I need the proper code because I have no idea how char works in Java but I need this code for String Java in OnlineGDB

I Need The Proper Code Because I Have No Idea How Char Works In Java But I Need This Code For String

Answers

Answer 1

Given in the image is an example of  program in Java that is able to takes input from a file "words.txt" and a character, and also be able to returns the position of the character in the string.

What is the Java code about?

The Java code given in the image is one that is set up to carry out some key  tasks by taking input from a file labeled as "words.txt".

Therefore, The most basic approach for writing text to a file is to make use of the standard java.io package's PrintWriter class. The commonly used print() and println() techniques for writing to the console are said to be available in the PrintWriter class.

Learn more about Java code from

https://brainly.com/question/25458754

#SPJ1

See text below

Write a program to input a string and a character and return the position of the character found in the string, or indicate that the character is not in the string. Hint: use if-else

4 public class Main

public static void main(String[] args) throws IOException

DATA FILE ("words.txt")

dog

g

beautifully

I Need The Proper Code Because I Have No Idea How Char Works In Java But I Need This Code For String

Related Questions

A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in a stack.

Their teacher is looking to see if a specific ID number is included in the stack. Which of the following best describes whether their teacher should use a linear or a binary search?

A. The teacher could use either type of search though the linear search is likely to be faster
B. The teacher could use either type of search though the binary search is likely to be faster
C. Neither type of search will work since the data is numeric
D. Only the linear search will work since the data has not been sorted

Answers

Answer:

D.

Explanation:

Binary searches are required to be first sorted, since they use process of elimination through halving the list every round until the answer is found. Linear searches just start from the beginning and check one by one.

Do you ever wonder what types of media you will be using five years from now or when you graduate from college or a training program? How do you believe you will use digital media in your life?

For this assessment, you will create a concept map. A concept map is a graphic representation of a broad base of ideas or events. You will put yourself in the center of the concept map and have at least five branches from the center that show five different ways that you will use digital media. Below your concept map, explain each different way in detail. Use your imagination to describe why you believe that you will use digital media in these ways in the future. Remember that technology changes quickly and so does digital media. Keep in mind what we have discussed in this lesson.

You will include:

a concept map showing your future uses for digital media (at least five)
an explanation of each use
a description of the use

Upload your concept map that provides a detailed explanation of five different ways you will experience digital media in the future.

Answers

The  example of a concept map and the explanations for the uses of digital media.

Concept Map:

[You in the Center]

   Entertainment    Communication    Education    Information    Work

What is the training program?

Entertainment - I believe I will continue to use digital media for entertainment purposes such as watching movies, TV shows, and playing video games. With advancements in technology, I expect the quality and accessibility of digital entertainment to improve. Streaming services like Netflix and Hulu already offer an extensive library of content, and I believe this trend will continue to grow.

   Education - As someone who is currently in college, I have already seen how digital media can enhance the learning experience. I expect to continue using digital media for educational purposes, such as online courses, e-books, and educational apps. With the rise of artificial intelligence and machine learning, I also believe that digital media will play an increasingly important role in personalized learning.

Lastly, Work - With the growth of the digital economy, I expect to use digital media extensively for work-related purposes. This could include remote work, virtual meetings, and digital collaboration tools. I also expect to use digital media for job searching and career development, as well as for networking with other professionals.

Learn more about training program from

https://brainly.com/question/29926440

#SPJ1

Answer:

                                                 Concept Map

EntertainmentCommunicationEducationInformationWork

Entertainment - I believe digital media will remain a popular source of entertainment due to its convenience and accessibility. Streaming services like Netflix and online gaming have revolutionized how we consume entertainment, and advancements in technology will only improve the quality and accessibility of digital entertainment. Virtual and augmented reality may offer new ways to experience entertainment, making it an exciting time for digital media.

Communication - Digital media is transforming communication, and its impact will continue to be felt in the future. Potential future uses include virtual and augmented reality for immersive experiences in remote meetings, training, and customer experiences; artificial intelligence to automate tasks like scheduling and emails; voice assistants for easier control of devices and communication with colleagues; and new social media platforms designed for professional networking and collaboration. Collaborative tools like Slack and Microsoft Teams may become even more sophisticated, allowing seamless communication and collaboration. Overall, digital media is vital for efficient work, effective collaboration, and accessing new growth opportunities.

Education - Digital media has transformed the education landscape by making learning materials more accessible through online courses, e-books, and educational apps. It has also enabled new avenues for collaboration and engagement through online discussion forums and video conferencing tools. With the rise of artificial intelligence and machine learning, digital media is expected to play a significant role in personalized learning by analyzing individual student data and providing tailored recommendations for improving learning outcomes. Overall, these advancements will continue to enhance the way we learn and teach, making it more effective and efficient for students.

Information - Digital media is set to revolutionize how we access and interact with information. Personalized content based on users' preferences and browsing history could be delivered through digital media, thanks to advancements in artificial intelligence. Digital media can also create virtual libraries and museums that allow users to access rare and historical collections from anywhere in the world. Interactive learning experiences that incorporate gamification and augmented reality can be created. Additionally, digital media can create compelling visual representations of complex data sets to make information analysis and understanding easier. Real-time updates on news and events worldwide can also be enabled through digital media, keeping users informed and connected at all times.

Work - The digital economy is rapidly expanding, and digital media will become increasingly important in our work lives. Advancements in technology will make remote work and virtual collaboration more seamless and efficient. Virtual and augmented reality technologies have the potential to revolutionize collaboration, while chatbots and virtual assistants will automate tasks. Digital media will also play a significant role in career development and networking. Online learning platforms enable individuals to learn new skills and advance their careers. More personalized learning platforms will help individuals upskill and stay competitive in the job market. Digital media will shape the way we work and do business, enabling us to work more efficiently, collaborate more effectively, and access new opportunities for career growth and development. As a digital assistant, I am excited to see how technology will continue to advance and transform the way we work.

what is the checksum of 148​

Answers

Answer:

The summary on the given topic is summarized in the explanation portion below.

Explanation:

A means to ensure that somehow a machine data communication or transfer has no bits missing are termed as Checksum. These would be determined in many extremely difficult directions but there's no response.Whereas if checksum appears unacceptable or inaccurate, the machine is compared mostly with documentation it gets or collects and lends it a position.

True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow students directly from your online course in blackboard.

Answers

Answer:

TRUE

Explanation: please mark me brainliest

2. Information sources are generally categorized into three levels: primary, secondary, tertiary. True B) False

Answers

True. Information sources are generally categorized into three levels: primary, secondary, tertiary.

Information sources are commonly categorized into three levels: primary, secondary, and tertiary. Primary sources are original and firsthand accounts of information, while secondary sources analyze or interpret primary sources. Tertiary sources compile and summarize information from primary and secondary sources. This categorization helps in understanding the reliability, depth, and context of the information obtained from different sources.

learn more about:- Information sources here

https://brainly.com/question/29269826

#SPJ11

What are this Chinese logo map

Answers

Answer:

hope it's helpful to you

What are this Chinese logo map

Find the result of the following operation given that the numbers are represented in 2 's complement format. Assume that the number of digits \( (n) \) is \( 8 . \) \[ 10110 \text { - } 1110 \] Note:

Answers

Answer: \($$\boxed{\text{The result of the operation }10110 - 1110 \text{ is } -8 \text{ represented in two's complement format.}}$$\)

The given numbers are represented in two's complement format.

The number of digits \(\(n\)\) is 8.

We need to perform the operation: \(\[ 10110 - 1110 \]\)

First, we have to convert the numbers into decimal form.

10110 is a negative number, so we will use the first bit as a sign bit to represent a negative number.

Sign bit = 1.

Other bits = 0110 = 6 (in decimal).

Therefore, 10110 in two's complement format is -6.

1110 is a positive number as the sign bit is 0.

Therefore, 1110 in two's complement format is 14 (in decimal).

Now, we will perform the subtraction operation.

Subtract 1110 from 10110.

\($$ \begin{array}{cc} & 10110 \\ - & 1110 \\ \end{array} $$\)

Subtracting 0 from 0, we get 0.

Borrowing 1 from 1, we get 10.

Subtracting 1 from 10, we get 1.

Subtracting 1 from 0, we get -1.

Borrowing 1 from 1, we get 10.

Subtracting 1 from 1, we get 0.

Subtracting 0 from 1, we get 1.

Therefore, the result of the given operation is -8 represented in two's complement format.

Answer: \($$\boxed{\text{The result of the operation }10110 - 1110 \text{ is } -8 \text{ represented in two's complement format.}}$$\)

To know more about operation, visit:

https://brainly.com/question/30581198

#SPJ11

if i don't convert type to outlines in illustrator, does the viewer need to have the fonts installed? Yes/No

Answers

Yes, if you don't convert the type to outlines in Illustrator and the viewer does not have the fonts installed on their computer, the text will not display correctly.

This is because when you create text in Illustrator, it uses the fonts installed on your computer to display the characters. If you send the file to someone who does not have those fonts installed, their computer will substitute a different font, which may not match the original design.

However, if you convert the text to outlines, the font is no longer required and the text will be displayed as a graphic, which can be viewed correctly regardless of the viewer's installed fonts. It's important to note that converting text to outlines can make it more difficult to make edits later, so it's recommended to keep a copy of the original file with the live text intact.

Learn more about fonts here:

https://brainly.com/question/14934409

#SPJ11

Which system uses 16 digits to represent data?
O A. Hexadecimal code
O B. Decimal code
O C. Binary code
O D. Encode

Answers

The answer is A) hexadecimal code

Which entry-level cyber security has the highest average salary?

Will give brainliest

Answers

Answer:

The base salary for Entry Level Cyber Security Analyst ranges from $64,898 to $78,041 with the average base salary of $71,206.

Explanation:

Which of the following statements is true regarding Bell Labs? Select 3 options. They were responsible for developing the first mechanical computer, called the Analytical Engine. They developed the first cross country network to connect academic institutions. They are credited with creating the Unix operating system and solar cells. Work from their researchers resulted in nine Nobel prizes. Researchers from Bell Labs are responsible for the invention of the transistor.

Answers

Answer:

Researchers from Bell Labs are responsible for the invention of the transistor.

They are credited with creating the Unix operating system and solar cells. Work from their researchers resulted in nine Nobel prizes.

Explanation:

The statements is true regarding Bell Labs are; They are credited with creating the Unix operating system and solar cells. Work from their researchers resulted in nine Nobel prizes.

What is UNIX?

UNIX is simply an operating system developed by Bell Laboratories in the 1960s. Ever since then, it has been constantly worked upon and developed.

UNIX is an operating system because it is a suite of programs capable of making a computer to function.

Thus considered to be a stable, multi-user, and multi-tasking system for both desktops and laptops and even servers.

The statements is true regarding Bell Labs are; They are credited with creating the Unix operating system and solar cells.

- Work from their researchers resulted in nine Nobel prizes.

- Researchers from Bell Labs are responsible for the invention of the transistor

Learn more about UNIX;

https://brainly.com/question/14751939

#SPJ2

describe what is the generative adversarial net and how it works

Answers

A generative adversarial network (GAN) is a type of machine learning model in which two neural networks work together to generate new data.

The GAN consists of a generator and a discriminator network that is used to create artificial data that looks like it came from a real dataset. The generator network is the one that produces the fake data while the discriminator network evaluates it. The two networks play a "cat-and-mouse" game as they try to outsmart one another. The generator takes a random input and creates new examples of data. The discriminator examines the generated data and compares it to the real dataset. It tries to determine whether the generated data is real or fake. The generator uses the feedback it gets from the discriminator to improve the next batch of generated data, while the discriminator also learns from its mistakes and becomes better at distinguishing between real and fake data.

The generator's goal is to create artificial data that is similar to the real data so that the discriminator will be fooled into thinking it is real. On the other hand, the discriminator's goal is to correctly identify whether the data is real or fake. By playing this game, both networks improve their abilities, and the result is a generator that can create realistic artificial data.

Learn more about generative adversarial network (GAN) here: https://brainly.com/question/30072351

#SPJ11

4.9 Code Practice Question 4

Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values.

Sample Run
Enter Temperature: 27.6
Enter Temperature: 29.5
Enter Temperature: 35
Enter Temperature: 45.5
Enter Temperature: 54
Enter Temperature: 64.4
Enter Temperature: 69
Enter Temperature: 68
Enter Temperature: 61.3
Enter Temperature: 50
Sum = 504.3

Answers

total = 0

for x in range(10):

   temp = float(input("Enter Temperature: "))

   total += temp

print("Sum = {}".format(total))

I hope this helps!

What dictionary operation can you use to remove all the keys within the dictionary-named contacts?

Answers

The dictionary operation that you use to remove all the keys within the dictionary-named contacts is contacts.clear().

What is dictionary add and remove element from dictionary?

The act of Removing elements from Dictionary is one that can delete a specific item in a dictionary by the use of the pop() method.

Note that this method deletes an item with the given key and returns the value .

Hence, The dictionary operation that you use to remove all the keys within the dictionary-named contacts is contacts.clear().

Learn more about dictionary operation  from

https://brainly.com/question/24680091

#SPJ1

What is the main purpose of the design of a water hose.

Answers

Hoses are used to carry fluids through air or fluid environments. Hope this helps!
main purposes of design is function, communication, and aesthetics.

What are the requirements in order for data to be reliable? (Select all that apply) 1 point Data should be structured Data should be free of all errors Data should be relevant Data should be easy to collect

Answers

They should gather qualitative data about the ice cream flavor preference.They should gather this data via online questionnaire and the data will live in a cloud server.They store the data in a spreadsheet or database.

How is collecting customer flavor preference data?

This data will be gathered via online questionnaire stored in an encrypted cloud server and then will be analyzed based on each consumer flavor preference to model a general picture which will be our guidance for business strategy.

The data collected should be relevant prior mostly and then should be appropriate to the data need and sampling need for the collection to be fruitful. Other most important criteria for data collection is being timely.

Therefore,They should gather qualitative data about the ice cream flavor preference.

Learn more about qualitative data on:

https://brainly.com/question/29004144

#SPJ1

what is excel in ibca

Answers

Answer:

Excel is mostly used for data storage. It also more or less has its own programming language within it for automation of data transfer and storage. It's used in a grid layout or what you'd see as a sheet.

I have taken IBCA (Intro to Business Computer Applications) but I'm surprised that you're taking excel in IBCA, perhaps just the basics I'm assuming. Completing IBCA should get you Microsoft certifications in Word and BCA will get you certifications in Powerpoint and Excel. If you pass of course.

A 32-second sound clip will be recorded. The sound will be sampled 16000 times a second. Each sample will be stored using 8 bits. Calculate the file size in kilobytes. You must show all of your working. ​

Answers

The  Audio Size of the 32-second sound clip is given as: = 500 kb

See calculation and explanations below.

What is Audio Size?

The term audio size is used to refer to the size of an audio file measured in bytes, or kilobytes, or megabytes depending on it's size.



What is the calculation of the size of the audio file?

Step 1

The formula for calculating the Audio Size is:

= Sampling rate x sample size x time x channel

= 16,000hz x 8bits x 32 x 1 (We assume it is only one channel since the number of channels is not specified)

= 4,096,000 bits

Step 2 - We convert to bytes.

To convert to bytes, we divide our answer in bits by 8; hence

= 4,096,000/8

= 512,000

Step 3 - convert to kilobytes by dividing by 1024

Therefore, answer in kilobytes

= 512,000/1024

= 500 kb

See more about kilobytes at:
https://brainly.com/question/15166519
#SPJ1

raphael is working with a table in access. he needs to see all the records for customers in chattanooga so he can check the zip codes in that city. which database tool will show only these records in the table?

Answers

The 'filter' is the Access database tool that will show only the specified records in the table.

The 'filter' tool of the Access database is a valuable tool that allows obtaining only the desired data. The 'filter' tool provides you with the data that you want to retrieve from the access databases. You can use the 'filter' tool to fetch and display specific records in a datasheet, form, or report.

Based on the scenario given in the question where Raphael is working with a table in the Access database and wants to fetch the records of customers in Chattanooga in order to check zip codes in that city. Raphael will use the 'filter' tool of the Access database. The 'filter' tool will provide him with all the records of customers in Chattanooga.

You can learn more about Access Databases at

https://brainly.com/question/9745438

#SPJ4

In the interface ListInterface, the method public void add(T newEntry); describes which of the following behaviors?
a. adds a new entry to the end of the list
b. increases the list size by 1
c. does not affect any other entries on the list
d. all of the above

Answers

The method public void add(T newEntry); in the interface ListInterface describes the behavior of adding a new entry to the end of the list, increasing the list size by 1, and does not affect any other entries on the list. Therefore, the correct answer is d. all of the above.

The method public void add(T newEntry) in the interface ListInterface simply specifies that a new entry should be added to the list, without specifying any particular location. Therefore, the behavior of this method can vary depending on the specific implementation of the ListInterface.

However, in general, the method add is often used to add a new entry to the end of the list, increasing the size of the list by 1. This is the most common implementation of the add method in many list data structures.

Additionally, the add method does not typically affect any other entries in the list, meaning that it only modifies the list by adding the new entry, leaving all other entries unchanged.

Therefore, the correct answer is d. all of the above.

Learn more about method https://brainly.com/question/19360941

#SPJ11

employees have the ability to download certain applications onto their workstations to complete work functions. the cio enacted a policy to ensure that no modifications to the application have occurred. what method of validation did the cio implem

Answers

Code signing is the method of validation the CIO implement.

In order to verify the program author and ensure that the code hasn't been changed or damaged since it was signed, executables and scripts must be digitally signed. This procedure is known as code signing. The procedure uses a cryptographic hash to verify the validity and integrity of the data. Code signing can offer a number of beneficial advantages. Code signing is most frequently used to secure deployments; in some programming languages, it may also be used to lessen namespace conflicts. Almost all code signing implementations include some kind of digital signature method that may be used to confirm the author's or build system's identity as well as the object's integrity. It may also be used to hold additional meta data about an item or to offer versioning information about an object.

Learn more about the Web security with the help of the given link:

https://brainly.com/question/7098928

#SPJ4

3. Choose the statement that best describes a ray. A ray extends forever in both directions. B ray is a part of a line with two endpoints. C ray is an exact location. D ray has one endpoint and continues forever in the opposite direction.

Answers

Answer:

Ray is part of a line that starts at one point and extends forever in one direction.

Explanation:

In geometry, a ray can be defined as a part of a line that has a fixed starting point but no end-point. It can extend infinitely in one direction. On its way to infinity, a ray may pass through more than one point. The vertex of the angles is the starting point of the rays.

Extra

B. A part of a line with two endpoints?

line segment

A line segment has two endpoints. It contains these endpoints and all the points of the line between them. You can measure the length of a segment, but not of a line. A segment is named by its two endpoints, for example, ¯AB.

Answer:

Ray is part of a line that starts at one point and extends forever in one direction.

Explanation:

What is the output of the following snippet?
my_list =
[[0, 1, 2, 3] for i in range (2) ]
print (my_list [2] [0])

Answers

Answer:

Explanation is being shown in the file that takes you to the link

Only one person can receive the same email at the same time true or false

Answers

Answer:

false

Explanation:

Can you show details information on how to solve this problem.
Assume that the sizes of processes P2, P3, P4, P5, and P6 are 200K, 125K, 185K, 185K, and 175K, respectively. Calculate the total internal fragmentation and the percentage of memory actually used.

Answers

The total internal fragmentation is 154K, and the percentage of memory actually used is approximately 85.02%.

To calculate the total internal fragmentation and the percentage of memory actually used, we need to know the total available memory and the sizes of the processes. Let's assume the total available memory is 1MB (1,024K).

First, let's calculate the total memory used by the processes:

Total memory used = Size of P2 + Size of P3 + Size of P4 + Size of P5 + Size of P6

Total memory used = 200K + 125K + 185K + 185K + 175K = 870K

Next, let's calculate the total internal fragmentation:

Total internal fragmentation = Total available memory - Total memory used

Total internal fragmentation = 1,024K - 870K = 154K

Finally, let's calculate the percentage of memory actually used:

Percentage of memory actually used = (Total memory used / Total available memory) * 100

Percentage of memory actually used = (870K / 1,024K) * 100 = 85.02%

Therefore, the total internal fragmentation is 154K, and the percentage of memory actually used is approximately 85.02%.

to lern more about internal fragmentation.

https://brainly.com/question/31596259

#SPJ11

There is a weird green and black kinda growth on my screen that moves when I squeeze the screen, it also looks kinda like a glitchy thing too,Please help

Answers

LCD stands for Liquid Crystal Display. So yes, what you're seeing is liquid. it's no longer contained where it needs to be.

What port on the Aten KVM Switch does the RHS connect to? (It didn't specify what type)

CPU 4
CPU 3
CPU 2
CPU 1

Answers

Answer:

Without more details about the specific Aten KVM switch and RHS in use, I can only provide general guidance on where those ports and connections would likely be. Some things to consider:

• If the switch supports 4 CPUs, it is likely a 4-port KVM switch. So the options for where the RHS could connect would be to CPU 1 through CPU 4.

• The RHS typically stands for "Remote Host Station" which refers to the station that allows you to control and access the connected CPUs remotely. So the RHS port would connect to one of the CPU ports on the switch.

• Many KVM switches use standard PS/2 connectors for keyboard, mouse, video, and audio. Some also support USB connectors or a mix of PS/2 and USB ports. The ports on the Aten KVM switch and connectors on the RHS need to match in type and pin configuration to properly connect.

• Some switches use dedicated ports for keyboard, mouse, video, and audio for each CPU. Other switches use combined ports where you need to select whether the connection is for keyboard/mouse, monitor video, or audio. This will depend on your specific switch design.

• Ports are often labeled on the switch to indicate which CPU they correspond to, e.g. "CPU1", "CPU2", etc. The RHS would then connect to the appropriate port for the CPU you want to access remotely.

Without a visual diagram or more details on the Aten KVM switch, I cannot definitively specify which exact port (CPU 1 through CPU 4) the RHS should connect to. My recommendations would be:

Review the documentation for your specific Aten KVM switch model to determine port types and labels.

Ensure the connectors on the RHS match what the ports accept.

Try connecting the RHS to each port one by one, starting with CPU 1, until you gain access to the intended remote host system.

If still unsure or running into issues, you may need to contact Aten technical support for further guidance on your switch model.

Explanation:

Answer:cpu 1

Explanation:

please can someone help me with this?

please can someone help me with this?

Answers

Explanation:

there fore 36:4 = m¤

46:6

20:16

#von5

when you save a presentation with a .potx file extension, which type of powerpoint file is created?

Answers

A file with the POTX file extension is a Microsoft PowerPoint Open XML Template file used to maintain the same layout, text, styles, and formatting across multiple PPTX files.

When you save a presentation with a .potx file extension, the type of PowerPoint file that is created is known as .PPTX file.

What do you mean by Presentation?

The presentation may be defined as an activity in which someone expresses, describes, or explains something to a group of people in order to explore the given facts and understandings. The person who presents is known as the speaker, while the person who listens is known as the audience.

A POTX file is a presentation template created by PowerPoint, a program that significantly allows users in order to create slide show presentations. It contains default styles, text, layout, and formatting. POTX files are utilized in order to create multiple .PPTX files with the same formatting.

Therefore, when you save a presentation with a .potx file extension, the type of PowerPoint file that is created is known as .PPTX file.

To learn more about Presentation, refer to the link:

https://brainly.com/question/24653274

#SPJ5

It is not possible to have more than one optimal solution to a linear programming problem.
a. true. b. false.

Answers

Answer:false

Explanation:

Other Questions
Which statement could be used to explain why the function h(x) = x3 has an inverse relation that is also a function?The graph of h(x) passes the vertical line test.The graph of the inverse of h(x) is a vertical line.The graph of the inverse of h(x) passes the horizontal line test.The graph of h(x) passes the horizontal line test. which of the following is the correct order from earliest to latest of the revolution Sanofi contracted with UPS to store Sanofis vaccines in UPSs temperature-controlled warehouse. Under the contract, UPS agreed to store the product between 2 and 8 degrees Celsius and Sanofi agreed to obtain all-risks property insurance in an amount of full replacement cost for any damage to the vaccines while they were in storage. Several months later, it was discovered that the cooler had malfunctioned and the temperature had dropped to 4.2 degrees Celsius. As a result, the vaccines were rendered unsaleable causing Sanofi to suffer a loss of $8.2 million. After indemnifying Sanofi for the unsellable vaccines, Sanofis insurers brought a subrogated action against UPS. What is a subrogated action? What is the purpose of a subrogated action? What possible defences are available to UPS? Are the insurers likely to be successful? Would your answer change if the insurers brought the subrogated claim against the manufacturer of the temperature control system, the supplier and installer of the control system, or the contractor who calibrated and tested the system? The cost per ounce of a drink, c, in cents, varies inversely as the number of ounces, n. Six ounces of the drink costs 60 centsper ounce. Find the equation that represents this relationship.Note: Enter your answer in cents C= 6) 12 pounds of peanuts are mixed with an unknown weight of cashews. The peanuts cost a total of$30, the cashews cost $5 per pound. The combined mixture of nuts costs $4 per pound. How manypounds of cashews were used in the mixture? pls help 2 cm 2 cm (1.7 cm 3 cm 2 cm Find the surface area of the triangular prism. square centimeters What would happen to each of the properties if the intermolecular forces between molecules increased for a given fluid Complete a brief analysis of Citigroup. This analysis should identify Citigroup's: 1. current strategies, 2. strategic intent, 3. strategic mission, 4. capabilities, 5. core competencies, and 6. a competitive response profile (how does the company respond when its competitors make a change) Sperm cells have a whip like ____ to move them through a liquid. For a normally distributed population with a mean of 130 and standard deviation of 20 , approximately what percentage of the observations should we expect to lie between 90 and 170 ? Enter your answer to one decimal place. % of observations b. For a symmetric and m d-shaped distribution with a mean of 200 and standard deviation of 35 , approximately what percentage of the observations shoulo we expect to lie between 95 and 305 ? Enter your answer to one decimal place. % of observations c. For a bell-shaped distribution with a mean of 150 and a standard deviation of 25 , what interval should contain approximately 68% of the data? Enter your answers as whole numbers. Lower interval limit = , Upper interval limit = d. For a normally distributed population with a mean of 140 and a standard deviation of 15 , what interval should contain approximately 95% of the data? Enter your answers as whole numbers. Lower interval limit = Upper interval limit = Which of the following is true about a hypothesis that is proven to be inaccurate? WILL GIVE BRAINLIEST FOR CORRECT ANSWER!! A. An inaccurate hypothesis is not valuable. B. It allows the scientist to eliminate any possibility of a relationship between two variables. C. It will provide information to help formulate a new hypothesis in the future. D. It proves that the exact opposite of the hypothesis is true. The parallel lines of an isosceles trapezoid are congruent.true or false Transfusing mismatched blood types is a problem for a patient because A. it slows down digestion. B. it changes blood composition. C. it causes infection. D. it causes clots in blood vessels. Calcium hydroxide and phosphoric acid react to form calcium phosphate andwater A 10 1/2-inch candle burns down in 7 hours. If b represents how much of the candle, in inches, has burned away at any time given in hours, t, write a proportional equation for b in terms of t that matches the context. On April 19, 1940, the local health officer in the village of Lycoming, Oswego County, New York, reported the occurrence of an outbreak of acute gastrointestinal illness to the District Health Officer in Syracuse. Dr. A. M. Rubin, epidemiologist-in-training, was assigned to conduct an investigation.When Dr. Rubin arrived in the field, he learned from the health officer that all persons known to be ill had attended a church supper held on the previous evening, April 18. Family members who did not attend the church supper did not become ill. Accordingly, Dr. Rubin focused the investigation on the supper. He completed Interviews with 75 of the 80 persons known to have attended, collecting information about the occurrence and time of onset of symptoms, and foods consumed. Of the 75 persons interviewed, 46 persons reported gastrointestinal illness.Question 1: Would you call this an epidemic? Would you call it an outbreak? what si tour mame? en espaol (2+5root7)/(2-5root7) = a+b root7 class 9with complete explanation pls If a minor is served alcholic beverages, who is legally responsible?A.the serverB. The bartenderC.the bouncerD.the employer Which of these is an example of an ethnic enclave in New York City?