Java
Given an array of 10 names, complete the main method that outputs the name specified by the array index entered by the user. Use a try block to output the name and a catch block to catch any ArrayIndexOutOfBoundsException. Output the message from the exception object if an ArrayIndexOutOfBoundsException is caught. Output the first element in the array if the index is negative or the last element if the index is greater than the size of the array.
Hint: Format the exception outputs using the getMessage() method from the exception object. Do not hard code the exception messages.
Ex: If the input of the program is:
5
the program outputs:
Name: Jane
Ex: If the input of the program is:
12
the program outputs:
Exception! Index 12 out of bounds for length 10
The closest name is: Johnny
Ex: If the input of the program is:
-2
the program outputs:
Exception! Index -2 out of bounds for length 10
The closest name is: Ryley
import java.util.Scanner;
public class LabProgram {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
String[] names = { "Ryley", "Edan", "Reagan", "Henry", "Caius", "Jane", "Guto", "Sonya", "Tyrese", "Johnny" };
int index;
index = scnr.nextInt();
try {
}
}
}

Answers

Answer 1

The program illustrates the use of catching exceptions using try and catch.

Exceptions are simply errors that can crash a programTry and catch are used to prevent errors from crashing a program

The required try and catch block is as follows:

try {

       System.out.print(names[index]);

   }

   catch (ArrayIndexOutOfBoundsException e) {

  System.out.println(e.getMessage());

}

The flow of the above code segment is as follows:

First, we begin with the try block

try {

Then the program prints the element at the index

       System.out.print(names[index]);     }

If the index does not exist in the array (e.g. -1 or 11), then the catch block is executed

   catch (ArrayIndexOutOfBoundsException e) {

This prints the appropriate exception

  System.out.println(e.getMessage()); }

See attachment for sample run

Read more about similar programs at:

https://brainly.com/question/21330187

JavaGiven An Array Of 10 Names, Complete The Main Method That Outputs The Name Specified By The Array

Related Questions

Computational problem solving: Developing strategies: Given a string, S, of n digits in the range from 0 to 9, describe an efficient strategy for converting S into the integer it represents.

Answers

Given a string S of n digits in the range from 0 to 9, an efficient strategy for converting S into the integer it represents is computational problem-solving.

This process requires the following steps:

Step 1: Start by defining a variable, let's call it num, to 0, which will hold the integer representation of the string.

Step 2: Iterate through each digit in the string from left to right.

Step 3: For each digit, multiply the current value of num by 10 and then add the integer value of the digit to it.

Step 4: After iterating through all digits, the final value of num will be the integer representation of the string. For example, suppose we have the string "12345".

Using the above strategy, we would do the following:

Step 1: Define num as 0.

Step 2: Iterate through each digit in the string from left to right. For the first digit, 1, we would multiply num by 10 and then add 1, giving us num = 1. For the second digit, 2, we would multiply num by 10 again and then add 2, giving us num = 12. And so on, until we have iterated through all digits.

Step 3: After iterating through all digits, the final value of num will be the integer representation of the string, in this case, 12345.

To know more about computational problem-solving refer to:

https://brainly.com/question/30712124

#SPJ11

Overview Deep in the jungles of Africa, a rare bat virus was transmitted to a group of people causing them to live forever without needing food or water. The minor side effect of this virus is that the infected people live with a continual desire to bite humans and drink their blood. Those bitten then join the world’s new biting force (also known as vampires). This program is to simulate a vampire takeover and report on the findings. Specifications We will be simulating the infection of humans by vampires on a 2D map of a size of your choosing. The simulation will show a scatter plot containing humans, vampires, food, water and garlic. On each timestep, the vampires and humans will move and interact with each other as well as with the food, water and garlic. Timesteps (5%) The heart of your program will be a loop that controls how many timesteps the program runs for. This loop will control all the other functionality (such as movement). Your program should accept 3 command line parameters but default to reasonable options in the case of their absence. The command line parameters are as follows: Initial number of humans Initial number of vampires Number of timesteps in the simulation Objects (10%) Both humans and vampires should be represented in the code as objects. Humans should have health and age variables and vampires only a health variable. They should also have methods for their various actions, such as moving, attacking, biting etc. The methods you have are up to you. 3 Humans start with a health of 100 at the beginning of the simulation and lose 1 health point for every step they move (see the movement section). Humans also start with a random age between 10 and 50 and at every timestep they age by 1. Humans don’t live past 70 timesteps. Vampires start with the health that they had as a human before becoming infected. They don’t have an age and only lose health by being bitten by other vampires (see the interaction section). Food, water and garlic could also be represented using objects but don’t have to be. The initial locations of food, water and garlic are up to you.

Answers

This program is designed to simulate a vampire takeover in the jungles of Africa. It takes place on a 2D map and displays a scatter plot showing humans, vampires, food, water, and garlic. The simulation runs for a specified number of timesteps, and during each timestep, vampires and humans move and interact with each other as well as with the objects on the map.

The core of the program is a loop that controls the duration of the simulation. It accepts three command line parameters: initial number of humans, initial number of vampires, and the number of timesteps. If no values are provided, reasonable defaults are used.

The program represents humans and vampires as objects. Humans have health and age variables, while vampires only have a health variable. They have various methods for actions like moving, attacking, and biting.

Humans start with a health of 100 and lose 1 health point for every step they take. They also have a random age between 10 and 50, increasing by 1 at each timestep. Humans cannot survive beyond 70 timesteps. Vampires begin with the same health they had as humans before turning, and they don't age. Their health decreases only if they are bitten by other vampires.

Food, water, and garlic can be represented as objects on the map, but it's not mandatory. The initial locations of these objects can be determined as desired.

In conclusion, this program simulates the spread of vampires on a 2D map in the African jungles. Humans are the primary targets of the vampires, who attempt to bite them and turn them into vampires. Vampire health decreases if they are bitten by other vampires. The presence of food, water, and garlic adds further interactions. The simulation runs for a specified number of timesteps, allowing humans, vampires, and objects to interact with each other.

Learn more about vampires visit:

https://brainly.com/question/32364246

#SPJ11

Which transmission medium transmits data the fastest?
A) Twisted-pair cable
B) Coaxial cable
C) Wireless
D) Fiber-optic cable

Answers

Fiber optics: These connections are wired. It offers the quickest method of data transmission.

Why would a fibre optic cable be used?A fiber-optic cable, sometimes referred to as an optical-fiber cable, is an arrangement that resembles an electrical cable but has one or more optical fibres that are used to convey light instead of electricity. A fiber-optic cable is made up of several to hundreds of optical fibres enclosed in a plastic sheath. These are also known as optical cables or optical fibre cables, because they transmit data messages in the form of light, which travels hundreds of miles far more quickly than the electrical signals used in conventional cables. Fiber optic cables offer faster data transmission than wireless networks when the speed of the two networks is taken into account. Fiber optic cables maintain their strength even during busy times, whereas wireless networks can become slower.

To learn more about Fiber-optic cable, refer to:

https://brainly.com/question/29990631

The transmission medium that transmits data the fastest is Fiber-optic cable.

Fiber-optic cables transmit data through light pulses, allowing for faster speeds and greater bandwidth compared to other transmission mediums such as twisted-pair cable, coaxial cable, and wireless.

A twisted-pair cable consists of two or more wires twisted together to reduce interference from other devices. It is often used to transmit data over short distances, such as within a building or across a campus.

However, twisted-pair cable does not transmit data as quickly as other transmission media. A coaxial cable consists of a center conductor and an outer conductor, with a layer of insulation between them. Coaxial cable is commonly used to transmit data over long distances, such as between buildings or across a city.

However, it is not as fast as fiber-optic cable. Wireless transmission refers to the use of radio waves or other electromagnetic signals to transmit data without the need for wires or cables. Wireless transmission is commonly used for mobile communication devices, such as cell phones and tablets.

However, it is not as fast as fiber-optic cable. Fiber-optic cable is a transmission medium that uses glass or plastic fibers to transmit data at high speeds over long distances. Fiber-optic cable is the fastest transmission medium, and it is often used to transmit data across continents or even across the ocean. It is also used in data centers and other high-speed applications.

Learn more about Fiber Optics: https://brainly.com/question/28681724

#SPJ11

what is a dynamic website? the person responsible for creating the original website content includes data that change based on user action information is stored in a dynamic catalog, or an area of a website that stores information about products in a database an interactive website kept constantly updated and relevant to the needs of its customers using a database

Answers

A dynamic website is an interactive website that is kept constantly updated and relevant to the needs of its users by utilizing a database.

what is a dynamic website?

A dynamic website is kept updated and interactive through a database. Designed to generate web pages dynamically based on user actions or other factors. In a dynamic website, content can change based on user actions.

The website can show personal info and custom content based on user input. Dynamic websites use server-side scripting languages like PHP, Python, or Ruby to access a database. The database stores user profiles, product details, and other dynamic content for retrieval and display.

Learn more about dynamic website from

https://brainly.com/question/30237451

#SPJ4

help me cuz i foreal neda answer

help me cuz i foreal neda answer

Answers

I think it’s A

I’m pretty sure
I think it’s A. I’m not sure thought

What is Utility Software ? Name any two utility programs.

Answers

Answer:

Utility software is any software that gives pleasure and two utility programs could be linux and unix uwu

Explanation:

WinRar, Winzip, is a type of program that provides configuration services

I am timed and it needs to be in program C PLEASE help !!


Declare an array of doubles of size 170 called examBonus and initialize all the elements in the array to 5.5 (HINT: use a loop)

Answers

Answer:

Following are the declaration to this question:

double examBonus[] = new double[170]; // declaring the double array examBonus that holds 170 size value  

int x1;//defining an integer variable x1

for (x1=0;x1<170;x1++)//defining a for loop that initialize value in array

{

examBonus[x1] = 5.5;//assign value in array

}

Explanation:

In the above-given java program code, a double type array "examBonus" is declared, that holds a given size value, which is already defined in the question.

In the next step, an integer variable "x1" is defined which is used in the for loop that starts from 0 and ends when its value less than 170, and it assigns the value "5.5" in the above-given array.

you are a network engineer at bhms ltd. the network administrator wants you to set up a security configuration for the router so that the router can accept or decline certain packets depending on their information. which of the following will you use in such a scenario?

Answers

The network engineer will use in such a scenario is SSH. The correct option is (A).

What is SSH?

SSH is an abbreviation for Secure Shell or Secure Socket Shell. It is a type of network protocol. As the name implies, it allows the user to access a host or computer on an unprotected network in a more secure manner.

The primary distinction between SSH and SSL is that SSH is used to establish a secure tunnel to another computer from which you can issue commands, transfer data, and so on.

Worldwide, it is extremely popular and frequently utilized. Encrypts and authenticates communication between two hosts over the internet.

Therefore, the correct option is (A) SSH.

To learn more about SSH, refer to the link:

https://brainly.com/question/15687439

#SPJ1

The question is incomplete. Your most probably complete question is given below:

(A) SSH.

(B) RDP.

(C) SMB.

(D) FTP transfer.

What is contained in the trailer of a data-link frame?

Answers

Answer:

Trailer: It contains the error detection and error correction bits. It is also called a Frame Check Sequence (FCS).

Explanation:

In the context of data-link frames, the trailer is the final part of the frame structure. It typically contains two important components:

Frame Check Sequence (FCS): The FCS is a field in the trailer that is used for error detection. It is a checksum or a cyclic redundancy check (CRC) value calculated based on the contents of the entire frame, including the header, data, and sometimes the trailer itself.

End Delimiter: The end delimiter is a specific bit pattern or sequence of bits that marks the end of the frame. It helps the receiving device recognize the end of the frame and differentiate it from subsequent frames.

Thus, the trailer, along with the header and data, forms a complete data-link frame. It is used for reliable transmission of data across a network by incorporating error detection mechanisms and frame boundaries.

For more details regarding data-link frames, visit:

https://brainly.com/question/31497826

#SPJ6

Task 1: How Many Calories? A bag of cookies holds 30 cookies. The calorie information on the bag claims there are 10 "servings" in the bag and that a serving equals 300 calories. Write a program that asks the user co input how many cookies he or she actually are, then reports how many total calories were consumed. you must know the following facts: • To Calculate the number of cookies in a serving: cookiesPerServing - Cookies Per_Bag/Num_Servings; • To Calculate the number of calories in a cookie. caloriesPerCookie = calories_per_serving/cookiesPerServing; . To Calculate the total calories consumed. totalCalories caloriespercookie * numCookies;

Answers

A Python program that calculates the total calories consumed based on the user's input is given in the image attached.

What is the Calories?

The initial step of the program involves determining the quantity of cookies per serving. This is accomplished by dividing the total amount of cookies in the bag (30) by the number of servings (10).

Therefore, one can be able to determine the overall caloric intake by multiplying the caloric value of each individual cookie by the quantity of cookies ingested, and subsequently present the outcome through a print() statement.

Learn more about Calories from

https://brainly.com/question/830145

#SPJ4

Task 1: How Many Calories? A bag of cookies holds 30 cookies. The calorie information on the bag claims

George has to present the goals of information management to his team member. What is a goal of information management?
The goal of information management is to identify information requirements for various____levels.

Answers

Answer:

Management

Credit / Resource:

This problem has already been solved, if you would like to view more about this please click the question link below.

https://brainly.com/question/5495374

REOLVER EL SIGUIENTE PROBLEMA: R1=1.7K, R2=33K R3=4.7K R4=5.9K R5=17K IT=20mA CALCULAR: VT, I1, I2, I3, I4, I5 Y RT

Answers

Answer :

Ok

Step-by-Step Explanation:

what do you understand by the term "Artificial Intelligence "?​

Answers

Answer:

Artificial Intelligence (AI) is the branch of computer sciences that emphasizes the development of intelligence machines, thinking and working like humans. For example, speech recognition, problem-solving, learning and planning.

Can someone help me ?

Can someone help me ?

Answers

Yes, that’s true. The selected answer is correct

Answer:

yes please

Explanation:

You have written a search application that uses binary search on a sorted array. In this application, all keys are unique. A co-worker has suggested speeding up access during failed searching by keeping track of recent unsuccessful searches in a cache, or store. She suggests implementing the cache as an unsorted linked-list.
Select the best analysis for this scenario from the list below:
A. In some circumstances this may help, especially if the missing key is frequently search for.
B. An external cache will always speed up the search for previously failed searches, but only if an array-based implementation is used.
C. This is a good idea as the the linked-list implementation of the cache provides a mechanism to access the first item in O(1) steps.
D. This is always a bad idea.

Answers

The option A is the correct answer.Option A is the best analysis for this scenario from the list below. Here's why:Explanation:The binary search algorithm is used to find a particular key in a sorted array. In the case of a failed search, it takes log2 n comparisons to determine that the key is not present in the array.

If the application frequently searches for the missing key, the time required to access the array can be reduced by storing recent unsuccessful searches in a cache or store.In certain scenarios, such as when the absent key is often looked for, this might help.

An unsorted linked-list can be used to implement the cache. In such a case, the linked-list implementation of the cache provides a way to access the first item in O(1) steps. It is preferable to keep an external cache. However, it will only speed up previously unsuccessful searches if an array-based implementation is employed.

To know more about key visit:-

https://brainly.com/question/31937643

#SPJ11

A method of capturing only the changes that have occurred in the source data since the last capture is called ________ extract.

Answers

A method of capturing only the changes that have occurred in the source data since the last capture is called Static extract.

What is Static extract?

This is known to be a given method that is often used in getting only the alterations that have taken place in the source data since its last capture.

Note that in  full extraction, there is data extraction and loading and as thus A method of capturing only the changes that have occurred in the source data since the last capture is called Static extract.

Learn more about source data from

https://brainly.com/question/26928042

#SPJ1

define the term cyber space​

Answers

Answer: Cyberspace, is an amorphous, supposedly virtual world created by links between computers, Internet-enabled devices, servers, routers, and other components of the Internet’s infrastructure

six stations, a through f, communicate using the maca protocol. is it possible that two transmissions take place simultaneously? explain your answer.

Answers

No, it is not possible for two transmissions to take place simultaneously using the MACA protocol, as it uses a "listen-before-talk" approach to avoid collisions.

Which algorithm is best for spanning tree?

By gradually adding edges to a spanning tree that is expanding, Kruskal's Algorithm creates the spanning tree. The greedy approach used by Kruskal's algorithm is to identify the edge with the least weight in each iteration and add it to the expanding spanning tree.

What is the spanning tree algorithm and why is it needed?

A Layer 2 network technique called Spanning Tree technique (STP) is used to stop loops from forming within a network topology. STP was developed to prevent the issues that occur when computers share data over redundant paths in a local area network (LAN).

To know more about protocol visit :-

https://brainly.com/question/27581708

#SPJ1

What would be the best solution for the customer to share the monitor, mouse, and keyboard between the two computers quzlet

Answers

Answer:

A KVM switch.

Explanation:

A KVM switch would be the best solution for a customer to share the monitor, mouse, and keyboard between the two computers assuming he or she has one computer specifically for web services and another for a different purpose.

A KVM is an acronym for keyboard, video and mouse.

Basically, it is a hardware device which enables computer users to connect a keyboard, mouse and monitor (video display device) to several other computers and as such facilitates the sharing of these devices between multiple computers.

What are the difference between immediate window and view window.
(wrong answers will be reported)

Answers

Answer:

mmediate window is used to debug and evaluate expressions, execute statements, print variable values, and so forth. It allows you to enter expressions to be evaluated or executed by the development language during debugging.

The Command Window is used to execute commands or aliases directly in the Visual Studio integrated development environment (IDE).

Explanation:

It needs to be as simple as possible. Each question is slightly different.1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].Associate the list with the variable arith_prog.

Answers

Answer

can we get a picture of the problem ?

Explanation:

help a fellow coder and anser these 5 questions
Anne wants to hide her age by converting it from 13 to 1101. Which number system is Anne converting to?

Alphanumeric
Alphabetical
Binary
Decimal
Question 2(Multiple Choice Worth 5 points)

(04.03 LC)

Which of the following allows a user to quickly access a frequently used computer app?

Alphabetize program icons.
Create a shortcut on the toolbar.
Delete all icons on the screen.
Place all icons in one folder.
Question 3(Multiple Choice Worth 5 points)

(04.03 LC)

Which is an example of a binary number?

25
01111
#00FF00
Two
Question 4(Multiple Choice Worth 5 points)

(04.03 MC)

Alex needs to add a line of code to his program that will convert the number 568 to a binary number. Which function should Alex use?

bin()
translate()
digi()
print()
Question 5(Multiple Choice Worth 5 points)

(04.03 LC)

Which of the following means to find and fix errors in code?

Debug
Document
Error check
Restore

Answers

Answer: yes because it helps

Explanation: it shows everything

1. How many lines would be required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm? What would the actual display tolerance be for this number of lines?

Answers

The number of lines required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm, we can calculate the circumference of the circle and divide it by the desired display tolerance.

Circumference of the circle = π * diameter

= π * 200 mm

Number of lines required = Circumference of the circle / Display tolerance

= (π * 200 mm) / 0.1 mm

To find the actual display tolerance for this number of lines, we divide the circumference of the circle by the number of lines:

Actual display tolerance = Circumference of the circle / Number of lines

= (π * 200 mm) / (Circumference of the circle / Display tolerance)

= Display tolerance

Therefore, the actual display tolerance for the calculated number of lines will be equal to the desired display tolerance of 0.1 mm. In summary, the number of lines required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm is determined by dividing the circumference of the circle by the display tolerance. The actual display tolerance for this number of lines remains at 0.1 mm.

Learn more about tolerance calculations here:

https://brainly.com/question/30363662

#SPJ11

1. on a vlsm network, which mask should you use on point-to-point wan links to reduce the waste of ip addresses?

Answers

An interface that serves as the terminus of a point-to-point network frequently has a 31-bit subnet mask.

What is meant by vlsm network?

Variable Length Subnet Mask (VLSM) is a subnet design method where all subnet masks can have different widths. A subnet is a segmented portion of a larger network. Network engineers can utilize several masks for various subnets of a single class A, B, or C network by "subnetting subnets," which is the procedure.

By using the VLSM (Variable Length Subnet Mask) technique, network managers can partition an IP address space into subnets of various sizes as opposed to subnets of the same size.

For the same class of addresses, VLSM enables the use of several subnet masks across the network. Point-to-point links between routers, for instance, can utilize a /30 subnet mask, which provides two host addresses per subnet.

To learn more about vlsm network refer to:

https://brainly.com/question/29638015

#SPJ4

To generate a control break report, your input records must be organized in ____ order based on the field that will cause the breaks.

Answers

To generate a control break report, your input records must be organized in directory order based on the field that will cause the breaks.

What is directory?

Directory serves as guide in locating a particular item.

The directory is written in a way for an individual or an employee to understand and be able to retrieved needed information.

Therefore, to generate a control break report, your input records must be organized in directory order based on the field that will cause the breaks.

Learn more on directory below

https://brainly.com/question/14364696

#SPJ1

What is the binary code for 101?

Answers

Answer:

1100101

Explanation:

Answer:

The binary code for "101" is 1100101

What can you add to your presentation from the Insert tab?

Animations
Pictures
Variants
Transitions

Answers

Answer:

B. PICTURES

Explanation:

Answer:

I know its late but pictures is the answer.

Explanation:

I took the test and got it right.

what is the correct java syntax to output the sentence: My dog's name is "dee-dee"?

Answers

Answer:

System.out.println("My dog's name is \"dee-dee\"");

Explanation:

You need to use the backslash to use quotes inside a string.

If we are transferring data from a mobile device to a desktop and receive an error message that the mobile device has stopped communicating with the desktop, what is most likely the root cause?

Answers

The root cause of the error  when transferring the data from mobile device to the computer is maybe the port on the system is either damaged or not seeing the device.

Which device is used to transfer data from one place to another?

The device that is often used is known to be an External Hard Drives or the use of Media Devices for big Data Transfers.

Note that Copying data into an external hard drives, flash drives, or other kinds of storage devices is said to be another way that is often used in the transfer of data.

Moving specific files or backing up the full system from one computer to another is known to be very quick and easy.

Therefore, The root cause of the error  when transferring the data from mobile device to the computer is maybe the port on the system is either damaged or not seeing the device.

Learn more about error message from

https://brainly.com/question/25671653

#SPJ1

Converting Denary to Binary
Work out the binary value of each denary number. Remember, any number you put a 1 under is
activated and will be added, anything with a 0 under is not activated and is not added One has been
done for you to show you how you can work it out
128
Denary
32
16
8
2
1
1
1
0
0
0
1
1
+
199
I need to make 199 out of the 8 different numbers I have across the top
I can use 128, this will leave me with 71 stil to make
I can then use 64, this will leave me with 7
can't use 16 or 8 as they won't fit into 7
I can use 4 which will leave me with 3
I can use 2 which will leave me with 1
can then use 1
I have made 199
Any number I used will be a one, numbers I didn't use are all
128
Denary
64
32
16
1
56
121
45
132
249

Answers

Answer:

Converting the numbers provided to decimal:

128: 10000000

64: 01000000

32: 00100000

16: 00010000

1: 00000001

56: 00111000

121: 01111001

45: 00101101

132: 10000010

245: 11111001

Other Questions
help!! HELP HELP HELP HELP Find the present values of these ordinary annuities, Discounting occurs once a year. Do not round intermediate calculations, Round your answers to the nearest cent. a. $200 per year for 16 years at 14%. $___b. $100 per year for 8 years at 7% $___c. $1,000 per year for 8 years at 0% $___ Nobody has been able to figure out this question can anybody help me I only have about 10 more minutes Shelly rounds two values to the nearest hundred and then adds them. Their estimated sum is 700. Which pairs of numbers could be Shellys original values? Check all that apply. The graph below is used by company 2 to show the average monthly electric cost based on the electricity provider.A bar graph entitled Average Monthly Electric Cost has Company on the x-axis and Average monthly cost on the y-axis, from 95 to 125 in increments of 5. Company 1 has an average cost of 110, company 2 an average cost of 100, and company 3 an average cost of 120.How could the graph be redrawn so that the difference in monthly electric cost does not appear as great? A garden table and a bench cost $814 combined. The garden table costs $86 less than the bench. What is the cost of the bench? how do you prepare rice pudding change into passive voice Contex clues help readers by which of the following A. Understand unfamiliar wordsB. Understand which reading skill to useC. Understand how to analyze the textD. Understand the authors purpose Let R be the region bounded by the following curves. Use the shell method to find the volume of the solid generated when R is revolved about the y-axis.y=11x,y=0,x=3,x=9 12 of 12Items12 of 12ItemsIn three to five sentences, compare systems for digestion in an amoeba to those in a mouse. What specializations exist in the bodies of each? help please. the _______ is the period of time between the onset of one stimulus and the onset of another. Can A Computer Science Engineer Become A BusinessDevelopment Executive? ) What does a person have to do in order to receive a ballot by mail? 02. BASIC COUNSELLING SKILLS INCLUDE THE FOLLOWING EXCEPT:- A). CONCRETENESS B), EMPATHY C. PASSIVE LISTENING D). SELF DISCLOSURE I need to find the volume please help me i dont understand this Which equation best describes the graph?y = -4/5x 2y = 5/4x 2y = 4/5x + 2y = -5/4x + 2 round 682 to 1 significant figures ParkingYour coffee shop sits in a strip mall next to a small restaurant. The owner of the restaurant has complained to you about parking: There are not enough spaces available for his customers during lunch and dinner hours.Activity What are some suggestions you might offer to alleviate this situation? Prepare an outline for a conversation between the two owners: List your suggestions and the pros and cons for each. The greatest accomplishment of Philip II of Spain was to