what is the ordering obtained by using the depth first search algorithm to solve the topological problem in the dag below?

Answers

Topological sorting for a Directed Acyclic Graph (DAG) is a linear ordering of vertices where u comes before v for every directed edge. If a graph is not a DAG, topological sorting is not possible for that graph.

How is DAG defined in coding?

A directed acyclic graph (DAG) is a graph without cycles linking the other edges that is used in computer science and mathematics. As a result, starting at any edge, it is not possible to traverse the complete graph. The directed graph's edges are one-way only.

What in networking is DAG?

A deep learning neural network called a DAG network has layers that are set up in the form of a directed acyclic graph. A DAG network's design might be more intricate, with layers receiving inputs from other layers and producing data to other layers.

To know more about DAG visit;

https://brainly.com/question/30028062

#SPJ4

The method node.____(att) removes the attribute att from the node.

Answers

Answer:

The method node.removeAttribute(att) removes the attribute att from the node.

which one of the following is not a good technique for performing authentication of an end user?

Answers

One of the following is not a good technique for performing authentication of an end user is identification number.

What is identification number?

To complete various financial transactions, a personal identification number (PIN), which is a numerical code supplied with a payment card, must be input. A personal identification number (PIN) is primarily used to offer an extra degree of protection to electronic transactions. It's a little-known fact that your ID number consists of more than simply your birthdate and seven arbitrary digits. Each digit indicates a piece of personal data about you, such as your gender and country of residence.

Learn more about identificaation number: https://brainly.com/question/30038351

#SPJ4

Think about some of the car ads you see on tv, internet, or print. What are some of the special offers advertised?.

Answers

Special offers that are advertised on TV or internet are:

1. Zero percent financing.2. Cash back offers.3. Special lease offers.4. Low or no interest rates.5. Special warranties and extended service plans.6. Trade-in allowances.7. Discounts on accessories and parts.8. Military discounts.9. First-time buyer incentives.10. Complimentary oil changes.

The Benefits of Taking Advantage of Special Offers When Buying a Car

When it comes to buying a car, there are numerous ways to save money and take advantage of special offers. From zero percent financing to cash back offers, there are plenty of options available to consumers that can help them to get the most out of their purchase. Low or no interest rates, special warranties and extended service plans, and trade-in allowances are all great ways to save money when buying a car. Discounts on accessories and parts, military discounts, and first-time buyer incentives can help to make a car more affordable. And complimentary oil changes can help to extend the life of the vehicle.

Zero percent financing offers are especially attractive to car buyers. This means that buyers have the option of making no interest payments on their car loan, allowing them to save money in the long run. This type of offer can be especially beneficial when purchasing a new car, as the payments can be spread out over a longer period of time.

Learn more about Special offers:

https://brainly.com/question/11252186

#SPJ4

what challenges do we face in developing technology that can do so?

Answers

Following are some of the challenges we face in developing technology:

1)Lose of jobs

2)Many issues related to software like upskilling

3)Some or other way affects the human race

4)Lose of man power in jobs like manual part

What are some of the developing technologies?

Most and fast rapid developing includes the AI which is artificial intelligence it slowly eats up the man power which eventually lead the less usage of man power, AI does this job which less people are needed for the automated areas and scenarios

It affects the present generation the most and they need to continuously upskill themself to tackle the developed technologies

Hence we can say that because of developing technologies much effort is needed to withstand in the current job if the AI is intervened not only AI many manual jobs has been taken out due recession in current scenario

To know more on developing technologies follow this link:

https://brainly.com/question/24518752

#SPJ4

what is true about a class and interface type? a. you can convert from a class type to any interface type that the class implements

Answers

In a class and interface type , you can convert from a class type to any interface type that the class implements.

A Class can be defined as the collection of objects that have a similar type of properties. It is a logical entity that can be seen as a blueprint for creating the objects. A Class can have many objects where each has the attributes and behavior defined by the class itself. However, we can also create a singleton class that has only a single instance.The interface in Java can be defined as the blueprint of the class. An interface can have abstract methods and static constants. By using the interface, we can achieve abstraction in java. We can also achieve multiple inheritance in java using interface. We cannot define the method body in the interface.An interface is different from abstract classes, i.e., an interface can't be instantiated, just like the abstract class. However, fields are static, public, and final in the interface, whereas; methods are public and abstract.

To know more about class and interface visit:

https://brainly.com/question/15696741

#SPJ4

When removing screws while working on a laptop, what should be done with the screws?

-they should be disposed of
-they should be left inside the case of the laptop
-they should be stored or labeled
-they should be painted to indicate where they go

Answers

When removing screws while working on a laptop the screws  should be stored or labeled.

A work of art and repeating issue that a great many people experience is a screw with a striped or harmed screw head joined to a laptop motherboard! We as a whole have ended up here, clumsily grabbing a screwdriver attempting to eliminate the screw just to see that it has been harmed, either by your surged activities or by a past handyman.

Since the screw head is completely stripped, your screwdriver can't get a decent grip and concentrate the screw. Something important to note is that some laptop makers, for example, Mac utilize genuinely unambiguous screws (pentalobe, torx, tri-wing) that are challenging to track down on the lookout. On the off chance that you don't have the right screwdriver, the best thing to do is to proceed to get one, in any case, you risk exacerbating things or in any event, destroying your motherboard totally!

Eliminating a screw with a stripped head takes a little resourcefulness, yet it is really straightforward eventually. We will go north of a couple arrangements. The strategy you pick will rely upon your singular circumstance and what you have accessible

to know more about motherboard click here:

https://brainly.com/question/23281367

#SPJ4

Write a program that asks the user to enter a city name, and then prints Oh! CITY is a cool spot. Your program should repeat these steps until the user inputs Nope.

Sample Run
Please enter a city name: (Nope to end) San Antonio
Oh! San Antonio is a cool spot.
Please enter a city name: (Nope to end) Los Angeles
Oh! Los Angeles is a cool spot.
Please enter a city name: (Nope to end) Portland
Oh! Portland is a cool spot.
Please enter a city name: (Nope to end) Miami
Oh! Miami is a cool spot.
Please enter a city name: (Nope to end) Nope

Answers

Answer:

# Ask the user to enter a city name

city = input("Please enter a city name: (Nope to end) ")

# Repeat until the user inputs "Nope"

while city != "Nope":

   # Print a message about the city

   print("Oh! %s is a cool spot." % city)

   # Ask the user for another city name

   city = input("Please enter a city name: (Nope to end) ")

how many bit strings of length 10 contain either five consecutive 0's or five consecutive 1's ?

Answers

The first five 0s can start at position 1, 2, 3, 4, or 6 if you follow the first five 0s summation rule.

Start with the first slot then add anything else after that. Starting at position 2, the first bit must be a 1 (2'5 = 32).

the remaining bits can be anything; 2'4 = 16 start at third spot, the second bit must be a 1 owing to the reason given above, the first bit can be whatever, and the last 3 bits can be anything;

16 starting at spots 4,5 and 6, the same as starting at spots 2 or 3, for a total of 16 each. 32 + 16 + 16 + 16 + 16 + = 112.

The same pattern is guaranteed by the five straight 1s, and there are several possibilities, such as 112.

A double count would apply to two cases (thus that we need to exclude)

0000011111 and 1111100000

Total = 112 +112 -2 =222

to know more about possibilities click here

brainly.com/question/1601688

#SPJ4

Complete the class definition.
class shoe:
def
(self, style, color):
self.style = style
self.color = color

def __str__(self):
return self.style + ' ' + self.color

Answers

The Completeness of the class definition is def_init_(self, style, color):

What does Java class definition mean?

In Java, a class is one that serves as a logical building block for objects with similar traits and functionalities. As a result, all objects belonging to a class will have the same methods or attributes. For instance, a particular cat in the real world is an object of the "cats" class.

Therefore, one can say that a class is an object's "blueprint," describing or displaying all the features and information that an item of a given class offers. It cannot be referred to as an object's parent or instance.

Learn more about defining a class  from

https://brainly.com/question/9949128
#SPJ1

what is the recommended maximum number of words in the title of an apa style paper?

Answers

It is generally recommended to keep titles short and concise, typically no more than 12 words.

The American Psychological Association (APA) does not provide a specific word limit for titles. However, it is generally recommended to keep titles short and concise, typically no more than 12 words. Titles should accurately reflect the content of the paper, be descriptive, and be as specific as possible.

Additionally, it is important to avoid unnecessary words, such as articles (a, an, the), prepositions (in, on, of), and conjunctions (and, but, or). Titles should also be written in sentence case, meaning that only the first word and proper nouns are capitalized.

For more questions like APA click the link below:

https://brainly.com/question/2920334

#SPJ4

To locate a property's Analytics tracking code, which sequence of steps should be followed?



Admin > Tracking Code > Tracking Info

Admin > Tracking Info > Tracking Code

Reports > Audience > Tracking Code

Audience Reports > Settings > Tracking Code

Answers

Admin > Tracking Info > Tracking to locate a property's Analytics tracking code.

What is property tracking?

Is a web-based service that helps you evaluate potential properties before you buy and track the properties that you already own. Track monthly income and expenses. View detailed performance reports. Track vacancy rates and lease expirations.

The LandGlide app is designed to help people find their property lines using their smartphones.

See more about property tracking at brainly.com/question/11561077

#SPJ1

Healthcare organizations that handle phi are known as_____if they use electronic means to process transactions or transmit information.

Answers

Healthcare organizations that handle phi are known as Covered entities if they use electronic means to process transactions or transmit information.

What is Covered entities ?Health plans, healthcare clearinghouses, and healthcare providers who electronically communicate any health information in conjunction with transactions for which HHS has developed standards are all considered covered entities under the HIPAA regulations.The Department of Health & Human Services enacted HIPAA as a federal statute in the United States in 1996. It aims to restrict public access to patient personal information. The misuse of this information is prevented because to HIPAA's strict compliance.The goal of the U.S. Department of HHS is to improve everyone's health and well-being by offering efficient human services and encouraging good, long-term progress in the fields of medicine, public health, and social services.

To learn more about HIPAA refer :

https://brainly.com/question/18625638

#SPJ4

when creating a sql query, which join clause returns only records with matching values in two or more database tables?

Answers

A result table is created by joining rows with matching values from two or more tables using the SQL INNER JOIN function.

Explain about the SQL inner join?

When matching values are found in a field shared by both tables, an inner join connects the records from the two tables. To select every employee in each department, combine the Departments and Employees tables using an inner join.

When you need to return all records from the "left" table, regardless of whether they have a pair in the "right" table, you will use left join. When you wish to return only records having a pair on both sides, you will use inner join

By using a relevant field from the queryed tables, SQL join clauses can retrieve data from two or more database tables and present it in a result table. The most frequent of them all is the inner job.

To learn more about SQL inner join refer to:

https://brainly.com/question/23450971

#SPJ4

what's encapsulation and what are the benefits of using encapsulation? how to apply getters and setters to a private constant (final) data?

Answers

Encapsulation is a technique for preventing direct user access to some object components, preventing users from seeing the current state values for all of an object's variables.

Explain about the Encapsulation?

Encapsulation, like a class in Java, refers to the idea of grouping together data and methods that operate on that data. The idea is frequently applied to conceal an object's internal state or representation from the outside world. Encapsulation is the technique of gathering related code in one location. It is also known as information concealing. Inside of a single class in C++, we can group data members and functions that work together.

In order to prevent clients from directly accessing the values or state of a structured data object in a way that would reveal undocumented implementation details or compromise the state invariance upheld by the methods, encapsulation is used to hide the values or state of the object inside a class. Not only OOP uses this mechanism.

To learn more about Encapsulation refer to:

https://brainly.com/question/11181441

#SPJ4

shanise is an it security professional for a large private bank. she got an alert that the bank website received a funds transfer request that was correctly credentialed but flagged as being out of the account owner's usual pattern. if the alert is correct, what type of attack has likely occurred?

Answers

The bank website received a funds transfer request that was correctly credentialed but flagged as being out of the account owner's usual pattern. if the alert is correct,the type of attack has likely occurred is Malware

What is Malware?Any software that is intentionally designed to disrupt a computer, server, client, or computer network, leak sensitive information, gain unauthorised access to data or systems, deny access to data, or unintentionally compromise a user's computer security and privacy is known as malware (a portmanteau for malicious software). Contrarily, software that harms users due to a flaw is commonly referred to as having a bug. On the Internet, malware causes significant issues for both consumers and organisations. The number of malware variations has climbed to 669,947,865 in 2017, which is twice as many malware variants as in 2016, according to Symantec's 2018 Internet Security Threat Report (ISTR)There are many different kinds of malware, including Trojan horses, worms, ransomware, spyware, adware, rogue software, wiper, and scareware. The methods used to combat malware vary.

To learn more about Malware refer to:

https://brainly.com/question/28910959

#SPJ4

an internet service provider (isp) is considering an update to its servers that wouldsave copies of the web pages most frequently visited by each user. which of thefollowing is least likely to occur as a result of the update?

Answers

The result of the update is Web sites that are not visited frequently might no longer be accessible to users.

What is meant by Accessible ?

Making your websites as user-friendly as feasible is known as accessibility.

Although we typically associate this with persons with impairments, making websites accessible also benefits other audiences, including those who use mobile devices or have sluggish network connections.

A location is accessible if it is easily accessible to people with disabilities, regardless of their disability.

A structure with a universal design, as an illustration.

Accessible is a quality that enables people with disabilities to easily receive things.

The purpose of accessibility features is to make it easier for people with impairments to utilise technology.

Keyboard shortcuts, closed captioning, and text-to-speech are examples of common accessibility features.

To learn more about Accessible refer to

https://brainly.com/question/30001873

#SPJ4

what are the two ways of concatenating two strings? group of answer choices use the concat() method, or the trim() method use the concat() method, or use the between the two strings use the concatenate() method, or use the between the two strings use the contenate() method, or the concat() method

Answers

The two ways to use concatenate the strings are

(String concatenation) operator.

using the concat method

What is a concat method ?

String concatenation in Java is accomplished through the StringBuilder (or StringBuffer) class and its append method. By appending the second operand to the end of the first operand, the String concatenation operator creates a new String. String concatenation can concatenate not only Strings but also primitive values. As an example,

class TestStringConcat{

public static void main(String args[]){

String s1="Test";

String s2="Test";

String s3=s1.concat(s2);

System.out.println(s3);//TestTest

}

}

string concatenation

class TestingStringConcatenation1{

public static void main(String args[]){

String a="Test"+" Test";

System.out.println(a);//TestTest

}

}

Hence the conclude that concat and By+string concatenation are the two methods used

To know more about concatenation follow this link:

https://brainly.com/question/16185207

#SPJ4

cloud computing refers to

Answers

Data storage, servers, databases, and other computer services are all accessible through cloud computing. Its major objective is to provide users access to data centres.

Any activity that includes hosting services online falls under the broad category of "cloud computing." These services are broken down into the three primary forms of cloud computing: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS).

Cloud computing is the on-demand provision of computer system resources, particularly data storage (in the form of cloud storage) and computational power, without direct active supervision by the user. Numerous sites, each of which is a data centre, frequently serve as different parts of large clouds. Cloud computing relies on resource sharing to accomplish coherence and frequently employs a "pay as you go" approach, which may assist reduce capital expenditures but may also result in unanticipated running expenses for customers.

Learn more about Computer here:

https://brainly.com/question/15707178

#SPJ4

When populating a motherboard with DIMM modules, what configuration option will not work?a. Using two different manufacturer's memoryb. Mixing unbuffered with registeredc. Mixing memory speedsd. Leaving a slot unpopulated

Answers

Answer:

b. Mixing unbuffered with registered

you have two dhcp (dynamic host configuration protocol) servers on your network. your computer accidentally received the wrong ip and dns server configuration from a dhcp server that was misconfigured. the dhcp server with the incorrect configuration has been disabled. what commands could you use to release and renew your computer's dhcp configuration?

Answers

To release and renew the DHCP settings on your machine, use the following commands:

(A) ipconfig /renew

(B) ipconfig /release

What is a DHCP server?

In k-mA Client computers are given IP addresses by the DHCP server. In order to save time during configuration, this is frequently utilized in business networks.

A database that is housed on a server machine contains all of the IP addresses of every computer.

Multiple clients are given IP addresses by the DHCP server.

A network protocol called Dynamic Host Configuration Protocol (DHCP) is used to set up network devices for IP network communication.

A DHCP client obtains configuration data from a DHCP server via the DHCP protocol, such as an IP address, a default route, and one or more DNS server addresses.

The following commands are used to release and renew the DHCP configuration on your computer:

(A) ipconfig /renew

(B) ipconfig /release

Therefore, to release and renew the DHCP settings on your machine, use the following commands:

(A) ipconfig /renew

(B) ipconfig /release

Know more about a DHCP server here:

https://brainly.com/question/14407739

#SPJ4

Themes are found on the ____ tab.

Answers

Themes are found on the  design  tab. You'll find design themes in the Themes bunch.

To review how the current slide would look with a specific subject applied, rest your pointer over the thumbnail picture of that topic.

PowerPoint gives an assortment of design themes — including facilitated variety plans, foundations, textual styles, and position of placeholders. Utilizing pre-designed themes makes it simple for you to change the general look of your show rapidly.

Of course, PowerPoint applies the plain Office subject to new, blank introductions. Notwithstanding, you can without much of a stretch change the look and feel of your show by applying an alternate topic.

1. The plain Office topic is applied when you pick Blank Show

2. In the Themes gallery, you can change to another subject

3. The chosen subject is currently applied to your show

to know more about powerpoint click here:

https://brainly.com/question/23714390

#SPJ4

Other Questions
find the maclaurin expansion for the following functions and indicate for which values of x it actually represents the function ) the term used to describe non-listening which involves the appearance of listening and attentiveness is: what is the transfer of oxygen and carbon dioxide between the environment and the bloodstream in the lungs called? what types of change is needed to break down a compound examine a department of education advertising campaign that promotes literacy. analyze the campaign to discover the target audience and the advertising techniques used. then evaluate the effectiveness of these advertising techniques. write a formal essay in which you explain how the advertising campaign effectively promotes literacy to a range of audiences. now, review the prompt for hints about the audience. who will read your writing? with ________, the sender and receiver transmit a message using different keys. The ideas expressed in the excerpt most directly contributed to the The largest moment magnitudes measured to date are from earthquakes that occurred in subduction zones. True/False in marketing research, this level of measurement is the preferred measure when measuring purchase likelihood and attitude assessment.___ all of the following resulted from the repeated invasions of the germanic tribes that led to the fall of the roman empire except For the U.S. economy, which of the following is the most important reason for the downward slope of the aggregate-demand curve? the wealth effect the interest-rate effect the exchange-rate effect the real-wage effect Angela Ricci studied religion in a Chinese village temple and had many questions about religion. What questions did she have that could be answered with anthropological fieldwork?Do villagers and priests share common understandings of religion?How do villagers understand the meaning of the temple itself, a physical structure? fine the product of 1/100 5. Marcus, Alaina, and Tory recorded the number of text messagesthey sent on a certain day. Marcus sent 24 text messages, Alainasent 8 fewer messages than Marcus, and Tory sent twice as manymessages as Alaina. What is the ratio of the number of texts that Torysent to the total number of texts sent by all three friends? how are the realities of advanced manufacturing potentially different than traditional views held about the manufacturing sector? Is there a single word in English for denote a period of 12 years (like "Decade" for a period of 10 years)? 1. A synonym for the word wrath is:A. pleasure.B. disease.C. anger.D. annoyance.2. As a result of Mr. Freeman's death, Maya feels:A. joyful.B. angry.C. guilty.D. None of the choices are correct.3. When Maya returns to Stamps after her SA, she feels:A. nervous.B. overwhelmed.C. relieved.D. disgusted.4. Mrs. Cullinan angers Maya because she:A. calls her a racist name.B.changes her name to Mary.C. unjustly yells at another employee.D. All of the choices are correct.5. During this time period, Bailey:A. becomes sexually active with many young girls in the town.B. starts dating a girl who takes advantage of him.C. spends most of his time working in the Store.D. All of the choices are correct.6. Momma makes arrangements to take the children to California to live with their mother because:A. Vivian contacted her and asked for her to bring the children to California.B. she wanted to protect them from the dangerous racial tensions in Stamps.C. she could not afford to keep them any longer.D. Bailey kept asking if he could live with his mother.7. An antonym for the word devoid is:A. fragile.B. perfect.C. full.D. sad. in addition to the typical symptoms of meningitis, meningococcemia can cause a high fever, chills, delirium, and widespread , or bleeding under the skin. Match each number on the left with the correct description of the number on the right.Answer options on the right may be used more than once.-10This is an integer.This is a rational number, but not an integer.This is an irrational number.5-5.631/ For the binomial distribution, which formula finds the standard deviation? Choose the correct answer below: np npq npnpq