Q1: Write a program that asks the user to type 5 integers and writes the average of the 5
integers. This program can use only 2 variables.

Answers

Answer 1

The following java program will be:
import Java.util*

public class Average{

public static void main(String [] args){

int sum = 0;

int numbers = 0;

for(int i = 0; i < 5; i++){

Scanner sc = new Scanner(System.in);

System.out.println(“Please enter your integers: “);

numbers = sc.nextInt();

sum += numbers;

}

System.out.println(“The average is: “ + sum/5)”

}

}

What is java?

Java is a high-level, class-based, object-oriented programming language with a low number of implementation dependencies. It is a general-purpose programming language designed to allow programmers to write once and run anywhere (WORA), which means that compiled Java code can run on any platform that supports Java without the need for recompilation. Java applications are often compiled to bytecode that can run on any Java virtual machine (JVM), regardless of computer architecture.

To learn more about Java from this link
https://brainly.com/question/19271625

#SPJ13


Related Questions

how many comparison will the algorithm need to determine the valu 67 is in the array

Answers

The maximum and minimum. The procedure requires exactly 3n/2-2 comparisons to identify min and max if n is a power of 2. It will take a few more steps if it is not a power of 2. (not significant).

What is the algorithm need to determine in the array?

The fundamental operations that an array supports are listed below. Print each array element in a traversal operation Insertion: Adds a new element to the provided array at the given index.

Deletes the element at the specified index. Use the provided index or value to search for an element.

Therefore, An array is used to group together several instances of the same type of data.

Learn more about algorithm here:

https://brainly.com/question/13851399

#SPJ1

Which of the following might a technical review board (TRB) identify? requirements, job tasks, and roles and responsibilities

risks or issues in the implementation plan

the statement of work for the implementation plan

allocation of resources in the implementation plan​

Answers

All the items listed as Requirements, job tasks, roles and responsibilities will be assessed during Technical Review Board(TRB).

What is Technical Review Board(TRB)?

The dedicated review process for a supplier that is in charge of the quality management program's implementation, the upkeep of all qualified and certified processes, process change management, reliability data analysis, failure analysis, device recall procedures, and the technology's qualification status.

What is the role of Quality Management?

Monitoring various organisational processes and tasks to guarantee that the goods and services provided, as well as the methods employed to deliver them, are consistent is known as quality management.

Requirements, Job Tasks, roles and Implementation are assessed by Technical Review Board(TRB).

Hence, all the given are assessed.

To learn more about the Quality Management from the given link

https://brainly.com/question/7498492

#SPJ9

What is Apple’s slogan?

Answers

Answer:

"think different"

Explanation:

Think Different” is one of the most recognizable slogans of the 21st Century. The idea was first introduced in the 1997 TV commercial. “Think Different” is still on Apple products today, 23 years after the TV debut. Crazy Ones is hands-down one of the best one-minute commercials in history.

Explanation:Apple: 'Think Different.'

Why would a developer use a mood board in the Design step of the game
development cycle?

OA. To gather inspiration for a game's artwork
OB. To include specific details about a program
OC. To identify key points and scenarios in a program
OD. To outline the logic of a program

Answers

The developer use a mood board in the Design step of the game development cycle is to include specific details about a program.

What is meant by game development cycle?

Pre-production, production, quality control, launch, and post-production maintenance are the five key stages of the game development process.

A game's three development phases. Pre-production, production, and post-production are the common stages of video game development.

Game development, also known as "gamedev," is the process of making a game. Even while some games have only been developed by one or two game developers, the game creation process normally includes input from one or more game designers, artists, programmers, animators, testers, project managers, etc.

Video game designers help make a game's vision . To achieve this, they programme features, code visual elements, and test iterations until a game is ready for sale.

To learn more about game development cycle refer to :

https://brainly.com/question/28808209

#SPJ1

Consider the following code segment.
if (false && true || false)
{
if (false || true && false)
{
System.out.print(""First"");
}
else
{
System.out.print(""Second"");
}
}

if (true || true && false)
{
System.out.print(""Third"");
}

What is printed as a result of executing the code segment?
A First
B Second
C Third
D FirstThird
E SecondThird

Answers

The third is printed as a result of executing the code segment. The correct option is C.

What are code segments?

Code segments are sections of a larger program or code that have been cut out. A code segment in computing is a section of an object file or the corresponding area of the virtual address space of the program that contains executable instructions.

It is also referred to as a text segment or simply as text. An executable segment whose conforming bit is set in the descriptor, It allows sharing of procedures that should run at the privilege level of the calling procedure but may be called from different privilege levels.

Therefore, the correct option is C. Third.

To learn more about code segments, refer to the link:

https://brainly.com/question/27008715

#SPJ1

When a company monitors their workers through the use of technology, they should do all of the following except:
Require workers to complete additional tasks.
Ensure monitoring is meaningful to the organization's mission.
Inform employees when and what is being monitored.
Capture qualitative inputs in addition to quantitative data.
Consider the privacy rights of individuals

Answers

When a company monitors their workers through the use of technology, they should do all of the following except Option A: Require workers to complete additional tasks.

How are employees monitored by businesses?

A lot of businesses are known to merely use monitoring software to keep track of their workers' work information, including their working hours, the amount of time they spend on tasks, whether they spend a lot of time sending social media messages, and other general data collection that enables them to enhance the workers' workflow.

Therefore, one can say that  Systems for tracking as well as for overseeing employees also fulfill other crucial functions. Their major objectives are to stop internal theft, assess staff productivity, check on the efficient use of business resources, and gather proof in case of future legal action.

Learn more about monitoring from

https://brainly.com/question/24112284
#SPJ1

Will Forza Horizon 5 be on a game pass?

Answers

Answer:

probably

Explanation:

Recently, from around june through september 2022, a social engineering campaign, attributed to a nation-state group, has been utilizing trojan versions of open-source software during their attack chain to achieve backdoor access. What is the commonly attributed name of the threat actor and an example of one of the open-source software that they have trojanized?.

Answers

The commonly attributed name of the threat actor is called ZINC. A wide range of social engineering campaigns using weaponized legitimate open-source software by an actor tracked as ZINC.

ZINC weaponizing a wide range of open-source software including PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and muPDF/Subliminal Recording software installer for these attacks.

Who is ZINC?

ZINC is a nation-state activity group that is highly operational, destructive, and sophisticated. Active since 2009, the activity group gained public attention in 2014 after a successful attack on Sony Pictures Entertainment. ZINC is known to employ a number of custom remote access tools (RATs), including those identified by Microsoft as FoggyBrass and PhantomStar.

ZINC seeks to coerce employees of companies it is attempting to infiltrate into installing seemingly benign programs or opening weaponized documents containing malicious macros.

To know more about Open Source Software(OSS), visit: https://brainly.com/question/4593389

#SPJ4

Which of these is an example of a vertical standard? Please select all that apply. Excavation workers must be protected from cave-ins. When welding, a fire watch must be maintained for 30 minutes past the time of welding. Ladders must always extend three feet past the working surface. An iron worker is placing steel 30 feet up and is wearing a full body harness tied off to an anchor point with a lanyard. PPE is required to protect against face, hand, and eye injuries.

Answers

An example of a vertical standard (that is specific safety standard) from the list are:

Excavation workers must be protected from cave-ins. (Option A)When welding, a fire watch must be maintained for 30 minutes past the time of welding. (Option B)An ironworker is placing steel 30 feet up and is wearing a full body harness tied off to an anchor point with a lanyard (Option D)
What is a Vertical Standard?

The majority of OSHA rules are horizontal in nature. That is, they apply to all employers, regardless of industry.

However, several OSHA requirements are vertical in nature. This indicates that they only apply to a single industry.

Vertical standards are applicable to certain industries or activities, procedures, situations, processes, means, techniques, equipment, or installations.

Vertical OSHA guidelines include the following:

OSHA's Construction Standards from 1926OSHA's Shipyard Standards from 1915OSHA 1910 Subpart R Special Businesses Regulations apply to pulp, paper, and paperboard mills, textile mills, sawmills, and other industries.

Learn more about safety standards:
https://brainly.com/question/15371083
#SPJ1

JAVA Prompt #2: Given an array of Strings called paint Colors, paint a line in the direction that a Painter
picasso is facing until it reaches a barrier. Paint the line in the color stored as the second element of
paintColors.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that  Given an array of Strings called paint Colors, paint a line in the direction that a Painter picasso is facing until it reaches a barrier.

Writting the code:

public ColorsPane(PaintPane paintPane) {

           add(new JButton(new ColorAction(paintPane, "Red", Color.RED)));

           add(new JButton(new ColorAction(paintPane, "Green", Color.GREEN)));

           add(new JButton(new ColorAction(paintPane, "Blue", Color.BLUE)));

       }

       public class ColorAction extends AbstractAction {

           private PaintPane paintPane;

           private Color color;

           private ColorAction(PaintPane paintPane, String name, Color color) {

               putValue(NAME, name);

               this.paintPane = paintPane;

               this.color = color;

           }

See more about JAVA at brainly.com/question/12975450

#SPJ1

How many parameters does the result function accept?

A. 1
OB. 0
OC. 2
OD. 4

Answers

Two parameters the function should contain to get a result in a correct way

What is a function?

A set of inputs including one output per input is referred to as a function. A function, put simply, is a relationship among inputs where each input has exactly one output. Each function has a range or codomain and a domain.

Simply put, a function is a "chunk" of code that you'll use once rather than writing it out repeatedly. Programmers could use functions to divide a problem into smaller, more manageable chunks, of which each performs a particular function.

Hence to conclude that the 2 parameters are required for the function to get the result
To know more on functions follow this link
https://brainly.com/question/21725666
#SPJ1

Modular design would be least beneficial for a programmer creating which
type of game?

OA. A game that might have errors in its code
B. A completely unique game
C. An extremely simple game
D. A game with many different parts

Answers

Answer: c

Explanation: An extremely simple game play

Which action is an example of an event?

A. A button is pressed.
OB. The "Game Over" screen is displayed.
OC. A coin is collected.
OD. A sprite changes color.

Answers

If a button is pressed then it is considered an event

What are events and actions?

When a user clicks on an element, the click event occurs.

An Event is defined as a change in the state of an object. In HTML, there are various events that represent some activity performed by the user or the browser. When javascript code is included in HTML, js reacts to these events and allows execution. This process of reacting to events is known as Event Handling. Thus, js handles HTML events using Event Handlers.

For example, when a user clicks on the browser, add js code that will execute the task to be performed on the event.

Hence to conclude all the CTA buttons are events

To know more on actions and events follow this link:

https://brainly.com/question/28805846

#SPJ1

ans as fast as u can important

Answers

1) User-generated content :

User-generated content, also referred to as UGC or consumer-generated content, is unique content created by customers specifically for a brand and shared on social media or through other channels. UGC can take many different forms, such as pictures, movies, reviews, a recommendation, or even a podcast.

2)Open Chrome on your Android device.

Reopen the tab.

Tap Settings next to "Discover." Switch on or off.

3)The speed at which the content on your page loads is referred to as page speed.

Site speed, which is the page speed for a representative sample of page views on a site, is frequently mistaken for page speed. Page speed can be measured in terms of "time to first byte" or "page load time," which measures how long it takes for a page to fully display its content.

Hence I believe i have answered all questions

To know more on page speed follow this link

https://brainly.com/question/26339742

#SPJ9

Which of the following protocols support VLSM, summarization, and discontiguous networking? (Choose three.) A. RIPv1 B. IGRP C. EIGRP D. OSPF E. ВСР F. RIPv2

Answers

The one that supports VLSM, summarization, and discontinuous networking are EIGRP, OSPF, and RIPv2. The correct options are C, D, and F.

What is VLSM?

Variable Length Subnet Mask (VLSM) is a segmented subnet of a larger network design strategy in which all subnet masks can be of varying sizes.

This "subnetting subnets" process allows network engineers to use different masks for subnetworks of a single class A, B, or C network.

EIGRP, OSPF, and RIPv2 are the ones that support VLSM, summarization, and discontinuous networking.

Thus, the correct options are C, D, and F.

For more details regarding VLSM, visit:

https://brainly.com/question/29388644

#SPJ1

which of the following can be classified as data reduction techniques? a. cluster analysis b. sampling c. data visualization d. none of the above

Answers

The option that can be regarded as data reduction technique is "Cluster Analysis" (Option A)

What is Cluster Analysis?

Cluster analysis, often known as clustering, is the job of grouping a set of items so that those in the same group are more comparable to those in other groups.

It should be noted that clustering analysis is widely employed in a variety of applications, including market research, pattern matching, data analysis, and image analysis.

Clustering can also assist marketers in identifying unique groupings within their client base. They can also describe their consumer groups depending on their purchase habits.

Learn more about Data Reduction techniques:
https://brainly.com/question/28265384

#SPJ1

Most networks are homogeneous;that is,they support computers running a wide variety of operating systems.
True
False

Answers

Most networks are homogeneous, that is they support computers running a wide variety of operating systems is false.

What are operating systems?

Operating systems are defined as the program that controls all other application programs in a computer after being loaded into it by a boot program. Essential features for controlling devices linked to a computer are provided by operating systems.

One of Network Operating System's (NOS) most important aspects is the directory service it offers. A network device that is not mentioned in a network profile cannot be accessed by another network device. Support for multiprocessing, hardware identification, and fundamental operating system features including processor and protocol support.

Thus, most networks are homogeneous, that is they support computers running a wide variety of operating systems is false.

To learn more about operating systems, refer to the link below:

https://brainly.com/question/6689423

#SPJ1

When a school has a faculty with varying levels of technology adoption and knowledge, what can they do within the school to help support others with using online classroom tools?
Run workshops led by teachers to increase the level of technology proficiency for less-skilled teachers
Remove less-skilled teachers from teaching roles until they have achieved a desired level of technology proficiency
Enforce an in-school teacher training curriculum with an exam to ensure all teaching staff have reached a desired level of technology proficiency
Send less-skilled teachers to basic computer training sessions provided by the local education authority
Identify coaches and mentors to work with those less comfortable with online technology

Answers

Answer:

Technology is the worst vote if agreed

Answer:When a school has a faculty with varying levels of technology adoption and knowledge, what can they do within the school to help support others with using online classroom tools?

Explanation:

Imagine that you are a digital media professional working on a team of a dozen people to create a social media marketing campaign. Which technology would you choose to use to communicate with your team? Why would you choose it?

Answers

If I were a digital media professional working on a team of a dozen people to create a social media marketing campaign. The technology that I would you choose to use to communicate with my team  are:

Go ogle MeetZoomEmail

What other kind of technology do you employ for human interaction?

The four main forms of communication technology—telephone, radio, television, and internet—have all made it simpler to deliver messages.

Speaking face-to-face tech without having to be in one office are: Go ogle Meet, Zoom, etc.

Note that You still need to spend money on a video conferencing product even if most of your team's work is done in person. These solutions allow your team to collaborate even when they are not in the same location and are often more efficient than phone calls.

Learn more about digital media from

https://brainly.com/question/26174462

#SPJ1

random number guessing game. write a program

Answers

The  code for a random number guessing game in Phyton is given as as follows:

import random

import math

# Taking Inputs

lower = int(input("Enter Lower bound:- "))

# Taking Inputs

upper = int(input("Enter Upper bound:- "))

# generating random number between

# the lower and upper

x = random.randint(lower, upper)

print("\n\tYou've only ",

      round(math.log(upper - lower + 1, 2)),

     " chances to guess the integer!\n")

# Initializing the number of guesses.

count = 0

# for calculation of minimum number of

# guesses depends upon range

while count < math.log(upper - lower + 1, 2):

   count += 1

   # taking guessing number as input

   guess = int(input("Guess a number:- "))

   # Condition testing

   if x == guess:

       print("Congratulations you did it in ",

             count, " try")

       # Once guessed, loop will break

       break

   elif x > guess:

       print("You guessed too small!")

   elif x < guess:

       print("You Guessed too high!")

# If Guessing is more than required guesses,

# shows this output.

if count >= math.log(upper - lower + 1, 2):

   print("\nThe number is %d" % x)

   print("\tBetter Luck Next time!")

How does the above code work?

The user enters the range's bottom and upper bounds.

The compiler chooses a random integer from the range and stores it in a variable for future use.

A whileLoop will be set up for repetitive guessing.

If the user guesses a number that is bigger than a randomly chosen number, the user receives the message "Try Again! You guessed too high."

Else If the user guesses a number that is less than a randomly chosen number, the user receives the message "Try Again!" "You guessed incorrectly."

And if the user correctly guesses in a certain number of guesses, the user receives a "Congratulations!" output.

Otherwise, if the user does not correctly estimate the integer in the allotted number of guesses, he or she will receive the message "Better Luck Next Time!"

Learn more about codes;
https://brainly.com/question/29099843
#SPJ1

Imagine that you were looking to hire a digital media professional. What would you look for in their resume?

Answers

If I were looking to hire a digital media professional, the things that I will look for in their resume are:

HARD SKILLS

Face book AdsGo ogle AdwordsEmail MarketingDynamic AdsGo ogle Analytics

SOFT SKILLS

CommunicationCreative problem solvingAnalytical thinkingInfluencingTeam work

For digital marketing, why should I engage you?

The response a person should give is that "I work really hard and pick things up quickly, so I can easily shape myself into the desired shape. As a digital marketing professional, I can easily comprehend and put processes into practice thanks to my strong grasping ability. ”

The abilities that are required to work in digital marketing are:  Data analysis, content creation, SEO & SEM, CRM, communication skills, and social media are all examples of skills.

Learn more about resume from

https://brainly.com/question/14178136
#SPJ1

what is the use of studying automata theory?

Answers

Answer:

Explanation:

the word automata comes from a Greek word which means 'self - acting'. it is the study of making abstract machines to solve computational problems. the use of studying theory of automata is hands on practice of making machines which consists of states and transitions and works on input symbols as arguments for taking the next transition to move into the next state. Studying automata theory helps us to understand the working and functionality of compiler construction, parsing, artificial intelligence as well as formal verification.

What are Forza Horizon 5 credits?

Answers

Forza Horizon 5 credits  is One of the top X box One games, Forza Horizon 5, uses credits as its in-game cash. These enable you to purchase anything, including homes, vehicles, music, and apparel. You'll need a lot of the green stuff to feed your love because the game has a massive collection of over 700 cars.

What is the game about?

Similar to earlier games in the series, credits are significant in Forza Horizon 5 because they are the primary means by which players may purchase the newest vehicles.

Note that Forza Horizon 5 Credits, as the name implies, are the name of the in-game money in the most recent Forza game. The largest map in Forza Horizon 5 is based on a fictitious representation of Mexico.

Learn more about gaming from

https://brainly.com/question/28031867
#SPJ1

MAKE A LIST OF 10 PROJECTS IN AI WITH SPECIAL EMPHASIS ON CV AND NLP​

Answers

Answer:Sentiment analysis for marketing, Toxic comment classification, Language identification, Predict closed questions on Stack Overflow, Create text summarizer, Document Similarity (Quora question pair similarity), Paraphrase detection task, Generating research papers titles, Translate and summarize news, RESTful API for similarity check

Explanation:

the programming language is for visual basic

Answers

A code segment that displays a menu of three food items along with a quit
option
while True:
   print("Please choose one of the following options:")
   print("1. Pizza")
   print("2. Chicken")
   print("3. Salad")
   print("4. Quit")
   choice = input("Enter your choice: "

What is code segment?
A code segment, sometimes referred to as a text segment or just text in the computing world, is a section of a computer file that is made up of object code or an equivalent section of the program's address space which contains information about executable commands and directives. When a programme is processed and run, it is often saved in an object-code-based computer file. The code segment is on of the object file's divisions. When the programme is loaded into memory by the loader so that it might be executed and implemented, various memory segments are assigned for a specific use, just as they are for segments in object code-based computer files and segments that are only needed during run time when the programme is being executed.

To learn more about code segment
https://brainly.com/question/25781514
#SPJ13

What is the key feature of mixed reality?

Answers

Answer:

Awareness of the Real-World Surroundings .

3D Objects

User Friendliness

Surrounding Audio

Respective Positioning

The key feature of Mixed Reality is the content detects and interacts with the environment. The correct option is 3.

What is Mixed Reality?

A new kind of immersive experience is produced by the technology known as mixed reality (MR), which combines aspects of virtual reality (VR) and augmented reality (AR).

MR offers more versatility than VR and a more seamless merging of the real and virtual worlds than AR.

In order to create an immersive experience where the digital material is connected to the real world and reacts to the surroundings, Mixed Reality (MR) blends virtual and real-world aspects.

In other words, MR is created to give people the ability to engage with digital content that is superimposed on the real environment while still feeling present in it.

Thus, the correct option is 3.

For more details regarding mixed reality, visit:

https://brainly.com/question/22621708

#SPJ2

Your question seems incomplete, the probable complete question is:

What is a key feature of Mixed Reality?

It has an interactive visor that only shows 2D information.The content is always visible to the user view.The content detects and interacts with the environment.It has a headset that completely replaces the real-world view.

the question involves the draw class which is used to draw line segments and squares on a 10-by-10 xy coordinate grid

Answers

The upper left corner of the square is located at the coordinate (x, y). The sides of the square will be of length len, or as large as will fit on the grid.

What is coordinate grid?

Two parallel lines, known as axes (pronounced AX-eez), that are perpendicular to each other make up a coordinate grid. Typically, the term "x-axis" refers to the horizontal axis. The y-axis is the common name for the vertical axis. The origin is the location where the x- and y-axes Draw is a public class. /** Prerequisite: All variables range from 0 to 10, inclusive. Creates a line segment in a grid of 10 by 10 x-y coordinates. Drawing the line segment from (x1, y1) to (x2, y2).

public void draw

Line(int x1, int y1, int x2, int y2): //** implementation not disclosed / Prerequisites include len > 0 and 0 x 10, respectively. Creates a square with a side length and size of 10 by 10 on an x-y coordinate grid. The square's upper left corner is going to be at coordinates (x, y), and its side length is going to be len (or as large as will fit in the grid).

public void draw

Square (*to be implemented*): int x, int y, and int lengthintersect.

The coordinates (x1, y1) and (x2, y2) are used to construct a line segment using the drawLine method, whose implementation is not displayed (x2, y2). For instance, use the drawLine(2, 5, 6, 4) call.

You will create the method drawSquare, which outputs the side length and area of the drawn square in the examples' format and draws a square on a 10-by-10 grid. The coordinates for the square's upper left corner are: (x, y).

To learn more about coordinate grid refer to:

https://brainly.com/question/20362114

#SPJ1

Why is it important to get files names that are destructive of their contacts?

Answers

Answer: So that you know how to locate them easily

Explanation:

How does IoT and mobile app development transform the future of UX?

Answers

The internet of things and mobile app development transform the future of UX by the fact that these directly connect with physical objects and turn mobile apps into full-fledged remotes that can runnel with virtually any fasten or connected machine anywhere in the world.

What do you mean by the Internet of things?

The Internet of things may be defined as a type of technology that significantly made alterations by discriminating digital applications and software in all proportions of life. It is the next outfit of digital development for businesses.

According to the context of this question, IoT devices are produced in order to collect data, the prerequisite for a UI may not always be needed, but the developers cannot dilapidate the UX of the application.

IoT has a significant influence on mobile application design and development and UX for both customer-focused products and enterprise IoT apps. Developers must modifies the UX in order to elaborate enterprise use cases.

To learn more about Mobile app development, refer to the link:

https://brainly.com/question/22082285

#SPJ1

What is the commonly attributed name of the threat actor and an example of one of the open-source software that they have trojanized?.

Answers

The threat actor is frequently referred to by the name ZINC. a variety of social engineering campaigns by an actor known as ZINC that weaponized legitimate open-source software.

PuTTY, KiTTY, TightVNC, Sumatra PDF Reader, and the installer for the muPDF/Subliminal Recording software are just a few examples of the open-source programs that ZINC has weaponized for these attacks.

What is this ZINC?

ZINC is a highly effective, destructive, and sophisticated nation-state activity group. The activity group, which has been going since 2009, came to the attention of the public in 2014 after a successful attack on Sony Pictures Entertainment. It is well known that ZINC uses a variety of specialized remote access tools (RATs), such as PhantomStar and FoggyBrass, which were named by Microsoft.

ZINC tries to force employees of the companies it is trying to infiltrate to open weaponized documents with malicious macros or install seemingly innocent programs.

To learn about Open Source Software(OSS), visit: brainly.com/question/4593389

#SPJ4

Other Questions
what is the role of sulfuric acid in the reaction? b) (1 point) why is the mixture extracted with sodium bicarbonate? your answer should include a chemical equation to explain why gas bubbles are observed and identify the gas. c) (1 point) what is brine and why is it used? Which linear function is graphed on the grid?A g(x)=15x-6g(x) = 5x +45g(x)=x-6g(x) = 5x +451 2 3 4 5 6 7 8 9 what cells were chloroplast present in? what did they look like in the various cells? be specific.use complete sentences. Based on the graph, what conclusion can be drawn about the US economy?The economy suffered a setback in 2009 before rebounding in 2011.The economy suffered a setback in 2009 before rebounding in 2010.The economy suffered a setback in 2009 and had not recovered by 2011.The economy suffered setbacks in the years 2009, 2010, and 2011. which of the following represents errors made by both fieldworkers and respondents? intentional and unintentional errors purposeful and non-purposeful errors voluntary and involuntary errors conscious and unconscious errors Consider this statement: Car dealerships make more money on financing than they do on the car. What does that tell you about the value of financing? Who wins and who loses when a car is financed? Why? Which set of ethics codes emphasizes preventing unlawful behavior by increasing control and penalizing wrongdoers?. Mia walks to work on the busy city sidewalks. As she walks many men make crude comments about her appearance. Mia greatly dislikes these experiences and does not want this type of treatment. This scenario is one example of gender discrimination, specifically known as what?. during which stage of translation does mrna join with trna and two ribosomal subunits? a. termination b. elongation c. initiation d. staging e. promotion Using the distributive property, an expression is equivalent to 20+30 what volume of 0.0700 m phosphoric acid is required to neitralize 20.0 ml of .105 m potassium hydroxide which action by the nurse would be a priority for preventing the most common complications of intravenous acyclovir therapy? What is the de broglie wavelength (in meters) of a 148 g baseball thrown at a velocity of 35. 1 meters per second?. What components make up a metropolitan area? What is the l and w if the area is 32 and the perimeter is 24 Bilquis has x dimes and y nickels. She has at least 15 coins worth no more than $1 combined. Solve this system of inequalities graphically and determine one possible solution. is going to invest $820 and leave it in an account for 19 years. Assuming the interest is compounded quarterly, what interest rate, to the nearest tenth of a percent, would be required in order for John to end up with $1,830? What is the u. S. Federal communication commissions role in regard to internet access?. Sometimes people want to take what others have. Throughout history, more powerful countries have often taken control of less powerful countries in order to seize their lands and natural resources. These powerful countries often justify, or make excuses for, these actions by explaining that they will be able to use the land and resources more effectively. But do those reasons justify the use of force? Outline one reason why managing transport is important for urban sustainability.