here is a description of variables used in a gas station class. customer - represents the name of the person buying gas vehicle - represents the type of vehicle of the person buying gas gasprice - represents the cost per gallon of gas on one specific day customerbill - represents the total amount of money owed by person buying gas based on these descriptions, which of the following variables would be static?

Answers

Answer 1

The variable that would be static is D. gas price.

What is a static variable?

A static variable is one that has been "statically" allocated in computer programming, which means that its lifetime (or "extent") is the entire execution of the program. This contrasts with objects, whose storage is dynamically allocated and deallocated in heap memory, and with shorter-lived automatic variables, whose storage is stack allocated and deallocated on the call stack.

In contrast to information that varies from instance to instance, static variables are used to store data that logically relates to an entire class.

In this case, the variable that would be static is the gas price. Therefore, the correct option is D.

Learn more about variables on:

https://brainly.com/question/25223322

#SPJ1

Complete question

here is a description of variables used in a gas station class. customer - represents the name of the person buying gas vehicle - represents the type of vehicle of the person buying gas gasprice - represents the cost per gallon of gas on one specific day customerbill - represents the total amount of money owed by person buying gas based on these descriptions, which of the following variables would be static?

customer

customer bill

vehicle

gas price.


Related Questions

you are writing a declaration for a new class called king that represents a chess piece, and it has already been started for you below. assuming that the class chesspiece is already defined, change the class declaration to indicate that king is a subclass of chesspiece (do not add anything inside the braces, which should remain blank for this question).

Answers

The declaration class King : ChessPiece creates a new class King that is a subclass of the existing class ChessPiece.

class King : ChessPiece

In this example, the declaration for the King class indicates that it is a subclass of the ChessPiece class. This means that the King class inherits all of the properties and methods of the ChessPiece class, and can add additional properties and methods as needed. The syntax for declaring a subclass in C++, Java, and other similar programming languages is to include the name of the parent class after a colon : following the name of the subclass.

In this case, the declaration for the King class specifies that it is a subclass of the ChessPiece class, which means that the King class inherits all of the properties and methods of the ChessPiece class. The declaration class King : ChessPiece creates a new class King that is a subclass of the existing class ChessPiece. The braces {} following the declaration are left blank, meaning that no properties or methods are defined within the class yet.

Learn more about programming languages here:

https://brainly.com/question/13563563

#SPJ4

What are to be considered before software installation? Why?​

Answers

Answer:

before software installation we should consider the following things:

1. Software must be virus free

2.Required components for software should be installed

3.Computer requirements must be little bit high required for that software

4.software musn't be corrupt

Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use?

Answers

Answer:

web browser

Explanation:

the other three will not let her excess her page at all

She needs to use a web browser

help ma??!! please please

Answers

hey what do you need help with?

give us a picture and we will try to help.

Can you give brainliest to more than one person?

Answers

Answer:

No, you can not give more than one person brainliest answer

__________ type of storage is very popular to store music, video and computer programs.
i am doing my homework plzz fast​

Answers

Answer:

Optical storage devices.

Explanation:

Optical storage device are those devices that read and store data using laser. To store data in optical storage devices low-power laser beams are used. It is a type of storage that stores data in an optical readability medium.

Examples of the optical storage device includes Compact disc (CD) and DVD.

The optical storage device is popular in storing data of music, videos, and computer program. Therefore, the optical storage device is the correct  answer.

While gaming online, Julian receives several insulting comments from another player. This is an example of
O denigration
O cyberstalking
harassment
O outing

Answers

Answer:

cyberstalking harassment

Explanation:

since Julian is being harrased or bullied online by someone

How to protect data in transit Vs rest?

Answers

Implement robust network security controls to help protect data in transit. Network security solutions like firewalls and network access control will help secure the networks used to transmit data against malware attacks or intrusions.

If this helps Brainliest please :)

Write a function that takes, as an argument, a list, identified by the variable aList. If the list only contains elements containing digits (either as strings as non-negative integers), return the string formed by concatenating all of the elements in the list (see the example that follows).

Answers

Answer:

The function is as follows:

def concList(aList):

   retList = ""

   for i in aList:

       if(str(i).isdigit()):

           retList+=str(i)

       else:

           retList = "Not digits"

           break;

   return retList

Explanation:

This defines the function

def concList(aList):

This initializes the return string to an empty string

   retList = ""

This iterates through aList

   for i in aList:

This converts each element of the list to an empty list and checks if the string is digit

       if(str(i).isdigit()):

If yes, the element is concatenated

           retList+=str(i)

If otherwise

       else:

The return string is set to "No digits"

           retList = "Not digits"

And the loop is exited

           break;

This returns the return string

   return retList

you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?

Answers

Answer:

Do not use such labels because they may be misleading and are unethical.

Explanation:

Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.

While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.

Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.

There are different instructions that comes with labeling, lithium metal label  is quite different from Lithium-ion labels and as such one cannot use one for the order.

What one should you do is to never use the lithium metal labels in place of  Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.

One has to comply with the regulations regarding batteries and the packaging of lithium batteries.

Lithium Metal Batteries  are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.

They have high energy density than other lithium batteries.   They can be found in Watches , Calculators etc.

Lithium-ion batteries are known to be  secondary battery. That is, they are said to be rechargeable in nature. They can be found  in Mobile phones, Laptops etc.

When shipped, any packages that has lithium-ion batteries must be labeled with  UN3480  or UN3481.

When shipped, any packages that has lithium metal batteries must be labeled  with UN3090  or UN3091.

Learn more about Batteries from

https://brainly.com/question/24876978

If you had to make a choice between studies and games during a holiday, you would use the _______ control structure. If you had to fill in your name and address on ten assignment books, you would use the ______ control structure.



The answers for the blanks are Selection and looping. Saw that this hasn't been answered before and so just wanted to share.

Answers

The missing words are "if-else" and "looping".

What is the completed sentence?

If you had to make a choice between studies and games during a holiday, you would use the if-else control structure. If you had to fill in your name and address on ten assignment books, you would use the looping control structure.

A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.

Learn more about looping:
https://brainly.com/question/30706582
#SPJ1

The global communication network that allows computers to connect and pass through information is called?

Answers

Answer: Internet

Explanation:

Answer:

The Internet.

Explanation:

What would be the result of the following calculation in a spreadsheet?


=5+10/5-3*3-1


a. -1

b. -3

c. 1

d. 3

e. 0


answer: B. -3

Answers

Answer:

answer a -1

b-3 hi hello who are you

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

a) A new member has joined your team. This member is an excellent developer for desktop applications. However, your team mainly focuses on Mobile Development. The new member finding it difficult to understand why small UI control and densely packed UI’s do not work on mobile devices. Explain to this developer why larger controls are needed on mobile devices by contrasting desktop and mobile.

Answers

A brief explanation as to why larger controls are needed on mobile devices by contrasting desktop and mobile is given below:

Mobile devices have smaller screens compared to desktop computers, which means that there is less space available for UI elements. Larger controls take up more space, but they also make it easier for users to tap or click on them accurately with their fingers.\Mobile devices are often used on the go, in situations where the user may be standing or walking. Larger controls are easier to tap or click accurately in these situations because the user's fingers are not as precise as a mouse cursor on a desktop computer.

What is UI?

This refers to the acronym that is used to refer to User Interface and this is a graphical use domain word that shows how the interface of a phone or laptop displays.

Hence, it can be seen that the pixel density of mobile devices is generally higher than that of desktop computers, which means that smaller UI elements may appear too small or difficult to see on mobile devices. Larger controls are easier to see and interact with on high-density screens.

Read more about User Interface here:

https://brainly.com/question/29435376

#SPJ1

How many NOTS points are added to your record for not completely stopping at a stop sign?

Answers

The number of NOTS points added to your record for not completely stopping at a stop sign can vary depending on the location and laws of the jurisdiction where the traffic violation occurred. It is important to note that not stopping fully at a stop sign is a serious safety violation, and it can result in a traffic ticket, fines, and possible points on your driver's license record.

In some jurisdictions, failing to stop at a stop sign can result in a citation for running a stop sign or a similar violation. In other jurisdictions, it may be categorized as a failure to obey traffic signals or a similar violation. The number of NOTS points added to your record, if any, will depend on the specific violation charged and the point system used by the jurisdiction in question.

It's important to note that NOTS points are used to track and measure the driving record of a driver, and they may impact insurance rates and license status. It's always a good idea to familiarize yourself with the laws and regulations in your area and drive safely to reduce the risk of violations and penalties.

Write a program that asks for the number of units sold and computes the total cost of the purchase. Input validation: Make sure the number of units is greater than 0. Use output (stream) manipulators: 2 digits after the decimal point g

Answers

Answer:

Explanation:

The following code is written in C++, it asks the user for input on number of units sold and places it in a variable called units_sold. Then it asks for the package price and places that value in a variable called package_price. Finally it multiplies both values together into a variable called final_price and adjusts the decimals.

#include <iostream>

#include <iomanip>

using namespace std;

       int main()

       {

       // Variables

       int units_sold,

       final_price;

       // ask user for number of units sold

       cout << "\nEnter number of units sold: ";

       cin >> units_sold;

       

       //ask for Package price

       cout << "\nEnter Package Price: ";

       cin >> package_price;

       // Total amount before discount

       final_price = units_sold * package_price;

       cout << setprecision(2) << fixed;

       cout << endl;

       return 0;

       }

lan is working on a project report that will go through multiple rounds of
revisions. He decides to establish a file labeling system to help keep track of
the different versions. He labels the original document
ProjectReport_v1.docx. How should he label the next version of the
document?
A. ProjectReport_revised.docx
B. ProjectReport_v1_v2.docx
C. Report_v2.docx
D. ProjectReport_v2.docx

Answers

Answer:It’s D

Explanation:

APEVX

The label of the next version of the document can probably be ProjectReport_v2.docx. The correct option is D.

What is a document?

A document's purpose is to enable the transmission of information from its author to its readers.

It is the author's responsibility to design the document so that the information contained within it can be interpreted correctly and efficiently. To accomplish this, the author can employ a variety of stylistic tools.

Documentation can be of two main types namely, products and processes. Product documentation describes the product under development and provides instructions on how to use it.

A document file name is the name given to a document's electronic file copy.

The file name of the document does not have to be the same as the name of the document itself. In fact, you can use the shortest possible version of the name.

As the document here is second version of the previous one, so its name should be ProjectReport_v2.docx.

Thus, the correct option is D.

For more details regarding document, visit:

https://brainly.com/question/27396650

#SPJ2

I am writing a code that requires me to identify a positive integer as a prime (or not). I have looked at references on how to find it but it does not work for what I am trying to do. Below is the set of instructions. I have written the first half of the code and verified that it works. I am stuck on how to write the logic that identifies the prime based on the instructions.
-----
Write a program that prompts the user to input a positive integer. It should then output a message indicating whether the number is a prime number.
Your program should use a loop to validate the positive integer and accept the input only when the user inputs a positive number.
Your code should be an efficient algorithm using the following note.
(Note: An even number is prime if it is 2. An odd integer is prime if it is not divisible by any odd integer less than or equal to the square root of the number.)
For the square root, import the math library (import math) and use math.sqrt() function)

Answers

import math

number = int(input("Enter a number: "))

while number < 0:

 number = int(input("Enter a number: "))

if number % 2 == 0:

 if number == 2:

   print("Your number is a prime.")

   exit()

 print("Your number is not a prime.")

 exit()

elif number % 2 == 1:

 i = 2

 while i <= math.sqrt(number):

   if number % i == 0:

     print("Your number is not a prime ")

     exit()

   i += 1

print("Your number is a prime.")

I hope this helps!

https://acm.cs.nthu.edu.tw/problem/13144/
The website is the problem, and I need to implement the 13144.h(which is function.h in the 13144.cpp) to get the right answer.
Thanks for your help.

Answers

Answer:

Th.. uh... yea... uh.. I don’t know

Explanation:

Computer one on network A, with IP address of 10.1.1.8 want to send a package to computer to with IP address of 10.1.1.205. Taking in consideration that computer one is sending an FTP request to computer to the store support on computer one is 21086, which of the following contains the correct information for the first TCP segment of data

Answers

Note that the right information for the first TCP segment of data in the given scenario is  -

Source Port - 21086Destination Port - 21Sequence Number - 1 Acknowledgment   Number - 2

Why  is this so?

Since   Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21   (FTP default port),the sequence number   would start at 1, and the acknowledgment number would be 2.

A TCP segment is a  unit of data encapsulatedin a TCP /IP packet used for communication between devices over a   network.

Learn more about TCP at:

https://brainly.com/question/18956070

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 10.1.1.205. Taking in consideration that computer 1 is sending a FTP request to computer 2, and the source port on computer 1 is 21086, which of the following contains the correct information for the first TCP segment of data?

Source Port: 5000

Destination Port: 80

Sequence Number: 1

Acknowledgment Number: 2

Source Port: 21086

Destination Port: 21

Sequence Number: 1

Acknowledgment Number: 2

Source Port: 21

Destination Port: 21

Sequence Number: 4

Acknowledgment Number: 1

Source Port: 80

Destination Port: 5000

Sequence Number: 1

Acknowledgment Number: 1

Answer:

Explanation:

Note that the right information for the first TCP segment of data in the given scenario is  -

   Source Port - 21086

   Destination Port - 21

   Sequence Number - 1

   Acknowledgment   Number - 2

Why  is this so?

Since   Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21   (FTP default port),the sequence number   would start at 1, and the acknowledgment number would be 2.

A TCP segment is a  unit of data encapsulatedin a TCP /IP packet used for communication between devices over a   network.

Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.

Answers

The three genuine statements almost how technology has changed work are:

Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.

With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.

Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.

Technology explained.

Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.

Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.

Learn more about technology below.

https://brainly.com/question/13044551

#SPJ1

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least

Answers

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least  65 percent transfer efficiency.

What is the transfer efficiency

EPA lacks transfer efficiency requirement for auto refinishing spray guns. The EPA regulates auto refinishing emissions and impact with rules. NESHAP regulates paint stripping and coating operations for air pollutants.

This rule limits VOCs and HAPs emissions in automotive refinishing. When it comes to reducing overspray and minimizing wasted paint or coating material, transfer efficiency is crucial. "More efficiency, less waste with higher transfer rate."

Learn more about transfer efficiency  from

https://brainly.com/question/29355652

#SPJ1

five uses of the operating system​

Answers

Answer:

Security – ...

Control over system performance – ...

Job accounting – ...

Error detecting aids – ...

Memory Management – ...

Security, job accounting, error detection, memory management, file management

Mission statement base on shoes company ? Help me

Answers

Here are 2 examples:

- Bringing comfortable walking, running, biking, and adventuring to the world.

- Transforming the way you live your life, two soles at a time.

A mission statement should be focused on what a company is about at its core roots. What's the driver for why the company does what it does? Often it is related to why a company is relevant in its industry.

Our mission statement is to offer our customers with an athletic footwear product that has desirable performance attributes such as impeccable quality, enhanced features, comfort and its diverse assortment of vibrant colors, trending styles, and exclusive designs.

An AIS is composed of people, procedures and instructions, data, software, technology infrastructure, and controls. These six components enable an AIS to fulfill which of the following important business functions?
a)Transform data into information so management can plan, execute, control, and evaluate activities, resources, and personnel
b)Provide the controls needed to safeguard an organization's assets and data
c)Develop the procedures and instructions needed to operate the software and store the data
d)Collect and store data about the organization's activities, resources, and personnel
e)Hire the best people available to manage the organization

Answers

The correct answer is a)Transform data into information so management can plan, execute, control, and evaluate activities, resources, and personnel.

People, Data, Software, Procedure, Information Technology, and Internal Controls are the components of an Accounting Information System (AIS). The operations in accounting, finance, law, and general administration that enable a corporation to run are referred to as firm infrastructure. The infrastructure of the company includes the AIS. The name of the employee, the item sold, and the date are some of the AIS variables that are related to a particular sales transaction. The daily sales quota is not a crucial element that the AIS records in respect to certain sales transactions.

To learn more about data click the link below:

brainly.com/question/10980404

#SPJ4

who is the first computer programmer​

Answers

Answer:

Ada Lovelace was the first computer programmer

public class ArrayCopy {

public static void main (String[] argv)
{
int[][] A = {
{1},
{2, 1},
{3, 2, 1},
{4, 3, 2, 1},
{5, 4, 3, 2, 1}
};
print (A);

int[][] B = copy (A);
print (B);
}

static void print (int[][] X)
{
for (int i=0; i for (int j=0; j < X[i].length; j++) {
System.out.print (" " + X[i][j]);
}
System.out.println ();
}
}

// INSERT YOUR CODE HERE.

}
answer in java, please complete code above

Answers

Sure! Below is the completed code that includes the missing part:

java:

public class ArrayCopy {

   public static void main(String[] argv) {

       int[][] A = {

               {1},

               {2, 1},

               {3, 2, 1},

               {4, 3, 2, 1},

               {5, 4, 3, 2, 1}

       };

       print(A);

       int[][] B = copy(A);

       print(B);

   }

   static void print(int[][] X) {

       for (int i = 0; i < X.length; i++) {

           for (int j = 0; j < X[i].length; j++) {

               System.out.print(" " + X[i][j]);

           }

           System.out.println();

       }

   }

   static int[][] copy(int[][] X) {

       int[][] copyArray = new int[X.length][];

       for (int i = 0; i < X.length; i++) {

           copyArray[i] = new int[X[i].length];

           for (int j = 0; j < X[i].length; j++) {

               copyArray[i][j] = X[i][j];

           }

       }

       return copyArray;

   }

}

In the given code, the missing part is the `copy` method. This method is responsible for creating a copy of the 2D array `A` and returning it as a new 2D array.

The `copy` method initializes a new 2D array `copyArray` with the same number of rows as the original array `X`. It then iterates over each row of `X` and creates a new row in `copyArray` with the same length as the corresponding row in `X`. Finally, it copies the values from each element of `X` to the corresponding element in `copyArray`.

The completed code allows you to print the original array `A` and its copy `B` by calling the `print` method. The `print` method iterates over each element in the 2D array and prints its values row by row.

Note: When running the code, make sure to save it as "ArrayCopy.java" and execute the `main` method.

For more questions on copyArray, click on:

https://brainly.com/question/31453914

#SPJ8

Suppose we adapt a different. "greedy" strateov to solve the rod-cutting problem as follows: for each length i and price p; in the price table, we divide p;/ to find the price per length. We then repeatedly pick the length with the highest possible price per length, according to how much length still remains, and cut a piece of this "best" length. Will this strategy still vield the best results? If so, explain why. If not give a counter example.

Answers

No, this strategy will not yield the best results for the rod-cutting problem.       A counterexample can be constructed where the greedy strategy fails to find the optimal solution, such as when there are pricing anomalies or non-linear price relationships across different lengths.

this strategy will not always yield the best results for the rod-cutting problem. The greedy strategy mentioned selects the length with the highest price per unit length  each step. However, this approach does not consider the overall optimal solution and may lead to suboptimal results.

A counterexample can be demonstrated with the following scenario: Suppose we have a rod of length 8 and the price table as follows: length 1 has a price of 5, length 2 has a price of 10, length 3 has a price of 25, and length 4 has  prUsing the greedy strategy, the algorithm will first select length 4 as it has the highest price per unit length. It will then be left with a rod of length 4. The next selection will be length 2, followed by length 1, resulting in a total price of 65.However, the optimal solution in this case would be to cut the rod into two pieces of length 4, yielding a total price of 60.Thus, the greedy strategy fails to provide the best results for the for the rod-cutting problem in all cases.

For more such question on rod-cutting problem

https://brainly.com/question/13868053

#SPJ8

PLEASE ANSWER
Select the correct answer.

What test was developed to filter humanlike artificial intelligence?

Answers

Answer:

Turing test is the answer

Other Questions
HELP ME PLSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS What is the central idea of The Challenge by Gary Soto t Supply is elastic if Select one: a small percentage change in price results in a large percentage change in quantity supplied. a large percentage change in price results in a small percentage change Meg plotted the graph below to show the relationship between the temperature of her city and the number of sweaters sold at a store:Part A: In your own words, describe the relationship between the temperature of the city and the sale of sweaters in the city. (5 points)Part B: Describe how you can make the line of best fit. Write the approximate slope and y-intercept of the line of best fit. Show your work, including the points that you use to calculate slope and y-intercept. (5 points)PLEASE HELP WITH PART B ASAP Presenting the results of your analysis--data visualization--is an important part of analytics true or false?. python python pythonpls answer it in 2 hours!! thank youvery importantYou are required to write program to manage a shopping list forthe family.The family wants to have a list of all the products in a reusable resource system, reducibility is independent of the order of reduction! true or false? A concierge company performs everyday services such as walking the dog, picking up cleaning, waiting for the repairman, and going to the post office for people who are too busy to perform these tasks. The clients can evaluate the services provided Which equation describes how the parent function, y=x, is vertically stretched by a factor of 4?Oy=x+4Oy=(x+4)Oy-4xOy=x* What is the concept of aggression? please help!! this is for my geometry class Can someone please help me? You borrow $75,000 and promise to pay back $155,713 at the end of 7 years. ____% d. You borrow $11,000 and promise to make payments of $3,359.50 at the end of each year for 5 years. ____% Which one of the following agreements stated that the lower house represented thepeople and the upper house represented the states?A. Great CompromiseB.Representation CompromiseC.Executive CompromiseD.Three-Fifths Compromise69 place value of 30,542 The tendency to view one's own culture or group as superior to others.ideologyreformulationinternalizationself-fulfillmentnarcissismethnocentrismTrue or false 4.24Audit risk and inventories LO1Bandits Bargains stocks thousands of items that range in value from $1 to $100. The inventories on hand represent a material portion of current assets. The merchandise items change according to the season and the promotional theme adopted by the stores management for the year. Merchandise is ordered up to four months in advance from Chinese and Korean suppliers. These special orders require Bandits Bargains to give the suppliers substantial deposits upon placement of the orders.RequiredIdentify the accounts (balance sheet and income statement) that are at risk of material misstatement for Bandits Bargains. Explain why they are at risk. Below, the two-way table is given for a classof students.FreshmenSophomoreJuniors Seniors TotalMale.4622Female 3463TotalIf a student is selected at random, find theprobability the student is a senior.P(Senior) = [?]%Round to the nearest whole percent.Entor Reporting frequencies of sample data, such as eye color, ethnicity, grade point average, and height is done by using __________ statistics. A. inferential B. exploratory C. descriptive D. correlational Please select the best answer from the choices provided A B C D derivation of f(x) = x^4 - 8x^2 + 3