please help anyone plss the code for the html to create an website plsss anyone PLSSSSS ​and i will mark u as brainliest forever

Please Help Anyone Plss The Code For The Html To Create An Website Plsss Anyone PLSSSSS And I Will Mark

Answers

Answer 1

Answer:ater on, in Chapter 9, you'll learn to put web pages online so anyone with a web ... Every web page you build along the way will be a bona fide HTML document. ... That means that the raw code behind every web page you create will consist entirely ... punctuation marks, and everything else you can spot on your keyboard).

Explanation:


Related Questions

Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicomputer where its data are stored. Another bank has ten branches spread throughout California , with the data being stored on a mainframe in San Francisco . Which system do you think is more vulnerable to unauthorized access

Answers

Answer:

The system that will be more prone to attack or vulnerability is the  bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.

Explanation:

Solution

If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable  to unauthorized persons or individuals.

The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.

With this example, the chances of vulnerability or attacks increases from the following :

Accounts payable could be disturbed by changing cash in payment false.Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.Transaction fraud like hacking, masquerading are very common in a networked system.

The system that will be more prone to attack or vulnerability is:

The bank with data being stored on a mainframe in San Francisco.

What is Database?

This refers to the data management where information is stored for easy retrieval and use.

With this in mind, we can see that if a bank in California has 13 different branches and stores data differently and another bank has 10 branches in California with data stored in a mainframe in San Francisco.

Hence, the more vulnerable system would be the mainframe in San Francisco because it is a shared system.

Read more about databases here:

https://brainly.com/question/5707732

Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False

Answers

Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

2. InDesign is the industry standard for editing photos is a true statement.

3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.

4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.

What lossy compression means?

The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after  it has undergone decompression.

Note that data here tends to be permanently deleted, which is the reason  this method is said to be known as an irreversible compression method.

Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

Learn more about File compression from

https://brainly.com/question/9158961

#SPJ1


Spreadsheet software enables you to organize, calculate, and present numerical data. Numerical entries are called values, and the
instructions for calculating them are called.

Answers

Answer:

It's called coding frame

Define the 7 steps to web design.

Define the 7 steps to web design.

Answers

I think it’s what he said

In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multiplied by the fourth power of two.

A. Fourth
B. Fifth
C. Sixth

Answers

Answer:

Your answer would be, B. Fifth digit ftom the right.

Explanation:

Binary with letters works like this,

the first 3 bits from the left, determine if the character is caps or lowercase, 010 is capital and 011 is lowercase, the next 5 are like this,

First - 2 to the power of four

Second - 2 to the power of three

Third - 2 to the power of two

Fourth - 2 to the powet of one

Fifth - 2 to the power of zero

So, given that information, the fourth digit from the right is 2 to the power of the three. The sixth digit is a bit to determine the capitalization, so the only answer left is B.

In binary, the second digit from the right is multiplied by the first power of two, and the fifth digit from the right is multiplied by the fourth power of two.

What is a binary number?

The base-2 numeral system, often known as the binary numeral system, is a way of expressing numbers in mathematics that employs only two symbols, typically "0" and "1."

The character's case is determined by the first three bits from the left, 010 is capitalized, 011 is lowercase, and so on for the following 5.

First - 2 to the power of four

Second - 2 to the power of three

Third - 2 to the power of two

Fourth - 2 to the powet of one

Fifth - 2 to the power of zero

The fourth digit from the right is therefore 2 to the power of three given the information above. The only option left is B because the sixth digit is a bit to determine capitalization.

Therefore, the correct option is B. Fifth.

To learn more about binary numbers, refer to the link:

https://brainly.com/question/15766517

#SPJ2

In Scratch, what option in the Sounds tab would you select if you wanted to use a sound file already on your local computer?
Choose a Sound
Record
Surprise
Upload

Answers

Answer: is Upload

Hope this helps! :)

Answer:

upload

Explanation:

Declare an array to store objects of the class defined by the UML. Use a method from the JOPTIONPANE class to request the length of the array the use

Answers

Here's the code snippet that declares an array to store objects of a class defined by a UML and uses the showInputDialog method from the JOptionPane class to request the length of the array from the user:

The Code Snippet

import javax.swing.JOptionPane;

public class MyClass {

   public static void main(String[] args) {

       int length = Integer.parseInt(JOptionPane.showInputDialog("Enter the length of the array:"));

      MyUMLClass[] array = new MyUMLClass[length];

       

       // Rest of the code...

   }

}

class MyUMLClass {

   // Class definition...

}

This instance entails that the user is requested to provide the quantity of items in the array with the use of the showInputDialog method, and subsequently, the input value is saved into the length variable. Subsequently, a collection of MyUMLClass instances is generated with a predetermined size.

Read more about arrays here:

https://brainly.com/question/29989214

#SPJ1

What is output?

C = 1
sum - 0
while (c < 10):
c = c + 3
sum = sum + c

print (sum)​

Answers

11

Explanation:

Please make me Brainliest

In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year

Answers

Answer:

In Python:

tuition = 7180

year = 2019

rate = 0.035

for i in range(2019,2027):

   print(str(year)+": "+str(round(tuition,2)))

   tuition = tuition * (1 + rate)

   year = year + 1

   

Explanation:

This initializes the tuition to 7180

tuition = 7180

This initializes the year to 2019

year = 2019

This initializes the rate to 3.5%

rate = 0.035

This iterates through years 2019 to 2026

for i in range(2019,2027):

This prints the year and tuition

   print(str(year)+": "+str(round(tuition,2)))

This calculates the tuition

   tuition = tuition * (1 + rate)

This increments year by 1

   year = year + 1

C++ code pls write the code

C++ code pls write the code

Answers

Answer:

Following are the code to this question:

#include<iostream>//defining header file

using namespace std;

class vec//defining class vec  

{

int x, y, z; //defining integer varaible x, y, z

public: // using public access specifier

vec() //defining default constructor

{

   x = 0; //assign value 0 in x variable  

   y = 0; //assign value 0 in y variable

   z = 0;//assign value 0 in z variable

}

vec(int a, int b , int c) //defining parameterized constructor vec

{

   x = a; //assign value a in x variable

   y = b; //assign value b in y variable

   z = c;//assign value c in z variable

}

void printVec() //defining a method printVec

{

   cout<<x<<","<<y<<","<<z<<endl; //use print method to print integer variable value

}

//code

vec& operator=(const vec& ob) //defining operator method that create object "ob" in parameter  

{

x=ob.x; //use ob to hold x variable value

y=ob.y;//use ob to hold y variable value

z=ob.z;//use ob to hold z variable value

return *this;//using this keyword to return value  

}

};

int main()//defining main method

{

vec v(1,2,3);//calling parameterized constructor

vec v2; //creating class object to call method

v2=v; //creatring reference of object

v2.printVec(); //call method printVec

return 0;

}

Output:

1, 2, 3

Explanation:

In the above-given code part, a method "operator" is defined, that accepts an object or we can say that it is a reference of the class "ob", which is a constant type. Inside the method, the object is used to store the integer variable value in its variable and use the return keyword with this point keyword to return its value.    

Write first 20 decimal dijits in the base 3

Answers

Answer:

first 20 decimal dijits in the base 3

Explanation:

i wrote what you said

Different types of users in a managed network, what they do, their classification based on tasks

Answers

In a  managed network,, skilled can be miscellaneous types of consumers accompanying various roles and blames.

What is the network?

Administrators are being the reason for directing and upholding the network infrastructure. Their tasks involve network arrangement, freedom management, consumer approach control, listening network performance, and mechanically alter issues.

Administrators have high-ranking approach and control over the network. Network Engineers: Network engineers devote effort to something designing, achieving, and claiming the network foundation.

Learn more about   network from

https://brainly.com/question/1326000

#SPJ1

ndcdeviceid?????????????????????​

Answers

YESS

Explanation:

YESSssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss

I am working on 8.8.6 "Totals of Lots of Rolls" in codeHS javascript and
I do not know what to do can someone help me?

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that rolls a 6-sided die 100 times.

Writting the code:

var counts = [0, 0, 0, 0, 0, 0, 0];

for (var i = 0; i < 100; i++) {

   counts[Math.floor(1 + Math.random() * 6)]++;

}

console.log('You rolled ' + counts[1] + ' ones.');

console.log('You rolled ' + counts[2] + ' twos.');

console.log('You rolled ' + counts[3] + ' threes.');

console.log('You rolled ' + counts[4] + ' fours.');

console.log('You rolled ' + counts[5] + ' fives.');

console.log('You rolled ' + counts[6] + ' sixes.');

See more about JAVA at brainly.com/question/12975450

#SPJ1

I am working on 8.8.6 "Totals of Lots of Rolls" in codeHS javascript and I do not know what to do can


If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color

Answers

I have no idea for that

Answer:

watermark

Explanation:

Write a program that will read in id numbers and place them in an array.The array is dynamically allocated large enough to hold the number of id numbers given by the user. The program will then input an id and call a function to search for that id in the array. It will print whether the id is in the array or not.

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

int main() {

  int n, i, *p, s;

  scanf("%d", n);

  p = (int*) malloc(n * sizeof(int));

  if(p == NULL) {

     printf("\nError! memory not allocated.");

     exit(0);

  }

  printf("\nEnter elements of array : ");

  for(i = 0; i < n; ++i) {

     scanf("%d", p + i);  

  }

  scanf("Enter Id to be searched: %d", s);

  for(j = 0; j < n; ++j) {

     if (s == *(p+j)){

         printf("ID number is in the array at position %d", j);

     }else{

         printf("Error: ID number does not exist.");

     }  

  }

  return 0;

Explanation:

The C program source code inputs integer values to dynamic array size, and the search variable is looked for in the array using a for loop. If the search term exists, then the index position is printed on the screen, else an error message is displayed on the screen.

A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error. The analyst runs a netstat -an command to discover if the webserver is up and listening. The analyst receives the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
A. Buffer overflow
B. Domain hijacking
C. Denial of service
D. Arp poisoning

Answers

Answer:

C. Denial of Service

Explanation:

Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.

D-H public key exchange Please calculate the key for both Alice and Bob.
Alice Public area Bob
Alice and Bob publicly agree to make
N = 50, P = 41
Alice chooses her Bob
picks his
Private # A = 19 private #
B= ?
------------------------------------------------------------------------------------------------------------------------------------------
I am on Alice site, I choose my private # A = 19.
You are on Bob site, you pick up the private B, B and N should have no common factor, except 1.
(Suggest to choose B as a prime #) Please calculate all the steps, and find the key made by Alice and Bob.
The ppt file of D-H cryptography is uploaded. You can follow the steps listed in the ppt file.
Show all steps.

Answers

Answer:

See explaination

Explanation:

Please kindly check attachment for the step by step solution of the given problem.

D-H public key exchange Please calculate the key for both Alice and Bob. Alice Public area Bob Alice

Explain the history of communication.

Answers

Answer:

Ur answer

Explanation:

i hope its help to you

Explain the history of communication.

What is the best way to deal with a spam

Answers

Simply ignoring and deleting spam is the best course of action. Avoid responding to or engaging with the spam communication because doing so can let the sender know that your contact information is still live and invite additional spam in the future. Additionally, it's critical to mark the email as spam using your email program or by reporting it to the relevant authorities. Make careful to report the spam to the proper authorities for investigation if it appears to be a phishing scheme or contains hazardous content.

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

Perform algorithm time measurement for all three quadratic sorting algorithms for Best Case (already sorted), Average Case (randomly generated), and Worst Case (inverse sorted) inputs and compare them with O(N*logN) sorting algorithm using Arrays.sort() method. Use arrays sizes of 50K, 100K, and 200K to produce timing results.

Answers

Answer:

Experiment size : 50,000

==================================

Selection sort :

---------------------------------------------------------

Worst case : 0.162

Average case : 0.116

Best case : 0.080

Insertion sort :

---------------------------------------------------------

Worst case : 0.162

Average case : 0.116

Best case : 0.080

Bubble sort:

--------------------------------------------------------

Worst case : 0.211

Average case : 0.154

Best case : 0.117

Experiment size : 100,000

==================================

Selection sort :

---------------------------------------------------------

Worst case : 0.316

Average case : 0.317

Best case : 0.316

Insertion sort :

---------------------------------------------------------

Worst case : 0.316

Average case : 0.317

Best case : 0.316

Bubble sort:

--------------------------------------------------------

Worst case : 0.482

Average case: 0.487

Best case : 0.480.

Experiment size : 200,000

==================================

Selection sort :

---------------------------------------------------------

Worst case : 1.254

Average case : 1.246

Best case : 1.259

Insertion sort :

---------------------------------------------------------

Worst case : 1.254

Average case : 1.246

Best case : 1.259

Bubble sort:

--------------------------------------------------------

Worst case : 1.990

Average case : 2.009.

Best case : 1.950

Explanation:

[NB: since it is very long there is the need for me to put it it a document form. Kindly check the doc. Files. The file A is the sort Analysis.Java file and the file B is the sort.Java file].

The concept of algorithm time measurement strictly depends on the following;

=> The measurement of time, space or energy on different sizes.

=> Plotting of the measurements and characterizing them.

=> Running or implementation of the algorithm.

Programming language such as Java can be used in accessing the operating system clock and Java had two static methods.

KINDLY CHECK BELOW FOR THE ATTACHMENT.

Identify and describe the three basic operations used to extract useful sets of data from a relational database?

Answers

The select operation, The join operation, The project operation are the three basic operations used to extract useful sets of data from a relational database.

Describe the three basic operations used to extract useful sets of data from a relational database?

The select operation generates a subset from the table's records (rows) that satisfy the specified criteria. Relational tables are joined together to offer the user access to more data than is contained in each table alone. The project procedure generates a subset of the table's columns, enabling the user to construct new tables that only include the necessary data.

What actions are performed in a relational DBMS?

Relational algebra has five fundamental operations: Set Difference, Union, Cartesian Product, and Selection. Most required data retrieval activities are carried out by them.

To know more about database visit

brainly.com/question/29412324

#SPJ4

Help me with this digital Circuit please

Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please

Answers

A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Thus, These circuits receive input signals in digital form, which are expressed in binary form as 0s and 1s. Logical gates that carry out logical operations, including as AND, OR, NOT, NANAD, NOR, and XOR gates, are used in the construction of these circuits.

This format enables the circuit to change between states for exact output. The fundamental purpose of digital circuit systems is to address the shortcomings of analog systems, which are slower and may produce inaccurate output data.

On a single integrated circuit (IC), a number of logic gates are used to create a digital circuit. Any digital circuit's input consists of "0's" and "1's" in binary form. After processing raw digital data, a precise value is produced.

Thus, A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Learn more about Digital circuit, refer to the link:

https://brainly.com/question/24628790

#SPJ1

What can help establish the focus and organization it relies on?

A.organizing
B.Plan
C.programming
D. arranging

Answers

Answer:

the answer is A jdififkfmtmg of g

Write a research about the 5 major of computer applications

Answers

Answer:

At the Indian National Congress Karachi session in 1931, Congress passed resolution dissociating itself and disapproving the policy of political violence in any form. The resolution was drafted by Mahatma Gandhi which admired the bravery and sacrifice of the 3 Martyrs- Bhagat Singh, Sukhdev, and Rajguru.

Explanation:

What is the running time to perform the following operations: (a) minimum (b) maximum (c) median (d) average (e) search/look-up (f) predecessor (g) successor, for a dynamic set with n keys implemented using the following data structures: (a) binary search tree (b) hash table based dictionary (c) direct address based dictionary (d) red-back tree (e) van-emde boas tree.

Answers

The running time that is used for a lot of operations in a lot of data structures for any given dynamic set with n keys are known to be given below.

What is the running time  about?

In terms of  (a) Minimum time they are:

Binary search tree: This is seen as O(h), and it is one where h is seen as the height of the said tree.

In terms of Hash table based dictionary: It is one that is not applicable, as it is one where the hash tables do not aid or support any form of finding of any kind in terms of the minimum element.

Lastly in terms of Direct address based dictionary: O(1) is one that is seen as as the minimum element that is it is one that can be directly accessed via the use of its key. Red-black tree: is one where the O(1), is one that act as red-black trees that tends to keep a subtree via the use of the minimum element found at its root.

Learn more about running time  from

https://brainly.com/question/26046491

#SPJ1

What is the running time to perform the following operations: (a) minimum (b) maximum (c) median (d)

Explain Newtown 3rd law.

gur-krcz-siq​

Answers

Every action has an equal and opposite reaction.

a simple structured program in c++ to calculate average of n items​

Answers

Answer:

#include <iostream>

using namespace std;

int main ()

{

 int n, i;

 float sum = 0.0, average;

 cout << "Enter the number of items:";

 cin >> n;

 float num[n];

 for(i = 0; i < n; ++i)

 {

   cout << "Enter a number: ";

   cin >> num[i];

   sum += num[i];

 }

 average = sum / n;

 cout << "Average = " << average;

 return 0;

}

Explanation:

OK, I let ChatGPT write this one, but it is a proper solution. You can simplify it by not storing each number in an array element. This is because other than adding it to the sum, you don't need these numbers.


4. Why do animals move from one place to another?​

Answers

Answer:

Animal move from one place to another in search of food and protect themselves from their enemies.They also move to escape from the harsh climate. Animal move from one place to another in search of food,water and shelter.

Answer:

Animals move one place to another because he search food and shelter

Other Questions
x^2-64=0 solve for all real values of x Banks and other financial institutions can grant a small business a _____, which is an agreement by which a financial institution promises to lend a business a predetermined sum on demand. a. mutual fund.b. line of credit.c. non-recourse loan.d. trust fund.e. trade credit. Using the expanded accounting equation, calculate and enter the answers for each question. You will need to use the answers you calculate for beginning and ending equity to answer the rest of the questions.Assets LiabilitiesBeginning of Year: $27,000 $18,000End of Year: $60,000 $27,0001) What is the equity at the beginning of the year?Beginning Equity 2) What is the equity at the end of the year?Ending Equity 3) If the owner contributes $7,600 and the owner withdraws $39,600, how much is net income (loss)?Net Income (Loss) 4) If net income is $3,800 and owner withdrawals are $9,200, how much did the owner contribute (owner, capital)?Owner, Capital 5) If the owner contributes $18,200 and net income is $18,100, how much did the owner withdraw (owner, withdrawals)?Owner, Withdrawals 6) If the owner contributes $42,300 and the owner withdraws $2,900, how much is net income (loss)?Net Income (Loss) PLEASE HELP WILL CROWN YOU The graph of a linear function is shown on the coordinate grid.What is the y-intercept of the graph of this function?PLEASE HELP! WILL GIVE BRAINLY ANSWER Starting today, Angela is planning to invest $6 at the beginning of each quarter for 3 years. Angela will earn is an annual 5% return on her investment. How much money would the investment be worth in today's dollars? Round your answer to two decimal places. a client is scheduled for an allograft to a burn wound, and the client asks for an explanation. what information will the nurse include in the client teaching? What is the Free Cash Flow to the Firm for Microsoft, whichhas:Cash Flow from Operations = $10,000mCapital Expenditure = $2,000mInterest Expense = $500mCorporation Tax = 25% what will be the outcome of not having ts(lock) as an atomic instruction A triangle has angle measurements of 72, 101, and 7 What kind of triangle is it? Factors that influence the birth rate of a country ? Determine the square root for each perfect square.1. 642. 1003. 814. 165. \sqrt 4/96. \sqrt 1/4 The number of red marbles in a jar is 3 times the number of blue marblesThere are 27 red marbles and b blue marbles. Write an equation to represent this situation. How many blue marbles are there? who collects the majority of information on an individual's performance in traditional merit pay programs? A mutation was made in the Drosophila gene sex lethal such the third exon was never spliced out. What is most likely effect this mutation will have on sex determination? All female All male Will not alter sex determination 50:50 sex ratio Read the paragraph.Growing a vegetable garden can be an expensive and complicated process. Many people use raised beds, buy expensive garden soil, and pay high prices for seedlings that have been started in corporate greenhouses.Which sentence would maintain a consistent tone if added to the paragraph?I think that if I were to start at garden at home I would only plant the vegetables I like and not the bad ones.Starting a garden at home sounds like a lot of work and isn't for lazy people.However, growing vegetables using a few inexpensive supplies and materials most people already have is possible.It's probably not worth the bother if you can't find things to use around your house. patricia will flip the coin 8 times. let a be the event that exactly 4 of the 8 flips are heads, and b be the event that the last two flips are tails. find p(a b). Sunrise Middle School is holding a carwash to raise money for their various school sport teams. The cost is $10 for SUV's and $5 for cars. Twenty-five percent of the money raised goes to the football team, thirty percent goes to the soccer team and the remaining percentage goes toward the basketball team. Write an expression to represent how much the basketball team will receive. Let S represent number the SUV's and Let C represent the number of cars Economists typically measure rates of inflation by a supernova resulting from the collapse of a massive star's core, that has hydrogen lines in its spectrum, is called a(n)