Col 1 Col2 Col 3
Row 1 23.1 13.58 14
Row 2 56.783 46.29 45.71
Write a program that accomplishes the following objectives:
1. reads in the number of rows, then the number of columns,
2. using nested FOR loops, reads in the column data for each row,
3. adds up the data for each row and derives an average for each row,
4 also adds up all the data in the table and derives an overall average.
Hints
1. Look at slides 3 and 4 of CS1336_Lect5e_nested_loops.pptx and Pr5-14.cpp for samples of nested FOR loops, especially line 38 in slide 4 for a calculation of average per student. That is very much like a row average.
2 Have two running total variables, for example rowsum and totalsum. Initialize totalsum to 0 in the beginning of the program Initialize rowsum to 0 before the inner loop (see line 29 in slide 4). Keep running totals for both of these inside the inner loop (see line 36 in slide 4). Average the rowSum after each iteration of the inner loop (see line 38 in slide 4). Average the totalsum after the outside loop ends
When the input is as shown in Figure 1. your program should produce the output as shown in Figure 2.
Figure 1: (sample input) 23 23.1 13.58 14 56.783 46.29 45.71
Figure 2 (sample output) Lverage of data in row #1 is 16.89 Average of data in row #2 is 49.59 Average of all data is 33.24

Answers

Answer 1

Answer:

In C++:

#include<iostream>

using namespace std;

int main(){

int rows, cols;

cout<<"Rows: "; cin>>rows;

cout<<"Columns: "; cin>>cols;

int rowsum = 0; int totalsum = 0;

float nums[rows][cols];

for(int i = 0;i<rows;i++){

for(int j = 0;j<cols;j++){

cout<<"Row "<<i+1<<", Column "<<j+1<<": ";

cin>>nums[i][j];

rowsum+=nums[i][j];  totalsum+=nums[i][j];

}

cout<<"Average of row "<<i+1<<": "<<(rowsum*1.0/cols*1.0)<<endl;

rowsum = 0;

}

cout<<"Overall Average: "<<(totalsum*1.0)/(rows*cols*1.0);

return 0;

}

Explanation:

This line declares number of rows and number of columns as integer

int rows, cols;

This line prompts user for number of rows

cout<<"Rows: "; cin>>rows;

This line prompts user for number of columns

cout<<"Columns: "; cin>>cols;

This line initializes rowsum and totalsum to 0, respectively

int rowsum = 0; int totalsum = 0;

This line declares a 2d array

float nums[rows][cols];

The following iteration gets user input into the array

for(int i = 0;i<rows;i++){

for(int j = 0;j<cols;j++){

cout<<"Row "<<i+1<<", Column "<<j+1<<": ";

cin>>nums[i][j];

This line sum up the rows

rowsum+=nums[i][j];  

This line sum up each entry

totalsum+=nums[i][j];

}

This line calculates and prints the average of each row

cout<<"Average of row "<<i+1<<": "<<(rowsum*1.0/cols*1.0)<<endl;

rowsum = 0;

}

This line calculates and prints the overall average

cout<<"Overall Average: "<<(totalsum*1.0)/(rows*cols*1.0);


Related Questions

What is true about the process of converting analog data into digital data?

a

To make the digital version be a more accurate representation of the analog data, the process should use fewer bits to represent each sample.

b

The digital version is a representation of the analog data but cannot include all of the details.

c

A longer interval between measured samples means more details will be captured in the conversion from analog to digital

d

The digital version contains all of the details of the analog data, as long as enough storage capacity is available.

Answers

Answer:

b. The digital version is a representation of the analog data but cannot include all of the details.

Explanation:

Analog data are continuous infinite stream of data but since the computer has finite memory, these data could only be represented on the computer by converting them to finite data. This process is called analog to digital conversion.

The following are some of the things that should be noted when doing this conversion:

1. Since the digital version is a finite representation of the analog which is infinite, it (the digital version) cannot include all of the details in the analog.

2. For the digital version to be a more accurate version of the analog data it represents, as much bit as possible should be used to represent each sample.

3. Short intervals between measured samples means more details will be captured in the conversion from analog to digital.

Analog to digital conversion of data simply involves the converting an infinite stream of data into a Finite version of the same data.

Digital data are Finite representation of the infinite data typical of analog representation. Hence, a Finite sequence, will not habor all the data or information contained in an analog record.

Therefore, the digital data representation will only be a Finite representation of the analog data and will not contain all of the details.

Learn more :https://brainly.com/question/17557558

The purpose of the ________ in a database system is to receive requests from applications and to translate those requests into reads and writes on the database files.

Answers

Answer:

database management system (DBMS)

Explanation:

The process that is being described is known as a database management system (DBMS). There are many types of these systems because they are extremely useful as they allow for complete manipulation of data within databases, allowing data to flow in and out as needed from a database. Popular examples of such systems include MySQL, PostgreSQL, Microsoft Access, SQL Server, etc. Every single application or company that has large sets of data need to use DBMS'

A loop should output 1 to n. If n is 5, the output is 12345. What should XXX and YYY be? Choices are in the form XXX / YYY. cin >> n; for (XXX; i++) { cout << YYY; }

Answers

Answer:

[tex]i = 0; i < n / i + 1[/tex]

Explanation:

Given that:

a loop output 1 → n

if n = 5

output = 12345

n = scnr.nextInt();

for [tex](XXX; i++)[/tex]

{

System.out.printIn(YYY);

}

XXX / YYY is [tex]i = 0; i < n / i + 1[/tex]

Please select the word from the list that best fits the definition
PLEASE HURRY. ITS TIMED

Enjoys working through a process


Interpersonal

Musical

Body-Kinestetic

Spatial

Linguistic

Intrapersonal

Logical-Mathmatical

Answers

Musical is the one that best fits it

Answer:

im tryna get points for a challenge. im not that smart but those look like cool wrds. mwah

Explanation:

Intangible resources are typically embedded in ________ routines and practices that have evolved and accumulated over time. common obvious standard unique

Answers

Answer:

Unique

Explanation:

The correct word to fill in the gap is "unique". This is because the routines are not common or of any major standard but are special in their own ways

Which statement best describes the refraction of light

Answers

Answer:

Two wave pulses move toward each other along a rope. The two waves produced have different speeds.

Explanation:

Refraction of light is the change in the speed of light as it travels. The correct option is C.

What is refraction?

The bending of light as it passes from one medium to another is caused by the difference in the speed of light in the different media.

When viewed through a medium with a different refractive index, this bending of light can cause objects to appear distorted or displaced.

The change in direction and speed of light as it passes from one medium to another, such as from air to water or from water to glass, is referred to as refraction.

This happens because the speed of light changes when it moves from one medium to another due to a change in the refractive index of the medium.

Thus, the correct option is C.

For more details regarding refraction, visit:

https://brainly.com/question/14760207

#SPJ3

Your question seems incomplete, the probable complete question is:

Which statement best describes refraction of light? It

A. produces echoes

B. happens only in mirrors

C. is the change in the speed of light as it travels

D. happens because light bounces from a surface

Which of these converts the reciprocating motion of the piston into rotary motion?

Answers

Answer:

The right approach is "Crankshaft".

Explanation:

Using the composite material gets converted this same reciprocating motion of such a piston to rotary motion. The connecting rod seems to be the intermediary between some of the piston and perhaps the crankshaft. Whenever the piston would be reciprocated from TDC instead to BDC, perhaps the crankshaft moves clockwise somewhere throughout the primary wheels Piston would be directly linked to the connecting rod to that same gudgeon pin as well as the crankshaft has been associated with the connecting rod to something like the crank.

If every company is now a technology company then what does this for every student attending a business college? Provide specific examples to support your example

Answers

Answer:

The fact that most companies today are tech companies is not an obstacle for people studying in business schools.

Thus, despite the fact that today's large companies, such as Microsoft, Tesla, Apple or Amazon dedicate themselves almost exclusively, or have their business base, to technology, a group of suitable professionals will always be necessary in the field of technology. economic and financial management of these companies, to avoid that they incur in bad business, bad investments, errors in the payment of taxes or problems of the same tenor.

ANSWER QUICKLY PLEASE

Fill in the blank to complete the sentence.
Binary Digit 1 0 0 0 0 0 1 1
Decimal Equivalent of Place Value 128 64 32 16 8 ? 2 1

A high level language like Python is converted to bytecode, and then binary when the program is executed. The missing place value is this binary number is _____

Answers

Explanation:

I don't know what is the question.

? should have the value of 4

binary digit 10000011 is equal to 128 plus 2 plus 1 = 131 in decimal

Binary Digit 1 0 0 0 0 0 1 1 Decimal Equivalent of Place Value 128 64 32 16 8 4 2 1. A high level language like Python is converted to byte code, and then binary when the program is executed. The missing place value is this binary number is 131 in decimal.

What is Binary digit?

The term “binary” refers to the smallest and minimum two-digit number stored on a computer device. The smallest binary codes are zero (0) and one (1). The use of storing numbers easily. The computer only understands the binary language. The binary is converted into the number system as a human language.

The Binary digit is 1 0 0 0 0 0 1 1

1 × [tex]2^{0}[/tex]  = 1 × 0 = 1

1 × [tex]2^{1}[/tex]  = 1 × 2 = 2

0 × [tex]2^{2}[/tex] = 0 × 4 = 0

0 × [tex]2^{3}[/tex] = 0 × 8=  0

0 × [tex]2^{4}[/tex] = 0 × 16 = 0

0 × [tex]2^{5}[/tex] = 0 × 32 = 0

0 × [tex]2^{6}[/tex] = 0 × 64 = 0

1 × [tex]2^{7}[/tex] = 1 × 128 = 128

1 + 2 + 128 = 131 in decimal

(1 0 0 0 0 0 1 1) = (131)

Hence, the significance of the Binary digit is aforementioned.

Learn more about on Binary digit, here:

https://brainly.com/question/11110720

#SPJ5

In a systems development life cycle (SDLC) model, the purpose of the _____ is to create a physical model that will satisfy all documented requirements for the system.

Answers

Answer:

systems design phase.

Explanation:

In a systems development life cycle (SDLC) model, the purpose of the systems design phase is to create a physical model that will satisfy all documented requirements for the system.

This ultimately implies that, that system design involves determining the overall system architecture, which is typically comprised of hardware, end users, physical processing components, software, and the communication channel that will effectively and efficiently satisfy the essential requirements of the system.

The system inputs and outputs will be designed along with a plan of the way the system's features will be navigated.

Basically, system design is divided into two groups;

I. Logical design.

II. Physical design.

The design of service systems is the process involved in planning, creating infrastructure, building communication, organizing staffs and standardization of a system so as to improve its quality and business relationships between the service provider and its clients. A characteristic that can be used to guide the design of service systems is to ensure services cannot be inventoried.

Access will place ________ around a text string within a query criteria that will limit the results to their exact specifications.

Answers

Answer: quotation marks (")

Explanation:

Quotation marks are put around a text string within a query criteria so that the results of the specifications are limited. We should note that the criteria is defined as the conditions which the users can set inside the query in order for them to get the records that they want to return.

In Python, when converting a string value into a numeric value that is a positive or negative whole number, the int() function is used.


True

False

Answers

Answer:

True

Explanation:

The Int  Variable can handle Positive and Negative Numbers, it just can't handle decimal numbers.

The statement "In Python, when converting a string value into a numeric value that is a positive or negative whole number, the int() function is used" is true.

What is python?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Python is a great programming language for experienced developers as well. It's one of the most widely used programming languages in the world, maybe as a result of how simple it is for novices to learn. Python is one of the most approachable programming languages due of its simple syntax and lack of complexity.

Therefore, the statement is true.

To learn more about python, refer to the link:

https://brainly.com/question/18502436

#SPJ5

What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV

Answers

Answer:

4G/5G.

Explanation:

The broadband cellular network technology that mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV is 4G/5G.

4G technology refers to the fourth generation broadband cellular network technology that is typically used for cellular communications on mobile phones and it is considered to have an internet speed that is ten times faster than what is obtainable on the third generation (3G) broadband technology.

Similarly, 5G is the fifth generation broadband cellular network technology that succeeded 4G and it offers higher quality in terms of performance, reliability, availability and efficiency.

As a result of the speed and high quality specifications of the 4G/5G broadband cellular network technology, they are widely used for various communications systems.

anybody got a quisten

Answers

Answer:

no why?

Explanation:

Write an application that displays the strings in the provided array alphabetically in ascending order.

Answers

Answer:

Explanation:

The following code is written in Python and it is a very simple function/program that takes in an array of strings as a parameter called names. This array is then passed the built-in sort function which automatically sorts it in ascending alphabetical order. Finally, the print method is called on the names array to print all of its elements out.

def sort_strings(names):

   names.sort()

   print(names)

A large population of Aloha users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in units of 40 msec.a. What is the chance of success on the first attempt at a given station?b. What is the probability of exactly k collisions (for k = 1, 2,...,10) followed by a success?c. What is the expected number of transmission attempts needed?

Answers

Answer:

a) 0.1353

b) attached below

c) 7.4

Explanation:

Frame transmission rate = 40 msec

Total load  requests = 50 requests /sec

hence

Total arrival rate G in Frames ( G ) / x secs

= 50 request/sec * X sec

= 50 * ( 40*10^-3 )

= 2 requests/ x sec

a) Determine chance of success on first attempt

0.1353

b) Determine the probability of exactly K collisions followed by a success

 attached below

c) what is the expected number of transmission attempts needed

7.4

My pc suddenly freezes and i can't open any apps or task manager. Apps do not open at all and if i restart from the start it gets stuck on restart forever. I have to force restart my pc a couple of times before it is back to normal. What is wrong?

Answers

Answer:

Explanation:

You might need a new computer or a new mother board

Write a python program that: - Defines a tuple of 5 integer numbers - prints the tuple - Appends a new value to the end of the tuple - prints the tuple again Please note that appending a new value to a tuple will change the tuple. However, as you learned in Unit 5, tuples are immutable i.e. do not change. Therefore, to solve this problem, you need to find a way to change a tuple.

Answers

Answer:

The program is as follows:

my_tuple = (1,2,3,4,5)

print(my_tuple)

mylist = list(my_tuple)

mylist.append(6)

my_tuple = tuple(mylist)

print(my_tuple)

Explanation:

This defines a tuple of 5 integers

my_tuple = (1,2,3,4,5)

This prints the tuple

print(my_tuple)

To add new element to the tuple; First, we convert it to list. This is done below

mylist = list(my_tuple)

Then, an item is appended to the list

mylist.append(6)

The list is then converted to tuple

my_tuple = tuple(mylist)

This prints the tuple

print(my_tuple)

What type of micro sd card is needed for this type of MP3 player? I tried searching it up and a bunch came up. I don’t know which one is the right one. Someone please help me <3

Answers

a regular micro sd, they offer different amounts of storage

True or False: One benefit of virtualization is that it allows for better use of already existing hardware that may not be seeing full utilization.

Answers

Answer:

True.

Explanation:

Virtualization can be defined as a technique used for the creation of a virtual platform such as a storage device, operating system, server, desktop, infrastructure or computing resources so as to enable the sharing of resources among multiple end users. Virtualization is usually implemented on a computer which is referred to as the "host" machine.

Generally, to use the virtualization technology on a computer, it must be enabled in the BIOS/UEFI).

Additionally, VMware tools can be installed on host computers to check which processes are having high CPU usage by using vimtop, as well as checking if vCenter Server is swapping.

Hence, one benefit of virtualization is that it allows for better use of already existing hardware that may not be seeing full utilization. Hardware components such as storage devices, central processing unit (CPU), random access memory (RAM), host computers are extensively put into use.

The following example demonstrates a program that uses 3 levels of nested dictionaries to create a simple music library. The following program uses nested dictionaries to store a small music library. Extend the program such that a user can add artists, albums, and songs to the library. First, add a command that adds an artist name to the music dictionary. Then add commands for adding albums and songs. Take care to check that an artist exists in the dictionary before adding an album, and that an album exists before adding a song.

music = {
'Pink Floyd': {
'The Dark Side of the Moon': {
'songs': [ 'Speak to Me', 'Breathe', 'On the Run', 'Money'],
'year': 1973,
'platinum': True
},
'The Wall': {
'songs': [ 'Another Brick in the Wall', 'Mother', 'Hey you'],
'year': 1979,
'platinum': True
}
},
'Justin Bieber': {
'My World':{
'songs': ['One Time', 'Bigger', 'Love Me'],
'year': 2010,
'platinum': True
}
}
}

#complete/edit code given below:

# Get user input

# While user input != 'exit'
# ...

Answers

Answer:

def add_album(artist,album):

   song_list = input("enter the list of song titles separated by comma: ").split(",")

   print(song_list)

   year = int(input("enter release year: "))

   is_platinum = bool(input("Is it platinum? True/False"))

   music[artist][album] = {}

   music[artist][album]['songs'] = song_list

   music[artist][album]['year'] = year

   music[artist][album]['platinum'] = is_platinum

def add_artist():

   artist = input("enter name of artist: ")

   if music.get(artist, "no") == "no":

       music[artist] = {}

       

   else:

       print("artist already exist in dictionary.")

   is_album = input("add album? ")

   if is_album == "yes":

       album_name = input("Enter album name: ")

       add_album(artist,album_name)

           

for _ in iter(dict, 0):

   is_exist = input("Do you want to end the program? yes/no: ")

   if is_exist == "yes":

       break

   elif is_exist == "no":

       is_art = input("Add artist? ")

       if is_art == "yes":

           add_artist()

       else:

           print("enter  yes/no")

   else:

       print("make a decision, yes/no")

Explanation:

The python program defines an "add_artist" and "add_album" function that references the dictionary "music". The functions prompt for user inputs of the artist name, album, year, and platinum record.

The functions use the bracket notation to access and update the dictionary in the memory.

g Let m be a positive integer with n -bit binary representation: What are the smallest and largest values that m could have?

Answers

Answer:

The smallest value that m could have is 0, while the largest is [tex]2^n - 1[/tex]

Explanation:

For numbers with n bits, we have that:

The minimum possible value is 0.

The maximum possible value is [tex]2^n - 1[/tex]

So, in this question, since the number m has n bits:

The smallest value that m could have is 0, while the largest is [tex]2^n - 1[/tex]

Write a function named is_sub_dict that accepts two dictionaries from strings to strings as its parameters and returns True if every key in the first dictionary is also contained in the second dictionary and maps to the same value in the second dictionary. For example, given the dictionaries below, map1 is a sub-dict of map2, so the call of is_sub_dict(map1, map2) would return True. The order of the parameters does matter, so the call of is_sub_dict(map2, map1) would return False.

Answers

def is_sub_dict(dict1, dict2):

   one = dict1.keys()

   two = dict2.keys()

   for x in one:

       if x in two:

           if dict1[x] == dict2[x]:

               pass

           else:

               return False

       else:

           return False

   return True

I wrote the code in python 3.8. I hope this helps.

What occurs during the mail merge process? Place the steps in the correct order.

Specify which records to

Insert merge fields.

Preview, print, or email the Connect to a data source.

Create the main

include

document

document


ANSWER:

1. creat the main document

2. connect to a data source

3. specify which records to include

4. insert merge fields

5. preview, print, or email the document

Answers

Answer:

1. Create the main document

2. Connect to a data source

3. Specify which records to include

4. Insert merge fields.

5. Preview, print, or email the document.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

The sequential steps of what occurs during the mail merge process are;

1. Create the main document

2. Connect to a data source

3. Specify which records to include

4. Insert merge fields.

5. Preview, print, or email the document.

Answer:

1.Create the main document

2.Connect to a data source

3.Specify which records to include.

4.Insert merge cells

5.Preview, print, or email the document.

Explanation:

Just did it on e2020

talon is a new game designer working on an exciting and innovative game idea, but its time to examine the idea for technical feasibility. what ? could Talon ask to determine the technical feasibility


a. Are there people who would buy your game? Are stores willing to sell it?


b. can this idea be technically achieved? Wil it work the limitations of hardware and programming resources?


c. Does the game do something new that will pique people interests?


d. Am i having tons of fun while playing this game?

Answers

A Because if no one will sell it, it will be pointless so if people sell it and buy it, it will be best so A

Are there people who would buy your game? Are stores willing to sell it? Talon asks to determine the technical feasibility Thus, option A is correct.

What is Technical feasibility?

Technical feasibility assesses the expert program's complexities and frequently entails figuring out whether it is able to use cutting-edge methods and instruments.

The analysis examines the viability of a project's four components: Scientific: A list of the necessary hardware, software, and manpower to render their function. Finance: A projection of the development's total cost and predicted return.

The time has come to assess the project's technological viability. Talon is a new coder who is working on an interesting and original gaming idea. Because it will be useless if no one buys it and no one sells it.

Therefore, option A is the correct option.

Learn more about Technical feasibility, here:

https://brainly.com/question/14208774

#SPJ2

Maria wants to create a simple logo for her new flower shop. She would like to use the computer to create this logo. Maria should use a machine diagramming software CAD ​

Answers

Answer:

graphics software

Explanation:

Maria should use a graphics software

In case of a suspected data breach, what course of action should a chief information security officer (CISO) take

Answers

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

Which command is used to copy entire folder structures between volumes or across a network while maintaining all NTFS file permissions and attributes

Answers

Answer:

Robocopy

Explanation:

The newer and most used command to accomplish this is Robocopy. This code does exactly what is described in the question, it copies the entire structure of the volume in question but still maintains all of its permissions and attributes. It also allows you to copy large datasets at an extremely fast speed, roughly 150 MB/sec. Robocopy can even resume interrupted file transfers without loss of data.

Open & Place is used to insert the image in the same file. is it true or false?

Answers

it is true because it’s just the way i insert an image on a file i don’t know what other way to explain it

1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch can send unicast traffic to a specific port

Answers

Answer:

The switch sends broadcast traffic to all ports like a hub to get the number of ports used and build its MAC address table.

Explanation:

A network switch is a device used in a LAN to connect all available workstations. Unlike a network hub, it is able to send frames from a host or workstation to another using its MAC address table.

An example of a switch is the Cisco 2950 switch. When it is first turned on, it acts as a hub, broadcasting traffic to all its ports. This process is used to create a MAC address table to get the IP address of workstations and the ports they relate to, enabling it to send unicast traffic to a specific port.

Other Questions
I have a small paper to write on the "What is the mystery of Nazca Lines?" and I was wondering if what I have wrote is enough, I'm open for anymore ideas for my paper.After doing some research on the Nazca Lines I have found that they are these enormous geoglyphs that are etched into a roughly 200-square-mile stretch in the desert, they were created by the created somewhere between the 4th century B.C. and the 10th century A.D. by a group called the pre-Inca. These Lines are located in the deserts in Peru, between the Inca Valley and the Nazca Valley, and the Lines were discovered in 1927. There are some people that dont believe that the Nazca Lines are real, but according to a Japanese Archaeological team, they have reports that state that they have correctly identified some of the glyphs, that some of them are non-native birds. The Nazca Lines have the nickname Eighth Wonder of the World, and they are some back stories about that name. Many people think that the lines were made by aliens or some other non-human because there is also a biomorph called the astronaut, which is a human figure with a bulbous head in a space suit. There have been reasons and other things that many people think the lines just showed up, but then there are other people who are saying it has to do with the sun and moon rise on important holidays, so it's like a big calendar. They think that the geoglyphs were to represent earthly constellations like the ones in the sky at night. But however, in more recent years, people and scientists are beginning to doubt the meaning that people have had for the lines and that they arent tied to celestial happenings. A census helps the CPI in what way?a. It shows who will be unemployed next yearb. It shows which citizens will use the stock market.c. It shows the purchasing history of citizens by year.d. It shows the educational level of citizens. how do chromosomes relate to heredity? Within the water cycles, where do individual water molecules reside the longest? in the ocean in shallow groundwater in deep groundwater in the atmosphere PLS ANSWER FAST!!!!How did the native cultures affect the politics of this region? A: They demanded that American settlers return their lands. B: They helped Mexican soldiers find routes into Texas. C: They prevented American settlers from moving to Texas. D: They weakened Mexico's hold on Texas and other territories. How did the Enlightenment lead to the English Civil War? Please i need this asap!! what made american colonial societies different from european societies What lengths of two sides of a triangle are seven and 11. Which could not be the length of the third side?a. 19b. 10c. 12d. 5 How would the Anti-Federalist have responded to the gun control argument if they were alive today?NEED ASAP What is the circumference of this circle? The area of a trapezium is 550 cm2 and the length of the parallel sides is 23cm and 27cm, find the distance between them. Which of the following is a characteristic science? 1) which is not an example of a food rich in protein?1 lean meat 2 eggs 3 fish 4 potato who were the presidents who have taken the oath of office outside of Washington, d.c. How many 1 1/2 -pound loaves of bread can be made from 9 pounds of dough? Which equation shows the zero property of multiplication A. 40=0B. 9+9+9=39C. 36=63D. 51=1 Number 1. Write an Equation for this situation Amanda is training for a marathon she sets the pace so that every mile takes eight minutes. Write an equation for the amount of time, t, it takes her to run m miles number 2. Write an equation for this situation bars of chocolate sell for $2.50 each. Write an equation to show how much money, d, it costs to buy x, number of chocolate bars please help! 1.) which is an impact that television, internet and social media has all had on american society? A) they have all led to an overall decrease in information and knowledge among citizensB) they widley spread ideas that have created common culture and social normsC) these innovations contributed to america becoming a capatilaist societyD) companies associated with these industries account for 80% of the jobs in america Please help on a time limt!! How do I find out the exact solutions and approximate solutions?