Write a function call using print_sum() to print the sum of x and 400 (providing the arguments in that order).

Answers

Answer 1

A function call utilizing print-sum to print the sum of x and 400 is

print-sum(x, 400)

What is sum, exactly?A summation, also known as a sum, is the outcome of adding two or more numbers or quantities. There are always an even number of terms in a summation. There could be only two terms, or there could be one hundred, thousand, or a million. There are summations with an infinite number of terms. SUM Single User Monitor is its full form. The idea of the sum of four stresses the notion that there are numerous—if not infinite—ways to achieve particular outcomes, objectives, aspirations, or locations. To total the numbers, choose a cell next to them, choose AutoSum from the Home menu, and then press Enter.

To learn more SUM, refer to:

https://brainly.com/question/20203147

#SPJ4


Related Questions

A file name extension provides what information about a file?
the file format
the file length
the file permissions
the file creation date

Answers

A file name extension provides this information about a file: A. the file format.

What is a file?

A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.

In Computer technology, a sequence which best reflects the size of various files and their extension on a computer system, from smallest to largest is:

Text (.txt)Compressed files (.zip)Picture (.jpeg)Audio (.mp3)Video (.mp4)

In conclusion, we can reasonably infer and logically deduce that a file name extension generally provides file format information about a file.

Read more on file extensions here: brainly.com/question/1982059

#SPJ1

I request that it is done in C++. Giving 100 points. To find the number of 100 dollar bills, 20 dollar bills, 10 dollar bills, 5 dollar bills, 1 dollar bills, quarters, dimes, nickels, and pennies that will make up an amount entered by the user.


Sample Output:


Enter Amount: 489.98


The number of 100 dollar bills: 4

The number of 20 dollar bills: 4

The number of 10 dollar bills: 0

The number of 5 dollar bills: 1

The number of 1 dollar bills: 4

The number of Quarters: 3

The number of Dimes: 2

The number of Nickels: 0

The number of Pennies: 3

I have this so far.(look at attachment)

Answers

A program that finds the number of 100 dollar bills, 20 dollar bills, 10 dollar bills, 5 dollar bills, 1 dollar bills, quarters, dimes, nickels, and pennies that will make up an amount entered by the user.

The Program

#include<iostream>

using namespace std;

int main () {

    double bill=0.0, twenty=0.0, ten=0.0, five=0.0, one=0.0, quarter=0.0, dime=0.0, nickel=0.0, penny=0.0, payment=0.0, cashBack=0.0;

    // We need to gather a value for the bill.

    while (bill==0) {

    cout << "Please enter the amount of the bill (ex. $15.67): \n";

    cin >> bill;

    cout << "Your bill is "<< bill << ".\n";

    }

    do {

    cout << "Please pay for bill by entering \nthe count of each dollar bill denomination and coin denomination.\n";

    // Gathers an amount for each denomination and then gives it a value equal to its monetary value.

    cout << "\nTwenty dollar bills:"; cin >> twenty;

    twenty *= 20.00;

    cout << "\nTen dollar bills:"; cin >> ten;

    ten *= 10.00;

    cout << "\nFive dollar bills:"; cin >> five;

    five *= 5.00;

   cout << "\nOne dollar bills:"; cin >> one;

    one *= 1.00;

    cout << "\nQuarters:"; cin >> quarter;

    quarter *= .25;

    cout << "\nDimes:"; cin << dime;

    dime *= .10;

    cout << "\nNickels:"; cin >> nickel;

    nickel *= .05;

    cout << "\nPennies:"; cin >> penny;

    penny *= .01;

          // Add the money together and assign the value to payment.

          payment = twenty + ten + five + one + quarter + dime + nickel + penny;

          cout << "\nYour payment totals: $" << payment << "\n";

          if (payment < bill) {

                 cout << "\nYou didn't pay enough money to cover the bill. \nPlease re-enter your amount.\n";  

          // If payment isn't greater than bill then they're asked to reenter their money.

          }

          // Determine the amount of cash to give back and assign the value to cashBack.

                 cashBack = payment - bill;

          } while (cashBack <= 0);

    cout << "\nI owe you $" << cashBack <<"\n";

    // Reset the values of each denomination to 0

    twenty = 0;

    ten = 0;

    five = 0;

    one = 0;

    quarter = 0;

    dime = 0;

    nickel = 0;

    penny = 0;

    // These while loops will subtract the monetary value from cashBack and add a value of 1 each time it is looped.

    while (cashBack >= 20) {

    cashBack -= 20;

    twenty += 1;

    }

    while (cashBack >= 10) {

    cashBack -= 10;

    ten += 1;

    }

    while (cashBack >= 5) {

    cashBack -= 5;

    five += 1;

    }

    while (cashBack >= 1) {

    cashBack -= 1;

    one += 1;

    }

    while (cashBack >= .25) {

    cashBack -= .25;

    quarter += 1;

    }

    while (cashBack >= .10) {

    cashBack -= .10;

    dime += 1;

    }

    while (cashBack >= .05) {

    cashBack -= .05;

    dime += 1;

    }

    while (cashBack >= .01) {

    cashBack -= .01;

    penny += 1;

    }

    // For each denomination that has a value greater than 0, the person is payed back the amount.

    if  (twenty > 0) {

         cout << "\n" << twenty << " Twenty dollar bills.\n";

    }

    if  (ten > 0) {

          cout << "\n" << ten << " Ten dollar bills.\n";

    }

    if  (five > 0) {

          cout << "\n" << five << " Five dollar bills.\n";

    }

    if  (one > 0) {

          cout << "\n" << one << " One dollar bills.\n";

    }

    if  (quarter > 0) {

          cout << "\n" << quarter << " Quarters.\n";

    }

    if  (dime > 0) {

          cout << "\n" << dime << " Dimes.\n";

    }

    if  (nickel > 0) {

          cout << "\n" << nickel << " Nickels.\n";

    }

    if  (penny > 0) {

          cout << "\n" << penny << " Pennies.\n";

    }

}

Read more about C++ programming here:

https://brainly.com/question/20339175

#SPJ1

_______ functions are difficult to process without the key but easy to process when you have the key.

Answers

Functions that are difficult to process without the key but easy to process when you have the key are known as trapdoor functions. They are thought to be challenging to calculate in the opposite. They can only be computed in one direction.

The function may be thought of as a function whose evaluation in one way is simple but challenging in the opposite direction. Factorization of a product of two big primes is an illustration of a trapdoor function. They are common in public-key cryptography since they’re special case functions.

Follow the link below to learn on how trapdoors functions can be created

https://brainly.in/question/14505831

Write a while loop that divides usernum by 2 while usernum is greater than 1, displaying the result after each division. ex: for usernum = 40, output is: 20 10 5 2.5 1.25 0.625

Answers

import java.util.Scanner;

public class DivideIntoHalfLoop {

   public static void main (String [] args) {

      int userNum = 0;

      userNum = 40;

      while (userNum>=1) {

         System.out.print(userNum/2 +" ");

         userNum=userNum/2;

      }

      System.out.println("");

      return;

   }

}

Follow the link below to the difference between while loop and for loop

https://brainly.com/question/19344465

#SPJ4

write an algorithm to find square of even integers between 2 and 50​

Answers

It is the answer you can see in the picture.

It is right ?

Which of the following is the type of system that uses electrical signals sent through wires? = digital
= local loop
= analog
= microwave

Answers

Analog Data is the type of system that uses electrical signals sent through wires. Thus, option C is correct.

What are electrical signals?

Electrical signals can contain any quantity from a vast variety of possible values. These signals are often created with the help of the transmission of the signals that will help in conveying the message that is present.

Data that's also physically recorded is referred to as analog data. Analog information is kept on USB sticks, digital data is indeed a collection of distinct characters. Therefore, option C is the correct option.

Learn more about electrical signals, here:

https://brainly.com/question/20506284

#SPJ1

Would a "tree" and a "branch" be an example of a superclass and a subclass? Why or why not?

Answers

No, cause a tree isn't a superclass. It's just a tree and the branch has nothing to do with superclass or subclass

John wants to know the amount of ram memory installed on his computer. in which category of the windows 7 control panel can this information be found?

Answers

John can find the amount of Random Access Memory (RAM) memory installed on his computer with the Windows 7 under the category “System and Security” in the Control Panel.

To know the total amount of installed RAM through Control Panel in the computer with Windows 7, John should follow the steps as:

Click the Windows key Type Control Panel Click the category named “System and Security” Now under “System”, click “View amount of RAM and processor speed” “Device Specifications” section displays the amount of installed RAM in John’s computer

Thus, above are the steps by which John’s can find the amount of installed RAM in his Windows 7 computer’s Control Panel.

What is Random Access Memory (RAM)?

RAM is the temporary memory in computers that stores the data currently being used by the processor.

You can learn more about Control Panel at

https://brainly.com/question/1445737

#SPJ4

anyone who like memes? IG= mdkmdk1911

Answers

Answer:

I love them so much, they are the best

In which phase of the tuckman's model of team development does the least amount of work tend to get done?

Answers

In storming stage is the phase of the Tuckman's model of team development does the least amount of work tend to get done.

The most difficult and crucial phase to get through is storming. Conflict and rivalry are prevalent throughout this time as unique personalities start to develop. Due to the focus on ineffective tasks during this period, team performance may actually suffer. The team's goals may not be shared by all the members, and cliques and subgroups may form around influential people or areas of agreement.

Members must work to overcome challenges, accept individual differences, and resolve disagreements on team responsibilities and objectives in order to go through this stage.

Learn more about Tuckman's model https://brainly.com/question/14019770

#SPJ4

If you were to create a game, what genres would it be, and why? What would that game look like?

Answers

Answer:

According to me, I would go for an adventure type of game that is open world and maybe online (like play with friends around the world) and make it like it has ebdless possiblities and wouldn't end quickly. It would look realistic with 4k graphics and art

Which tab should you click if you want to add a caption for a picture or image in your Word document?

a. file
b. home
c. layout
d. references
e. mailings

Answers

Answer:

References

Explanation:

Karel starts off at the floor, but there is a ball up on a shelf. You need Karel to go to fetch the ball and bring it back to the start.

Karel should end up on back at the beginning with a ball on (1, 1).

Make sure to use at least 3 functions in your program!
I will give brainiest

Answers

An algorithm that can be used to

program dog

move dog up 4x

move dog right 1x

collect ball

move dog right 1x

move dog down 4x

move dog left 3x

end program

What is an Algorithm?

This refers to the process or set of rules to be followed to solve a problem in computing and programming.

Hence, we can see that An algorithm that can be used to

program dog

move dog up 4x

move dog right 1x

collect ball

move dog right 1x

move dog down 4x

move dog left 3x

end program

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

If the where clause contains multiple expressions to evaluate, you can use _____ to enforce the order in which the expressions must be evaluated.

Answers

If the “whereclause has multiple expressions to evaluate, parentheses can be used to enforce the order in which the expressions must be evaluated.

To enforce a specific order of expressions to be evaluated in SQL, parentheses can be used. The expressions enclosed in parentheses are always evaluated first. For example, to select all students in departments Computer Science and Information Technology who have CGPA greater than 3.6, it can be specified:

    WHERE    STcgpa > 3.6    AND   (STdept = ‘CS’  OR    STdept = ’IT’)

The parentheses determine the meaning of the evaluation of expressions. It means all rows are required that have a:

STdept value of CS or IT, and

STcgpa value greater than 3.6

In the above query expressions enclosed in parentheses are evaluated first and then the expression outside the parentheses is evaluated.

In case parentheses are not used, the result will be different as the evaluation order of the expressions changes.  

    WHERE    STcgpa > 3.6    AND   STdept = ‘CS’  OR    STdept = ’IT’

Without parentheses the above query gives the rows that have:

STdept  = CS and STcgpa > 3.6, or

STdept = IT, regardless of the STcgpa

You can learn more about SQL statement at

https://brainly.com/question/19538735

#SPJ4

different types of optical disk

Answers

Answer:

dvd, blu ray disc, CD-RW, CD-R

There are many types of optical disks, all of which include:

• DVD
•Blu-Ray
•CD-RW
•CD-R
•Recordables
•ROM
•RAM
•Ultra HD Blue-Ray
• DataPlay

There are many more than that, but those are the most commonly used.

When yahoo! makes decisions about whether or not to collect personal information about customers when they use its website, this is an example of?

Answers

When yahoo! makes decisions about whether to collect personal information about customers when they use its website, this is an example of an ethical issue.

Who is a customer?

A customer is a person who places an order for a product, pays for a product or service, and then receives it. He or she can also be a user of the things or services that are being provided. 

Yahoo! decided that they would not be collecting personal information of the client as this is the topic of personal privacy, then the company has shown some ethical values and beliefs and the company has respected them.

Learn more about customer, here:

https://brainly.com/question/13472502

#SPJ1

Isaca touts the cisa certification as being appropriate for accountants, networking, and security professionals. _________________________

Answers

It is false that ISACA promotes the CISA certification as suitable for networking, security, and accounting professionals.

IT (information technology) governance is the focus of the international professional organization ISACA. Although ISACA currently just uses its acronym, it is still referred to in its IRS filings as the Information Systems Audit and Control Association. Currently, ISACA provides 8 certification programs in addition to additional micro-certificates.

The Department of Homeland Security's (DHS) Cybersecurity and Infrastructure Security Agency (CISA) is in charge of enhancing cybersecurity and infrastructure protection at all levels of government, coordinating cybersecurity initiatives with American states, and enhancing the government's defenses against individual and state-sponsored cyberattacks.

Learn more about ISACA https://brainly.com/question/28198922?

#SPJ4

What are some things that can cause damage to a camera?
How can you protect your camera from damage?
Why is camera care important?
What are two actions you should do to care for your camera?
Describe two ways that you can stay safe when you photograph.

Answers

Answer:

Wetness and moisture are two other big risks that can really do damage to your camera. Water goes after your camera in many, different ways. In the worst way, water can take out your camera immediately – just ask any digital camera owner who’s unfortunately ever dropped his camera into baths, rivers, toilets, etc.
Because if you are going to a camera you have to be responsible and take care of because camera is not cheap these days

Explanation:

Answer:

Things that can damage is water and if it is left in a 95 degree area

Put ur camera in a case,

Don’t leave it outside and keep it in a safe area.

Bring bug spray when your out side bugs get bad on rainy days and it’s even worse in the summer.wear full clothing so you don’t get mosquito bites or ant bites those things sting and wear full Clothes when your doing on-ground shots

Have a great day!

Explanation:

What is the command you would use to execute a java program where the main() function is contained in a class called flightcontroller?

Answers

The command that would be used to execute a java program where the main() function is contained in a class called flightcontrolle java FlightController.

A Java programme can be thought of as a collection of objects that interact by calling each other's methods. Now let's take a quick look at the definitions of class, object, methods, and instance variables.

A language for object-oriented programming is Java. The classes and objects in Java, along with their characteristics and methods, are the foundation of everything. For instance, an automobile is an object in the actual world. The car contains characteristics like weight and colour, as well as functions like drive and brake.

There are four platforms of the Java programming language:

1. Java Platform, Standard Edition (Java SE)

2. Java Platform, Enterprise Edition (Java EE)

3. Java Platform, Micro Edition (Java ME)

4. Java FX.

Learn more about java program:

https://brainly.com/question/26642771

#SPJ4

You need to trace the route that a cat 6 utp cable takes through the ceiling and walls of your building. which tool should you use?

Answers

We should use Tone Generator to to trace the route that a cat 6 utp cable takes through the ceiling and walls of your building. The tone generator can be used to test the speakers and their electrical wiring, as well as to find the frequency of hearing loss and tinnitus.

A sinusoidal signal is produced by a tone generator at the selected frequency. Can be used as a learning tool for physics as well as to test audio equipment like speakers or earbuds. You may also test the frequency range of tablet speakers.

Learn more about tone generator https://brainly.com/question/28017740

#SPJ4

To write data to a file, you define an object of type _________. to read data from a file, you define an object of type _________.

Answers

To write data to a file, you define an object of type fstream to read data from a file, you define an object of type ofstream. The correct options are c and d.

What is data?

Data is an amount of information and collection that is recorded and saved for a gathering of information that is used in the future. Data is of various kinds.

In a computer, data files are saved and all the things that happen in the computer are saved in the computer memory.

C++ Files and Streams are fstreams and ofstream is a C++ output file stream.

Therefore, the correct option is c, ofstream, and d, fstream.

To learn more about data, refer to the link:

https://brainly.com/question/11941925

#SPJ1

The question is incomplete. Your most probably complete question is given below:

inputFile

ifstream  

ofstream  

fstream

Your network follows the 100base-fx specifications for fast ethernet and uses half-duplex multimode cable. What is the maximum cable segment length allowed?.

Answers

Answer: Fiber optic cabling  usually needs interduct to protect it as the cable is fragile and expensive if you break it

On half-duplex links, the segment length cannot exceed 412 m. Either SC, MIC, or ST fiber optic connectors can be used, but SC is recommended.As an example, a 100BASE-FX fiber optic segment using a typical multimode fiber optic cable is limited to segment lengths of 412 meters (1351.6 feet) in half-duplex mode.

2. What are considered "red flags" that
employers/college admissions look for on your
social media accounts? (In other words, things
that would prevent them from hiring you)

{Actually exploratory technology}

Answers

Final answer:

Employers and college admissions officers consider several red flags on social media accounts that may hinder employment or college admissions. These include inappropriate or offensive content, drug or alcohol-related content, poor communication skills, negative comments about employers or educational institutions, and inconsistent information. It is crucial to maintain a professional and positive online presence to increase the likelihood of being hired or admitted.

Explanation:

In today's digital age, employers and college admissions officers often review applicants' social media accounts to gain additional insights into their character and behavior. This practice has become increasingly common as social media platforms have become a prominent part of people's lives. When evaluating social media accounts, employers and college admissions officers look for certain red flags that may raise concerns about an individual's suitability for a job or admission.

Some of the red flags that employers and college admissions officers consider include:

Inappropriate or offensive content: Posting discriminatory, racist, sexist, or offensive content can raise concerns about an individual's values and professionalism. It is important to maintain a respectful and inclusive online presence.   Drug or alcohol-related content: Sharing excessive partying, drug use, or alcohol-related content can create the perception of irresponsible behavior. Employers and college admissions officers may question an individual's judgment and reliability.Poor communication skills: Frequent use of slang, profanity, or grammatical errors in posts can reflect poorly on an individual's communication abilities. It is important to demonstrate strong written communication skills online.Negative comments about employers or educational institutions: Criticizing previous employers or educational institutions can indicate a lack of professionalism and loyalty. Employers and college admissions officers value individuals who can maintain positive relationships.Inconsistent information: If the information shared on social media contradicts what is stated on a resume or college application, it can raise concerns about honesty and integrity. It is important to ensure consistency in the information presented across different platforms.      

By being mindful of the content shared on social media platforms, individuals can maintain a professional and positive online presence that enhances their chances of employment or college admissions.

Learn more about red flags on social media accounts that can hinder employment or college admissions here:

https://brainly.com/question/1297688

#SPJ14

Final answer:

Employers and college admissions officers often review applicants' social media accounts for red flags that may impact hiring decisions or college admissions. Some common red flags include inappropriate or offensive content, drug or alcohol-related content, negative comments about employers or educational institutions, inconsistent information, and poor communication skills.

Explanation:

In today's digital age, employers and college admissions officers often review applicants' social media accounts to gain additional insights into their character and behavior. Certain red flags on social media can raise concerns and potentially impact hiring decisions or college admissions.

Some common red flags that employers and college admissions look for on social media accounts include:

               

It is important for individuals to be mindful of their online presence and ensure that their social media accounts present a positive and professional image.

Learn more about red flags on social media accounts that can hinder employment or college admissions here:

https://brainly.com/question/1297688

#SPJ14

     "

What is the command to list the top 10 files that use the most disk space in linux?

Answers

Type du -a /dir/ | sort -n -r | head -n 20. du will calculate the file space used. The sort will sort out the output of a du command.

Why is Linux used? Linux is an open source operating system (OS). An operating system, which is a piece of software, is directly in charge of managing the hardware and resources of a system, including the CPU, memory, and storage. By sitting between applications and hardware, the operating system (OS) creates connections between all of your software and the operational physical resources. Many of the gadgets you likely own, such as Android smartphones, tablets, and Chromebooks, as well as digital storage, cameras, wearable technology, personal video recorders, and more, all support Linux.  Your automobile has Linux running on the inside. Linux is an open-source alternative to Windows OS, which is a for-profit operating system.

To learn more about Linux, refer to:

https://brainly.com/question/25480553

#SPJ4

Use the ______ element to create a generic area or section on a web page that is physically separated from others

Answers

Use the div element to create a generic area or section on a web page that is physically separated from others.

In the field of computers, div can be described as a special container that is used in order to make a specific generic area or a particular section on a web page.

The 'div' element stands for division as this element causes a division to be made on the webpage. The div tags are used for multiple purposes such as web layouts.

It is due to the div element that content can be grouped in a webpage that makes it look more attractive and reliable. Without the div element, data will not be understood properly on a webpage and might be misunderstood by the reader.

To learn more about a webpage, click here:

https://brainly.com/question/14552969

#SPJ4

_______ reality allows physical and virtual elements to interact with one another in an environment; it is not a fully immersive experience because it maintains connections to the real world.

Answers

Augmented reality allows physical and virtual elements to interact with one another in an environment; it is not a fully immersive experience because it maintains connections to the real world.

Augmented reality is a term used to describe the process of overlaying digital images onto the real world to escalate them with digital attributes. It uses the physical world environment and connects it with virtual data. In addition to this connection, augmented reality comes up with real-time interaction and three-dimensional registration of virtual and real things.

Sensors, processors, display units, and different input devices make up the hardware units of augmented reality. The display allows the images of both the virtual and physical world to be placed over the user's area of view.

It is playing a major role in enhancing the gaming, commerce, and literature fields. It also plays role in architecture by providing three-dimensional visualization of 2D drawings.

To learn more about augmented reality, click here:

https://brainly.com/question/9054673

#SPJ4

In a client/server network, the ____________________ host the resources for the clients to use and provide security.

Answers

In a client/server network, the server host the resources for the clients to use and provide security.

A server in computing is a piece of hardware or software (a computer program) that offers functionality to other programs or objects, referred to as "clients."

Many of the functions that servers can offer are referred to as "services," such as executing computation for a client or sharing data or resources among many clients. Both a single client and a single server can accommodate many clients. A client process can run on a single device or connect to a server running on a different device through a network.

Learn more about client/server network https://brainly.com/question/28099574

#SPJ4

how do I fix this tech problem I'm having when I press ctrl it mute my sound and when I press the windows key on my keyboard it turns the pc off how to fix this issue


this was not happening yesterday please help me ​

Answers

Answer:

You can try reinstalling your keyboard drivers.

You can do this by right clicking the windows icon in the bottom left and click on Device Manager, find the keyboard tab and expand it, right click on your keyboard driver (it will be the same name as your keyboard, or it might have a generic name), then right click it, and press uninstall, then restart your computer to see if it worked.

If that didn't work, you can try reinstalling the USB controller drivers.

You go into device manager just like before, but find the 'Universal Serial Bus controllers' tab and uninstall the devices there, then restart.

If neither of those work, you sadly might have to get another keyboard.

Hope this helps

Describe the tools on the layout ribbon.

Answers

Explanation:
Layout ribbon used to create sophisticated views of a model alignment of elements and sections to create high-quality diagrams

Your company is experiencing an increase in malware incidents. Your manager is asking for advice on how best to verify that company-owned workstations are up-to-date with security patches, anti-malware requirements, and software application updates. The manager is also concerned that employee-owned devices connecting to the corporate lan have the same level of security as the company devices

Answers

To verify that company-owned workstations are up-to-date with security patches, and anti-malware requirements the best is to Implement an endpoint management server appliance.

By analyzing all incoming data to stop malware from being installed and infecting a computer, antimalware can assist in preventing malware attacks. Antimalware software can also identify sophisticated malware and provide defense against ransomware assaults.

Hence, the best endpoint management server. In order to maintain functionality and protect the devices, data, and other assets from cyber threats, networked PCs and other devices are under the policy-based control of endpoint management.

Hardware-enabled capabilities in PCs built on the Intel vPro® platform can improve management and security software solutions. The security of both company-owned and employee-owned personal devices will unquestionably be improved by this.

Learn more about malware here:

https://brainly.com/question/14271778?referrer=searchResults

#SPJ4

Other Questions
Bob has a collection of 450 pens. If he gave 90 pens to his friendJenny, find the percent of pens left with Bob? Which factors influence ocean currents? Select the three correct answers.A. Earth's rotationB. Salinity. C. WindD. Ocean depth Find the eighth term of each geometric sequence. -3,6,-12, . . . . . What is the mental health Which of the following is most likely the next step in the series? 1. Sara y Paula _________ muy nerviosas. 5. Este cepillo _______ de Clarisa. 2. Yo ________ cmoda en esta silla. 6. Nosotros_________ en la sala de clases. 3. La boda _______ un evento especial para todos. 7. Ella ______ contenta. 4. Usted no ________ muy entusiasmado. 8. Vosotros ______ altos Aunt rose baked 2 1/2 dozen cookies. Her grandson, ricky ate _ of them. How many cookies did rocky eat? Read the question. Then fill in the correct answer on the answer document provided by your teacher or on a sheet of paper.The Great Pyramid of Giza in Egypt originally had a height of about 148 meters. The base of the pyramid was a square with 230-meter sides. What was the original volume of the pyramid? Round to the nearest whole number.A. 1,786,503m B. 2,609,733 mC. 104,128,752 mD. 122,716,907 m Some marcadoras is it un, unas, unos, or una What is the practical advantage of requiring a function to have exactly one output for each input? ATP is used by the?? HIGHLIGHT >AND NOTES(a) Taro costs $7.00 per kilogram.What is the cost of a taro that weighs 510 grams?$2.83$3.57$4.28$5.10(b) A taro costs $4.20. What is the weight of the taro in grams (g)? According to the textbook, __________ are actions by individuals in an organization that are directed toward the goal of furthering their own self interests. A student has taken three math tests so far this semester. His scores for the first three tests were 75,79 , and 83 .b. What will be his total score for all six tests? Solve for x in the diagram below Use additive inverse and their properties to find equivalent expressions 3+(-5) During an experiment, you measure the absorbance of a sample to be 2.4. to correctly determine the concentration of the sample, you should:_________ Steve races to the nearest taco stand at lunchtime and sees that his pedometer recorded his peak speed at 79.579.5 cm/s. what was steve's peak speed in kilometers per hour? Which of the following is the best definition for symbolism? OA representation of an idea, emotion, or perspective O An underlying message or big idea O The creation of a fictional character The time and place of the action Which statement best describes the difference between dissolution and melting? (1 point)O Dissolution involves the formation of a new substance, while melting involves a state change.O lonic compounds dissolve, while polar compounds melt.O Polar compounds dissolve, while ionic compounds melt.O Dissolution involves a state change, while melting involves the formation of a new substance.