Answers

Answer 1

Answer:

this is the start of the equation

Explanation:

2p + 1 = -1

-2 -2

Answer 2

Answer:

I think its -1

Explanation:

2p+1=-1

2p+1-1=-1-1 minus one from each side

2p=-2 divide both sides by 2

2p/2=-2/2

p=-1


Related Questions

which type of address is the IP address 232.111.255.250

Answers

Answer:

Multicast, class D network

Explanation:

Addresses from 224.0.0.0 – 239.255.255.255 are all reserved for class D networks, which is used to identify multicast groups

Use this website to answer the question being asked.

Use this website to answer the question being asked.

Answers

G;;gle Cloud products used in healthcare are those digital products that are used for the purpose of managing data within the healthcare sector.

What are G;;gle Cloud products?

G;;gle Cloud products consist of materials that are used for the purpose of analyzing data to make operations smoother within the health sectors and other key industries.

For instance, there is a product for managing data analytics, API, and operational platforms. These products make work easier and also allow for cooperation and interactions within the workplace.

Learn more about G;;gle Cloud Products here:

https://brainly.com/question/14376058

#SPJ1

pleas help with this

pleas help with this

Answers

Answer:

points = dict(Harris=24, Butler=11, Embiid=31, Simmons=15, Reddick=9, Scott=8, Ennis=7, Marjanovic=4, Bolden=1, McConnell=2)

total_points = 0

highest_scorer = ""

highest_score = 0

for player, score in points.items():

 print(player + ": " + str(score) + " points")

 total_points += score

 if score > highest_score:

   highest_score = score

   highest_scorer = player

print("Total points: " + str(total_points))

print("Highest scorer: " + highest_scorer + " (" + str(highest_score) + " points)")

1) Write a Java application that asks the user how many numbers wants stored in a one-dimensional array. The program should allow the user to enter the numbers and calculate the total, average, highest and lowest of all those numbers.

Answers

Answer:b

Explanation:

n\

If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least

Answers

If you buy $1000 bicycle, the credit payoff strategy that will result in your paying the least is option c) Pay $250 per month until it's paid off.

Which credit card ought to I settle first?

You can lower the total amount of interest you will pay over the course of your credit cards by paying off the one with the highest APR first, then moving on to the one with the next highest APR.

The ways to Pay Off Debt More Quickly are:

Pay more than the required minimum.more than once per month.Your most expensive loan should be paid off first.Think about the snowball approach to debt repayment.Keep track of your bills so you can pay them faster.

Learn more about credit payoff strategy from

https://brainly.com/question/20391521
#SPJ1

See full question below

If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least

a) Pay off the bicycleas slowly as possible

b) Pay $100 per month for 10 months

c) Pay $250 per month until it's paid off

The principal object of a hash function is __________ .
a. data integrity
b. compression
c. collision resistance
d. mapping messages

Answers

Answer:

a. data integrity

Explanation:

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

Some of the properties of a hash function are;

1. Pre-image resistance: this makes it practically impossible to reverse a fixed-size hash values to its initial arbitrary size. This property helps to maintain and enhance data integrity by making it difficult or impossible for an attacker to find the input data from a hash value.

2. Second pre-image resistance: this property makes it near impossible or very difficult to determine or decode another input data from a given set of input and hash values. Also, this helps to enhance data integrity.

3. Collision resistance: this is to make possible for all hash values to have a unique value. This simply means that, with this property it would be difficult for different input data to have the same hash value. Thus, it helps to create integrity in data management.

Hence, with the aforementioned properties, the principal object of a hash function is data integrity.

Hash functions in the computer world includes;

1. Message Digest (MD): it is a 128 bit hash function and comprises of the following; MD2, MD4, MD5, and MD6.

2. Secure Hash Function (SHA): it comprises of the following; SHA-0, SHA-1,SHA-2, and SHA-3.

3. Whirlpool: it comprises of the following; Whirlpool-0, Whirlpool-T, and Whirlpool. It is primarily a 512 bit hash function.

4. RACE Integrity Primitives Evaluation Message Digest (RIPEMD): it comprises of the following versions; RIPEMD, RIPEMD-128, and RIPEMD-160.

Please help ASAP!
Which type of game is most likely to have multiple different outcomes?

A. shooter game

B. puzzle game

C. platform game

D. role-playing game

Answers

Role play game multiple options involved

4) Computer viruses can be spread by
sharing flash drives.
O downloading and running a file attached to an email.
O downloading a song from a peer-to-peer sharing site.
O all of the above

Answers

Answer:

All of the above

Explanation:

Flash drives may be stored with viruses, A file from an email might not be reputable, and Peer to Peer sights are risky and a virus can be disguised as a song. This proves that the answer is all of the above.

The White House spokesman said that if the relevant bill was sent to the desk, US President Biden would sign to end the national emergency of COVID-19 in advance, although he strongly opposed it. The US Senate will vote on the evening of the 29th local time and is expected to pass

Answers

The requirement for the Senate to vote on the bill is a standard legislative process in the United States.

Why the senate votes on bills

In order for a bill to become law, it needs to be approved by both the House of Representatives and the Senate. The legislative branch of the US government is divided into two chambers—the House of Representatives and the Senate—each with its own set of responsibilities.

Once a bill is introduced in either chamber, it goes through a series of committee reviews, debates, and amendments before being put to a vote.

Read more on bills here https://brainly.com/question/29613391

#SPJ1

The White House spokesman said that if the relevant bill was sent to the desk, US President Biden would sign to end the national emergency of COVID-19 in advance, although he strongly opposed it. The US Senate will vote on the evening of the 29th local time and is expected to pass

Why does the senate have to vote on a bill

besides personal budget how else can Excel be used at home​

Answers

Phone number storage, password storage, contact storage, etc.

I would like assistance on writing a c++ program without using double. Thank you

I would like assistance on writing a c++ program without using double. Thank you
I would like assistance on writing a c++ program without using double. Thank you

Answers

Here is the corrected code:

function convertTime() {

let hours, minutes, ampm;

let military = prompt("Enter military time (hh:mm):");

// Verify input is a valid military time

if (!/^\d{2}:\d{2}$/.test(military)) {

  alert(military + " is not a valid time.");

  return;

}

// Parse hours and minutes

hours = parseInt(military.split(":")[0]);

minutes = parseInt(military.split(":")[1]);

// Convert to 12-hour format

if (hours == 0) {

  hours = 12;

  ampm = "AM";

} else if (hours < 12) {

  ampm = "AM";

} else if (hours == 12) {

  ampm = "PM";

} else {

  hours = hours - 12;

  ampm = "PM";

}

// Output the converted time

let standard = hours.toString().padStart(2, "0") + ":" + minutes.toString().padStart(2, "0") + " " + ampm;

alert("Standard time: " + standard);

// Ask if the user wants to convert another time

let repeat = prompt("Would you like to convert another time? (y/n)").toLowerCase();

if (repeat == "y") {

  convertTime();

}

}

convertTime();

How many bits are reserved for the Transmission Control Protocol (TCP) flags?

Answers

It’s 6 bits are reserved for the 6 TCP control flags. A connection, at which layer, implies that every segment of data sent is acknowledged? transport; A connection at the transport layer implies that every segment of data sent is acknowledged.

In terms of Pseudo-Code: Which of the following statements is NOT correct

Question 10 options:

A set of instruction that have to use a specific syntax

No strict set of standard notations

Is not a programming language

Easy to understand, and clear

Answers

A pseudocode is simply a false code that is used as a prototype for an actual program

The incorrect statement is option (a)

Take for instance, the following pseudocode to add two numbers

input a

input b

c = a + b

display c

Using the above pseudocode as a guide, we have the following observations

It is clear and can be easily understoodThere is no standard notation; I can decide to replace "input" with "accept", and the pseudocode will still have the same meaning

From the definition of pseudocode, I stated that it is a prototype for an actual program.

This means that, it is not a programming language

From the above explanation, we can conclude that the correct option is (a).

This is so, because a pseudocode does not have a syntax

Read more about pseudocodes at:

https://brainly.com/question/18875548

Which formatting option(s) can be set for conditional formatting rules?

Answers

Answer:

D

Explanation:

Any of these formatting options as well as number, border, shading, and font formatting can be set.

Billie downloads an email attachment from a co-worker. The attachment contains a virus. Within minutes of downloading the file, Billie's computer shuts down and will not turn back on. The company uses an intranet network. How did a virus most likely get into the original file sent to Billie? Explain your answer.

Answers

Answers:

You suspect that you have accidentally downloaded a virus.Turn off his computer and reboot from a clean system disk.She has no reason to expect a file from this person.Lisa has received a file attachment from a co-worker, James.The attachment contains a virus.

The virus most likely get into the original file sent to Billie through a corrupt file that was sent and it automatically pitch itself to the file.

How do viruses get into files?

A  lot of Computer Viruses are known to often spread to other disk drives or computers  mostly wen an infected files are gotten through downloads that are gotten from websites, email attachments, etc.

Note that the issue is that virus most likely get into the original file sent to Billie through a corrupt file that was sent and it automatically pitch itself to the file.

Learn more about email attachment from

https://brainly.com/question/17506968

#SPJ2

Choose the correct term to complete the sentence.
The media is usually repressed in
governments.

Choose the correct term to complete the sentence.The media is usually repressed ingovernments.

Answers

A dictator government  has all power in the hands of one individual/group, suppressing opposition.  The media is usually repressed in dictatorial government

What is the government?

Dictatorships have limited to no respect for civil liberties, including press freedom. Media is tightly controlled and censored by the ruling authority. Governments may censor or control the media to maintain power and promote propaganda.

This includes restricting freedom of speech and mistreating journalists. Dictators control information flow to maintain power and prevent challenges, limiting transparency and public awareness.

Learn more about government from

https://brainly.com/question/1078669

#SPJ1

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.


Dutermine the number of hosts in each of the subnet in the network shown in Figure ?​

Answers

Answer:

Neither answer so far is correct. Assuming you are starting with a class B address, you have 10 bits for subnets. 2^10 is 1024. So 1024 subnets are available.

Each subnet will have 6 bits for hosts. 2^6 = 64. We subtract 2 for the first and last address in the subnet, so 62 host addresses are available per subnet.

Explanation:

there is the example

with detail in image

Dutermine the number of hosts in each of the subnet in the network shown in Figure ?
Dutermine the number of hosts in each of the subnet in the network shown in Figure ?
Dutermine the number of hosts in each of the subnet in the network shown in Figure ?
Dutermine the number of hosts in each of the subnet in the network shown in Figure ?

Read the quote. Explain how you think music can enhance experiences and relationships. Give specific examples.

"The function of music is to enhance in some way the quality of individual experience and human relationships." ~ John Blacking

Answers

Music has the power to enhance experiences and relationships in many ways. Music can create a certain mood or atmosphere, helping to set the tone for an experience or relationship.

What is enhance experiences?

Enhance experiences is the idea of making experiences more enjoyable, meaningful, and valuable for people. This can be done by creating unique experiences, personalizing experiences, and creating an environment that encourages people to be more engaged.

For example, playing soft, romantic music at a dinner can set the mood for an intimate evening with a loved one. It can also give a feeling of joy, excitement, or nostalgia, helping to bring people closer together. Music can also provide a sense of connection, making it easier for people to communicate and relate to one another. For example, playing a favorite song from childhood can spark a conversation and foster fond memories of shared experiences. Music can also provide a sense of comfort and support, providing a safe space to express emotions. For example, listening to a relaxing song can help someone feel more relaxed and at ease in a difficult situation. Overall, music has the power to transform experiences and relationships, making them even more meaningful and enjoyable.

To learn more about express emotions
https://brainly.com/question/29851625
#SPJ1

types of motherboard​

Answers

Answer:

Types of Motherboard

Explanation:

Motherboards are present in Desktop, Laptop, Tablet, and Smartphone and the components and functionalities are the same. But the size of the components and the way they are accommodated on the board varies due to space availability. In desktops, most of the components are fitted inside the sockets provided on the board and it is easy to replace each of them separately, whereas in Laptops/Smartphones some components are soldered on the board, hence it is difficult to replace/upgrade.

Though different motherboards have varying capabilities, limitations, features, Physical size/shapes (form factor), they are identified/grouped/categorized mostly by their form factors. Each manufacturer has come out with its form factor to suit the design of computers. Motherboard manufactured to suit IBM and its compatible computers fit into other case sizes as well. Motherboards built using ATX form factors were used in most of the computers manufactured in 2005 including IBM and Apple.

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

5 disadvantage of assembly
level language​

Answers

Disadvantages Of Assembly Language

Long programs written in such languages cannot be executed on small sized computers.It takes lot of time to code or write the program, as it is more complex in nature.Difficult to remember the syntax.Lack of portability of program between computers of different makes.No SDKs (System Development Kit).

The dealer’s cost of a car is 85% of the listed price. The dealer would accept any offer that is at least $500 over the dealer’s cost. Design an algorithm that prompts the user to input the list price of the car and print the least amount that the dealer would accept for the car. C++

Answers

Here is an algorithm in C++ that prompts the user to input the list price of the car and prints the least amount that the dealer would accept for the car:

#include <iostream>

using namespace std;

int main() {

   double list_price, dealer_cost, min_accepted_price;

   const double DEALER_COST_PERCENTAGE = 0.85;

   const double MIN_ACCEPTED_PRICE_OVER_COST = 500;

   cout << "Enter the list price of the car: ";

   cin >> list_price;

   dealer_cost = list_price * DEALER_COST_PERCENTAGE;

   min_accepted_price = dealer_cost + MIN_ACCEPTED_PRICE_OVER_COST;

   cout << "The least amount the dealer would accept for the car is: $" << min_accepted_price << endl;

   return 0;

}

The algorithm starts by including the library iostream and declaring the namespaces. Then it declares the variables that will be used in the program (list_price, dealer_cost, min_accepted_price) and the constants that will be used (DEALER_COST_PERCENTAGE and MIN_ACCEPTED_PRICE_OVER_COST). Then it prompts the user to enter the list price of the car. Next, it calculates the dealer's cost by multiplying the list price by the dealer cost percentage and the minimum amount the dealer would accept by adding the dealer's cost to the minimum accepted price over cost. Finally, it prints the least amount the dealer would accept for the car.

What were the main differences between the layout, blocking, and animation sections?

Answers

Note that:

Layout refers to the arrangement of elements on a page or screen, including the position and size of text boxes, images, and other elements.Blocking refers to the placement of actors, sets, and props in a scene in theater, film, or animation production. In animation, it involves defining the movements and positions of characters and objects in each shot or scene.

Animation refers to the creation of the illusion of movement and change by rapidly displaying a sequence of static images that minimally differ from each other

What is an animation Section?

Animation is a means of creating the illusion of movement in a series by photographing consecutive drawings, models, or even puppets.

Because our eyes can only hold an image for about a tenth of a second, when many pictures emerge in quick succession, the brain merges them into a single moving image. Traditional animation involves drawing or painting images on clear celluloid sheets to be photographed. Early cartoons are instances of this, but most animated films nowadays are created using computer-generated imagery, or CGI.

Learn more about Animation;
https://brainly.com/question/29996953
#SPJ1

The create_python_script function creates a new python script in the current working directory, adds the line of comments to it declared by the 'comments' variable, and returns the size of the new file. Fill in the gaps to create a script called "program.py".
def create_python_script(filename):
comments = "# Start of a new Python program"
with ___:
filesize = ___
return(filesize)
print(create_python_script("program.py"))

Answers

Answer:

Following are the code to this question:

with open(filename,"w+") as file: #use an open method that open file in w+ mode        

   file.write(comments)#use write method that inputs the value in the file            

   file.close()#closing the file  

import os#import package os for file  

filesize = os.path.getsize(filename)#defining a variable filesize that uses the getsize method to calculate its size.

Explanation:

Following are the full program to this question:

def create_python_script(filename):#defining method create_python_script that accept filename variable as the parameter

   comments = "# Start of a new Python program"#defining a string varaible comments that holds string value      

   with open(filename,"w+") as file: #use an open method that open file in w+ mode        

       file.write(comments)#use write method that inputs the value in the file        

       file.close()#closing the file    

   import os#import package os for file  

  filesize = os.path.getsize(filename)#defining a variable filesize that uses the getsize method to calculate its size.  

 return filesize#return filesize value

print(create_python_script("program.py"))#use print method that call create_python_script and print its return value

Output:

please find program file and its output.

Program description:

In the above-given program, a method "create_python_script" is declared that accept the "filename" as the parameter, inside the method a comments string variable is declared, that holds string value and define an open method to open "program.py" file and assign the string value in the file.

In the next line, the "getsize" method is defined, which counts string value in digits and returns its value and use the print method to call the "create_python_script" with parameter a print its value.

The create_python_script function creates a new python script in the current working directory, adds

An ordinary deck of playing cards contains 52 cards, each of which has a suit and a value. Most card games require that a deck be shuffled at the beginning of a play. However, sometimes the deck isn't shuffled well enough, and there are arrangements of cards in the deck which may cause a bias in the play. Two such arrangements are a same-suit sequence and an ascending sequence. Asame-suit sequence is simply a sequence of consecutive cards in the deck with the same suit. Anascending sequence is a sequence of consecutive cards in the deck that follow one another in increasing value, with Ace following King and preceding two. Thus, 2S, 5S, KS, 3S AS is a same-suit sequence of length five, and 9C, 10D, JC, QS, KH, AC, 2D is anascending sequence of length seven, and 2H 3H 4H 5H 6H is both a same-suit and ascending sequence of length five.
The Problem
Given a deck of cards, determine the length of the longest same-suit sequence and the length of the longest ascending sequence.
The Input (to be read from standard input)
The first line will contain a single positive integer, c (CS25), representing the number of test cases to process. The test cases follow.
Each test case will be two lines long, each line will contain a string of 52 characters. The first line represents the first 26 cards in the deck and the second line represents the next 26 cards, in order in the deck
Each card will be represented with two characters, one for its kind and one for its suit, in that order. The 13 characters representing kinds are '2', '3', '4', '5', '6', '7', '8', '9', 'T', 'J', 'Q', 'K', 'A', in ascending order. The 4 characters representing suits are 'C', 'D', 'H' and 'S'.
The Output (to be printed to standard out)
For each input case, output two space separated integers on a line by themselves: the length of the longest same-suit sequence and the length of the longest ascending sequence, respectively.
Sample Input
2
255SKS3SAS9CTDJCOSKHAC2D2H3H4H5H6HQD9SJDSHAH4D7CJS 8C KD5C2CQHTS9H5DJHQC4C8D7STHAD 7H6D6C6S9D4S7DKC3D8S3CTC QCTD4C8D7STHADZH2D3S6D6C6S9D4 SAS 7D2HKC5H3DTC8S9C3H3C QD9SQSJDSHAH2SKS4D4H557CJS8CKD5C2CACQHJCTSCHKH9H5DJH
Sample Output
5 7
3 2
Implementation Restrictions/Run-Time/Memory Restrictions
1. You must read the deck for each case into statically allocated string(s).
2. For full credit, your algorithm must run in O(n) time. This means that you can only do a few separate single loops through a deck of cards for full credit. In particular a correct solution that has a pair of nested loops will NOT receive full credit.
3. For full credit, you must have appropriately designed functions. In particular, any correct solution which is fully coded in main will NOT receive full credit.
You must only declare your string variables INSIDE your case loop.

Answers

maybe a picture would be nice .

Use the drop-down menus to match the example to the correct audio-editing technique or term.

combining a vocalist’s audio recording with a pianist’s audio recording
cutting
cutting a section of an audio recording that is poor quality when the sound wave crosses the horizontal axis
balancing a high-pitched soprano voice with a low-pitched alto voice
removing the first 20 seconds and last 30 seconds of a song to eliminate unwanted sound
slowly reducing the volume of a melody at the end of a song
slowly increasing the volume of a melody at the beginning of a song
fading out the end of a pop song, then fading in a mixed song containing classical harmonies and pop vocals

Answers

The terms matched corretly matched are:

Combining a vocalist's audio recording with a pianist's audio recording: MixingCutting a section of an audio recording that is poor quality when the sound wave crosses the horizontal axis: Zero-crossingBalancing a high-pitched soprano voice with a low-pitched alto voice: EqualizingRemoving the first 20 seconds and last 30 seconds of a song to eliminate unwanted sound: Topping and tailingSlowly reducing the volume of a melody at the end of a song: Fade-outSlowly increasing the volume of a melody at the beginning of a song: Fade-inFading out the end of a pop song, then fading in a mixed song containing classical harmonies and pop vocals: Cross-fading

What do thse terms mean?

Mixing: Combining multiple audio tracks or elements into a cohesive and balanced final audio output.

Zero-crossing: A technique used to make clean cuts or edits in an audio waveform by selecting points where the waveform crosses the horizontal axis (zero amplitude).

Equalizing: Adjusting the frequency response of an audio signal to enhance or reduce specific frequencies, helping to balance the overall sound.

Topping and tailing: Removing unwanted sections from the beginning (top) and end (tail) of an audio recording.

Fade-out: Gradually reducing the volume of a sound or music track to create a smooth transition towards silence.

Fade-in: Gradually increasing the volume of a sound or music track from silence to a desired level.

Cross-fading: Transitioning smoothly between two audio tracks by gradually decreasing the volume of one while simultaneously increasing the volume of the other.

Learn more about audio recording;
https://brainly.com/question/30187434
#SPJ1

describe usage about hand geometry biometric?

Answers

Biometrics for hand geometry recognition are less obvious than those for fingerprint or face recognition. Despite this, it is nevertheless applicable in numerous time/attendance and physical access applications.

What is Hand geometry biometric?

The concept that each person's hand geometry is distinct is the foundation of hand geometry recognition biometrics.

There is no documented proof that a person's hand geometry is unique, but given the likelihood of anatomical structure variance across a group of people, hand geometry can be regarded as a physiological trait of humans that can be used to distinguish one person from another.

David Sidlauskas first proposed the idea of hand geometry recognition in 1985, the year after the world's first hand geometry recognition device was commercially released.

Therefore, Biometrics for hand geometry recognition are less obvious than those for fingerprint or face recognition. Despite this, it is nevertheless applicable in numerous time/attendance and physical access applications.

To learn more about Hand geometry biometric, refer to the link:

https://brainly.com/question/12906978

#SPJ9

explain computer system architecture ​

Answers

Answer:

specification detailing how a set of software and hardware technology standards interact to form a computer system or platform.

Explanation:

Computer architecture is a specification detailing how a set of software and hardware technology standards interact to form a computer system or platform. In short, computer architecture refers to how a computer system is designed and what technologies it is compatible with.

windows 98 pentium 100, 8mb RAM, 32 mb free hard disk space, 8x CD-ROM

Answers

Answer:

That system wouldn't work

Explanation:

Other Questions
Which of the foilowing of Fishers product categories includes fashionable clothing, personal computers, and othr products that typically have a very brief ife cycle? O Dystunctional products O Value density products O Buliwhip products O Innovative products O Funcional products x+y=4x= -3pls explain how to get the answer If Y=K=0[infinity](K+1)Xk+3 Then Y=K=0[infinity] 1.8 ("he is pinned down...passing by"). 1.7.1 How do the footsteps pin the boy down? 1.7.2 What does "footsteps passing by" suggests? Refer to lines 7-8 (hin bull (2) (1) HELP! I NEED SOMEBODYWhat is the area of the triangle?Enter your answer as a decimal in the box. Round only your final answer to the nearest tenth.One side is 11cm. The other is 9cm. The measure of the angle is 63 degrees. complete the text with the correct form of verbs why are cable channels more profitable than the broadcast networks? a. cable networks attract wealthier viewers who are willing to add on premium channels. b. cable networks have larger numbers of viewers than the broadcast networks. c. cable networks receive revenue from advertising as well as subscriptions. d. cable networks can charge more for advertising than the broadcast networks. What part does the ocean play in the water cycle? social development is a universal process prove it PESTLE Explain & Analysis the Social Culture and Economic factors of an Australian business, Oztent Australia and their product line trend. No other case study given. Guillaume puts a bottle of soft drink in a refrigerator and leaves it there until its temperature has dropped 18.7 K.Part A:What is the magnitude of its temperature change |t|= 18.7 k in degrees celsius?Answer: ____Part B:What is the magnitude of the temperature change (change in T = 18.7 K) in degrees Fahrenheit? In the extraction of iron, carbon monoxide acts as O A catalyst OB an inert gas . an oxidising agent . a reducing agent . This graph shows the demand and supply of a particular brand of shampoo in the market. Which point on the graph indicates a surplus production of shampoo? My parents recently moved to the Poconos, they got 30 or more inches of snow from this last snow storm. It took my Dad 2 hours to clear 10 feet of their driveway. If their driveway is 120 feet long, how long will it take him to clear their driveway? If the Federal Reserve reduced its required reserve ratio down to 0%. What impact could this have on the money supply and overall macroeconomy? Are there any potential issues with this policy? Write questions for the underlined parts. 1.A:.......... B: I spend TWO HOURS a day on my hobby. 2.A:......... B: He plays volleyball THREE TIMES A WEEK. 3.A:.......... B: He often plays volleyball AT THE COURT NEAR HIS SCHOOL. 4.A:.......... B:I enjoy my hobby BECAUSE I THINK IT'S CREATIVE. 5.A:.................. B: He likes to play volleyball with HIS FRIEND. What is the image point of (- 3, - 2) after the transformation r x-axis R 270^ ? what is the number of chromosomes in a gemete compared to a zygote and why ? Point B has coordinates (4,1). The x-coordinate of point A is -4. The distance between point A and point B is 10 units. What are the possible coordinates of point A? which of the following is the most effective strategy for preventing research misconduct? creating hypercompetitive research environments limiting data sharing good mentoring working unsupervised