paul allen and bill gates first designed which program for the altair 8800, which led them to start microsoft®?

Answers

Answer 1

The answer to your question is that Paul Allen and Bill Gates designed the program known as "Altair BASIC" for the Altair 8800 computer. This program was a high-level programming language interpreter specifically tailored for the Altair 8800, a popular microcomputer kit in the 1970s.

1. In the mid-1970s, Paul Allen and Bill Gates were inspired to develop software for the Altair 8800 after seeing an article about it in Popular Electronics magazine.
2. They reached out to the creators of the Altair 8800 and convinced them that they had developed a working version of BASIC, a programming language.
3. Allen and Gates then created Altair BASIC, which was an interpreter for the BASIC programming language that allowed users to write and run programs on the Altair 8800.
4. The success of Altair BASIC prompted Allen and Gates to form Microsoft, which initially focused on developing software for microcomputers.
5. This groundbreaking program for the Altair 8800 was instrumental in the creation of Microsoft, and it marked the beginning of a revolutionary era in personal computing.

In summary, Paul Allen and Bill Gates designed Altair BASIC for the Altair 8800, leading to the establishment of Microsoft and their subsequent contributions to the world of technology.

Learn more about programming language: https://brainly.com/question/23959041

#SPJ11


Related Questions

write an algorithm to find the perimeter of rectangle

Answers

Answer:

look at the link i put down below

Explanation:

write an algorithm to find the perimeter of rectangle

Please I have been having a problem with this assignment of mine but I have not gotten an answer. Idiot know if anybody could be of help to me.
Part 1

Write a Python program that does the following.

Create a string that is a long series of words separated by spaces. The string is your own creative choice. It can be names, favorite foods, animals, anything. Just make it up yourself. Do not copy the string from another source.

Turn the string into a list of words using split.

Delete three words from the list, but delete each one using a different kind of Python operation.

Sort the list.

Add new words to the list (three or more) using three different kinds of Python operation.

Turn the list of words back into a single string using join.

Print the string.

Part 2

Provide your own examples of the following using Python lists. Create your own examples. Do not copy them from another source.

Nested lists
The “*” operator
List slices
The “+=” operator
A list filter
A list operation that is legal but does the "wrong" thing, not what the programmer expects
Provide the Python code and output for your program and all your examples
Thanks.

Answers

Answer:

ummm

Explanation:

your on your own it doesn't makes since

A camera detector has an array of 4096 by 2048 pixels and uses a colour depth of 16.
Calculate the size of an image taken by this camera; give your answer in MiB.

Answers

The size of an image taken by this camera is approximately 16 MiB.

How to calculate the size of an image?

To calculate the size of the image taken by the camera, we need to know the total number of bits in the image.

The number of pixels in the image is:

4096 pixels × 2048 pixels = 8,388,608 pixels

The colour depth is 16, which means that each pixel can be represented by 16 bits. Therefore, the total number of bits in the image is:

8,388,608 pixels × 16 bits per pixel = 134,217,728 bits

To convert bits to mebibytes (MiB), we divide by 8 and then by 1,048,576:

134,217,728 bits ÷ 8 bits per byte ÷ 1,048,576 bytes per MiB = 16 MiB (rounded to two decimal places)

Learn more about cameras at:

https://brainly.com/question/26320121

#SPJ1

A program has a class Potato , which is derived from the class Vegetable , which is derived from the class Food . This is an example of _______

Answers

Inheritance

If you have a potato, it has the features/characteristics of a vegetable
A potato is healthy, and it gets this from being a vegetable
A vegetable gets its features/characteristics from food
A vegetable can be eaten, just like food
We can then say that a vegetable inherits the ability to be eaten from food
And that the potato inherits this from being a vegetable
The potato class inherits from the vegetable class the healthiness, but the vegetable class doesn’t inherit healthiness from the food class

FILL IN THE BLANK. Domain names must always have at least _____ parts, with each part separated by a dot (period). A. Four B. Five C. Three D. Two

Answers

The correct answer is "C. Three". Domain names must always have at least three parts, with each part separated by a dot (period).

These parts are known as "labels" and they are ordered from right to left, with the top-level domain (TLD) appearing last, followed by the second-level domain (SLD) and the subdomain (if present) appearing before that. For example, in the domain name "www.example.com", "com" is the TLD, "example" is the SLD, and "www" is a subdomain (which is often used to indicate a specific web server within a domain). It is also worth noting that domain names can have additional parts beyond the three required ones. For example, the domain name "blog.example.com" has four parts, with "blog" being a subdomain of "example.com".

Learn more about SLD here:

https://brainly.com/question/31368043

#SPJ11

What can hack or code can I use to get a shadow or frost dragon in adopt me

Answers

There aren’t any codes that could be used to redeem a Shadow Dragon or a Frost Dragon. Even if you’re desperate, do not hack the game as it would get you a permanent ban from the game forever. Try trading up to your dream pet instead of cheating to achieve it!

Security personnel has the primary responsibility to control the number of patrons entering and to check their IDs. Does the bouncer need to be certified

Answers

The certification requirements for security personnel, including bouncers, can vary depending on the jurisdiction and specific regulations in place.

In some areas, there may be legal requirements for security personnel to obtain certification or licenses to work in certain roles or establishments. This certification process often includes training on topics such as crowd control, conflict resolution, legal responsibilities, and ID verification.

To determine whether a bouncer needs to be certified, it is important to consult the local laws and regulations governing security personnel in the specific jurisdiction where they will be working. This may involve contacting local authorities, licensing agencies, or security industry associations to obtain accurate and up-to-date information on certification requirements.

It is generally advisable for security personnel, including bouncers, to undergo appropriate training and certification to ensure they possess the necessary skills and knowledge to perform their duties effectively and responsibly. Certification can provide assurance to both employers and patrons that the security personnel are adequately trained and qualified to maintain a safe and secure environment.

Learn more about jurisdiction here

https://brainly.com/question/14179714

#SPJ11

Final answer:

The requirement for a bouncer to be certified can vary depending on the location. Despite this, their main responsibilities, such as controlling the number of patrons entering and checking IDs, remain the same.

Explanation:

The job of security personnel, whose post is typically located outside the entrance of an alcohol establishment, is primarily to control the number of patrons entering, as well as to check their IDs. The certification process for this position (often referred to as a 'bouncer') can depend largely on the specific regulations of the state or country in which the alcohol establishment is located. Some places require formal security training or licensing, which may cover topics like conflict resolution, legal responsibilities, and emergency response. To be subsequently certified, the individual may also need to pass a background check and meet physical fitness standards.

Therefore, while the responsibilities of checking IDs and controlling the number of patrons entering are standard, whether or not a bouncer needs to be certified can vary.

Learn more about Security here:

https://brainly.com/question/32133916

Kira has a visual impairment and uses adaptive technology, like a screen reader, to help her write assignments in Word Online. Kira is trying to complete a three-page essay at school and needs help to find shortcuts for her screen reader. What is the best way for Kira to find help?

Answers

Answer: Go to the Accessibility option under the help tab

Explanation:

I did the test and got a 100.

so about computers can you tell me about bit coins and giga watts

Answers

Bitcoin is a decentralized digital money that may be purchased, sold, and exchanged whereas gigawatt hour is a measure of energy that equals one million kilowatt hours.

What is a Bitcoin?

Bitcoin's creator, Satoshi Nakamoto, originally described the need for “an electronic payment system based on cryptographic proof instead of trust.” Digital currency known as Bitcoin is completely decentralized and not subject to bank or governmental regulation. Instead, cryptography and peer-to-peer software are employed. A public ledger, a copy of which is stored on servers throughout the world, records every bitcoin transaction.

What is a Giga Watts?

1 Kilowatt hour [kWh] = 0.000 001 Gigawatt hour [GWh]

1,449 kilowatt hours (kWh) of energy to mine a single bitcoin.

0.001449 GWh

To know more about Cryptography visit:

https://brainly.com/question/88001

#SPJ1

what is a major difference between cyber vandalism and online priacy

Answers

Answer:

There really isn't a significant difference; two terms for the same things. B. Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Answer:

Vandals want to disrupt and show off a viewpoint; the goal of online piracy is to steal money.

Explanation:

a p e x

Please help w/ Java, ASAP!!!!

Please help w/ Java, ASAP!!!!
Please help w/ Java, ASAP!!!!

Answers

Answer:

B

Explanation:

When you have a method that is copying values from one array into another, you first have to initialize a new array which you can copy the values into. This is done by using the provided value "count".

   int [ ] nums = new int [count];

Second, you have a "for each" loop that iterates over each index in the first array, and assigns the value at that index to the same index location in the copy array. In a "for each" loop, the variable "val" represents the content of an index, not an iterated value itself. This is why we can just do this inside the loop:

  nums[ j ] = val;

That said, you still need "j" to be there and increment because we still need a tracking value for the current index in the copy array.

   int j = 0;

   for (int val: array)

   {

     copyArray[j] = val;

    j++;

   }

Third, you return the copy version of the array.

return nums;

Source:

I am currently a second year Java student.

2. Read the following scenarios about how three different programmera approach
programming a computer game. Identify which type of programming design
approach each represents (3 points):
a) Yolanda first breaks down the whole game she needs to program into modules.
She then breaks these modules into smaller modules until the individual parts are
manageable for programming. She writes the smallest modules, and then
recombines them into larger parts.
b) Isabella takes the game process and groups together sets of related data involved
in the process. She then identifies the messages the data should respond to. After
writing the code for each set of data, Isabella then combines, tests, and refines the
subsets until the software runs properly

Answers

a.) Structured programming

b.) Object-oriented programming

c.) Top-down programming

The programming design approach represented in this scenario is modular programming. The programming design approach represented in this scenario is object-oriented programming.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Modular programming is the programming design approach represented in this scenario.

Yolanda divides the entire game into modules, which are then subdivided further into smaller modules until the individual parts are manageable for programming.

Object-oriented programming is the programming design approach represented in this scenario. Isabella organizes sets of related data and determines which messages the data should respond to.

Thus, this method entails representing data and functions as objects and employing inheritance and polymorphism to generate flexible and reusable code.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Which curve is mostly used to characterize technology growth process? A S-curve An exponential curve A 45 degree straight line A Bell curve

Answers

The S-curve is the curve that is most commonly used to characterize the technological growth process.

An S-curve is a curve that is characterized by a rapid increase in growth at the beginning, followed by a leveling off or saturation at a certain point. The rate of growth slows down as it approaches its limits. It is a common way to represent the growth of a variety of phenomena, including technological growth.A technological advancement can start slowly, then speed up as more researchers become interested in it and funding becomes more accessible. However, it will eventually reach its peak, at which point it will slow down. A few technological advancements may also experience a plateau in their growth before becoming obsolete.A Bell curve is used to represent the normal distribution of data, an exponential curve represents exponential growth, and a 45-degree straight line represents constant growth. Therefore, the curve that is most commonly used to represent the technological growth process is the S-curve.

Learn more about S-curve here :-

https://brainly.com/question/28333332

#SPJ11

i will mark brainalist! ​

i will mark brainalist!

Answers

Answer:

I would say

1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Answer:

i think it would be 1) Weather Station

2) (word missing)

3) Robot perihen devices

4) Bit

5) Primary Key

6) Algorithim

7) Flow Chart

8) Table Wizard

9) Design View

10) SIMS

Explanation:

A screen on Evelyn's cell phone can hold an odd or an even number of apps. If she has an odd number of apps, how can she arrange them on 2 screens?

Answers

To arrange an odd number of apps on two screens, Evelyn can put (N-1)/2 apps on one screen and 1 app on the other.

When Evelyn has an odd number of apps on her cell phone, she may encounter a challenge when trying to arrange them on two screens evenly. However, with a little creativity and strategic placement, she can find a solution.

Let's assume Evelyn has N apps, where N is an odd number. She can begin by placing (N-1)/2 apps on one screen. This screen will hold the majority of the apps, as it can accommodate an even number of them. Now, Evelyn is left with one app to place.

To address this, she can choose one of the apps from the first screen and move it to the second screen, making it uneven. This action leaves her with (N-1)/2 - 1 apps on the first screen and 1 app on the second screen. While this setup is not perfectly even, it ensures that all the apps are accounted for on both screens.

Alternatively, if Evelyn desires a more balanced arrangement, she can distribute the apps differently. She can place (N+1)/2 apps on one screen and (N-1)/2 apps on the second screen. This configuration ensures that the number of apps on each screen differs by only one.

In either case, Evelyn can prioritize her most frequently used or essential apps on the first screen, making them easily accessible. The second screen can hold less frequently used or secondary apps.

By employing these strategies, Evelyn can overcome the challenge of arranging an odd number of apps on two screens, allowing for efficient organization and easy access to all her applications.

Learn more about Odd Apps

brainly.com/question/32284707

#SPJ11

Read the code snippet below and determine which markup language it is:



Sound Card
Creative Labs
Sound Blaster Live
80.00



The code is an example of the (Blank) markup language.

Answers

Answer:

Sound Card

Explanation:

triad wants to setup a secure pipe from one data center to another. they want a protocol that performs tunneling. make a recommendation?

Answers

The most suitable protocol for tunneling that Triad can use to establish a secure pipe from one data center to another is IPSec (Internet Protocol Security).

IPSec is a network protocol suite that authenticates and encrypts internet protocol (IP) data packets to secure data transmission over an IP network. It is widely used in Virtual Private Networks (VPNs) to secure communication channels between two networks over the internet or between remote users and a private network.

IPSec provides confidentiality, integrity, and authenticity for internet protocol data packets in a network. It creates a secure connection by encapsulating the original IP packets and encrypting them using security protocols such as Authentication Header (AH) and Encapsulating Security Payload (ESP). IPSec also supports different modes of operation for different applications, such as transport mode, tunnel mode, and hybrid mode.

Tunnel mode is the most commonly used mode in IPSec VPNs. In tunnel mode, the entire IP packet, including the original header, is encapsulated and encrypted. This mode is preferred when two networks are connected over the internet, and the original IP header may not be trusted or may be modified during transmission. Therefore, tunnel mode provides end-to-end security and integrity for the data transmission between two networks. Thus IPSec is the most suitable protocol for tunneling that Triad can use to establish a secure pipe from one data center to another.

Learn more about network: https://brainly.com/question/8118353

#SPJ11

A computer monitor is a type of____________.

i. input device

ii. output device

iii. storage device

iii. software

iv. none of these

Answers

Answer:

output device, through which processed information are displayed in text or graphics.

A computer monitor is a type of output device. So the correct choice is :

option (ii) output device.

A computer monitor is an example of an output device because it is made to display visual data produced by the computer. The monitor receives signals and shows pictures, movies, text, and other visual content when it is attached to the graphics card of a computer. It acts as a user interface, enabling users to observe and engage with the output of the computer.

A monitor does not receive any input from the user, in contrast, to input devices, which send data or commands to the computer. Keyboards, mice, and scanners are examples of input devices that let users communicate with computers by entering data or issuing orders.

The monitor serves as an output device, for instance, when you play a video game and view the images on the screen, or when you open a document and read the text on the screen. It uses the output produced by the computer system and shows it to the user graphically.

To know more about monitors,

https://brainly.com/question/30619991

what is the depth of the following tree?

what is the depth of the following tree?

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

This given tree has four nodes. Node A is a parent node in this tree, while B, C, and D are child nodes of A.

The given options about the depth of the tree are:

A). 0B). 1C). 2D). 3

The correct option to this question is (B) i.e. the depth of this tree is 1.

Because we know that the depth of a node M in the tree is the length of the path from the root of the tree to M. So, in this case,  the depth of node A to node B, C, and D  is 1. So, the correct option to this question is B. i.e the depth of the given tree is 1.

Write a function called in_bisect that takes a sorted list and a target word and will returns True if the word is in the list and False if it's not.

Answers

def in_bisect(t, word): if len(t) == 0: return False i = len(t) // 2 if t[i] == word: return True if word < t[i]:  return in_bisect(t[:i], word) else: return in_ bisect(t[i+1:], word). the word is not found in the list and the list is empty, then the function returns False.

The given Python program is a recursive function that searches a word in a sorted list using the concept of binary search. The binary search algorithm takes advantage of a collection of elements that are sorted uniformly in order to improve performance when searching for an element. A collection of n elements can be divided roughly in half log base 2 of n times.The in_bisect() function takes two parameters: a list and a word. It returns True if the given word is present in the list.

The function does this by continuously dividing the list in half, based on the position of the middle element, until the word is found or it is determined that it is not in the list.The code first sets the mid-point index, i, to the length of the list, t, divided by 2 using integer division. If the word is in the middle of the list, then the program returns True. Otherwise, the program decides which half of the list to check, based on whether the word is less than or greater than the middle element, and then calls in_bisect() recursively with the appropriate half of the list.

To know more about bisect visit:

https://brainly.com/question/32270687

#SPJ11

Write a program to declare an integer array of size 10 and fill it with random numbers using the random number generator in the range 1 to 5. The program should then perform the following: . Print the values stored in the array Change each value in the array such that it equals to the value multiplied by its index. Print the modified array. You may use only pointerioffset notation when solving the programt Example run: The sales red the fa (& 7 4- 8 A hp 144 ( 9 Add text 1 Draw P

Answers

We declare an integer array 'arr' of size 10. We then use the 'srand' function to seed the random number generator with the current time to ensure different random numbers on each program run.

Here's a program in C that fulfills the requirements you mentioned:

#include <stdio.h>

#include <stdlib.h>

#include <time.h>

int main() {

   int arr[10];

   srand(time(NULL)); // Seed the random number generator

   // Fill the array with random numbers between 1 and 5

   for (int i = 0; i < 10; i++) {

       arr[i] = rand() % 5 + 1;

   }

   // Print the original array

   printf("Original Array: ");

   for (int i = 0; i < 10; i++) {

       printf("%d ", arr[i]);

   }

   printf("\n");

   // Modify each value in the array by multiplying it with its index

   for (int i = 0; i < 10; i++) {

       arr[i] = arr[i] * i;

   }

   // Print the modified array

   printf("Modified Array: ");

   for (int i = 0; i < 10; i++) {

       printf("%d ", arr[i]);

   }

   printf("\n");

   return 0;

}

We fill the array with random numbers between 1 and 5 using the rand function. To limit the range, we use the modulo operator (%) to get the remainder when divided by 5 and add 1 to shift the range from 0-4 to 1-5.

We then print the original array using a for loop. After that, we modify each value in the array by multiplying it with its index. Finally, we print the modified array.

Each array element is accessed using pointer arithmetic notation, 'arr[i]', where 'i' represents the index of the element.

Upon running the program, you should see the original array printed first, followed by the modified array.

To know more about integer array

brainly.com/question/32893574

#SPJ11

How get end portals in mope

Answers

Answer:

what

Explanation:

EXPLAIN THE IMPORTANCE OF CREATING A POWERPOINT PRESENTATION AND HOW YOU COULD USE IT IN YOUR FUTURE CAREER

Answers

Answer: You could use this in real life because you might have a job and you might need to do a presentation for your work and presentations and powerpoints might help you remember things and stay organized.

Explanation:

Automata and formal languages
short statements
Which of the following statements about automata and formal languages are true? Briefly justify your answers. Answers without any substantiation will not achieve points! (a) Every language contains th

Answers

(a) Every language contains the empty string ε.

This statement is true. The empty string ε is a valid string in every language, including the empty language and languages that contain other strings. It serves as the base case for many formal language definitions and operations.

(b) The set of all possible strings over an alphabet Σ forms a regular language.

This statement is false. The set of all possible strings over an alphabet Σ, known as the universal language Σ*, is not a regular language. It is an example of a context-free language because it cannot be recognized by a finite automaton.

(c) The union of two regular languages is always a regular language.

This statement is true. The union of two regular languages is always a regular language. Regular languages are closed under the union operation, meaning that if L1 and L2 are regular languages, then L1 ∪ L2 is also a regular language.

(d) The complement of a context-free language is always a context-free language.

This statement is false. The complement of a context-free language is not always a context-free language. Context-free languages are not closed under complementation. There exist context-free languages whose complements are not context-free.

(e) Every regular language can be recognized by a deterministic finite automaton (DFA).

This statement is true. Every regular language can be recognized by a deterministic finite automaton (DFA). DFAs are one of the equivalent models of computation for regular languages, along with regular expressions and nondeterministic finite automata (NFAs).

(f) Every context-free language can be generated by a context-free grammar.

This statement is true. Every context-free language can be generated by a context-free grammar. Context-free grammars are a formalism used to describe and generate context-free languages. They consist of production rules that define how nonterminal symbols can be replaced by sequences of terminal and nonterminal symbols.

You can learn more about programming languages at: brainly.com/question/23959041

#SPJ11

A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of data?

Answers

Ans: Line graphs are used to display data or information that changes continuously over time. Line graphs allow us to see overall trends such as an increase or decrease in data over time. Bar graphs are used to compare facts. The bars provide a visual display for comparing quantities in different categories or groups.

Plz make me the brainliest

CONCLUSION: 1. Do you think programmers always write code exactly the same way? Why would it be an advantage for programmers to look at programming solutions from different perspectives? 2. What are the consequences of a poorly written algorithm?​

CONCLUSION: 1. Do you think programmers always write code exactly the same way? Why would it be an advantage

Answers

Answer:

C1: From a programmer's perspective, it can be advantageous to look at programming solutions from different perspectives because it can help you to see the big picture and identify potential problems before they become big problems. By looking at different solutions, you can also learn how to solve problems that have never been solved before.

C2: A poorly written algorithm can have a variety of consequences, the most common of which is that it will take longer to execute. It can also result in errors being made, which can lead to system crashes or other issues.

True or false question:

Is Presper Eckert was the programmer.

Answers

The statement given "Is Presper Eckert was the programmer." is false because Presper Eckert was not a programmer.

Presper Eckert was an American engineer and inventor who co-designed the first general-purpose electronic digital computer called ENIAC (Electronic Numerical Integrator and Computer) in the 1940s. While he played a crucial role in the development and design of ENIAC, he was not primarily known as a programmer. Instead, Eckert focused on the hardware and engineering aspects of computer design.

Programmers, on the other hand, are individuals who write and develop software programs that run on computers. They are responsible for coding, creating algorithms, and implementing software solutions. While Eckert contributed to the early development of computing technology, programming tasks were typically handled by other individuals who worked alongside him.

You can learn more about Presper Eckert at

https://brainly.com/question/9579686

#SPJ11

WILL GIVE BRAINLIEST!!!!!!!
In a series circuit, electricity flows along more than one path.


True

False

Answers

The answer is True !!!!!!!!!!!!!!!

like books and movies, software is a type of intellectual property. true or false?

Answers

It is TRUE to state that books and movies, software is a type of intellectual property.

What are intellectual property?

Intellectual property refers to creations of the mind, such as inventions, literary and artistic works,symbols, designs, and trade secrets.

It encompasses copyrights, trademarks, patents, and industrial designs, granting exclusive rights to creators or owners.  

Intellectual property protection ensures recognition and control over these intangible assets and encourages innovation and creativity.

Learn more about  intellectual property at:

https://brainly.com/question/1078532

#SPJ1

Why should data be not taken from the internet directly?​
Please solve it..!!

Answers

Answer:

Explanation:

some files and websites are out of controllable. because of the hackers

Data obtained from the internet should not always be taken at face value and used directly in important decision-making processes or analysis.

What is internet?

The Internet (or internet) is a global network of interconnected computer networks that communicate using the Internet protocol suite (TCP/IP).

For several reasons, data obtained from the internet should not always be taken at face value and used directly in important decision-making processes or analysis.

Accuracy: Internet data accuracy cannot always be verified, and there is no guarantee that the information is correct.Reliability: The dependability of internet data is also debatable.Relevance: Internet data may or may not be relevant to your specific research or project needs.Legal and ethical concerns: Using data obtained from the internet may raise legal and ethical concerns, particularly regarding intellectual property rights, copyright, and privacy.

Thus, data should not be taken from the internet directly.

For more details regarding internet, visit:

https://brainly.com/question/13308791

#SPJ2

Other Questions
sandra is a very busy mom with three children who are very successful in school. she tries to remember to praise them for their accomplishments, but she occasionally forgets to do so. the children are experiencing what b. f. skinner would call: Add the D.O.P (direct object pronoun) with the conjugated verb Fernando (cuidar) a los nios/Fernando takes care of the childrenFernando ________ ____________ Identify the part of speech for the underlined words in the sentence below.I bought three boxes of popcorn at the store, and I also bought candy.a.nounsb.verbsc.adverbsd.adjectivesThe underlined words are boxes, popcorn, and candy.I bought three boxes of popcorn at the store, and I also bought candy.a.nounb.prepositionc.adjectived.adverbThe underlined word was boughtI bought three boxes of popcorn at the store, and I also bought candy.a.nounb.prepositionc.adjectived.adverbThe underlined word is three.I bought three boxes of popcorn at the store, and I also bought candy.a.prepositionsb.conjunctionsc.pronounsd.adverbsThe underlined words are of and at.Identify the part of speech for the underlined word in the sentence below.I bought three boxes of popcorn at the store, and I also bought candy.a.adverbb.conjunctionc.adjectived.prepositionThe underlined word is also. i really need help on homework please help Multiply (8 + 3i)(3 + 5i). 39 + 49i 9 + 49i 24 + 15i2 24 + 49i + 15i2 Find two consecutive whole numbers that square root 15 lies between decide whether or not the matrices are inverses of each other [9 4 4 4 ] and [-0.2 0.2 0.2 -0.45]Yes or No Marking brainliest!! Find the solution to the system of equations below:y = 4x + 20y = 8x - 4 Where do students go to school? Although 80.4% of firsttime firstyear students attended college in the state in which they lived, this percent varied considerably over the states. A stemplot of the percent of firstyear students in each of the 50 states who were from the state where they enrolled is provided. The stems are 10s and the leaves are 1s. The stems have been split in the plot. 3(1-2x)>3-6x what is x plz show work I need help plzzzzzzzzzzzzzzzz. ASAPPPPPPP Given an undirected graph G= (V, E) determined by the adjacency matrix as follows:0100110111010100110111010The number of odd degree vertices of the graph isSelect oneA.2B.4C.3D.1if anyone knows the question please help me :( After we arrived in New Orleans, we rode the trolley around town.This sentence is made up of --One noun clause, and one independent clauseTwo independent clausesOne dependent clause and one independent clauseTwo dependent clausesPLEASE HELP!! Measurable, substantial, accessible, differentiable, and actionable are criteria to consider when determining: All but one of the following is an aspect of messages that foster the peripheral route. Which one is not?A) Message order.B) Format.C) Distractions.D) Source Credibility.E) All of the above are aspects of the messages of the peripheral route. i dont know how to use the pythagorean threomNO LINKS PLEASE HELP ASAP PLSSS Use the first principle of deviated to find the derivative ofy=5x1. The function s(t)=t3+3t+3 gives the distance from a starting point at time t of a particle moving along a line. Find the velocity and acceleration functions. Then find the velocity and acceleration at t=0 and t=1. Assume that time is measured in seconds and distance is measured in centimeters. Velocity will be in centimeters per second (cm/sec) and acceleration in centimeters per second per second (cm/sec2). Jacob is twice as heavy as Ken Linda is half as heavy as Ken Giver 3 children is at least 35 kg. a By letting Linda's mass be x, write an inequality for the total mass of the 3 children b. Hence, find the minimum mass of Ken Monica wanted to buy x notebooks at $3.50 each and 15 rulers at $(x+0.20) each She had a budget of $105 only c. Write an inequality for Monica's total expenditure . Hence, how many notebooks can she buy at most?