2 point) Express this problem formally with input and output conditions.2.(2 points) Describe a simple algorithm to compute the upper median. How manyoperations does it take asymptotically in the worst case?3.(7 points) Show how you can use the (upper) medians of the two lists to reduce thisproblem to its subproblems. State a precise self-reduction for your problem.4. (7 points) State a recursive algorithm that solves the problem based on your reduction.5.(2 point) State a tight asymptotic bound on the number of operations used by youralgorithm in the worst case.

Answers

Answer 1

Answer:

See attached images

2 Point) Express This Problem Formally With Input And Output Conditions.2.(2 Points) Describe A Simple
2 Point) Express This Problem Formally With Input And Output Conditions.2.(2 Points) Describe A Simple
2 Point) Express This Problem Formally With Input And Output Conditions.2.(2 Points) Describe A Simple

Related Questions

Methods ii.) Define and implement a method that takes a string array as a parameter and returns the length of the shortest and the longest strings in the array i.) Write a method that take an integer array as a parameter and returns the sum of positive odd numbers and sum of positive even numbers. iii.) Implements the sequential search method that takes and array of integers and the item to be search as parameters and returns true if the item to be searched in the array, return false otherwise

Answers

Answer:

Explanation:

Well I am sorry I don't know the answer anyway.

Answer each of the following with a TRUE (T) or FALSE (F).
(1) Pipelining allows instructions to execute sequentially.
(2) If you can find the value x in the cache, you can also find it in the main memory too.
(3) Only the lw instruction can access the Data Memory component.
(4) The bias in single precision is 127, while in double precision it is 1024.
(5) In a cache mapping architecture, the valid bit is always on until data is found in that specific block.
(6) Memory speed generally gets faster the farther you move from the processor.
(7) A cache is a small high speed memory that stores a subset of the information that is in RAM.
(8) The hit rate of a cache mapping architecture is calculated by doing 1 - hit penalty.
(9) Cache is the fastest type of memory.
(10) Single-cycle and multi-cycle machines differ in CPI but all the other values are the same.

Answers

Answer:

t

Explanation:

Question 10 (5 points)
Which of the following represents the PC speed rating of a DDR4-1600 SDRAM
DIMM?
OPC4-12800
OPC4-6400
PC4-200
PC-200

Answers

Answer:

The PC speed rating of a DDR4-1600 SDRAM DIMM is PC4-12800.

Explanation:

Write a program that reads in an integer and displays a diamond pattern as described below. the integer determines the the number of plus characters in the widest (center) part of the diamond. the program should use nested loops. you can assume the number read in is odd.

Here is one sample run:


Diamond Width: 7

+

+++

+++++

+++++++

+++++

+++

+

Answers

Answer:

The program in Python is as follows:

numrows = int(input())

n = 0

for i in range(1, numrows + 1):

   for j in range (1, (numrows - i) + 1):

       print(end = " ")

   while n != (2 * i - 1):

       print("*", end = "")

       n = n + 1

   n = 0

   print()

k = 1; n = 1

for i in range(1, numrows):

   for j in range (1, k + 1):

       print(end = " ")

   k = k + 1

   while n <= (2 * (numrows - i) - 1):

       print("*", end = "")

       n = n + 1

   n = 1

   print()

Explanation:

This gets the number of rows

numrows = int(input())

This initializes the upper part of the diamonds

n = 0

The following iteration prints the spaces in each row

for i in range(1, numrows + 1):

   for j in range (1, (numrows - i) + 1):

       print(end = " ")

The following iteration prints * in the upper part of the diamond

   while n != (2 * i - 1):

       print("*", end = "")

       n = n + 1

   n = 0

This prints a new line

   print()

The lower part of the diamond begins here

k = 1; n = 1

The following iterations print the spaces in each row

for i in range(1, numrows):

   for j in range (1, k + 1):

       print(end = " ")

   k = k + 1

The following iteration prints * in the lower part of the diamond

   while n <= (2 * (numrows - i) - 1):

       print("*", end = "")

       n = n + 1

   n = 1

This prints a new line

   print()

Different types of users in a managed network, what they do, their classification based on tasks

Answers

In a  managed network,, skilled can be miscellaneous types of consumers accompanying various roles and blames.

What is the network?

Administrators are being the reason for directing and upholding the network infrastructure. Their tasks involve network arrangement, freedom management, consumer approach control, listening network performance, and mechanically alter issues.

Administrators have high-ranking approach and control over the network. Network Engineers: Network engineers devote effort to something designing, achieving, and claiming the network foundation.

Learn more about   network from

https://brainly.com/question/1326000

#SPJ1

Which of the following are limiting factors to solar power?
1. Other, easier energy sources are available
2. Solar equipment is expensive
3. All of these
4. The sun doesn't shine for 24 hours every day.

Answers

The option that  are limiting factors to solar power is3. All of these

1. Other, easier energy sources are available2. Solar equipment is expensive4. The sun doesn't shine for 24 hours every day.

What is the solar power?

In terms of easier energy sources which are known to be are available: Solar power is one that sometimes do not  always sound convenient or easily available energy source for some kind of places or applications.

Lastly, in terms of Solar equipment been expensive: Solar panels, batteries, as well as other equipment are said to be needed to bring about store solar power and thus is expensive.

Learn more about solar power from

https://brainly.com/question/17711999

#SPJ1

What website can you make videos on Chromebook or computer that's free without downloading?

Answers

1) wevideo
2) magisto
3) stupeflix video maker

I need help finishing this coding section, I am lost on what I am being asked.

I need help finishing this coding section, I am lost on what I am being asked.
I need help finishing this coding section, I am lost on what I am being asked.
I need help finishing this coding section, I am lost on what I am being asked.

Answers

Answer:

when cmd is open tell me

Explanation:

use cmd for better explanatios

Your science teacher gives you plastic
wire, copper wire, rubber tape and tin
foil. How would you design an
electrical wire using at least two of these materials?

Answers

You should wrap the rubber tape, which is an insulator, around the cooper wire, which is a conductor, to design an electrical wire.

The components of an electrical circuit.

Generally, an electrical circuit comprises the following electrical components:

ResistorsCapacitorsBatteriesTransistorsSwitchesElectrical wires

What is a design brief?

A design brief can be defined as a short statement which is written to describe the need of an individual or business, and what type of solution will meet that need (problem) through the design of an electrical circuit.

In this scenario, you should choose a rubber tape and the cooper wire from the materials provided by your teacher. Then, wrap the rubber tape, which is an insulator, around the cooper wire, which is a conductor, to design an electrical wire.

Read more on cooper wire here: https://brainly.com/question/24856041

#SPJ1

Henry is working on a group project and saves it so that he can access it anywhere he has internet. What type of software is Henry using to save his work?
a. hard software
b. internet software and services
c. IT services
d. technology software

Answers

Internet software and services type of software is Henry using to save his work.

Thus, The information technology sector's Internet Software and Services Industry consists of businesses that create and sell internet software and/or offer internet services such as online databases and interactive services, web address registration services, database creation services, and internet design services.

It excludes businesses categorized in the Internet Retail sector. A balanced scorecard, Porter's Five, SWOT, and financial study of  and Monster from the perspective of the Internet software and Services Industry.

Thus, Internet software and services type of software is Henry using to save his work.

Learn more about Internet, refer to the link:

https://brainly.com/question/13308791

#SPJ1

if someone has become very attached to their device and feels anxious if they cannot connect to the internet what are they experiencing

Answers

Answer:

anxiety or depression

Explanation:

Because if you like an device if you get get it you get sad and sad and sadder

Which of the following describes the phishing
of it up information security crime

Answers

Pretending to be someone else when asking for information

What is phishing?

A method wherein the criminal poses as a reliable person or respectable company in order to solicit sensitive information, such as bank account details, through email or website fraud.

Attackers create phony emails that contain harmful links. Once the victim clicks the link and enters their credentials, the attacker can use those credentials to gain illegal access. Consequently, the victim is phished.

Phishing is a dishonest method of obtaining sensitive information by posing as a reliable organization. Similar to any other form of fraud, the offender can do a great deal of harm, especially if the threat continues for a long time.

To learn more about phishing refer to:

https://brainly.com/question/23021587

#SPJ9

Is a questionnaire the best approach, or would interviews be better? And whether you use interviews, a questionnaire, or both techniques, should you select the participants at random, include an equal number of people from each shift, or use some other approach? How do you proceed?

Answers

Interviews are better than questionnaire as for answering some questions personal interaction seems to be best.

What are Interviews and Questionnaire ?

A planned interaction in which one party asks questions and the other responds is known as an interview. A simple process between two person one the interviewer who is answering the questions of other person is an interview.

A question is a form of research composed up of a list of questions used to collect data from respondents during a survey or statistical analysis. Typically, a research questionnaire will have both closed-ended and open-ended questions

to know more about interviews, visit

brainly.com/question/3410574

#SPJ1

Any set of logic-gate types that can realize any logic function is called a complete set of logic gates. For example, 2-input AND gates, 2- input OR gates, and inverters are a complete set, because any logic function can be expressed as a sum of products of variables and their complements, and AND and OR gates with any number of inputs can be made from 2-input gates. Do 2-input NAND gates form a complete set of logic gates? Prove your answer.

Answers

Answer:

Explanation:

We can use the following method to solve the given problem.

The two input NAND gate logic expression is Y=(A*B)'

we can be able to make us of this function by using complete set AND, OR and NOT

we take one AND gate and one NOT gate

we are going to put the inputs to the AND gate it will give us the output = A*B

we collect the output from the AND and we put this as the input to the NOT gate

then we will get the output as = (A*B)' which is needed

Which of the following extracts service account credentials from Active Directory using a brute force for offline cracking over a non-secure network by using tickets or service principal names (SPNs)?
-Kerberoasting
-Credentials in LSASS
-Unattended installation
-DLL hijacking

Answers

Option A,

Kerberoasting is the extraction of service account credentials from Active Directory through brute force for offline cracking over a non-secure network by using tickets or service principal names (SPNs).Hence, the correct answer is Kerberoasting.

The technique is referred to as “Kerberoasting” since it is based on extracting Kerberos tickets. Kerberoasting is an attack technique that has been in use for a long time, and it continues to be a common technique among attackers.Kerberos is a computer network authentication protocol that uses a trusted third party to verify user credentials. It relies on the use of “tickets” to verify the identity of the user attempting to access a network resource. Kerberos is used by Active Directory (AD) domain controllers to authenticate client and service credentials for access to network resources. An SPN is a unique identifier that specifies the name of a network service associated with a specific host. It’s used to determine which service an authenticated user has access to. SPNs are used by Kerberos to determine the service account that is required for a specific network service. An SPN is made up of three components: the protocol, the service class, and the host name.

Learn more about "Internet" : https://brainly.com/question/2780939

#SPJ11

Word, word, word and word are examples of different _____.


effects

styles

texts

fonts

Answers

Texts fonts styles effects etc. texts?

Answer:

Fonts

Explanation:

edge 2021

A company with a large number of hosts creates three subdomains under a main domain. For easier management of the host records, how many zones should be used

Answers

Answer:

4

Explanation:

For easier management of the host records of the company 4 zones should be used because

subdomain is part of a larger domain and the main domain which is the primary domain is the name which the company have decide to use which will represent the company website address and in a situation where the company

have different domain names in which they had registered, they will need to choose one among the domain which will inturn be their main domain.

Therefore for easier , efficient and effective management of the host records 4 zones will be the best zones to be used.

Example of sub domain is north.example.com

For easier management of the host records, 4 zones should be used

Host record or a DNS host, is simply known as record in one's domain's DNS zone file that is said to create the connection between one's domain and its matching IP address.

It is also called an A or Address record. It is said to links a domain to the physical IP address of a computer hosting that has the domain's services.

4 zones in the subdomain is good because a subdomain is part of a larger domain and the main domain and therefore having four will cater for all.

Its gives a creative approach to the management of DNS, DHCP, and IPAM data.

Conclusively, the use of host records helps to manage multiple DNS records, DHCP and IPAM data.

Learn more from

https://brainly.com/question/19281141

A security utility program that scans the system for small programs that interfere with how a computer functions are
utilities.
A.Data Encryption
B.Antivirus
C.Direwall
D.Cleaner

A security utility program that scans the system for small programs that interfere with how a computer

Answers

Answer:

B. Antivirus

Explanation:

I think Direwall is not even a word.

What is the best example of how computers have changed the way people communicate?
A.
A smart device can track every place you go and be accessed by people who shouldn't see this information.
B.
Internet influencers share their experiences in order to gain more followers.
C.
Most people have smartphones, and they can be reached wherever they go.
D.
Social media is used to find friends or relatives after a natural disaster.

Answers

Answer:

c since it is very important that people reached where ever they are

Hope This Helps!!!

The best example of how computers have changed the way people communicate is,

D. Social media is used to find friends or relatives after a natural disaster.

Hence option D is true.

Ask about the best example of how computers have changed the way people communicate.

In the past, during natural disasters, it could be challenging to locate and connect with loved ones due to limited communication channels.

However, with the advent of social media platforms, people can quickly share information about their safety, and whereabouts, and seek help in real-time.

Social media acts as a powerful tool for reuniting families and friends during such challenging times.

Therefore, the correct option is, D.

To learn more about computers visit:

https://brainly.com/question/22495842

#SPJ3

it is the process of combining the main document with the data source so that letters to different recipients can be sent​

Answers

The mail merge is  the process of combining the main document with the data source so that letters to different recipients can be sent​.

Why is mail merge important?

Mail merge allows you to produce a batch of customised documents for each recipient.

A standard letter, for example, might be customized to address each recipient by name.

The document is linked to a data source, such as a list, spreadsheet, or database.

Note that Mail merge was invented in the 1980s, specifically in 1984, by Jerome Perkel and Mark Perkins at Raytheon Corporation.

Learn more about mail merge at:

https://brainly.com/question/20904639

#SPJ1

Enter the decimal equivalent of the exponent of the following floating point binary number.

0 00000101 1.00100000000000000000000


Decimal exponent:

Answers

Answer:

11.125

Explanation:

       The binary numeral system uses the number 2 as its base (radix). As a base-2 numeral system, it consists of only two numbers which are 0 and 1. In order to convert binary to decimal, basic knowledge on how to read a binary number might help. As I cannot share links over Brainly I won't be able to give resources, but usually a simple search will bring up videos / websites that will help!

Hopefully this is correct, have a nice day! :D

Imagine you're an Event Expert at SeatGeek. How would you respond to this customer?

* Hi SeatGeek, I went to go see a concert last night with my family, and the lead singer made several inappropriate comments throughout the show. There was no warning on your website that this show would not be child friendly, and I was FORCED to leave the show early because of the lead singer's behavior. I demand a refund in full, or else you can expect to hear from my attorney.

Best, Blake

Answers

By Imagining myself as an Event Expert at SeatGeek.I would respond to the customer by following below.

Dear Ronikha,

Thank you for reaching out to SeatGeek regarding your recent concert experience. We apologize for any inconvenience caused and understand your concerns regarding the lead singer's inappropriate comments during the show.

We strive to provide accurate and comprehensive event information to our customers, and we regret any oversight in this case.

SeatGeek acts as a ticket marketplace, facilitating the purchase of tickets from various sellers. While we make every effort to provide accurate event details, including any warnings or disclaimers provided by the event organizers, it is ultimately the responsibility of the event organizers to communicate the nature and content of their shows.

We recommend reaching out directly to the event organizers or the venue where the concert took place to express your concerns and seek a resolution.

They would be in the best position to address your experience and provide any applicable remedies.

Should you require any assistance in contacting the event organizers or obtaining their contact information, please let us know, and we will be happy to assist you further.

We appreciate your understanding and value your feedback as it helps us improve our services.

Best regards,

Vicky

Event Expert, SeatGeek

For more such questions Event,click on

https://brainly.com/question/30562157

#SPJ8

Passing structured query language commands to a web application and getting the website to execute it is called SQL script:______.
A) Injection.
B) Processing.
C) Attacking.
D) Execution.

Answers

Answer:

(A) Injection

Explanation:

SQL injection is one of the most common web attacks used by attackers to steal data or compromise a web application (especially the database) by inserting or "injecting" SQL queries or commands through the input data from the web application.

In web applications, form inputs are used to make requests to the database either for validation or submission of data by executing queries in the database. If these queries are interfered with by passing query like commands into the form input fields rather than some regular alphanumeric characters, then we have an SQL injection.

When this happens;

i. the attackers can modify an SQL query to return additional results from the database

ii. the attackers can change a query to interfere with the application's regular logic flow.

iii. the attackers can extract sensitive information about the database such as its version and structure.

Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: Slow performance Word documents, PDFs, and images no longer opening A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?

a. Spyware
b. Crypto-malware
c. Rootkit
d. Backdoor

Answers

Answer:

d. Backdoor

Explanation:

A backdoor is a type of malware that overrides security checks and authentications to access a computer or embedded device.

When this is done, remote access is granted and databases and servers can be accessed and modified. Attackers can also give remote commands to the system.

What happened to Ann in the payroll department is probably a backdoor attack that affected her device.

While setting up annetwork segment you want to check the functionality cable before putting connectors on them. You also want to meaure the termination point or damange in cable which tool used

Answers

A network is divided into several parts (subnets) using network segmentation, which creates smaller, independent networks for each segment.

What is network Segementation?

Segmentation works by regulating the network's traffic flow. The term "network segmentation" should not be confused with "microsegmentation," which limits east-west communication at the workload level in order to lower an organization's network attack surface.

Despite having some uses, microsegmentation should not be confused with standard network segmentation.

A network is divided into several zones via network segmentation, and each zone or segment is independently managed. To regulate what traffic is allowed to pass through the segment and what is not, traffic protocols must be used.

Dedicated hardware is used to create network segments that are walled off from one another and only permit users with the proper credentials to access the system.

Therefore, A network is divided into several parts (subnets) using network segmentation, which creates smaller, independent networks for each segment.

To learn more about network, refer to the link:

https://brainly.com/question/15088389

#SPJ1

Practitioner Certification Foundation Assessment
Automation Practitioner Certification
Foundation Assessment
Question 2 of 20
Which of the following metrics is not applicable to Agile projects?
Select the correct option(s) and click or tap the Submit button.
Cost of Rework
Defect Rate
Defect Removal Efficiency
Peer Review Effectiveness

Answers

Answer:

None of the above.

Explanation:

All of the listed metrics can be applicable to Agile projects, as Agile projects also require monitoring and tracking of project progress, quality, and efficiency. Therefore, the correct answer is: None of the above.

The metric that is not applicable to Agile projects is the "Cost of Rework."

In Agile projects, the emphasis is on iterative and incremental development, where requirements and solutions evolve through collaboration between self-organizing cross-functional teams. Agile methodologies, such as Scrum or Kanban, promote flexibility and adaptability, allowing for changes and adjustments throughout the project lifecycle. As a result, the concept of "rework" becomes less relevant in Agile projects.

Unlike traditional waterfall projects, where changes are costly and time-consuming, Agile projects embrace change and view it as an opportunity for improvement. Agile teams expect and welcome changes in requirements, and they incorporate feedback and learning into their development process through regular iterations and frequent customer collaboration.

Instead of focusing on the cost of rework, Agile projects tend to prioritize other metrics that align with their iterative and customer-centric approach. These metrics include defect rate (measuring the number of defects discovered during development), defect removal efficiency (measuring the effectiveness of the team in identifying and resolving defects), and peer review effectiveness (evaluating the quality of code or deliverables through team collaboration and feedback).

Therefore, the correct option is: Cost of Rework.

Learn more about Agile projects click;

https://brainly.com/question/30160162

#SPJ2

Which of the following is not a legal variable name?
O myVariableIsGood
O 99Flake
O _floor
O time2GetJiggyWidIt
O wrox.com

Answers

99Flake because it starts with a number wrox.com because it contains a full stop of the following is not a legal variable name.

What is legal variable name?

The variable name cannot start with a numeric character, an underscore, or both. The variable name cannot contain two underscores. Age, gender, x25, and age of hh head are some examples of acceptable variable names. The definition of a variable in C is the same as it is in algebra. A word that simply has the following elements is known as a variable name. In names, the underscore (_) can also be used. It is frequently used in names that contain several words, such my name or price of tea in China. A safe rule for beginners is to start all names with a letter because there are circumstances in which names that begin with an underscore have a special meaning.

To know more about legal variable name visit:

https://brainly.com/question/13460486

#SPJ4

How does data structure affect the programs we use​

Answers

Answer The data structure and algorithm provide a set of techniques for that program in order for it to function. think of it like yt

Explanation:

Which type of reading is the least popular among African students?

Answers

The least popular type of reading for African students uis e-learning.

How popular is it for African students?

While e-learning has become more prevalent in recent years, there are still challenges in terms of access to technology and reliable internet connection in some areas.

Additionally, some students may prefer traditional classroom learning or physical books. However, e-learning has the potential to provide access to education and resources to students who may not have otherwise had the opportunity. Efforts to improve access to technology and digital resources can help bridge the digital divide and make e-learning more accessible and popular among African students.

Read more about reading here:

https://brainly.com/question/24716030

#SPJ1

Which part of the Result block should you evaluate to determine the needs met rating for that result

Answers

To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.

What is the  Result block

The assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.

The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.

Learn more about Result block from

https://brainly.com/question/14510310

#SPJ1

Other Questions
Why did economically disadvantaged white people not see a common cause with enslaved people? 1. (a) An enclosure has an inside area of 100 m2, and its inside surface is black and is maintained at a constant temperature. A small opening in the enclosure has an area of 0.02 m2. The radiant power emitted from this opening is 70 W. What is the temperature of the interior enclosure wall? 70 W 0.02 m2 (b) If the interior surface temperature is maintained as in (a), but the surface is gray with emissivity, 0.79, what is the radiant power emitted from the surface? answer pls! NEED HELP Find the area. Round to the nearest hundredth if necessary 13. The function f(x) is invertible. Find f(-11). Justify your reasoning using mathematical language. Which part of the paragraph reveals the authors Bias How does Futterman describe Palmer's initial contract with Wilson Sporting Goods? Undoubtedly one of the worst deals any top athlete has ever signed A fair contract based on Palmer's existing market value when the contract was formalized A game changing moment in the history of athlete power, as Palmer negotiated for great compensation than earlier athletes had been able to do A beneficial deal during Palmer's early years on the professional tour, but one that he soon outgrew 2It costs 0.75 to buy 5 bananas.Work out how much it would cost to buy 7 bananas. The concentration of barium carbonate (BaCO3) in & saturated aqueous solution at 25*C is 5.07*10-6M. What is the Ksp of this sparingly soluble salt? Select one: a. 5.00 x 10^-13 b. 1.23 x 10^-13.c. 3.64 x 10^-7 d. 5.00 x I0^-9 e. 2.57 x 10-^11 breifly explain one persoective expressed by abigail adams in the passage above Arnie went downstairs to get the newspaper for his dad. As usual, it was stuck in the front bushes. As Arnie reached for the paper, something caught his eye. A small, feathery lump sat under one of the bushes. Arnie leaned down for a closer look and gasped when he saw it was the mother sparrow. But, she was not chirpingshe was hurt. Arnie and his dad drove to the wildlife center. A smiling woman greeted them as they entered the center. They handed her the shoebox, and she delivered it to a veterinarian, which is an animal doctor."You did the right thing by bringing her here," the woman said when she returned from delivering the box. "Many people cause animals more harm when they try to help them. They don't think to bring the animals to a trained expert as you did. You can come back tomorrow to check on her." When Arnie woke up the next day, he heard the father sparrow and the babies chirping cheerfully outside his window. Arnie and his father returned to the wildlife center and talked to the veterinarian. She thanked them for bringing the bird to the center instead of trying to fix her wing themselves."Can we take her back to her babies today?" Arnie asked."Yes, she is as good as new," the doctor answered. "You made the right choice to bring her here. I am sure her babies will be grateful."What did the doctor mean when he said, "Yes, she is as good as new?"A) The mother sparrow is well. B) The mother sparrow likes her new nest. C) The mother sparrow is new to her surroundings. D) The mother sparrow needs more time with the doctor. Two lines, E and F, are represented by the equations given below.Line E: 5x + 5y = 40Line F: x + y = 8Which statement is true about the solution to the set of equations?aIt is (40,8).OIt is (8, 40)CThere is no solution.There are infinitely many solutions. Graph and analyze the function f(x)= 1/x-2 4 less than a number equals 12. Fill in each blank with the most appropriate form of the imperfect subjunctive.1. Si Shakira no __________ (PODER) cantar, no la escuchara.2. Si hoy no __________ (SER) viernes, no ira a cenar con mis amigos.3. Si nosotros no _________ (HABLAR) ingls, lo estudiaramos.4. Si mi madre no _________ (SABER) cocinar, quin cocinara durante los das de fiesta?5. Si t no __________ (TENER) Wi-Fi, tendras que estudiar en otro lugar.6. Si mi novia no __________ (TRABAJAR) hoy, nosotros estaramos en Cumberland Mall.7. Si mi celular no _________ (FUNCIONAR), tendra que ir a Verizon Wireless.8. Si nosotros __________ (SER) millonarios, creo que viviramos en islas tropicales.9. Si t no ________ (VIVIR) en otro planeta, nos visitaras, no?10. Si mi novia _________ (GANAR) ms dinero, nosotros podramos comprar una casa. 4. Which of the following statements accurately describes a difference betweenviruses and bacteria? *A. Viruses are much smaller than bacteria cells.B. Viruses have a higher metabolism than bacteria cells.C. Viruses contain organelles while bacteria cells do not.D. Viruses reproduce asexually while bacteria cells reproduce sexually.e A bag contains 9 marbles: 4 are green, 3 are red, and 2 are blue. Deon chooses a marble at random, and without putting it back, chooses another onrandom. What is the probability that the first marble is blue and the second is green? Write your answer as a fraction in simplest form. Who's quote is this?"You are a boulder, I am a mountain" Find the perimeter of the triangle to the right how much cash will an investor have to pay on a property where the bank is providing a loan at 75% ltv, on a purchase price of $5,500,000 and $450,000 in closing costs...?