in each blank, enter the list after the given iteration. put one space between each pair of numbers. do not put commas or any other character in your response besides the numbers and spaces. do not put a space at the beginning or end of your response. what will the list be after the first iteration of selection sort? 1 3 2 5 6 4 correct what will the list be after the second iteration of selection sort? 1 2 3 5 6 4 correct

Answers

Answer 1

The bubble sort of the unsorted list after one iteration each is:

3 2 5 6 4 1

2 3 5 4 1 6

2 3 4 1 5 6

2 3 1 4 5 6

2 1 3 4 5 6

1 2 3 4 5 6

How to describe the Bubble Sort?

This is a reference to the straightforward sort algorithm, which loops until the list is properly sorted after making a sweep through it to properly sort elements that are out of order.

Therefore, since one iteration is required, each element would be added until the list's end, when they are all in their proper places and no commas are needed.

Learn more about bubble sort on:

https://brainly.com/question/17628275

#SPJ1


Related Questions

Assume that class ArrayStack has been defined using the implementation in your textbook. Assume also that you start with the following code fragment: ArrayStackint> intStack; int data: intStack.push(4); // Statement A intStack.push (3); // Statement B intStack.push(2); // Statement intStack.oush (1): / Statement D Where should the statements: data - intStack.peekl: intStack.popu: cout << data << endl; be placed into the code above to produce the following output: 3 2 The statements will be inserted as a group. Choose all locations required to produce the output. once between statements A and B twice between statements A and B three times between statements A and B four times between statements A and B once between statements B and C twice between statements Band C three times between statements Band four times between statements Band once between statements Cand D twice between statements Cand D three times between statements and four times between statements C and D once after statement D twice after statement D three times after statement four times after statement D

Answers

To produce the output "3 2" using the given code fragment and the statements, you should insert the statements once between statements B and C.

Here's the modified code:

ArrayStack intStack;
int data;
intStack.push(4); // Statement A
intStack.push(3); // Statement B

// Insert the statements here
data = intStack.peek();
intStack.pop();
cout << data << endl;

intStack.push(2); // Statement C
intStack.push(1); // Statement D

This will first push 4 and 3 onto the stack. Then, it will peek at the top value (3) and print it, followed by popping it off the stack. Next, it will push 2 and 1 onto the stack. The final stack will have the values 4, 2, and 1 from bottom to top.

To learn more about stack visit : https://brainly.com/question/29659757

#SPJ11

Which of the following types of authority allows input and suggestions from additional staff members, but does not guarantee implementation?
A. Department authority
B. Staff authority
C. Functional authority
D. Employer authority

Answers

Wouldn’t it be B ? Staff authority

Which is a function (use) of a relational database for a school?

Answers

Students can be grouped by grade level and class period by teachers.

What is meant by database?A database is a structured collection of data that is often stored electronically in a computer system. A database management system often controls a database (DBMS). A database is a structured collection of data that is electronically accessible and stored in computing. Large databases are hosted on computer clusters or cloud storage whereas small databases can be stored on a file system.Databases frequently contain data on individual people, such as users' or customers' contact information. For instance, social media networks use databases to store user data including names, email addresses, and usage patterns. The information is utilised to enhance user experience and recommend content to users.

To learn more about database, refer to:

https://brainly.com/question/518894

What about connectivity issues? How do you ease their worries of having a firewall and being secure, but always able to access what they want?

Answers

Connectivity issues are not uncommon with firewalls, and can be a source of anxiety for some people. As an IT professional, it is important to ease these worries and ensure that people are able to access what they want while still being secure.

One way to address connectivity issues is to establish a virtual private network (VPN) connection. This enables remote access to internal networks over the internet, while keeping the data transmitted secure and private.Another way is to use a proxy server. A proxy server acts as an intermediary between the user and the internet, allowing users to access the internet while hiding their IP address and other identifying information from websites they visit.

Finally, ensuring that the firewall is properly configured and maintained can go a long way in preventing connectivity issues. Regular updates and patches can address vulnerabilities and ensure that the firewall is functioning as intended.

To know more about issues  visit:-

https://brainly.com/question/29869616

#SPJ11

it includes all types of technology used to deal with information such as computers hardware and Software technology used for ______, _______ and _______​

Answers

Answer:

Creating, storing, and transferring information.

Explanation:

Information Technology (IT) can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information technology in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information technology (IT) for supply chain management, to process financial accounts, manage their workforce, and as a marketing channel to reach their customers or potential customers.

Hence, Information Technology (IT) includes all types of technology used to deal with information such as computer hardware and Software technology used for creating, storing, and transferring information.

Which file format produces a lock-down version of an access database? accdb accdb-be accde accdb-e

Answers

The file format that produces a lock-down version of an access database is called; ACCDE

How to Identify Access Database?

ACCDB files are the default Microsoft Access database format in Access 2007 and later versions while the ACCDE format is a read-only, compressed version.

Now, the file format that produces a lock down version of an access database is called ACCDE file which is a Microsoft Access Execute Only Database file used to protect an ACCDB file.

Read more about Access Database at; https://brainly.com/question/9745438

#SPJ1

in the context of directories on the web, a human-powered directory uses crawlers to collect data. true or false

Answers

False. In the context of directories on the web, a human-powered directory relies on humans to manually add and organize content loaded in the context of directories. On the other hand, a web crawler or spider is a software program that uses automated processes to collect data from web pages and other online sources.

A Web crawler, sometimes called a spider or spiderbot and often shortened to crawler, is an Internet bot that systematically browses the World Wide Web and that is typically operated by search engines for the purpose of Web indexing (web spidering).[1]

Web search engines and some other websites use Web crawling or spidering software to update their web content or indices of other sites' web content. Web crawlers copy pages for processing by a search engine, which indexes the downloaded pages so that users can search more efficiently.

Crawlers consume resources on visited systems and often visit sites unprompted. Issues of schedule, load, and "politeness" come into play when large collections of pages are accessed. Mechanisms exist for public sites not wishing to be crawled to make this known to the crawling agent. For example, including a robots.txt file can request bots to index only parts of a website, or nothing at all.

learn more abou web crawlert here:

https://brainly.com/question/29843971

#SPJ11

False. A human-powered directory does not use crawlers to collect data. Instead, it relies on human editors to manually review and organize listings. Directories that use crawlers to collect data are called web crawlers or spiders, and they are typically used by search engines to index and catalog websites.

Get to know more about web crawlers https://brainly.com/question/14680064

#SPJ11

Complete the following sentence.
The implementation of _______
is a key component of STEM education.

Answers

Answer: STEM-based projects

Explanation:

The location of a specific input or output field device is identified by the processor by means of its _____.

Answers

The location of a specific input or output field device is identified by the processor by means of Address

When it comes to input and output devices, the processor needs to know the address of each device in order to communicate with it. The address is like a unique identifier for each device, and it tells the processor where to find the device in memory.

There are two main ways that processor addresses can be assigned to devices. The first is called static addressing, and the second is called dynamic addressing.

With static addressing, the address of a device is fixed and does not change. This means that the processor always knows where to find the device, and there is no need for the address to be stored in memory.

Dynamic addressing is a bit more complex. The address of a device can change depending on the current conditions, and so the processor needs to store the address in memory. This means that the processor has to search for the device every time it wants to communicate with it, which can take up more time and resources.

Learn more about addressing here:

https://brainly.com/question/17191250

#SPJ4

You use a special user account called administrator to log on to your computer; however, you think someone has learned your password. You are logged on as Administrator.

Answers

If you suspect that someone has learned your password while you are logged on as Administrator, it is crucial to take immediate action to prevent unauthorized access to your computer and any sensitive data on it.

Here are a few steps you can take:

Change your password: The first step is to change your password to prevent the suspected intruder from accessing your computer. Press Ctrl+Alt+Del, and then click "Change a password." Check for malware: Run a full system scan using a trusted antivirus program to check for any malware or spyware on your computer that could have compromised your password. Enable two-factor authentication: Enable two-factor authentication (2FA) on your administrator account to add an extra layer of security. 2FA requires you to provide a second form of authentication, such as a code sent to your mobile phone, in addition to your password to log in to your account.Review account activity: Review the recent activity on your administrator account, such as login attempts, file access, and system changes, to see if there is any suspicious activity. Monitor the account: Monitor the activity on your administrator account regularly to detect any unauthorized access or suspicious behavior.

By following these steps, you can protect your computer and sensitive data from unauthorized access and potential security breaches.

To get a similar answer on password visit:

https://brainly.com/question/30482767

#SPJ11

How do I add winning conditions to this rock paper scissors code in python? Please keep it simple as I am not allowed to include code we have not learned yet.

import random
choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")
computer = random.randint(1, 3)
if computer == 1:
print("Computer played R.")
elif computer == 2:
print("Computer played P.")
else:
print("Computer played S.")

Answers

Answer:

You wanted simple, but i dodn't know how simple you wanted so I kept it as simple as possible, don't blame me if theres a bug.

Explanation:

import random

choice = input("Enter Rock(R), Paper(P), or Scissors(S): ")

computer = random.randint(1, 3)

if computer == 1 and choice == "R":

   print("Computer played Rock.")

   print("Tie")

elif computer == 2 and choice == "P":

   print("Computer played Paper.")

   print("Tie")

elif computer == 3 and choice == "S":

   print("Computer played Scissors.")

   print("Tie")

elif computer == 1 and choice == "S":

   print("Computer played Rock.")

   print("You Lose")

elif computer == 2 and choice == "R":

   print("Computer played Paper.")

   print("You Lose")

elif computer == 3 and choice == "P":

   print("Computer played Scissors.")

   print("You Lose")

elif computer == 1 and choice == "P":

   print("Computer played Rock.")

   print("You Win")

elif computer == 2 and choice == "S":

   print("Computer played Paper.")

   print("You Win")

elif computer == 3 and choice == "R":

   print("Computer played Scissor.")

   print("You Win")

to ensure that text is easily read on low resolution devices, we should use a higher x-height. true or false?

Answers

To ensure that text is easily read on low resolution devices, we should use a higher x-height. This statement is true.

What is an x-height?

The distance between the baseline of a line of type and the top of the main body of lower case letters is referred to as x-height. The x-height is a critical aspect of text readability, particularly in body copy. It determines the visual impact of a typeface and its legibility in smaller sizes.

Resolution and higher x-heightResolution has an impact on the visual quality of typefaces. As the resolution gets lower, typefaces become more difficult to read. The x-height is increased to make text more readable on low-resolution devices. When we use a typeface with a higher x-height, the size of lowercase letters is increased. This implies that the height of lowercase letters is closer to the height of uppercase letters.

As a result, lower-case letters appear larger, and the words appear to have more space between them. In conclusion, to ensure that text is easily read on low-resolution devices, we should use a higher x-height.

Learn more about  devices here: https://brainly.com/question/26409104

#SPJ11

alice is a network engineer who has been tasked with researching a virtual private network (vpn) tunneling protocol to be used by her company. it must be able to pass traffic through a network address translation (nat) server and be compatible with a number of well-known proprietary and open source platforms. what solution does she select?

Answers

Anyone might access the home network by using the default username and password, which are presumably publicly available on the Internet.

What is virtual private network  ?

An encrypted connection between a device and a network via the Internet is known as a virtual private network, or VPN. Secure transmission of sensitive data is aided by the encrypted connection. It makes it impossible for unauthorized parties to eavesdrop on the traffic and enables remote work for the user. The use of VPN technology is common in business settings. By creating secure connections over the Internet, a VPN expands a company network. Traffic stays private while traveling because it is encrypted between the device and the network. While working away from the office, an employee can safely connect to the company network. A VPN connection is possible even on cellphones and tablets.

To know more about virtual private network , visit

https://brainly.com/question/14122821

#SPJ4

what are the four forms of utility in computing

Answers

Answer:

form, place, time, and possession utility

Explanation:

v. grout et al., "software solutions for antenna design exploration: a comparison of packages, tools, techniques, and algorithms for various design challenges," ieee antennas and propagation magazine, vol. 61, no. 3, pp. 48–59, 2019

Answers

The paper titled "Software Solutions for Antenna Design Exploration: A Comparison of Packages, Tools, Techniques, and Algorithms for Various Design Challenges" by V. Grout et al. (2019) presents a comprehensive comparison of software packages, tools, techniques, and algorithms used in antenna design.

What are the key findings of the comparison study conducted in the paper?

The paper discusses the findings of a comparative analysis conducted on various software solutions for antenna design exploration. The study compares different packages, tools, techniques, and algorithms for tackling diverse design challenges. The authors highlight key observations and insights based on their evaluation.

In approximately 150 words, the authors compare the performance, capabilities, and suitability of different software solutions. They discuss the strengths and limitations of each package, evaluate the tools and techniques employed, and analyze the effectiveness of various algorithms in addressing specific design challenges. The paper offers valuable insights into the state-of-the-art in antenna design software, aiding engineers and researchers in making informed choices for their design projects.

Learn more about  Software Solutions

brainly.com/question/32096696

#SPJ11

Select the correct answer from each drop-down menu. What is a distribution list and how is it selected?
A distribution list is a group of multiple (BLANK) addresses selected from the (BLANK) list, either individually or from an address list.

FIRST BLANK

email
home
web

SECOND BLANK

contacts
friends
data​

Answers

Blank 1 is email, and blank 2 is contacts list

Answer:

Email and contact list

Explanation:

From your email, there is a collection of addresses you have once sent wails or received from. That's your contact list. And you can select some addresses as a distribution list to send emails as a group or individually

Post Test: Software Development Life Cycle and Initial Phases 6 Select the correct answer. Which activity is performed during high-level design in the V-model? A. gathering user requirements B. understanding system design C. understanding component interaction D. evaluate individual components E. design acceptance test cases

Answers

During the high-level design phase in the V-model of the software development life cycle, the activity that is performed is understanding component interaction. So, the correct option is C.

The high-level design focuses on translating the system requirements into an architectural design that outlines the overall structure of the software system. It involves identifying the major components or modules of the system and understanding how they interact with each other to achieve the desired functionality.

Understanding component interaction is crucial during high-level design as it involves determining the interfaces and dependencies between the different components. This includes defining the communication protocols, data flows, and interactions between the components. The goal is to ensure that the components work together seamlessly and efficiently to meet the system requirements.

Option A, gathering user requirements, is typically performed during the requirements gathering phase, which is before the high-level design phase. It involves understanding and documenting the needs and expectations of the system's users.Option B, understanding system design, usually takes place in the detailed design phase, where the specific design of the system is defined, including the internal workings of the components.Option D, evaluating individual components, is more aligned with the testing phase, where the components are assessed individually to ensure their functionality and compliance with the design.Option E, designing acceptance test cases, typically occurs during the testing phase when the acceptance criteria are established and test cases are created to verify that the system meets the specified requirements.

In conclusion, during the high-level design phase in the V-model, the activity of understanding component interaction takes place to ensure that the major components of the system work together effectively to achieve the desired functionality.

For more questions on V-model

https://brainly.com/question/16298186

#SPJ11

how do you get your winkey wet??

Answers

Answer:

what

Explanation:

what

sorry but what

Answer:

what is a winkey.

Explanation:

What form is used to record the opening and closing of the security container?

Answers

An SF-700, Security Container Information, will be used in recording safe combinations.

What is Standard Form 700?A cover page and an envelope with a tear-off tab make up the three parts of the SF 700 form. Information regarding the activity, container, type of lock, and who to contact if the container is left open can be written on the cover sheet and the envelope's face.A cover page and an envelope with a tear-off tab make up the three parts of the SF 700 form. Information regarding the activity, container, type of lock, and who to contact if the container is left open can be written on the cover sheet and the envelope's face.A cover page and an envelope with a tear-off tab make up the three parts of the SF 700 form. There is room on the face of the envelope and the cover sheet for details about the activity, container,

To learn more about Standard Form 700 refers to:

brainly.com/question/30215746

#SPJ4

you have a file which you would like other users to see, but not modify. which file attribute should you use?

Answers

To allow other users to see a file but not modify it, you should set the file attribute to "read-only".

This attribute ensures that the file cannot be modified, deleted or overwritten by any user who does not have the appropriate permissions. Setting the file attribute to read-only is a simple and effective way to protect important files from accidental or intentional modification.The exact method of setting a file as read-only may depend on the operating system and file system being used. In most systems, you can right-click on the file and select "Properties" or "Get Info" to access the file attributes and set the file as read-only.

To learn more about file click the link below:

brainly.com/question/29052002

#SPJ11

when you run bro it automatically creates a list of log files, which of these are valid bro log files that you would find?

Answers

When you run Bro it automatically creates a list of log files, some of the file which are valid Bro log files are files.log, http.log, ssl.log, weird.log.

What are some Bro log files function?

Bro is an open-source network security monitoring tool that uses a specialized scripting language to define the protocols, events, and actions it monitors.

The source bro generates a variety of log files to record events and other data that can be used for analysis and troubleshooting. Some of the log files generated by Bro include conn.log, dns.log, http.log, and ssl.log.

Read more about Bro log files

brainly.com/question/28484362

#SPJ4

In terms of Reward power, what is
the power of big media and how has it changed given technological
changes in the
last twenty years?

Answers

Reward power refers to the power an individual possesses to offer rewards or benefits to others as an incentive to influence their behavior.

The big media is a term used to refer to the large media outlets or companies that control the flow of information to the public. It includes television networks, radio stations, newspapers, and other forms of mass media. The power of big media in terms of reward power has increased significantly in the last twenty years due to technological changes and advancements.The introduction of new technologies such as the internet, social media platforms, and mobile devices has enabled big media to reach a wider audience than ever before.

As a result, the power of these companies has increased, and they now have a greater influence over public opinion and behavior. They use their reward power to offer incentives to their audience in exchange for their loyalty or support. This includes rewards such as free subscriptions, exclusive content, and discounts on products or services.Technological changes have also made it easier for big media to collect data on their audience's behavior and preferences.

This data can be used to tailor their content to meet the specific needs and interests of their audience. By doing so, they can increase their reward power and maintain their dominance in the industry.Overall, the power of big media in terms of reward power has increased significantly in the last twenty years due to technological advancements. They use their reward power to influence the behavior of their audience and maintain their dominance in the industry.

Learn more about networks :

https://brainly.com/question/31228211

#SPJ11

print 3 numbers before asking a user to input an integer

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

Why is computer called an information processing machine?

Answers

Answer:

A computer is an information processing machine. Computers process data to produce information. The sets of instructions that humans give computers are called programs or software. Computers never lose or misplace information.

hope this helped youuu:)

the admin at universal containers is setting up permissions for internal sales users. in addition to assigning the salesforce cpq user permission set, for which objects do the users need read, create, edit, delete permissions?

Answers

They contain a small group of permissions that are crucial for the safety of Salesforce CPQ data.

We created Access sets to be assigned directly to users without any cloning or modifying, in contrast to the majority of CPQ admins who copy and then edit basic access sets for org users. Users' functional access is increased via permission settings without having to modify their profiles. Depending on the Salesforce edition, users can have several permission sets even if they can only have one profile. Regardless of their profiles, you can assign different sorts of users different permission sets. Regardless of a user's primary job function, you can create permission sets to allow access to logical groupings of people. Let's imagine, for instance, that you have a number of users who must transfer and delete leads.

Learn more about permissions here-

https://brainly.com/question/14178838

#SPJ4

HELP I NEED IT RIGHT NOW. I'LL MARK YOU THE BRAINLIEST. Each of these citations contains at least one mistake. Identify the problems, and explain how to fix them. 1.) Vadukul, Alex. "Driftwood Haiku on the Bronx Riviera." The New York Times, 5/14/17, p.1. 2.) Shel Silverstein. Where the Sidewalk Ends: Poems and Drawings. HarperCollins, 2014. 3.) Rilke, Rainer Maria and translator M.D. Herter Norton. Letters to a Young Poet. W.W. Norton, 2004. 4.) Emerson, Ralph Waldo. The Poet in Nature and Selected Essays, Penguin Books, 2003, pp. 259-284. Please help me, with this... and please write detailed answers.

Answers

Answer:

See explanation for full answer

Explanation:

Here are the new citations:

1)Vadukul, A. (2017, May 14). Driftwood Haiku on the Bronx Riviera. The New York Times, p. 1.

To fix this citation in APA the first name should be the first initial, the date should be second typed in yyyy,month dd in paranthesis. The title of the article is not in quotes and the name of the newspaper goes in italics

2) Silverstein, S. (2017). Where the Sidewalk Ends: Poems and Drawings. New York,NY: HarperCollins.

To fix this citation in APA the first name is full last name, first initial. The year the book is published is next in paranthesis followed by where the publishing company is located and then the state and city. The last part is the publishing companies name

3)Rilke, R. M., & Snell, R. (2004). Letters to a young poet (917507652 721002613 M. H. Norton, Trans.). Mineola, NY: Dover Publications.

To fix this citation in APA the authors full last name and initials go first followed by the year the book was published in paranthesis. The title of the book goes next and if you have it the ISBN with the translator. The publishing company city,state then the publication company name.

4) Emerson, R. W., & Porte, J. (2003). The Poet in Nature and Selected Essays. New York, NY: Penguin House.

To fix this citation in APA again the authors names have to be last name and first initial. The year the book was published follows. Then the title of the book in italics. Followed by the information for the publishing company (city,state,publishing company title)

Hope this helps you!

Which of the following type(s) of attributes need not be physically stored within the database?a. Compositeb. Derivedc. Multivaluedd. All of these choices are correct.

Answers

All of the choices are correct. Composite, derived, and multivalued attributes can be defined and used within a database, but they do not necessarily need to be physically stored within the database.

Composite attributes are attributes that are made up of multiple sub-attributes, such as an address field that includes sub-attributes for street, city, state, and zip code. While the sub-attributes may be stored in the database, the composite attribute itself may not be physically stored as a separate field.

Derived attributes are attributes that are calculated or derived from other attributes in the database. For example, an age attribute could be derived from a birthdate attribute. The derived attribute may not be physically stored in the database, but rather calculated as needed.

Multivalued attributes are attributes that can have multiple values for a single instance of an entity. For example, an employee entity may have a multivalued attribute for skills, which could have multiple values such as "programming" and "database management". The individual values may be stored in the database, but the multivalued attribute itself may not be physically stored as a separate field.

Learn more about attributes here:

https://brainly.com/question/29558532

#SPJ11

calista wants to add a screentip to a hyperlink she inserted into a cell. she selects the cell with the hyperlink, then presses a certain combination of buttons, then selects screentip, types in a message, clicks ok, then clicks ok again to save the link. which of these combination of buttons must she have pressed during this procedure?

Answers

She had to hit the buttons Ctrl + K in order to complete this process.

Which of these combinations of clicks would you pick if you wanted to delete a hyperlink from a cell?

Select the option for Removing Hyperlink by doing a right-click with the mouse on the selected cell(s) (or Remove Hyperlinks if you have more than one cell selected). This option deletes the formatting and hyperlinks from the chosen cell (s).

To switch between two workbook windows, which of these combo keys will you press?

Using the keyboard shortcut Ctrl+Tab is one of the quickest ways to transition between workbooks. Using this shortcut will display a list of all active Excel workbooks.

To know more about hyperlink visit :-

https://brainly.com/question/13344003

#SPJ4

The phone is very slippery when folded. Give an idea of how to tackle the issue.

Answers

\(\huge\bold{Answer}\)

Dont use your mobile with oily hands.

a. A set of electronic program that makes of computer perform tasks
1. Instructions
2. Software
3. Hardware
4. None of the

Answers

Answer:

2. Software

Explanation:

Software is an app

Hardware is the computer or cell phone or mobile phone

toppr

Other Questions
What is the rate of this answer ?? The perimeter of rectangle ABCD is 105 inches. Use this information to solve for x. Dc7x + 1Round your answer to the nearest tenths place if needed. . Your teacher recently found an old Nintendo in a thrift store. Use the formula to predictthe value of the Nintendo in 2020? (Remember, x is the years after 1986, and y is thevalue, in $.) Do you think this is a realistic prediction of the value of that Nintendo? A particular shirt is on sale for $12. The regular price is $20. How much is the discount? Use the formula Discount = Regular price - Sale price. 1.00 x 10-7 moles to grams simplify 2+5+4/7 help me pleaseeee- I'll give brainlist- Does anyone have answers 3 and 4 for 4. 4. 3 Practice: Modeling: Solids?Extremely lost and help with be appreciated :) Count to find the area. Tell whether the area is exact or an estimate.Select the correct number or words from the drop-down menus to complete the statements.An array of squares has 6 rows and 7 columns. In the first row has square 6 shaded yellow. In the second row, square5 and 6 are shaded. In both row three and four, the blocks 2 through 6 are shaded. There are no blocks shaded in rows five or six. active experimentation and abstract conceptualization when learning to control her emotions. based on her learning style, which of the following statements is most true? hypnosis involves a state of heightened openness to suggestion.a. trueb. false Why do you project out free cash flows for the DCF model? How did many escaped slaves flee to freedom in the North? What is the value of exterior What can you tell about a triangle when given three side lengths?What can you tell about the relationship between the angles of a triangle and its sides? Soru 4 Calculate the two-sided 95% confidence interval for the population standard deviation togmal given that a sample of size n-16 yields a sample standard deviation of 7.29. Yantnz: 05.63 sig Nancy is knitting a scarf. It takes her 0.2 of an hour to knit each inch of the scarf. She wants the length of the scarf to be 60 inches. Select ALL the correct answers.Which three statements describe accomplishments of the 2017 women's rights protests?A. They set the stage for a movement which called attention to sexual harassment.B. They led to laws that required health plans to cover women's preventive services.C. They overturned policies that threatened to eliminate abortion coverage.D. They caused more women to declare an intention to run for political office.E. They inspired support for other movements such as immigration reform. What is Teslas long-term portion of capital lease obligations as of December 31, 2013 (in $ thousands)? Please provide your answer without comma separator or decimal (Ex: 23456) Natural convection over surfaces: A 0.5-m-long thin vertical plate is subjected to uniform heat flux on one side, while the other side is exposed to cool air at 5C. The plate surface has an emissivity of 0.73, and its midpoint temperature is 55C. Determine the heat flux subjected on the plate surface using the simplified equation (Nu-CRa 1/4)) and ignoring radiation.