Battle Ship Program (IN JAVA)

BattleShip class

The Battleship class represents a single battleship. Each battleship has a name, attack level, and health level. Your class should
include the following

Constructor that sets health to 100 and initializes the other instance variables appropriately

updateDamage() that takes the attack power of the attacking ship as a parameter and updates the health of the victim based on the following:

If the attack power is less that 5, the ship inflicts 2 damage

If the attack power is less than 10, the ship inflicts 7 damage

If the attack power is 10 or more, the ship inflicts 10 damage

stillFloating() returns if the ship is still floating or not. The ship is floating as long as the health is greater than 0

toString() that returns the name and health of a ship

Tester Class

Make 2 ships using your own literals

Have the ships attack each other a few times

Print out both ships status in the end

Answers

Answer 1

Using the knowledge in computational language in JAVA it is possible to write a code that The Battleship class represents a single battleship.

Writting the code:

 public void isAttacked(int attackPower)

   {

       if(attackPower < 4)

       {

           this.health -=3;

       } else if (attackPower < 8)

       {

           this.health -=5;

       } else

       {

           this.health -=7;

       }

   }

See more about JAVA at brainly.com/question/12975450

#SPJ1

Battle Ship Program (IN JAVA) BattleShip ClassThe Battleship Class Represents A Single Battleship. Each

Related Questions

Specialized program that allows user to utilize in specific application is classified as

Answers

A specialized program that allows users to utilize a specific application is classified as an Application program.

What is an Application Program?

An application program, often known as a software application or app for short, is a type of computer program that is used by end users and is created to do a particular task that is unrelated to the operation of the computer.

Examples of application programs include those for word processing, spreadsheets, presentations, and database administration. They also include web browsers, email clients, media players, accountancy software, and tools for pronouncing words, translating sentences, and desktop publishing.

What does Word processing mean?

A Software application that enables users to create, save, modify, format, print, and retrieve documents.

An application program is a comprehensive, stand-alone piece of software that carries out a specific task for the user.

Hence, Application Program is utilised in specific applications.

To learn more about Word Processing from the given link

https://brainly.com/question/24043728

#SPJ1

By 2020, how many devices are expected to be connected to the internet worldwide?.

Answers

By 2020, it is expected that almost 9.7 billion devices will be connected to the internet worldwide.

What is the meaning of the term “internet”?

The Internet, sometimes known as "the Net" or just "the Internet," is a global system of computer networks. It is a network of networks in which users at any one computer can, with permission, access any other computer's data.

The internet is a network of networks and there are numerous varieties of it. It is made up of a variety of local to international public, commercial, academic, business, and governmental networks connected by a wide range of electronic, wireless, and optical networking technologies.

Global internet connectivity is anticipated to reach 9.7 billion devices by 2020.

Learn more about internet from here:

https://brainly.com/question/13308791

#SPJ1

What web 2. 0 feature allows users to subscribe to a data plan that charges for the amount of time spent on the internet?.

Answers

Software as a Service is the web 2. 0 feature that allows users to subscribe to a data plan that charges for the amount of time spent on the internet.

What is Software as a Service (SaaS)?

Software as a service (or SaaS) is a method of delivering applications as a service over the Internet. Instead of installing and maintaining software, you simply access it through the Internet, freeing yourself from the complexities of software and hardware management.

Web-based software, on-demand software, and hosted software are all terms used to describe SaaS applications. Whatever the name, SaaS applications are hosted on the servers of a SaaS provider. The provider manages application access, including security, availability, and performance.

To learn more about Software as a Service (SaaS), visit: https://brainly.com/question/14596532

#SPJ4

if a researcher is using data that are low in cost and save time, which type of data is this likely to be? multiple choice observational data questionnaire data secondary data patented data mined data

Answers

If a researcher is using data that are low in cost and save time, the type of data is this likely to be secondary data. The correct option is c.

What is secondary data?

Data that is gathered by a user other than the main user is referred to as secondary data. Census data, information gathered by government agencies, company records, and data that was initially gathered for other research goals are all common sources of secondary data for social science. This will be low in cost as it is easily available, and it will also save time.

Therefore, the correct option is c. secondary data.

To learn more about secondary data, refer to the link:

https://brainly.com/question/20382314

#SPJ1

which ip addressing process enables workstations to use private ip addresses to access the internet?

Answers

NAT Before transferring the data, it is a way to map several local private addresses to a public one.

What is NAT ?

By changing the network address information in packets' IP headers as they travel through a traffic routing device, network address translation is a technique for mapping one IP address space into another.

When a network was moved or when the upstream Internet service provider was changed but was unable to route the network's address space, the technique was initially employed to avoid the requirement to give new addresses to every site.

In light of the IPv4 address exhaustion, it has grown to be a widely used and crucial technique for global address space preservation.

NAT implementations may differ in their specific behaviour in different addressing cases and their impact on network traffic because NAT modifies the IP address information in packets. Vendors of equipment with NAT implementations do not frequently document the specifics of NAT behavior.

To learn more about NAT refer :

https://brainly.com/question/13105976

#SPJ4

The following program includes 10 cities that two people have visited. Write a program that creates: 1. A set all_cities that contains all of the cities both people have visited. 2. A set same_cities that contains only cities found in both person1_cities and person2_cit ies. 3. A set different_cities that contains only cities found in only person1_cities or person2_cities. Sample output for all cities: ['Accra', "Anaheim', 'Bangkok', 'Bend', 'Boise', 'Buenos Aires', "Caìro', "Edmonton', 'Lima', "London', 'Memphis', 'Orlando', 'Paris', 'Seoul', 'Tokyo', 'Vancouver', 'Zurich'] NOTE Because sets are unordered, they are printed using the sorted() function here for comparison. 1 person1 cities - ('Edeonton', "Vancouver', 'Parls", 'Bangkok', 'Hend', 'Bolse', 'Mosshis", "Zurlch', "Accra", ", 2 person2,cltles = ("Accra", "Orlando", "Tokyo", "Paris", "Anahein', 'Hienos Aires", "tondon', "Lima", "Seoul", 4 " Use set methods to create sets atl_cities, same _ities, and different_cities. 6." Your solution ges here w 7 in print(sorted(al1_cities)) 9. print(sorted(same_cities)) 10 print(sorted(different_cities))

Answers

Answer:

all_cities = person1_cities.union(person2_cities)

same_cities = person1_cities.intersection(person2_cities)

different_cities = person1_cities.symmetric_difference(person2_cities)

Explanation:

3. one of your co-workers has set up a model-driven application using dataverse. the app captures information about computer hardware assets, including their price. your co-worker is concerned that users of the application are going to forget to populate the cost center if the part is expendable. how could this be prevented?

Answers

If the expendable field is true, use a business rule to make the cost center field mandatory.

How can business rule be used in both canvas and Model Driven apps?If a table is utilized in the app, the business rules created for it are applicable to both canvas apps and model-driven apps. Currently, not all business rule actions are accessible through canvas applications. All of the business rule actions are currently available for model-driven apps to use, but not all of them are for canvas apps.See Create business rules to apply logic in a model-driven app form to learn how to provide a business rule that applies to a form in a model-driven app.

By combining conditions and actions, you can do any of the following with business rules:

Set column valuesClear column valuesSet column requirement levelsShow or hide columnsEnable or disable columnsValidate data and show error messagesCreate business recommendations based on business intelligence.

Learn more about Canvas and Model Driven apps refer :

https://brainly.com/question/15075251

#SPJ4

many fire departments are equipping their vehicles with , which allow(s) personnel to connect to the computer-aided dispatch system.\

Answers

Many fire departments are equipping their vehicles with , mobile data computers allow(s) personnel to connect to the computer-aided dispatch system.

What do you mean by computer-aided dispatch?

Computer-aided dispatch (CAD), sometimes known as computer-assisted dispatch, is a way of dispatching taxicabs, couriers, field repair technicians, mass transport vehicles, or emergency services using a computer. It can be used to deliver messages to the dispatchee via a mobile data terminal (MDT) or to store and retrieve data. A dispatcher may broadcast the call details to field units through two-way radio. Some systems communicate by utilising the selective calling features of a two-way radio system. CAD systems may deliver text messages including call-for-service information to alphanumeric pagers or wireless telephony text services such as SMS.

To learn more about computer-aided dispatch
https://brainly.com/question/28820108

#SPJ4

which of the following code segments could replace the while loop without changing the resulting value of total?
I. for (int h = 0; h < num; h++)
{
total += num % 10;
num /= 10;
}
II. for (int j = num; j > 0; j--)
{
total += j % 10;
}
III. for (int k = num; k > 0; k /= 10)
{
total += k % 10;
}
A. I only
B. II only
C. III only
D. I and II
E. II and III

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that code segments could replace the while loop without changing the resulting value of total.

Writting the code:

import java.io.*; //Code Segment I

public class Main

{

public static void main(String[] args)

{

for (int i = 0; i < 10; i++)

{

System.out.print( "*" );

}

}

}

import java.io.*;

public class Main

{

public static void main(String[] args)

{

for (int i = 1; i <= 10; i++)

{

System.out.print( "*" );

}

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

a(n) is a commercial organization with a permanent connection to the internet that sells temporary connections to retail subscribers.

Answers

An Internet service provider (ISP) is a commercial organization with a permanent connection to the internet that sells temporary connections to retail subscribers.

Why does the term "internet service provider" exist?

A company that offers people and organizations access to the internet and other related services is known as an ISP (internet service provider). A point of presence on the internet for the serviced area is available to an ISP because it has the tools and telecommunications line access needed.

Therefore, An Internet service provider (ISP) is a business that has a continuous connection to the Internet and offers short-term connections to retail subscribers. Telephone lines, cable lines, or wireless connections may be used to provide these connections.

Learn more about Internet service provider from

https://brainly.com/question/27966170
#SPJ1

Which field could serve as the primary key for a list of students in your school?.

Answers

The "Student ID Number" field could serve as the primary key for a list of students in your school.

What is a primary key?

A primary key is a unique column (or set of columns) assigned to a relational database table(s) in order to uniquely identify each table entry. For easy parsing of the table's data, a primary key is utilized as a unique identifier.

An effective relational database depends on the primary key notion. Relational databases are ineffective without the main key and conceptually related foreign key ideas. A primary key is actually required because a table can easily include thousands of items (including duplicates) in order to guarantee that each record can be uniquely identified at all times.

To learn more about primary key, use the link given
https://brainly.com/question/29351110
#SPJ4

what other uses and functions does inputaccel serve, and how will this be useful to novartis over the long term? (you may want to visit the emc/captiva website,

Answers

A service is a way to give consumers value by helping them achieve their goals without having to bear all the associated expenses and risks.

What is the function of inputaccel serve with Novartis?

The customized InputAccel server controls output by identifying and averting workflow bottlenecks. Additionally, it guarantees that other servers will continue to run even if one goes out, preventing downtime.

With InputAccel, businesses may reduce the amount of time spent manually handling paper while also reducing processing errors, improving data accuracy, and speeding up company operations.

Therefore, making information instantly accessible in content repositories like Documentum, ApplicationXtender, and Microsoft SharePoint,

Learn more about inputaccel serve here:

https://brainly.com/question/26749122

#SPJ1

Which of the following is a storage device? A. CPU B. printer C. RAM D. mouse

Answers

Answer:  c

Explanation: ram is a storage device

In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________.

Answers

Answer: field

Explanation: it’s field

In a record, each separate piece of data, such as the last name, a first name, or an address, is called a field.

Define data.

Data in computing is either information that has been converted into a form that is effective for transmission or processing, or it is factual information (such as measurements or statistics) that serves as the foundation for deduction, argument, or calculation.

Data can exist in a variety of ways, such as written words or numbers on paper, as bits or bytes saved in an electronic memory, or as truths ingrained in someone's memory. Data now, however, most frequently refers to information that is transferred or stored electronically since the development of computer technology in the middle of the 20th century.

To learn more about data, use the link given
https://brainly.com/question/13189580
#SPJ4

When you are collaborating on a project with other designers who are using their own computers, what is the major benefit to using linked smart objects in your photoshop document?.

Answers

The main advantage of using linked smart objects in your Photoshop document is that they will update automatically whenever changes are made to the original document, which is helpful when working on a project with other designers who are using their own computers.

Use Linked Smart Objects To Keep Photoshop Faster & Flexible:

An original is referenced by a Linked Smart Object, which will update to reflect any changes made to the original. In our hypothetical example, you could have changed everything else by just making modifications to the original image if you had placed the photo as a Linked Smart Object (File > Place Linked).

Imagine that you are working with other designers on a project to create some marketing materials for your business. Three distinct publications (a poster, flyer, and social media add) all use the same image, but each makes use of a different graphic. You suddenly realize that the image has a flaw that needs to be rectified.

Oh no! Now I have to update the images in all the other docs. That is what would occur if a Linked Smart Object hadn't been used.

Visit this website to find out more about Linked Smart Objects:

https://brainly.com/question/12216262

#SPJ1

maarku lost his debit card. he reported it immediately before any unauthorized withdrawals were made. how much is maarku responsible for?

Answers

There is no liability for unauthorized withdrawals if the debit card loss is reported immediately.

So, in this case, Maarku is not responsible at all because forgetting things is common and mistakes happen, but he fulfills his responsibility by immediately reporting it to the concerned authority according to the official guidelines.

Laws That Cover Stolen and Lost Cards:

The Fair Credit Billing Act and the Electronic Fund Transfer Act are the two primary federal laws governing procedures following card theft or loss.

Reporting a Stolen or Lost Debit Card

According to the Fair Credit Billing Act, your liability for unauthorized charges is determined by whether the thief used your card to make the purchase or simply stole the number.

The card issuer cannot hold you liable for more than $50 in fraudulent charges if the thief personally presents your card to make the purchase. (12 C.F.R. § 1026.12). Many credit card companies will waive the $50 fee.

If the thief stole the number but not the card, you are not liable.

However, in either of the above scenarios, you must notify the card issuer as soon as you become aware of the theft.

To know more about Lost Debit Card, visit:https://brainly.com/question/29100100

#SPJ4

which answer correctly describes the postscript type 1 font format? a font format that was developed by apple and only works on macintosh computers the font format developed by adobe that consists of two computer files the most recent font file format that works on both

Answers

The answer given in option B i.e. 'the font format developed by adobe that consists of two computer files' correctly describes the PostScript Type 1 font format.

PostScript Type 1 font, also known as PS1 font or Adobe Type 1 font, is referred to as the font format for single-byte digital fonts that is used with PostScript printers and with Adobe Type Manager software. PostScript Type 1 font can support font hinting.

Since the early 2000s, the PostScript Type 1 font format has been replaced by OpenType.

You can learn more about PostScript Type 1 font at

https://brainly.com/question/18785888

#SPJ4

you have decided to retire to a remote mountain cabin and write books. you need an internet connection to send material to your publisher. what is the option most likely to work for you?

Answers

The quickest connection available is fiber internet, but it's also the most difficult to locate. A trustworthy alternative to DSL internet is cable, which also offers faster speeds.

What is fiber-optic internet?Fiber optic internet uses cables with tiny glass or plastic fibers to carry data connections. Through these, data is transmitted as a pattern of pulsed light beams. At 1 Gbps, fiber optic internet speeds are around 20 times faster than those of traditional cable. The fastest internet connection available is fiber, but it's also the most difficult to locate. Additionally dependable and offering better internet speeds than DSL is cable. Another promising and reasonably priced new service is 5G internet, however it might take some time before it becomes generally accessible to the general population.Other internet connection types simply cannot compete with the speeds and dependability that fiber-optic internet offers.      

To learn more about Fiber optic internet refer to:

https://brainly.com/question/116766

#SPJ4

 

What is the output?
x = 6 % 2

if x == 1:
print("ONE")

else:
print("TWO")

Answers

Answer:

The output would be "TWO".

A technician wishes to update the nic driver for a computer. What is the best location for finding new drivers for the nic? select one:.

Answers

The best place to find new drivers for the NIC is the website for the manufacturer of NIC. So the answer is C.

NIC is stand for A network interface controller. NIC, also called as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms can be described as a computer hardware element that associated a computer to a computer network. Compared to the wireless network card, NIC recognizes a secure, faster, and more reliable connection. NIC lets us to share bulk data among many users. NIC can helps us to link peripheral devices using many ports of NIC.

The question is not complete. The complete question can be seen below:

What is the best location for finding new drivers for the NIC? Group of answer choices

A. Windows Update the installation media that came with the NIC

B. the installation media for Windows

C. the website for the manufacturer of the NIC

D. the website for Microsoft.

Learn more about NIC at https://brainly.com/question/17060244

#SPJ4

Along with chaining together blocks of data using hashes, what two other features help blockchain remain secure?.

Answers

Along with chaining together blocks of data using hashes, the two other features that help blockchain remain secure is  decentralization and consensus.

What other two characteristics aid in keeping blockchain secure?

Data structures created by blockchain technology include built-in security features. It is founded on cryptographic, decentralized, and consensus concepts that guarantee the integrity of transactions.

Note that the two types of cryptographic keys are private key and public key. Both of these keys are held by each person or node, and they are used to generate digital signatures. The most significant feature of blockchain technology is this digital signature, which serves as a specific and secure reference for a digital identity.

Learn more about decentralization  from

https://brainly.com/question/25661114
#SPJ1

true or false, the random number generator (data analysis tool) requires you to copy paste special value in order to create static random value(s)?

Answers

The random number generator (data analysis tool) requires you to copy paste special value in order to create static random value(s) is a false statement.

What is the meaning of random number?

A random number is a pick of a number made seemingly at random from a certain distribution such that the distribution is reproduced when a large collection of these numbers is chosen. Such numbers must almost always be independent in order to prevent relationships between succeeding numbers.

Therefore, a hardware or software algorithm known as a random number generator produces numbers at random from a finite or infinite distribution. Pseudo-random number generators and real random number generators are the two primary varieties of random number generators.

Learn more about random number generator from

https://brainly.com/question/10352102
#SPJ1

fill in the blank: r markdown notebooks can be converted into html, pdf, and word documents, slide presentations, and .

Answers

R markdown notebooks can be converted into html, pdf, and word documents, slide presentations, and  dashboard .

What is dashboard?

All of your data is shown visually on a dashboard. Although it has a wide range of applications, its main purpose is to present information quickly, like KPIs.

The information for a dashboard often comes from a linked database and is shown on its own page. It is frequently adjustable, giving you the option to select the data you want to view and whether or not you want to include charts or graphs to represent the data.

What R markdown?

The file type R Markdown is used to create dynamic documents in R. Like the document below, a R Markdown document is written in markdown (a simple plain text style) and includes sections of embedded R code.

What is embedded code?

The technique of capturing a word's context in a document, such as its semantics and relationships with other words, is known as word embedding. Word2Vec is a general architecture or method for word embeddings that uses shallow neural networks to create words vectors that capture the properties of words.

Learn more about Dashboard click here:

https://brainly.com/question/1147194

#SPJ4

eros wants to change a configuration file on his linux computer. he first wants to display the entire file contents. which tool would he use?

Answers

Since Eros wants to change a configuration file on his Linux computer. he first wants to display the entire file contents, the  tool that he would use is option D: CAT.

What does cat mean in a C program?

The cat command, which stands for "concatenate," is a straightforward tool used to concatenate and send files to your screen, or "standard output" (stdout). The simplest application of cat is to display a file's contents.

Therefore, In Linux, the Cat (concatenate) command is often used. It extracts data from the file and outputs its contents. It aids in file creation, viewing, and concatenation.

Learn more about configuration from

https://brainly.com/question/13484609
#SPJ1

See full question below

Eros wants to change a configuration file on his Linux computer. He first wants to display the entire file contents. Which tool would he use?

Head

Show

Display

Cat

windows 10 on a two-in-one device uses a new feature called , by which it detects when the keyboard is disconnected and automatically changes to tablet mode.

Answers

windows 10 on a two-in-one device uses a new feature called Continnum, by which it detects when the keyboard is disconnected and automatically changes to tablet mode.

Explain the Continnum feature.

Microsoft's Windows 10 operating system features a brilliant feature called Continuum that detects the type of device you're using and changes the user interface to be appropriate for PCs, 2-in-1 devices, tablets, or even transforms your phone into a PC. Windows uses Continuum to identify the hardware you are using and make sure that you always have the best interface on your computer.

For instance, on Windows 10, if you take away the keyboard, a dialog box will appear asking if you want to switch to tablet mode. The interface will then change after tapping this. Naturally, when you attach the keyboard again, the opposite is true. You can choose an automated response so that Windows knows what you want it to do, and that is how continnum works, rather than having to be prompted each time.

To learn more about Continnum, use the link given
https://brainly.com/question/28880831
#SPJ4

which of the following best describes the platform as a service (paas) cloud computing service model?

Answers

A statement which best describes the platform as a service (PaaS) cloud computing service model is that: B. PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

What is cloud computing?

In Computer technology, cloud computing can be defined as a type of computing service that requires the use of shared computing resources over the Internet, rather than the use of local servers and hard drives.

The categories of cloud service.

Generally speaking, cloud computing comprises three (3) main service models which includes the following;

Software as a Service (SaaS).Infrastructure as a Service (IaaS).Platform as a Service (PaaS).

In conclusion, a type of cloud computing service which offers software application developers a pre-configured hosting and testing environment to enable them build (create) new software applications is generally referred to as Platform as a Service (PaaS).

Read more on Platform as a Service here: brainly.com/question/24233315

#SPJ1

Complete Question:

Which of the following best describes the platform as a service (PaaS) cloud computing service model?

- PaaS stores and provides data from a centralized location without requiring local collection and storage.

- PaaS delivers everything a developer needs to build an application onto the cloud infrastructure.

- PaaS delivers software applications to the client either over the internet or on a local area network.

- PaaS delivers infrastructure to the client, such as processing, storage, networks, and virtualized environments.

In a ____________when significant deviation occurs, corrective action is taken to bring the deviating task back into compliance with the project plan; otherwise, the project is revised in light of the new information.

Answers

In a Gap Analysis when significant deviation occurs, corrective action is taken to bring the deviating task back into compliance with the project plan; otherwise, the project is revised in light of the new information.

What is Analysis of Gaps?

A gap analysis is a technique for evaluating how well a business unit is performing in order to ascertain whether or not business requirements or objectives are being fulfilled and, if not, what actions should be taken to do so.

Note that once a project is underway, it is monitored using a procedure called gap analysis, which also goes by the names of a negative feedback loop and a cybernetic loop. This procedure makes sure that progress is periodically measured. When there is a considerable deviance from the project plan, corrective action is performed to bring the job back into conformity; otherwise, the project is changed in light of the new data.

Learn more about Gap Analysis  from

https://brainly.com/question/10549036

#SPJ1

According to the speaker in the video case managing a website project, what should clients recognize is the most important foundation of a project when working with a web design project team?.

Answers

According to the speaker in the video case managing a website project, the clients should recognize that "communicating with the stakeholders" is the most important foundation of a project when working with a web design project team.

What is a website?

A website is a compilation of web pages and related content that is accessible through a single domain name and made available on at least one web server.

Web pages are digital documents that are written in HTML, and a website is a collection of several web pages (HyperText Markup Language). With a common interface and design, the website's web pages are connected by hyperlinks and hypertext. In addition to text and files, the website may also include digital assets like photographs, videos, and other files.

To learn more about a website, use the link given
https://brainly.com/question/25941596
#SPJ4

you are a consultant for an it company. your boss asks you to determine the topology of the network. what is the best device to use in this circumstance

Answers

The best device used to this circumstances is network mapper.

What is meant by network mapper?The process of discovering all the entities connected to a network is referred to as network mapping. Network mapping solutions provide detailed visibility into enterprise IT infrastructure by visualizing physical and virtual networks.The terms network diagram and network map refer to the same tool. A network diagram or map depicts how network components, known as nodes. Such as routers, hubs, and firewalls, connect to one another.Network mapping can provide network administrators with critical performance insights such as device status, physical connections, traffic metrics, and more, allowing them to troubleshoot issues more quickly and maximize uptime.

To learn more about network mapper refer to:

https://brainly.com/question/1167985

#SPJ4

which of the following must be true to remotely wipe your phone? the phone must have the correct app downloaded. the phone must be turned on. the phone must be connected to the internet. the phone must be associated with an email account.

Answers

Answer: the phone must be connected to the internet

Explanation:

Other Questions
Point C is in between D and E and DE = 61 . What is DC equal to? *Screenshot of question below* Which underlined words are noun clauses? Select two answers. A. "Having eaten too many empanadas", I was in no mood to walk home.B. I approached the podium "with tears in my eyes." C. "Why some dogs turn vicious" can't always be explained.D. Being quiet is "what seems impossible for a two-year-old."PLEASE HELP WORTH ALOT OF POINTS Which of these features is shared between eukaryotic and prokaryotic gene regulation?. If your job pays you a 10% commission based on your sales, how muchcommission would you make if your sales were $20,000?$200 $2,000$20,000$22,000 Does x + 2 = -3(x+1) have exactly one solution? Which analysis does the passage support Swift uses understatement to?. When preparing a buret for use in lab, the buret must always be cleaned thoroughly. Prior to being filled with solution, the buret is rinsed one last time. What is the buret rinsed with, and why?. Compare the features of static and dynamic computing environments and then select the accurate statements. a. Embedded systems are typically static, while most personal computers are dynamic. b. A dynamic environment is easier to update than a static environment. c. A dynamic environment gives less control to a user than a static environment. d. Dynamic environments are easier to protect in terms of security than static environments Question 29 (1 point)Since the 1960s, what has been the general conservative attitude toward bureaucracies? what is the rare neuropsychological disorder in which the affected individual has no perception of motion? describe how they experience motion. What will happen to the size of the red blood cell Which cells are responsible for breaking down bone to increase calcium levels in the blood? carol is a vegan and does not eat dairy foods. is it possible for her to obtain the daily recommended amount of calcium from a diet without taking supplements? This excerpt from Article VI, paragraph 2 of the US Constitution is normally seen as the most important part of the Supremacy Clause. This Constitution, and the Laws of the United States which shall be made in Pursuance thereof . . . shall be the supreme Law of the Land. Article VI, paragraph 2 of the US Constitution What does the Supremacy Clause say about the power of the federal government? The Constitution is the supreme law of the land. State governments have more power than the federal government. State and federal governments share all powers in the United States. Federal laws are more powerful than the Constitution. Where and when was the declaration of independence adopted by the continental congress?. How long was the Battle of San Jacinto? 3. Follow-up In Guided Example 5.4, Moe, Larry, and Curly allpush to the right with 85.0-N forces. If the boat has an acceleration of0.530 m/s, then what is the mass of the boat? as interactive communications between companies and customers grow, do you think that traditional advertising will grow or decline? what will be the effect of growth or decline on the price we pay for tv programs, newspapers, and magazines? whenever william fights with his brother, his parents take away his video game privileges. as a result, william stopped fighting with his brother. this best illustrates The story Catch the Moon by Judith Ortiz Cofer.How does Luis feel about his stay in juvenile hall? What do his reactions say about his character?