Input an int between 0 and 100 and print the numbers between it and 100, including the number itself and the number 100. If the number is less than or equal to 0, or greater than or equal to 100 print "error". Print 20 numbers per line.
Language: Java

Answers

Answer 1

import java.util.Scanner;

public class JavaApplication42 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       int count = 0;

       System.out.println("Enter an integer between 0 and 100");

       int num = scan.nextInt();

       if (num <= 0 || num >= 100){

           System.out.println("error");

       }

       else{

           while(num <= 100){

               if (count == 20){

                   System.out.println("");

                   count = 0;

               }

               else{

                   System.out.print(num+" ");

                   count++;

                   num++;

               }

           }

       }

   }

   

}

I hope this helps!

Answer 2

The pentagonal number is an illustration of loops.

Loops are used to perform repetitive operations

The program in Java where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

   public static void main(String[] args) {

       //This creates a Scanner object

       Scanner input = new Scanner(System.in);

       //This gets input for num

       int num = input.nextInt();

       //This prints error is num is out of range

       if(num <=0 || num >= 100){

           System.out.print("Error");

       }

       else{

       //This initializes counter to 0

       int count = 0;

       //This iterates through num

       for (int i = num; i <= 100; i++) {

           //This prints the current number

           System.out.print((i)+"\t");

           //This increments the counter by 1

           count++;

           //If the counter is 10

           if(count == 10){

               //This prints a new line

               System.out.println();

               //This sets the counter to 0

               count = 0;

}

}

}    

}

}

Read more about loops at:

https://brainly.com/question/19344465


Related Questions

You have been supporting CSM Tech Publishing's Windows Server 2016 server network for over a year. The office has two Windows Server 2016 servers running Active Directory and a number of other roles. Management has informed you that a small sales office is opening in the same building three floors up. The sales manager wants to install a sales application on a server located in the sales office. This server will have limited physical security because there's no special room dedicated for it, which means it will be accessible to non-IT personnel and visitors. You're considering installing Windows Server 2016 Server Core on the new server because accessing its console regularly probably won't be necessary, and this server will be managed from one of the other CSM Tech Publishing servers. What are the benefits and drawbacks of using Server Core for this branch office

Answers

Answer:

??

Explanation:

A motor takes a current of 27.5 amperes per leaf on a 440-volt, three-phase circuit. The power factor is 0.80. What is the load in watts? Round the answer to the nearer whole watt.

Answers

The load in watts for the motor is 16766 watts

To calculate the load in watts for the given motor, you can use the following formula:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

In this case:
Voltage (V) = 440 volts
Current (I) = 27.5 amperes per phase
Power Factor (PF) = 0.80
√3 represents the square root of 3, which is approximately 1.732

Now, plug in the values:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

Load (W) = 440 × 27.5 × 0.80 × 1.732

Load (W) = 16765.7 watts

Rounded to the nearest whole watt, the load is approximately 16766 watts.

Know more about the motor here :

https://brainly.com/question/29713010

#SPJ11

Attempting to write a pseudocode and flowchart for a program that displays 1) Distance from sun. 2) Mass., and surface temp. of Mercury, Venus, Earth and Mars, depending on user selection.

Answers

Below is a possible pseudocode and flowchart for the program you described:

What is the pseudocode  about?

Pseudocode:

Display a menu of options for the user to choose from: Distance, Mass, or Surface Temperature.Prompt the user to select an option.If the user selects "Distance":a. Display the distance from the sun for Mercury, Venus, Earth, and Mars.If the user selects "Mass":a. Display the mass for Mercury, Venus, Earth, and Mars.If the user selects "Surface Temperature":a. Display the surface temperature for Mercury, Venus, Earth, and Mars.End the program.

Therefore, the Flowchart:

[start] --> [Display menu of options] --> [Prompt user to select an option]

--> {If "Distance" is selected} --> [Display distance from sun for Mercury, Venus, Earth, and Mars]

--> {If "Mass" is selected} --> [Display mass for Mercury, Venus, Earth, and Mars]

--> {If "Surface Temperature" is selected} --> [Display surface temperature for Mercury, Venus, Earth, and Mars]

--> [End program] --> [stop]

Read more about pseudocode  here:

https://brainly.com/question/24953880

#SPJ1

Describe the approaches used in a typical watering hole attack.

What maleware was used in the 2012 financial sector attacks?

Which vulnerabilities were exploited?

Who was behind the attacks?

How did the attacks progress after initial infection?

What tools and techniques should be utilized to combat this type of attack?

Answers

The attack used the Gh0st Rat exploit and was known as the VOHO attacks

How does a watering hole attack work?

A watering hole attack is a series of events started by an attacker in order to gain access to a victim. However, the attacker does not directly target the victim.First, the attacker chooses a website or service that the intended victim is already familiar with. In general, the target site has low security, is frequently visited, and is well-liked by the intended victim. The attacker then compromises the target site and injects a malicious code payload, typically in the form of JavaScript or HyperText Markup Language, into the site (HTML). When the victim visits the compromised site, the payload is activated, and an exploit chain is started to infect the victim's computer. The payload could be automated, or the attack could result in a bogus

To know more about hole,click on the link :

https://brainly.com/question/30898889

#SPJ1

Read the following code:

x = currentAge
print(x + 20)

What value will this code calculate?

Select one:
a. Age in 20 years
b. Age 20 years ago
c. Age at 20 years old
d. Age in the year 2020

Answers

Answer:

The answer is "A) Age in 20 years"

Explanation:

Assuming currentAge is declared and is an integer, you are adding 20 to your current age which means it will print your age in 20 years.

Its Option A - Age in 20 Years.
Thank You!

What is the output
print( ‘You are’, age, ‘years old. ‘)

Answers

The output print(‘You are’, age, ‘years old.’) function is a useful tool for programmers looking to display a person's age as part of a string of text. It is a straightforward function that can be easily incorporated into a variety of Python programs.

The outputprint(‘You are’, age, ‘years old.’) is a Python function that outputs a string of text that includes the variable ‘age’. The function prints the phrase ‘You are’, followed by the value of the variable ‘age’, and ends with the phrase ‘years old.’ For example, if the variable ‘age’ is assigned the value of 25, then the output of the function would be ‘You are 25 years old.’

This function is commonly used in programs that involve age calculations or when displaying a person's age. It is a simple way to incorporate the value of a variable into a text string and output it to the console or screen.

For more such questions on Python function, click on:

https://brainly.com/question/25755578

#SPJ11

The first generation computers are likely to have been inverted in what period?

A. 1910s

B. 1920s

C. 1930s

D. 1940s

Answers

The first generation computers are likely to have been inverted in the period of the  1940s.

What is the era in 1st generation of computer?

The era is known to be around 1940-1956. This is said to be the period where the first set of computers were made.

Note that the first generation is one that vacuum tubes as the basic parts for memory and thus The first generation computers are likely to have been inverted in the period of the  1940s.

Learn more about  first generation computers  from

https://brainly.com/question/14713070

#SPJ1

The propositional variables f, h, and p represent the propositions:___________f: The student got an A on the final.h: The student turned in all the homework.p: The student is on academic probationSelect the logical expression that represents the statement: "The student is not on academic probation and the student got an A on the final or turned in all the homework."

Answers

The options are:

\((A)\neg p \land (f \lor h)\\(B)(\neg p \land f) \lor h\\(C)\neg p \land f \land h\\(D)\neg( p \land f) \lor h\)

Answer:

\((B)(\neg p \land f) \lor h\)

Explanation:

Given the propositional variables:

f: The student got an A on the final.h: The student turned in all the homework.p: The student is on academic probation

The negation of p, \(\neg p=$The student is not on academic probation\)

A AND B (Logical conjunction) is written as: \(A \land B\)A OR B (Logical disjunction) is written as: \(A \lor B\)

Therefore, the logical expression for the statement:

"The student is not on academic probation and the student got an A on the final " is: \(\neg p \land f\)

Therefore, the logical expression for the given statement

"The student is not on academic probation and the student got an A on the final or turned in all the homework."

is: \((\neg p \land f) \lor h\)

The correct option is B.

Compare and contrast between flowcharts that involve:
-simple logic flow and

-simple logic flow with a two way branch

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The solution to this question is given in the attached word file.  


\( \tt{Define \: hardware.}\)

Answers

Answer:

The vital components of a computer system , which can be seen and touched , are called hardware .

examples

keyboard monitormouse

hope it is helpful to you

Answer:

Hardware is the collective term for the internal and external hardware that enables you to carry out key operations including input, output, storage, communication, processing, and more.

___________________

Hope this helps!

Which term is generally used as a synonym (used interchangeably) for presentations?
A. video streams
B. Shockwave objects
C. Flash objects
D. slideshows
E. print advertisements

Answers

Answer:

D. Slideshows

Explanation:

Slideshows are most likely used for presentations.

Answer:

D.

Explanation:

Plato

java question
please provide with answer and explanation ​

java question please provide with answer and explanation

Answers

Using the codes in computational language in JAVA it is possible to write a code that write a method the parameter arraylist hold a class.

Writting the code:

import java.util.ArrayList;

import java.util.Iterator;

import java.util.Scanner;

public class {

 public static void main(String[] args) {

   Scanner ler = new Scanner(System.in);

  ArrayList<String> agenda = new ArrayList();

  agenda.add("Juca Bala;11 1111-1111");

   agenda.add("Marcos Paqueta;22 2222-2222");

   agenda.add("Maria Antonieta;33 3333-3333");

   agenda.add("Antônio Conselheiro;44 4444-4444");

   int i;

See more about JAVA at brainly.com/question/18502436

#SPJ1

java question please provide with answer and explanation

In much of the world, SI units are used in everyday life and not just in science. Why would it make sense for people in the United States to use SI units in everyday life, too?

Answers

Answer:

The use of SI is a way to standardize all measurements.

Explanation:

The use of SI is a way to standardize all measurements. In this way, people all over the world can communicate the data without any confusion. This allows them to exchange quantitative information when it comes to business and science in an effective and convenient way.

Can someone explain to me the process of inserting fonts into pdf, please? Also, related to this topic, metadata about a font that is stored directly in pdf as pdf objects, what does that mean more precisely? Any help is welcome :)

Answers

Answer:

what is inserting fonts into pdf:Font embedding is the inclusion of font files inside an electronic document. Font embedding is controversial because it allows licensed fonts to be freely distributed.

Fill in the blank to complete the “even_numbers” function. This function should use a list comprehension to create a list of even numbers using a conditional if statement with the modulo operator to test for numbers evenly divisible by 2. The function receives two variables and should return the list of even numbers that occur between the “first” and “last” variables exclusively (meaning don’t modify the default behavior of the range to exclude the “end” value in the range). For example, even_numbers(2, 7) should return [2, 4, 6].

def even_numbers(first, last):
return [ ___ ]


print(even_numbers(4, 14)) # Should print [4, 6, 8, 10, 12]
print(even_numbers(0, 9)) # Should print [0, 2, 4, 6, 8]
print(even_numbers(2, 7)) # Should print [2, 4, 6]

Answers

This code creates a new list by iterating over a range of numbers between "first" and "last" exclusively. It then filters out odd numbers by checking if each number is evenly divisible by 2 using the modulo operator (%), and only adding the number to the list if it passes this test.

Write a Python code to implement the given task.

def even_numbers(first, last):

   return [num for num in range(first, last) if num % 2 == 0]

Write a short note on Python functions.

In Python, a function is a block of code that can perform a specific task. It is defined using the def keyword followed by the function name, parentheses, and a colon. The function body is indented and contains the code to perform the task.

Functions can take parameters, which are values passed to the function for it to work on, and can return values, which are the result of the function's work. The return keyword is used to return a value from a function.

Functions can be called by their name and passed arguments if required. They can be defined in any part of the code and can be called from anywhere in the code, making them reusable and modular.

Functions can make the code more organized, easier to read, and simpler to maintain. They are also an essential part of object-oriented programming, where functions are known as methods, and they are attached to objects.

To learn more about iterating, visit:

https://brainly.com/question/30039467

#SPJ1

1. What is virtual memory?
The use of non-volatile storage, such as disk to store processes or data from physical memory
A part of physical memory that's used for virtualisation
Some part of physical memory that a process though it had been allocated in the past
O Future physical memory that a process could be allocated

Answers

Answer:

The use of non-volatile storage, such as disk to store processes or data from physical memory.

Explanation:

Virtual memory is used by operating systems in order to allow the execution of processes that are larger than the available physical memory by using disk space as an extension of the physical memory. Note that virtual memory is far slower than physical memory.

I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AM

Questions for chapter 8: EX8.1, EX8.4, EX8.6, EX8.7, EX8.8

I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for

Answers

The response to the following prompts on programming in relation to array objects and codes are given below.

What is the solution to the above prompts?

A)

Valid declarations that instantiate an array object are:

boolean completed[J] = {true, true, false, false};

This declaration creates a boolean array named "completed" of length 4 with initial values {true, true, false, false}.

int powersOfTwo[] = {1, 2, 4, 8, 16, 32, 64, 128};

This declaration creates an integer array named "powersOfTwo" of length 8 with initial values {1, 2, 4, 8, 16, 32, 64, 128}.

char[] vowels = new char[5];

This declaration creates a character array named "vowels" of length 5 with default initial values (null for char).

float[] tLength = new float[100];

This declaration creates a float array named "tLength" of length 100 with default initial values (0.0f for float).

String[] names = new String[]{"Sam", "Frodo", "Merry"};

This declaration creates a String array named "names" of length 3 with initial values {"Sam", "Frodo", "Merry"}.

char[] vowels = {'a', 'e', 'i', 'o', 'u'};

This declaration creates a character array named "vowels" of length 5 with initial values {'a', 'e', 'i', 'o', 'u'}.

double[] standardDeviation = new double[1];

This declaration creates a double array named "standardDeviation" of length 1 with default initial value (0.0 for double).

In summary, arrays are objects in Java that store a fixed-size sequential collection of elements of the same type. The syntax for creating an array includes the type of the elements, the name of the array, and the number of elements to be stored in the array. An array can be initialized using curly braces ({}) to specify the initial values of the elements.


B) The problem with the code is that the loop condition in the for loop is incorrect. The index should start from 0 instead of 1, and the loop should run until index < masses.length instead of masses.length + 1. Also, the totalMass should be incremented by masses[index], not assigned to it.

Corrected code:
double[] masses = {123.6, 34.2, 765.87, 987.43, 90, 321, 5};

double totalMass = 0;

for (int index = 0; index < masses.length; index++) {

   totalMass += masses[index];

}


The modifications made here are to correct the starting index of the loop, fix the loop condition, and increment the totalMass variable correctly.


C)

1)
Code to set each element of an array called nums to the value of the constant INITIAL:

const int INITIAL = 10; // or any other desired initial value

int nums[5]; // assuming nums is an array of size 5

for (int i = 0; i < 5; i++) {

   nums[i] = INITIAL;

}


2) Code to print the values stored in an array called names backwards:
string names[4] = {"John", "Jane", "Bob", "Alice"}; // assuming names is an array of size 4

for (int i = 3; i >= 0; i--) {

   cout << names[i] << " ".

}



3) Code to set each element of a boolean array called flags to alternating values (true at index 0, false at index 1, true at index 2, etc.):

bool flags[6]; // assuming flags is an array of size 6

for (int i = 0; i < 6; i++) {

   flags[i] = (i % 2 == 0);

}


Learn more about array objects at:

https://brainly.com/question/16968729

#SPJ1

write a program to check the given number is positive negative or zero​

Answers

Here is a a program to check the given number is positive negative or zero​ with Python code :

# Ask the user to enter a number

num = float(input("Enter a number: "))

# Check if the number is positive, negative, or zero

if num > 0:

   print("The number is positive.")

elif num < 0:

   print("The number is negative.")

else:

   print("The number is zero.")

Algorithm:

Suppose we have n jobs with priority p1,…,pn and duration d1,…,dn as well as n machines with capacities c1,…,cn.

We want to find a bijection between jobs and machines. Now, we consider a job inefficiently paired, if the capacity of the machine its paired with is lower than the duration of the job itself.

We want to build an algorithm that finds such a bijection such that the sum of the priorities of jobs that are inefficiently paired is minimized.

The algorithm should be O(nlogn)


My ideas so far:

1. Sort machines by capacity O(nlogn)
2. Sort jobs by priority O(nlogn)
3. Going through the stack of jobs one by one (highest priority first): Use binary search (O(logn)) to find the machine with smallest capacity bigger than the jobs duration (if there is one). If there is none, assign the lowest capacity machine, therefore pairing the job inefficiently.

Now my problem is what data structure I can use to delete the machine capacity from the ordered list of capacities in O(logn) while preserving the order of capacities.

Your help would be much appreciated!

Answers

To solve the problem efficiently, you can use a min-heap data structure to store the machine capacities.

Here's the algorithm:

Sort the jobs by priority in descending order using a comparison-based sorting algorithm, which takes O(nlogn) time.

Sort the machines by capacity in ascending order using a comparison-based sorting algorithm, which also takes O(nlogn) time.

Initialize an empty min-heap to store the machine capacities.

Iterate through the sorted jobs in descending order of priority:

Pop the smallest capacity machine from the min-heap.

If the machine's capacity is greater than or equal to the duration of the current job, pair the job with the machine.

Otherwise, pair the job with the machine having the lowest capacity, which results in an inefficient pairing.

Add the capacity of the inefficiently paired machine back to the min-heap.

Return the total sum of priorities for inefficiently paired jobs.

This algorithm has a time complexity of O(nlogn) since the sorting steps dominate the overall time complexity. The min-heap operations take O(logn) time, resulting in a concise and efficient solution.

Read more about algorithm here:

https://brainly.com/question/13902805

#SPJ1

Monero is cryptocurrency that focuses on transparency of ownership. True or false

Answers

Answer:

TRUE

Explanation:

A stack is a ___________________ data structure.

Answers

Answer:

A stack is a base data structure.

Ali receives an email from a person posing as a bank agent, who asks Ali to share his bank account credentials. Which type of network attack does this scenario indicate?
The network attack in this scenario is . This attack can occur .

Answers

Phishing is the type of network attack which this scenario indicates. This type of attack can take place via electronic messages.

What is network attack?

Network attacks are illegal activities on digital assets within an organization's network. Malicious parties typically use network assaults to change, destroy, or steal private data. Network attackers typically target network perimeters in order to obtain access to interior systems. In a network attack, attackers aim to breach the business network perimeter and obtain access to internal systems. Once inside, attackers frequently combine different forms of assaults, such as compromising an endpoint, propagating malware, or exploiting a weakness in a system within the network.

To learn more about network attack

https://brainly.com/question/14980437

#SPJ13

types of motherboard​

Answers

Answer:

Types of Motherboard

Explanation:

Motherboards are present in Desktop, Laptop, Tablet, and Smartphone and the components and functionalities are the same. But the size of the components and the way they are accommodated on the board varies due to space availability. In desktops, most of the components are fitted inside the sockets provided on the board and it is easy to replace each of them separately, whereas in Laptops/Smartphones some components are soldered on the board, hence it is difficult to replace/upgrade.

Though different motherboards have varying capabilities, limitations, features, Physical size/shapes (form factor), they are identified/grouped/categorized mostly by their form factors. Each manufacturer has come out with its form factor to suit the design of computers. Motherboard manufactured to suit IBM and its compatible computers fit into other case sizes as well. Motherboards built using ATX form factors were used in most of the computers manufactured in 2005 including IBM and Apple.

What if is a forecasting game, below are actions on your document and all you have to do is predict what will happen after the action is taken. Write your answer on a separate sheet of paper. 1. Triple click on the paragraph 2. Pressing Ctrl + A 3. Double click within the word 4. Pressing key combinations Shift + arrow key 5. Pressing key combinations Ctrl + End

Help me please​

Answers

Answer:

Where is the question

Explanation:

HOPE IT'S USEFUL

Write a program to read the the address of a person. The address consists of the following:

4 bytes street number

space

15 bytes street name

new line

11 bytes city

comma

space

2 bytes state

So the input could look like this:
Example: 1234 Los Angeles St.
Los Angeles, CA

Answers

This application presumes that the provided input format is precise (with a 4-digit street number, 15-byte street name, 11-byte city name, and 2-byte state abbreviation separated by spaces, new lines, and commas as specified).

How does BigQuery's Regexp replace work?

For instance, the result of SELECT REGEXP REPLACE("abc", "b(.)", "X1"); is aXc. Only non-overlapping matches are replaced using the REGEXP REPLACE function. As an illustration, substituting ana with banana only causes one replacement, not two. This function gives a false value if the regex parameter is an invalid regular expression. Additionally, it presumes that the input was typed accurately and without any mistakes or typos. You might want to add more validation and error-handling logic to a real-world application to make sure the input is accurate and complete.

# Read street address

street_address = input("Enter street address (4-digit street number, street name): ")

# Split the street address into street number and street name

street_number, street_name = street_address.split(' ', 1)

# Read city and state

city_state = input("Enter city and state (city, state abbreviation): ")

city, state = city_state.split(', ')

# Print the address

print(street_number)

print(street_name)

print(city)

print(state)

To know more about format visit:-

https://brainly.com/question/14725358

#SPJ1

Across the breadth of decision domains,
O The greater use of intuition over analytics results in stronger organizational
performance
The greater use of analytics over intuition results in stronger organizational
performance
O The use of analytics over intuition results in improved performance in about 75 percent
of the decision domains
O The use of analytics over intuition results in improved performance in about 50 percent
of the decision domains

Answers

Answer: C. The use of analytics over intuition results in improved performance in about 50 percent of decision domains.

Explanation: This suggests that while analytics can be a powerful tool for decision-making, there are still many situations in which intuition plays an important role. It is important for organizations to strike a balance between using analytics and intuition to make decisions that lead to improved performance.

What would be an ideal scenario for using edge computing solutions?

Answers

An ideal scenario for using edge computing solutions will be a school computer lab with workstations connected to a local network. The correct option is C.

What is edge computing?

The most typical places to find edge computing are in the transportation, industrial, energy, and even retail sectors.

The performant and scalable implementation model used by Akamai ensures that data and computation are not constrained by latency problems, which can negatively affect digital experiences.

Thanks to EdgeWorkers and EdgeKV, development teams can now focus on creating cutting-edge services and manage Akamai as code as a part of their digital infrastructure.

Thus, the correct option is C.

For more details regarding edge computing, visit:

https://brainly.com/question/28256857

#SPJ1

The Synonyms submenu offers a list of synonyms for a word. Is it always a good idea to use whatever synonyms are presented on the Synonyms submenu for a given word? Why or why not?

Answers

Answer:

No

Explanation:

Synonyms are sometimes NEARLY the same. Not exactly the same. Therefore the meanings can change a bit. For example a synonym for "bad" is "careless."

"I think corn is bad."

and

"I think corn is careless." - this sentence wouldn't make sense.

That's why, no, you shouldn't ALWAYS use the synonym.

What is the space complexity of the algorithm?ArithmeticSeries(list, listSize) { i = 0 arithmeticSum = 0 while (i < listSize) { arithmeticSum = arithmeticSum + list[i] i = i + 1 } return arithmeticSum}

Answers

Answer:

O(n) which is a linear space complexity

Explanation:

Space complexity is the amount of memory space needed for a program code to be executed and return results. Space complexity depends on the input space and the auxiliary space used by the algorithm.

The list or array is an integer array of 'n' items, with the memory size 4*n, which is the memory size of an integer multiplied by the number of items in the list. The listSize,  i, and arithmeticSum are all integers, the memory space is 4(3) = 12. The return statement passes the content of the arithmetic variable to another variable of space 4.

The total space complexity of the algorithm is "4n + 16" which is a linear space complexity.

Which of the following could be considered an algorithm?


directions for assembling a bicycle


the pages in a book


a file system directory


an application
F

Answers

The best answer is an application
Other Questions
Which statements about the opposite of 12 are true? Select each correct answer. 12 and its opposite are on located on the same side of zero on a number line. The opposite of the opposite of 12 is 12. 12 and its opposite are located the same distance from zero on a number line. The opposite of 12 is 112. 3. Bobbi bought 4 rolls ofribbon. Each roll of ribbon was meters long. How many cm ofribbon did Bobbi buy? How to take care of your body systems? Give 5 sentences plsshshdhdhajshhsdhdhd write 4n + 3 as a verbal expression \When we find a confidence interval around a value we are usingdescriptive statistics.TrueFalse what did martin luther king mean when He compared America's commitment to civil rights to a check that couldn't be cashed. PLEASEE HELP I NEED TO GET THIS RIGHT!! ill give lots of points if answer is correct Read the sentence and then answer the questionYesterday, the girl who has been my friend for three years moved away,I hope she will visit me soonWhich word from the sentence is a relative pronoun?O A WhoB. MeC. MyO D. She which of the following is not a typical capital budgeting cash outflow? multiple choice question. initial equipment investment working capital invested cost reductions installation costs The regression equation was found to be y = 3.00 + 0.475x. In this equation, y stands for number of errors, and x stands for number of hours without sleep. The predicted number of errors for a person who has gone 12 hours without sleep is A restaurant serves three types of omelettes. Surveys were taken of the last two days of orders and are displayed in the table below. Approximately 200 omelettes are served each day. What is the average number of ham and cheese omelettes served each day?SHOW YOUR WORK PLEASE Tyler used 1 1/4 gallons of paint to paint 5/7 of a fence How many gallons will it take to paint the whole fence? Write a Multiplication equation and a division equation to represent this question, then find the answer. Show your reasoning. Why did Loyalist oppose the Patriots cause? Which set of angles can form a triangle What are the types of expression? true or false, Valence bond theory states that a bond between two atoms is the strongest when the nuclei of the atoms are touching each other. Given mn, find the value of x.tto163 Which of the following describes what food is used for after it is broken down? Dr. robin lakoff explores how men and women use language differently and how this regularly leads to miscommunication between them. what type of anthropologist is she? Personal health monitors make it more difficut to be aware of your general health