In C++Write a loop that subtracts 1 from each element in lowerScores. If the element was already 0 or negative, assign 0 to the element. Ex: lowerScores = {5, 0, 2, -3} becomes {4, 0, 1, 0}.


int main() {

const int SCORES_SIZE = 4;

int lowerScores[SCORES_SIZE];

int i;


for (i = 0; i < SCORES_SIZE; ++i) {

cin >> lowerScores[i];

}

/* Your solution goes here */

for (i = 0; i < SCORES_SIZE; ++i) {
cout << lowerScores[i] << " ";
}
cout << endl;
return 0;
}

Answers

Answer 1

If the element is 0 or negative, assign 0 to the element, Continue to the next element.

To write a loop that subtracts 1 from each element in lowerScores and assigns 0 if the element was already 0 or negative, follow these steps:
Here's the modified code:
```cpp
int main() {
 const int SCORES_SIZE = 4;
 int lowerScores[SCORES_SIZE];
 int i;
 for (i = 0; i < SCORES_SIZE; ++i) {
   cin >> lowerScores[i];
 /* Your solution goes here */
 for (i = 0; i < SCORES_SIZE; ++i) {
   if (lowerScores[i] > 0) {
     lowerScores[i] -= 1;
   } else {
     lowerScores[i] = 0;
   }
 }
 for (i = 0; i < SCORES_SIZE; ++i) {
   cout << lowerScores[i] << " ";
 }
 cout << endl;
 return 0;
}
```

This code will result in the desired output, such as transforming {5, 0, 2, -3} into {4, 0, 1, 0}.

Create a loop that iterates through the elements in the array using the SCORES_SIZE constant, Check if the current element is greater than 0,If the element is greater than 0, subtract 1 from it.

More On C++ Program's: https://brainly.com/question/28959658

#SPJ11


Related Questions

What can handle work that is hard on a person and could cause repetitive injuries?

Answers

The robot which can handle work that is hard on a person and could cause repetitive injuries is a: Cobot.

Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing and handling tasks that are exclusively designed to be performed by humans or with human intelligence.

A cobot is an intelligent robot that is designed and developed to perform and handle work that may be too hard (difficult) and hazardous for a person or could cause repetitive injuries to him or her.

Read more: https://brainly.com/question/21656851

Which animation technique makes it easier to achieve smooth animations?


A. follow through

B. overlap

C.pose to pose

D. straight ahead

Answers

The animation technique that allows the illustrator to make fluid animations is pose to pose (option C).

What is the pose to pose animation technique?

The pose-to-pose animation technique is a technique used by animation illustrators to create animations using a drawing in a specific position as a reference point. Subsequently, they establish the intermediate drawings in which the character's movement is expressed.

For example, in many animations we see that a character is running. In this case, since it is a repetitive movement, the illustrator only has to make 3 or 4 drawings of the character and organize them in the appropriate way so that a fluid animation is seen. This facilitates the animation for the illustrator because with a few drawings they can make a longer animation, for example a character jumping, running, walking, talking, among others.

Learn more about animation in: https://brainly.com/question/18856998

#PSJ1

Answer:

c

Explanation:

What is the output of this program?


numA=3

for count in range(4,7):

numA= numA+ count

Print(numA)


(YOU WILL BE MARKED AT BRAINLIEST)

Answers

Answer:

18

Explanation:

the loop goes from 4 to 6

so after first loop numA = 3 + 4 = 7

second loop numA = 7 + 5 = 12

thirs loop numA = 12 + 6 =18

The output of the program is 18. In this program the numbers are calculated.

What is program?

Program is defined as a series of instructions written in a programming language that a computer may follow. A program's behavior when it is being used defines its functionality, which is frequently illustrated by how a user interacts with it. Low-level access to system memory is made possible by the procedural and general-purpose nature of the C programming language. To create an executable that a computer can run, a C program needs to be run through a C compiler.

As given

The loop goes from 4 to 6

So after 1 st loop numA = 3 + 4 = 7

2 nd loop numA = 7 + 5 = 12

3 rd loop numA = 12 + 6 =18

Thus, the output of the program is 18. In this program the numbers are calculated.

To learn more about program, refer to the link below:

https://brainly.com/question/3224396

#SPJ5

What uses electronic tags and labels to identify objects wirelessly over short distances? Multiple Choice 3D printing materials management radio frequency identification drones

Answers

Radio frequency identification (RFID) uses electronic tags and labels to identify objects wirelessly over short distances. RFID is a technology that employs radio waves to send data between a tag or label and a reader, allowing for the identification and tracking of objects.

RFID technology is commonly used in a variety of applications, including inventory management, asset tracking, and supply chain management. The technology is also used in access control systems, such as keyless entry systems for buildings or vehicles, and in electronic toll collection systems.

RFID technology can be applied to a wide range of objects, including products in a retail store, vehicles in a parking lot, and even livestock in a farm. The tags and labels used in RFID technology can be passive or active, with passive tags relying on the reader to power them and active tags having their own power source.

RFID technology is often compared to barcoding, with RFID offering the advantage of being able to identify and track objects without line-of-sight contact. This makes RFID particularly useful in applications where objects need to be identified and tracked quickly and efficiently, such as in a warehouse or distribution center

RFID tags and labels can be reused, reducing the cost of the technology over time.

To know more about Radio frequency identification visit:-

https://brainly.com/question/28272536

#SPJ11

can someone helpp what is this?

can someone helpp what is this?

Answers

Answer:

How about:

if a person is cute and not in a relation, and if it is friday or saturday, ask the person out on a date.

I highlighted the gates in the text.

can someone helpp what is this?

Question #1
Dropdown
Choose the word that matches each definition. Each term is only used once.
✓a GUI operating system that runs only on Apple desktop and laptop computers
✓an operating system for Apple mobile devices such as iPhone and iPad
✓a free Linux-based operating system for mobile devices

Answers

a GUI operating system that runs only on Apple desktop and laptop computers: macOS

an operating system for Apple mobile devices such as iPhone and iPad: iOS

a free Linux-based operating system for mobile devices: Android

In the tcp/ip model, what layer is considered so simple that it is ignored entirely?

Answers

In the tcp/ip model, what layer is considered so simple that it is ignored entirely is the Physical layer.

What is the Physical layer of tcp/ip model?\

The Physical Layer is known to be called the smallest or the lowest layer of the TCP/IP model.

Note that it is one that helps to handle  data in the form of bits and this  layer helps to deal with the host to host communication in any given network.

Therefore, In the tcp/ip model, what layer is considered so simple that it is ignored entirely is the Physical layer.

Learn more about tcp/ip model from

https://brainly.com/question/17387945

#SPJ1

In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Physical b. Data Link c. Application d. Network

In order to perform a calculation in a spreadsheet, you need to use a:

A) Variable

B) Formula

C) Table

D) None of the above

Answers

Answer:

B formula

Explanation:

took this last year

What do you understand by ISA? Does the external auditor follow
ISA or any regulatory body in conducting their audit? (150
words)

Answers

ISA stands for International Standards on Auditing. These standards are a set of globally recognized audit guidelines developed by the International Auditing and Assurance Standards Board (IAASB).

These standards aid in the achievement of international consistency and quality in auditing practices and provide for an objective methodology that auditors can use to measure the effectiveness of the audit process. It is relevant for both internal and external auditing.Internal auditors are in charge of verifying a company's accounts, processes, and systems. An internal auditor's function is to ensure that a company's financial data is correct, secure, and that all procedures are followed. Internal auditors should be familiar with ISA and use it to help guide their work.External auditors, on the other hand, are auditors who are not employed by the company they are auditing. External auditors must follow all ISA principles and guidelines to perform a fair and objective audit of a company's financial statements. External auditors are obliged to follow the auditing regulations and procedures of any regulatory body in addition to following ISA guidelines, as the auditing process is overseen by a number of regulatory bodies.In conclusion, the ISA provides guidelines that both internal and external auditors must follow. External auditors are required to comply with all ISA principles, regulations, and procedures in addition to the auditing guidelines of regulatory bodies.

To know more about Standards, visit:

https://brainly.com/question/31979065

#SPJ11

What is the purpose of a web server? What is the purpose of a web browser?

Answers

Answer: the purpose of a web browser is to help answer and needed questions, and to get to sites.

Explanation:

Computer engineering is a career that......

Answers

Answer:

Computer engineering is a career that works on the development and research of new technology-related things.

Explanation:

How to fix "deprecated gradle features were used in this build, making it incompatible with gradle 8.0"?

Answers

To fix this issue, the user needs to update the project's build.gradle file and replace the deprecated features with the new recommended ones.

Here are some steps the user can follow:

Check the Gradle version the project is currently using.Check the Gradle documentation for the version that is being used, to see which features have been deprecated in the latest version.Update the build.gradle file to use the recommended replacement features.Re-run the build command.

The error message "deprecated gradle features were used in this build, making it incompatible with gradle 8.0" occurs when a user is trying to build a project using an older version of the Gradle build tool, and the project contains features or configurations that have been deprecated (removed or replaced) in the latest version of Gradle.

Gradle is a powerful build tool that is commonly used in Java and Android development. It allows developers to automate the process of building, testing, and deploying their projects.

Learn more about fix problem, here brainly.com/question/20371101

#SPJ4

convert these denary numbers into binary numbers
a.36
b.137
c.254
d.184
e.212
f.500​

Answers

a. 0100100
b. 010001001
c. 011111110
d. 010111000
e. 011010100
f. 0111110100

What is the formula for increasing or decreasing recipe yield?​

Answers

The formula for increasing or decreasing recipe yield is multiplying the number of portions and the size of each portion.

What is a yield?

In the context of food, yield refers to how much of a finished or processed product you will have. A yield should always be included in professional recipes; for instance, a tomato soup dish might yield 15 L or 24 muffins.

A crucial tool for figuring out how much of a product to buy or how much to use in a recipe is yield percent. Making an accurate food order requires knowing how to calculate yield %.

Therefore, multiplying the number of portions and the size of each portion is the formula for altering the yield of a recipe.

To learn more about yield, refer to the link:

https://brainly.com/question/12704041

#SPJ9

In phishing scams, a scam artist obtains the victim's personal information by collecting it on websites. Asking for it. Stealing it. Searching for it online.

Answers

Answer:

B. Asking for it

Explanation:

In phishing scams, a scam artist obtains the victim's personal information by Asking for it. Hence, option B is correct.

What is phishing scams?

Phishing is a sort of online scam that preys on consumers by sending them emails that appear to be from reputable companies, such as banks, mortgage lenders, or internet service providers.

Phishing can occur by text message, social media, or phone calls, although the phrase is most frequently used to refer to attacks that come in the form of emails. Phishing emails can directly reach millions of users and can blend in with the countless good emails that busy users receive.

The victim receives an email from app stating that their account has been compromised and will be canceled until they confirm their credit card information. The victim visits a phony website after clicking the link in the phishing email, where the stolen.

Thus, option B is correct.

For more information about phishing scams, click here:

https://brainly.com/question/2880574

#SPJ2

Why can't I access my micro SD card on my Lenovo ThinkPad Yoga 11e? I'm trying to export some PNG files onto my Micro SD card, so I can have the files on my phones.

Answers

maybe you need a new sd card

Design a program that gives simple math quizzes. The program should display two random numbers that are to be added, such as: 247 + 129 The program should allow the student to enter the answer. If the answer is correct, a message of congratulations should be displayed. If the answer is incorrect, a message showing the correct answer should be

Answers

Answer:

import random

num1 = random.randint(0, 1000)

num2 = random.randint(0, 1000)

print(str(num1) + " + " + str(num2) + " = ?")

result = int(input("Enter the answer: "))

if result == (num1 + num2):

   print("Congratulations!")

else:

   print("The correct answer is: " + str(num1 + num2))

Explanation:

*The code is in Python.

Import the random to be able to generate random numbers

Generate two numbers, num1 and num2, between 0 and 1000

Ask the sum of the num1 and num2

Get the input from the user

If the answer is correct, display a message of congratulations. Otherwise, display the correct answer

An example of documentary evidence that might be presented at trial for a cyber crime is:


A. None of these choices.

B. data retrieved from slack space on a hard drive.

C. a cellular telephone.

D. a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses.

Answers

It’s d cause it has valuable info that the person was using to commit the crime

An example of documentary evidence that might be presented at trial for cybercrime is a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses. Thus, option D is correct.

 

What is the evidence?

Evidence is really the data used to attempt to support anything in a court of justice. Evidence is gathered from people, artifacts, and records. The only means through which the court may draw conclusions and reach a ruling is via the use of evidence.

According to the definition of information, it is the demonstration of any claim to be true. A hard copy of a hacker's worksheet with contact information and e-mail accounts is an illustration of documented evidence that might be used in court to prove a cybercrime. Therefore, option D is the correct option.

Learn more about evidence, here:

https://brainly.com/question/14370298

#SPJ2

Please complete the following program according to the specification given. Partial credit will be given for incomplete answers, so provide as much of the answer as you can. Remember that all program segments are to be written in JAVA.

1.Write a method split() which takes an argument String s and prints each character of s with a comma(“,”) in between each character.


Example

split(“1234”) prints: “1,2,3,4”

split(“Hi, Mr. Programmer!”) prints “H,i,,, , M,r,., P,r,o,g,r,a,m,m,e,r,!”

split(“”) prints “”


static public void split(String s) {

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that write a method split() which takes an argument String s and prints each character of s with a comma(“,”) in between each character.

Writting the code:

import java.io.*;

public class Test

{

   public static void main(String args[])

   {

       String Str = new String("Geeks-for-Geeks");

       // Split above string in at-most two strings

       for (String val: Str.split("-", 2))

           System.out.println(val);

       System.out.println("");

 

       // Splits Str into all possible tokens

       for (String val: Str.split("-"))

           System.out.println(val);

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Please complete the following program according to the specification given. Partial credit will be given

Jameelah has files all over her computer. Thus, it is often difficult for her to find the files she is looking for.
How Jameelah correct this issue?.

Answers

Answer:

folders

Explanation:

it is a very good way to keep your desktop organized and keep tidy

how can robots help us with online learning? 3 reasons please thank u :)​

Answers

Answer:

The use of robots increases the practicality of online education, such that the difference between in person attendance and online learning is minimized

In elementary school, robots can help deliver teaching materials in a class like setting, to students  who are unable to attend classes due to their current situation

In high school, simulators can give driving (and flying) lessons to would be drivers, without the exposure of the students to risk

Robots in higher education, such as medicine, can be used to carry out operational procedures with students where, there are no subjects to perform the surgical procedure on

The use of simulators makes possible training in disaster and crisis management

Explanation:

Brief description of RAM?
brief description of how RAM has evolved?
What is the functionality of RAM?
What are the benefits of RAM to the computer system?

Answers

RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor

The first form of RAM came about in 1947 with the use of the Williams tube. It utilized a CRT (cathode ray tube); the data was stored on the face as electrically charged spots. The second widely used form of RAM was magnetic-core memory, invented in 1947

The computer memory RAM ( Random Access Memory ) is a store any types of data for a short time. It means RAM memory is used for short-term data. The main purpose of RAM in a computer is to read and write any data. RAM memory works with the computer's hard disk

RAM allows your computer to perform many of its everyday tasks, such as loading applications, browsing the internet, editing a spreadsheet, or experiencing the latest game. Memory also allows you to switch quickly among these tasks, remembering where you are in one task when you switch to another task

Answer:It makes the computer better your wlcome give me brilint

what was the first model of the remington typewriter to include the visible upstrike design?

Answers

The first model of the Remington typewriter to include the visible upstroke design is Remington No. 2.

What is a Remington typewriter?

The Remington No. 2, which was originally sold in 1878, was the first typewriter to achieve commercial success.

The paper was held type-side down in the carriage of the Remington 2, which used a striking mechanism where the keys would rise up and strike the paper through the ink ribbon from the bottom up.

Therefore, the Remington No. 2 typewriter is the first Remington model to have a visible upstroke design.

To learn more about the Remington typewriter, refer to the link:
https://brainly.com/question/30369660

#SPJ1

In which place does essential computing of computer takes place at?
option
1]microprocessor
2]ram
3]motherboard
4]none

Answers

Answer:i

Explanation: gjjkh

mei is a new network technician for a mid-sized company. she is trying to determine what is causing a performance lag on the infrastructure's virtual private network (vpn). the lags typically occur between 8 a.m. and 9 a.m., and again between 1 p.m. and 2 p.m. what is the most likely cause?

Answers

MEI is a new network technician for a mid-sized company. she is trying to determine what is causing a performance lag on the infrastructure's virtual private network because of peak usage load.

What is MEI?

MEI is defined as a collaborative, open-source initiative to provide a method for structuring musical documents in a machine-readable manner. MEI is often used to create a digital musical text from a music document that already exists.

Peak usage load is defined as the maximum quantity of energy a user takes from the grid in a predetermined amount of time. The highest electrical power demand that has occurred over a given time period is known as peak demand on an electrical grid.

Thus, MEI is a new network technician for a mid-sized company. she is trying to determine what is causing a performance lag on the infrastructure's virtual private network because of peak usage load.

To learn more about MEI, refer to the link below:

https://brainly.com/question/16602669

#SPJ1

This is an example of what type of formula? =average(d1:d17) question 1 options: addition subtraction range average

Answers

Answer:

d average

Explanation:

The average is the ratio of the sum of the observation to the total number of observations. Then the correct option is D.

What is average?

Average is simply defined as the mean of the given set of numbers. The mean is considered as one of the measures of central tendencies in statistics. The average is said to be an arithmetic mean.

The average is given as

\(\rm Average = \dfrac{Sum\ of\ the\ observation}{Total\ number\ of \ observations}\)

This is an example of the average formula.

More about the average link is given below.

https://brainly.com/question/521501

The options on the Ribbon will____:

Answers

replace both the traditional menu bar and toolbars.

Hopefully, It's Correct... (ノ◕ヮ◕)ノ


Bundlr is an example of gatekeeper technology.
Group startsTrue or False

Answers

Answer:

False

Explanation:

Write a Python program that returns (by printing to the screen) the price, delta and vega of European and American options using a binomial tree. Specifically, the program should contain three functio

Answers

To write a Python program that calculates the price, delta, and vega of European and American options using a binomial tree, you can create three functions:



1. `binomial_tree`: This function generates the binomial tree by taking inputs such as the number of steps, the time period, the risk-free rate, and the volatility. It returns the tree structure.

2. `option_price`: This function calculates the option price using the binomial tree generated in the previous step. It takes inputs such as the strike price, the option type (European or American), and the tree structure. It returns the option price.

3. `option_greeks`: This function calculates the delta and vega of the option using the binomial tree and option price calculated in the previous steps. It returns the delta and vega.

Here is an example implementation of these functions:
```
def binomial_tree(steps, time_period, risk_free_rate, volatility):
   # Generate the binomial tree using the inputs
   # Return the tree structure

def option_price(strike_price, option_type, tree_structure):
   # Calculate the option price based on the strike price, option type, and tree structure
   # Return the option price

def option_greeks(tree_structure, option_price):
   # Calculate the delta and vega of the option based on the tree structure and option price
   # Return the delta and vega

# Example usage:
tree = binomial_tree(100, 1, 0.05, 0.2)
price = option_price(50, "European", tree)
delta, vega = option_greeks(tree, price)

# Print the results
print("Option Price:", price)
print("Delta:", delta)
print("Vega:", vega)
```

In this example, the `binomial_tree` function generates a tree with 100 steps, a time period of 1 year, a risk-free rate of 5%, and a volatility of 20%. The `option_price` function calculates the option price for a European option with a strike price of 50. Finally, the `option_greeks` function calculates the delta and vega based on the tree structure and option price. The results are then printed to the screen.

To know more about European visit:

https://brainly.com/question/1683533

#SPJ11

the iferror function allows the user to specify his/her own text when an error is encountered rather than returning the standard excel error message.

Answers

The IfError function is a powerful tool in Excel that allows users to customize error messages that appear when an error is encountered in a formula. Instead of seeing the typical error message, users can specify their own text to be displayed in its place.

This can be useful in a number of situations, such as when working with large datasets where errors are common or when sharing spreadsheets with others who may not be familiar with Excel formulas.By using the IfError function, users can make their spreadsheets more user-friendly and easier to understand. They can also reduce the amount of time spent on troubleshooting errors, since the custom error messages can provide more specific information about what went wrong and how to fix it.To use the IfError function, simply enter the formula you want to test and the custom error message you want to display if an error is encountered. The syntax for the function is as follows:=IFERROR(Formula, "Custom Error Message")For example, if you have a formula that calculates the average of a range of cells, you might use the IfError function to display a custom message if the range is empty or contains errors. Your formula might look like this:=IFERROR(AVERAGE(A1:A10), "No data available")Overall, the IfError function is a useful feature that can help users make the most of Excel's capabilities. By customizing error messages, users can improve the readability and functionality of their spreadsheets, making them more useful and effective.

For such more question on datasets

https://brainly.com/question/28168026

#SPJ11

Question :-Which function returns the current date and time and recalculates )? In Excel?

The NOW function is useful when you need to display the current date and time on a worksheet or calculate a value based on the current date and time, and have that value updated each time you open the worksheet.

Other Questions
Which of the following statements is FALSE?a. Demand for cattle was high in the East after the Civil War.b. The early cattle industry originated with Mexican American ranchers located between theRio Grande and the Nueces rivers.C. The early cattle market in Texas remained small because it was so difficult to herd cattleto markets in the East.d. Early cattle ranchers used sheep to herd steer through mountain passages.Please select the best answer from the choices providedBD El Sr. Milton Escobar se presenta al banco de los Trabajadores de Tegucigalpa a constituir un depsito a Plazo Fijo #2250 a 6 meses por L100,000. 00 al 10. 5% de inters anual entregando el valor total con cheque #0045 a cargo del mismo banco. Haga la partida de apertura Write an equation for the graph in terms for xY= President Eisenhower exercised tremendous leadership on behalf of the civil rights movement by encouraging the Supreme Court to take on the case of Brown v. Board of Education.False HELP ME THIS IS SO HARDDD Policies that have been created by banks and other mortgage lenders can create barriers for financing among African Americans. What set of policies has been a source of concern since the 1990s At a restaurant the total bill on the percentage of the bill left as a tip and represented in a scatter plot the best fit line is represented by the equation y = -0.632 + 27 + 1 where X represents the total bill in dollars How did the Gupta dynasty create the second major Indian empire List and explain security methods that can be used to prevent major security issues Consider a wave propagating in the negative x-direction with frequency f = 100 Hz. At t = 5 sec the displacement associated with the wave is given by y(x,t = 5)= 0.5 cos(0.1x) + 0.4 sin(0.1x + pi/3) where x and y are measured in centimeters and t in seconds. Obtain the displacement(as a function of x) at t = 10s. What are the wavelength lambda and velocity y associated with this wave? Which pair of legislators are known for their ability to compromise on states rights, federalist issues, and sectional issues? Andrew Jackson and John C. Calhoun Henry Clay and Daniel Webster John C. Calhoun and Henry Clay Daniel Webster and Andrew Jackson find value of p q and r Matrix A is 4*3 in size .the elements (aij) of matrix are given by aij=i-j/i+j Find two numbers who have a sum of 21 and a product of 104.Please include the following in your response:1) The system of equations used to solve the problem (These are the two equations)2) The two numbers (The answer)3) A brief explanation of how you found the numbers Which words or phrases from the passage have strong connotations that support the authors purpose? check all that apply. sham process fearful, traumatized youngsters government-funded lawyer represent immigrant children under current immigration laws hurtling children back A blood sample has 500 bacteria present. A drug fights the bacteria such that every hour the number of bacteria remaining, r(n)r(n), decreases by half. Write the exponential function, r(n)r(n), as a function of the number, nn, of hours since the drug was taken PLEAAASSEEE HELP THIS IS DUE RIGHT NOW, Im giving EXTRA POINTS if youre right PLUS A BRAINLIEST!!! Please help.!!! (NEED HELP NOW) Determine which statement is a counterclaim for the following argument. Argument: People in sports are given too many trophies.Claim A.Trophies are usually given to serve as a symbol of honor.Claim b.Everyone deserves to be recognized for his or her contributions.claim c.When too many trophies are given, they lose their value.claim d.It is important to recognize accomplishments that were made. Which of the following sentences containing a parenthetical expression is punctuated correctly? A) Mary, not Jack, was the best chess player at the school. B) Mary; not Jack was the best chess player at the school. C) Mary: not Jack was the best chess player at the school. D) Mary not Jack, was the best chess player at the school. responsibility for regulating the disposal of high-level radioactive wastes rests with: