Write code to play a Tic-tac-toe tournament. Tic-tac toe is a game for two players who take turns marking the spaces with Xs and Os in a 3x3 grid. The purpose of the game is to place three of your marks in a horizontal, vertical or diagonal.

Answers

Answer 1

Answer:

Explanation:

The following code is written in Python and is a full Two player tic tac toe game on a 3x3 grid that is represented by numbers per square.

# Making all of the main methods of the game

board = [0,1,2,

        3,4,5,

        6,7,8]

win_con = [[0,1,2],[3,4,5],[6,7,8],

           [0,3,6],[1,4,7],[2,5,8],

           [0,4,8],[2,4,6]] # possible 3-in-a-rows

def show():

   print(board[0],'|',board[1],'|',board[2])

   print('----------')

   print(board[3],'|',board[4],'|',board[5])

   print('----------')

   print(board[6],'|',board[7],'|',board[8])

def x_move(i):

   if board[i] == 'X' or board[i] == 'O':

       return print('Already taken!')

   else:

       del board[i]

       board.insert(i,'X')

def o_move(i):

   if board[i] == 'X' or board[i] == 'O':

       return print('Already taken!')

   else:

       del board[i]

       board.insert(i,'O')  

 

# Creating the main loop of the game

while True:

   turn_num = 1

   board = [0,1,2,3,4,5,6,7,8]

   print('Welcome to Tic-Tac-Toe!')

   print('AI not implemented yet.')

   while True:

       for list in win_con: #check for victor

           xnum = 0

           onum = 0

           for num in list:

               if board[num] == 'X':

                   xnum += 1

               elif board[num] == 'O':

                   onum += 1

               else:

                   pass

           if xnum == 3 or onum == 3:

               break

       if xnum == 3 or onum == 3: # break loops

           break

       if turn_num > 9: # Check if there are any more moves available

           break

       show()

       if turn_num % 2 == 1:

           print('X\'s turn.')

       else:

           print('O\'s turn.')

       move = int(input('Choose a space. '))

       if turn_num % 2 == 1:

           x_move(move)

       else:

           o_move(move)

       turn_num += 1

   if xnum == 3:  #If game ends

       print('X Won!')

   elif onum == 3:

       print('O Won!')

   else:

       print('Draw!')

   play_again = input('Play again? Y or N ')

   if play_again == 'Y' or play_again == 'y':

       continue

   else:

       break


Related Questions

Which statement best describes the refraction of light

Answers

Answer:

Two wave pulses move toward each other along a rope. The two waves produced have different speeds.

Explanation:

Refraction of light is the change in the speed of light as it travels. The correct option is C.

What is refraction?

The bending of light as it passes from one medium to another is caused by the difference in the speed of light in the different media.

When viewed through a medium with a different refractive index, this bending of light can cause objects to appear distorted or displaced.

The change in direction and speed of light as it passes from one medium to another, such as from air to water or from water to glass, is referred to as refraction.

This happens because the speed of light changes when it moves from one medium to another due to a change in the refractive index of the medium.

Thus, the correct option is C.

For more details regarding refraction, visit:

https://brainly.com/question/14760207

#SPJ3

Your question seems incomplete, the probable complete question is:

Which statement best describes refraction of light? It

A. produces echoes

B. happens only in mirrors

C. is the change in the speed of light as it travels

D. happens because light bounces from a surface

What is the next line? tupleC = (3, 8, 11, 15, 8, 11) >> tupleC.index(15) 0 1 O 3 02​

Answers

Answer:

The next line is 3

Explanation:

Given

The above code segment

Required

Determine the next line

The above program is in Python and the next line is the output of the second line.

The second line gets the index of 15 in tupleC.

15 is at the 3rd index.

Hence, the next line is 3.

Answer:3

Explanation: got it right on edgen

Write a function named is_sub_dict that accepts two dictionaries from strings to strings as its parameters and returns True if every key in the first dictionary is also contained in the second dictionary and maps to the same value in the second dictionary. For example, given the dictionaries below, map1 is a sub-dict of map2, so the call of is_sub_dict(map1, map2) would return True. The order of the parameters does matter, so the call of is_sub_dict(map2, map1) would return False.

Answers

def is_sub_dict(dict1, dict2):

   one = dict1.keys()

   two = dict2.keys()

   for x in one:

       if x in two:

           if dict1[x] == dict2[x]:

               pass

           else:

               return False

       else:

           return False

   return True

I wrote the code in python 3.8. I hope this helps.

Access will place ________ around a text string within a query criteria that will limit the results to their exact specifications.

Answers

Answer: quotation marks (")

Explanation:

Quotation marks are put around a text string within a query criteria so that the results of the specifications are limited. We should note that the criteria is defined as the conditions which the users can set inside the query in order for them to get the records that they want to return.

Write a function in Java that implements the following logic: Given three ints, a, b, and c, one of them is small, one is medium and one is large. Return true if the three values are evenly spaced, so the difference between small and medium is the same as the difference between medium and large.

Answers

Answer:

Follows are the code to this question:

public class Main//defining a class Main

{

public static boolean evenly_Spaced(int a,int b,int c)//defining a method evenly_Spaced that accepts three integer parameter  

   {

if(a-b==b-c)//defining if block to check small and the medium is the same as the difference between medium and large.

           return true;//return value true

       else//else block  

           return false;//return value false

   }

public static void main(String[] args) //defining the main method

{

    int a,b,c;//defining integer variable

    a=4;//assigning value  

    b=6;//assigning value  

    c=8;//assigning value  

    System.out.println(evenly_Spaced(a,b,c));//use print method to call evenlySpaced  

}

}

Output:

True

Explanation:

In the above code, a boolean method "evenly_Spaced" is declared, that accepts three integer variables in its parameter and defined the if block to check the smallest and the medium value is the same as the difference value in between the medium and large value, and return its value.

In the next step, the main method is defined, and inside this three integer variable "a, b, and c" is declared, that holds a value and passes into the method and print its return value.

1. When the Cisco 2950 switch is first turned on, it behaves like a hub. Why is this so, and what must happen before the switch can send unicast traffic to a specific port

Answers

Answer:

The switch sends broadcast traffic to all ports like a hub to get the number of ports used and build its MAC address table.

Explanation:

A network switch is a device used in a LAN to connect all available workstations. Unlike a network hub, it is able to send frames from a host or workstation to another using its MAC address table.

An example of a switch is the Cisco 2950 switch. When it is first turned on, it acts as a hub, broadcasting traffic to all its ports. This process is used to create a MAC address table to get the IP address of workstations and the ports they relate to, enabling it to send unicast traffic to a specific port.

In case of a suspected data breach, what course of action should a chief information security officer (CISO) take

Answers

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

True or False: One benefit of virtualization is that it allows for better use of already existing hardware that may not be seeing full utilization.

Answers

Answer:

True.

Explanation:

Virtualization can be defined as a technique used for the creation of a virtual platform such as a storage device, operating system, server, desktop, infrastructure or computing resources so as to enable the sharing of resources among multiple end users. Virtualization is usually implemented on a computer which is referred to as the "host" machine.

Generally, to use the virtualization technology on a computer, it must be enabled in the BIOS/UEFI).

Additionally, VMware tools can be installed on host computers to check which processes are having high CPU usage by using vimtop, as well as checking if vCenter Server is swapping.

Hence, one benefit of virtualization is that it allows for better use of already existing hardware that may not be seeing full utilization. Hardware components such as storage devices, central processing unit (CPU), random access memory (RAM), host computers are extensively put into use.

A loop should output 1 to n. If n is 5, the output is 12345. What should XXX and YYY be? Choices are in the form XXX / YYY. cin >> n; for (XXX; i++) { cout << YYY; }

Answers

Answer:

[tex]i = 0; i < n / i + 1[/tex]

Explanation:

Given that:

a loop output 1 → n

if n = 5

output = 12345

n = scnr.nextInt();

for [tex](XXX; i++)[/tex]

{

System.out.printIn(YYY);

}

XXX / YYY is [tex]i = 0; i < n / i + 1[/tex]

The purpose of the ________ in a database system is to receive requests from applications and to translate those requests into reads and writes on the database files.

Answers

Answer:

database management system (DBMS)

Explanation:

The process that is being described is known as a database management system (DBMS). There are many types of these systems because they are extremely useful as they allow for complete manipulation of data within databases, allowing data to flow in and out as needed from a database. Popular examples of such systems include MySQL, PostgreSQL, Microsoft Access, SQL Server, etc. Every single application or company that has large sets of data need to use DBMS'

For each of the descriptions below perform the following tasks:

a. A book is identified by its ISBN number and it has a title, a price, and a date of publication. It is published by a publisher which has its own ID number and a name. Each book has exactly one publisher but one publisher typically publishes multiple books over time.
b. A book is written by one or multiple authors. Each author is identified by an author number and has a name and a date of birth. Each author has either one or multiple books. In addition, occasionally data are needed regarding prospective authors who have not yet published any books.
c. In the context specified in 2a and 2b better information is needed regarding the relationship between a book and its authors. Specifically, it is important to record the percentage of the royalties that belong to a specific author whether or not a specific author is a lead author of the book and each author's position in the sequence of the book's authors.
d. A book (2a) can be part of a series which is also identified as a book and has its own ISBN number. One book can belong to several sets and a set consists of at least one but potentially many books.

Answers

Explanation:

i dont really know. I am just answering for the sake of points

What occurs during the mail merge process? Place the steps in the correct order.

Specify which records to

Insert merge fields.

Preview, print, or email the Connect to a data source.

Create the main

include

document

document


ANSWER:

1. creat the main document

2. connect to a data source

3. specify which records to include

4. insert merge fields

5. preview, print, or email the document

Answers

Answer:

1. Create the main document

2. Connect to a data source

3. Specify which records to include

4. Insert merge fields.

5. Preview, print, or email the document.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

The sequential steps of what occurs during the mail merge process are;

1. Create the main document

2. Connect to a data source

3. Specify which records to include

4. Insert merge fields.

5. Preview, print, or email the document.

Answer:

1.Create the main document

2.Connect to a data source

3.Specify which records to include.

4.Insert merge cells

5.Preview, print, or email the document.

Explanation:

Just did it on e2020

what are the three main components of an operating system? define each of them.

Answers

The three main components of an operating system are:

1. manage the computer's resources (this includes the central processing unit, memory, printers, and disk drives).

2. establish a user interface (this is where the human interacts with a computer, website or application. the UI, also known as user interface, is to make the user's experience easy and intuitive).

3. execute and provide services for applications software (this is the interface between the application program and the hardware, which gets carried out from OS).

g Let m be a positive integer with n -bit binary representation: What are the smallest and largest values that m could have?

Answers

Answer:

The smallest value that m could have is 0, while the largest is [tex]2^n - 1[/tex]

Explanation:

For numbers with n bits, we have that:

The minimum possible value is 0.

The maximum possible value is [tex]2^n - 1[/tex]

So, in this question, since the number m has n bits:

The smallest value that m could have is 0, while the largest is [tex]2^n - 1[/tex]

Write a python program that: - Defines a tuple of 5 integer numbers - prints the tuple - Appends a new value to the end of the tuple - prints the tuple again Please note that appending a new value to a tuple will change the tuple. However, as you learned in Unit 5, tuples are immutable i.e. do not change. Therefore, to solve this problem, you need to find a way to change a tuple.

Answers

Answer:

The program is as follows:

my_tuple = (1,2,3,4,5)

print(my_tuple)

mylist = list(my_tuple)

mylist.append(6)

my_tuple = tuple(mylist)

print(my_tuple)

Explanation:

This defines a tuple of 5 integers

my_tuple = (1,2,3,4,5)

This prints the tuple

print(my_tuple)

To add new element to the tuple; First, we convert it to list. This is done below

mylist = list(my_tuple)

Then, an item is appended to the list

mylist.append(6)

The list is then converted to tuple

my_tuple = tuple(mylist)

This prints the tuple

print(my_tuple)

What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV

Answers

Answer:

4G/5G.

Explanation:

The broadband cellular network technology that mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud computing, high-definition mobile TV, and mobile 3-D TV is 4G/5G.

4G technology refers to the fourth generation broadband cellular network technology that is typically used for cellular communications on mobile phones and it is considered to have an internet speed that is ten times faster than what is obtainable on the third generation (3G) broadband technology.

Similarly, 5G is the fifth generation broadband cellular network technology that succeeded 4G and it offers higher quality in terms of performance, reliability, availability and efficiency.

As a result of the speed and high quality specifications of the 4G/5G broadband cellular network technology, they are widely used for various communications systems.

Compare the average cost of tablets with a Windows operating system to the average cost of tablets with an Android operating system.

Answers

Answer:

the average for Windows tablets is $700 while the average for Android tablets is $463

Explanation:

After researching a variety of different products I have come up with the following price points for tablets of each operating system.

Windows:

879399599924

Android:

779349600124

From these prices, we can see that the average for Windows tablets is $700 while the average for Android tablets is $463. This is because Android has always been specifically designed for mobile and handheld devices which have allowed them to easily transfer their operating system to any handheld device. This has drastically cut down their manufacturing costs which also allowed them to reduce consumer prices while still making profits.

What computer part Connects to The outlet and provides power to the computer

Answers

The plug in thingy lol

Which of these converts the reciprocating motion of the piston into rotary motion?

Answers

Answer:

The right approach is "Crankshaft".

Explanation:

Using the composite material gets converted this same reciprocating motion of such a piston to rotary motion. The connecting rod seems to be the intermediary between some of the piston and perhaps the crankshaft. Whenever the piston would be reciprocated from TDC instead to BDC, perhaps the crankshaft moves clockwise somewhere throughout the primary wheels Piston would be directly linked to the connecting rod to that same gudgeon pin as well as the crankshaft has been associated with the connecting rod to something like the crank.

talon is a new game designer working on an exciting and innovative game idea, but its time to examine the idea for technical feasibility. what ? could Talon ask to determine the technical feasibility


a. Are there people who would buy your game? Are stores willing to sell it?


b. can this idea be technically achieved? Wil it work the limitations of hardware and programming resources?


c. Does the game do something new that will pique people interests?


d. Am i having tons of fun while playing this game?

Answers

A Because if no one will sell it, it will be pointless so if people sell it and buy it, it will be best so A

Are there people who would buy your game? Are stores willing to sell it? Talon asks to determine the technical feasibility Thus, option A is correct.

What is Technical feasibility?

Technical feasibility assesses the expert program's complexities and frequently entails figuring out whether it is able to use cutting-edge methods and instruments.

The analysis examines the viability of a project's four components: Scientific: A list of the necessary hardware, software, and manpower to render their function. Finance: A projection of the development's total cost and predicted return.

The time has come to assess the project's technological viability. Talon is a new coder who is working on an interesting and original gaming idea. Because it will be useless if no one buys it and no one sells it.

Therefore, option A is the correct option.

Learn more about Technical feasibility, here:

https://brainly.com/question/14208774

#SPJ2

If every company is now a technology company then what does this for every student attending a business college? Provide specific examples to support your example

Answers

Answer:

The fact that most companies today are tech companies is not an obstacle for people studying in business schools.

Thus, despite the fact that today's large companies, such as Microsoft, Tesla, Apple or Amazon dedicate themselves almost exclusively, or have their business base, to technology, a group of suitable professionals will always be necessary in the field of technology. economic and financial management of these companies, to avoid that they incur in bad business, bad investments, errors in the payment of taxes or problems of the same tenor.

The following example demonstrates a program that uses 3 levels of nested dictionaries to create a simple music library. The following program uses nested dictionaries to store a small music library. Extend the program such that a user can add artists, albums, and songs to the library. First, add a command that adds an artist name to the music dictionary. Then add commands for adding albums and songs. Take care to check that an artist exists in the dictionary before adding an album, and that an album exists before adding a song.

music = {
'Pink Floyd': {
'The Dark Side of the Moon': {
'songs': [ 'Speak to Me', 'Breathe', 'On the Run', 'Money'],
'year': 1973,
'platinum': True
},
'The Wall': {
'songs': [ 'Another Brick in the Wall', 'Mother', 'Hey you'],
'year': 1979,
'platinum': True
}
},
'Justin Bieber': {
'My World':{
'songs': ['One Time', 'Bigger', 'Love Me'],
'year': 2010,
'platinum': True
}
}
}

#complete/edit code given below:

# Get user input

# While user input != 'exit'
# ...

Answers

Answer:

def add_album(artist,album):

   song_list = input("enter the list of song titles separated by comma: ").split(",")

   print(song_list)

   year = int(input("enter release year: "))

   is_platinum = bool(input("Is it platinum? True/False"))

   music[artist][album] = {}

   music[artist][album]['songs'] = song_list

   music[artist][album]['year'] = year

   music[artist][album]['platinum'] = is_platinum

def add_artist():

   artist = input("enter name of artist: ")

   if music.get(artist, "no") == "no":

       music[artist] = {}

       

   else:

       print("artist already exist in dictionary.")

   is_album = input("add album? ")

   if is_album == "yes":

       album_name = input("Enter album name: ")

       add_album(artist,album_name)

           

for _ in iter(dict, 0):

   is_exist = input("Do you want to end the program? yes/no: ")

   if is_exist == "yes":

       break

   elif is_exist == "no":

       is_art = input("Add artist? ")

       if is_art == "yes":

           add_artist()

       else:

           print("enter  yes/no")

   else:

       print("make a decision, yes/no")

Explanation:

The python program defines an "add_artist" and "add_album" function that references the dictionary "music". The functions prompt for user inputs of the artist name, album, year, and platinum record.

The functions use the bracket notation to access and update the dictionary in the memory.

Drag each tile to the correct box.

Match the elements used in web searches to their functions.

to make an exact phrase

appear in all the results

to ensure all search terms

appear in the results

to ensure that at least one of the

search terms appear in the results

to exclude specific words from

the results

quotation marks

the AND operator

the OR operator

the minus sign

um All rights reserved.

Answers

Answer:

1. The quotation marks.

2. The AND operator.

3. The OR operator.

4. The minus sign.

Explanation:

Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.

Additionally, Boolean logic allow users to combine keywords with Boolean operators (quotes, AND, OR, near/n) to give a more personalized and relevant search results.

The various elements used in web searches and their uses are listed below;

1. The quotation marks: to make an exact phrase appear in all the results.

Some examples of a Boolean logic search using quotes as the Boolean operator are;

"What is the name of the president of USA""How to pass my exams with flying colors""Brainly is the best educational platform

2. The AND operator: to ensure all search terms appear in the results.

An example is searching; the name of the new president of USA AND his wife.

3. The OR operator: to ensure that at least one of the search terms appear in the results.

An example is searching, how to grow slim OR loose weight in a week.

4. The minus sign: to exclude specific words from the results.

An example is searching, list of all the members on brainly minus moderators.

Answer:

The answer is:

Quotation marks - to make an exact phrase  appear in all the results.

The AND operator - to ensure all search terms  appear in the results.

The OR operator - to ensure that at least one of the  search terms appear in the results.

The minus sign - to exclude specific words from  the results.

Explanation:

I got it right on the Edmentum test.

Complete the program by writing and calling a method that converts a temperature from Celsius into Fahrenheit.

Answers

Missing Code:

import java.util.Scanner;

public class CelsiusToFahrenheit {

// FINISH: Define celsiusToFahrenheit method here

public static void main (String [] args) {

Scanner scnr = new Scanner(System.in);

double tempF = 0.0;

double tempC = 0.0;

System.out.println("Enter temperature in Celsius: ");

tempC = scnr.nextDouble();

// FINISH

System.out.print("Fahrenheit: ");

System.out.println(tempF);

return;

}

}

Answer:

Replace // FINISH: Define celsiusToFahrenheit method here

with

public static double celsiusToFahrenheit(double tempC){

   double tempF = (tempC * 9/5) + 32;

   return tempF;

}

Replace // FINISH

with

tempF = celsiusToFahrenheit(tempC);

Explanation:

The first addition to the program:

This line defines the method

public static double celsiusToFahrenheit(double tempC){

This line calculates the Fahrenheit equivalent of the temperature in Celsius

   double tempF = (tempC * 9/5) + 32;

This line returns the temperature in Fahrenheit back to the main method

   return tempF;

}

The second addition to the program:

This line gets the returned tempF from the celsiusToFahrenheit module

tempF = celsiusToFahrenheit(tempC);

See attachment for complete program

Intangible resources are typically embedded in ________ routines and practices that have evolved and accumulated over time. common obvious standard unique

Answers

Answer:

Unique

Explanation:

The correct word to fill in the gap is "unique". This is because the routines are not common or of any major standard but are special in their own ways

What type of micro sd card is needed for this type of MP3 player? I tried searching it up and a bunch came up. I don’t know which one is the right one. Someone please help me <3

Answers

a regular micro sd, they offer different amounts of storage

Please select the word from the list that best fits the definition
PLEASE HURRY. ITS TIMED

Enjoys working through a process


Interpersonal

Musical

Body-Kinestetic

Spatial

Linguistic

Intrapersonal

Logical-Mathmatical

Answers

Musical is the one that best fits it

Answer:

im tryna get points for a challenge. im not that smart but those look like cool wrds. mwah

Explanation:

What is true about the process of converting analog data into digital data?

a

To make the digital version be a more accurate representation of the analog data, the process should use fewer bits to represent each sample.

b

The digital version is a representation of the analog data but cannot include all of the details.

c

A longer interval between measured samples means more details will be captured in the conversion from analog to digital

d

The digital version contains all of the details of the analog data, as long as enough storage capacity is available.

Answers

Answer:

b. The digital version is a representation of the analog data but cannot include all of the details.

Explanation:

Analog data are continuous infinite stream of data but since the computer has finite memory, these data could only be represented on the computer by converting them to finite data. This process is called analog to digital conversion.

The following are some of the things that should be noted when doing this conversion:

1. Since the digital version is a finite representation of the analog which is infinite, it (the digital version) cannot include all of the details in the analog.

2. For the digital version to be a more accurate version of the analog data it represents, as much bit as possible should be used to represent each sample.

3. Short intervals between measured samples means more details will be captured in the conversion from analog to digital.

Analog to digital conversion of data simply involves the converting an infinite stream of data into a Finite version of the same data.

Digital data are Finite representation of the infinite data typical of analog representation. Hence, a Finite sequence, will not habor all the data or information contained in an analog record.

Therefore, the digital data representation will only be a Finite representation of the analog data and will not contain all of the details.

Learn more :https://brainly.com/question/17557558

Why computer literacy is vital to access in business work

Answers

Answer:

The description of the circumstance is summarized throughout the answer section below.

Explanation:

Computer literacy, particularly throughout the working population, tends to help somebody to gain a primary influence over investments, also because the working population would then fully understand what else to do. It, therefore, makes it possible to implement that many key business functions that are using extra sophisticated technology also because the workforce seems to have elevated computer literacy.

A large population of Aloha users manages to generate 50 requests/sec, including both originals and retransmissions. Time is slotted in units of 40 msec.a. What is the chance of success on the first attempt at a given station?b. What is the probability of exactly k collisions (for k = 1, 2,...,10) followed by a success?c. What is the expected number of transmission attempts needed?

Answers

Answer:

a) 0.1353

b) attached below

c) 7.4

Explanation:

Frame transmission rate = 40 msec

Total load  requests = 50 requests /sec

hence

Total arrival rate G in Frames ( G ) / x secs

= 50 request/sec * X sec

= 50 * ( 40*10^-3 )

= 2 requests/ x sec

a) Determine chance of success on first attempt

0.1353

b) Determine the probability of exactly K collisions followed by a success

 attached below

c) what is the expected number of transmission attempts needed

7.4

Other Questions
im lost in Spanish help help me plzzzzzzz i will give u 50 points how to find a percentage It is a contribution of different discoveries about cells that laid the groundwork for other fields of science.A. The Microscopic Theory B. The Theory of Evolution C. The Cell TheoryD. The Theory of Spontaneous Generation What is 14/15 over 4/7 equal to To fund Social Security, the government created a tax paid bya. all citizens.b. the banking industry.c. workers and employers.d. charities. Can you create electricity with magnetism? the price of an item yesterday was $110 today the price fell to $33 find the percentage decrease the tables represent two linear functions in a system.which is the solution to this system?A. {-13/3, -25}B. {-14/3, -54}C. (-13, -50)D. (-14, -54) A website lists homes for sale in a suburban town. The site provides information including neighborhood, sellingprice, age of the home in years), number of bedrooms, and whether the home has a garage. Which of the variablesis a categorical variable?neighborhoodselling priceage of the homenumber of bedrooms necesito el siggno de puntuacion para, puerto rico es una isla bendecida por dios Y is inversely proportional to the square of x. If Y = 3 when x = 3, then Y =, when x is ? 11/12 3/6 3/12 what is the odd one out? who every gives me the right answer first I Give 30 points how did the northwest Ordinance influence the expansion of the united states?A.It outlawed slavery in the northwest territory.B.it immediately added five new states to the country.C.it gave women in territories the same right as men D.it allowed the United States to buy land from France How could the jackrabbit population suddenly increase?How might this affect the ecosystem? Which of the following statements is true about Jesus of Nazareth?A) He encouraged Jews to reject Roman rule.B) He asked Paul to rebel against the Romans.C) He questioned the teachings of the Jewish prophets.D) His teachings were based in Jewish tradition. compare and contrast convergent and divergent evolution Earl attaches a wire from the top of a 16-foot flagpole and stakes it to the ground 12 feet from the baseof the pole. How many feet long is the wire?16 Ft If a football field is 100 yards long and 54 yard wide and what is the area in perimeter of that football filed What is the value of n?2n 16 = 4n + 8