String str = "a black cat sat on a table";
int counter = 0;
for (int i = 0; i < str.length() - 1; i++)
{
if (str.substring(i, i + 1).equals("a") &&
!str.substring(i + 1, i + 2).equals("b"))
{
counter++;
}
}
System.out.println(counter);
What is printed as a result of executing this code segment?

Answers

Answer 1

On executing the given code segment, it prints the value of counter as 5.

Declare a string str with the value "a black cat sat on a table".Declare an integer counter and set it to 0.Iterate through the string from index 0 to the second-to-last character using a for loop.Inside the loop, check if the current character is "a" and the next character is not "b".If the condition is true, increment the counter.After the loop finishes, print the value of the counter.

Now, let's analyze the string:
- "a black cat sat on a table"
- The first "a" is followed by a space, the second "a" is followed by "c", the third "a" is followed by a "t", The fourth "a" is followed by a "t",  the fifth "a" is followed by a space and the sixth "a" is followed by "b". So only one of these instances are followed by "b".

So the code segment will print the number of times the character "a" is followed by a character other than "b". In this case, the value of counter is 5.

To learn more about code : https://brainly.com/question/28338824

#SPJ11


Related Questions

Explain the "no read-up, no write-down approach." (Bell-LaPadula model)

Answers

The Bell-LaPadula policy is provided through a computer system. The virus spreads if the virus is deployed on the system at a low level.

What is a computer virus?

When run, a computer virus is a sort of computer program that repeats itself by altering other computer programs and inserting its own code. If the replication is successful, the afflicted regions are considered to be "infected" with a computer virus, a term inherited from biological viruses.

The computer may act weirdly, glitch, or operate abnormally slowly if you have an infection.

Therefore, The Bell-LaPadula policy is provided through a computer system. The virus spreads if the virus is deployed on the system at a low level.

Learn more about computer on:

https://brainly.com/question/13805692

#SPJ1

Why would a real estate agent want to calculate a
median?
to determine the top and lower halves of
home prices in a neighborhood, which helps
to find the median
to determine the highest price paid in a
neighborhood
to determine the average price paid for a
home in a neighborhood
to determine the most popular price for homes
in the neighborhood

Answers

Answer:to determine the top and lower halves of home prices in a neighborhood, which helps to find the median

Explanation:E2020

Which of the following are secure protocols, ports, services, or applications? (Select TWO.)
a. SLP
b. Port 443
c. SMTP
d. SSH
e. Ports 161/162

Answers

The secure protocols, ports, services, or applications are Port 443 and SSH. The correct options are b and d.

What are secure protocols?

The standard HTTP port is 80. This indicates that port 80 is where the server request is received. However, a standard HTTP request can be intercepted. SSL encryption is used to secure an HTTP connection to prevent it (HTTPS protocol).

The URL string in this instance starts with "HTTPS" setting it apart from a typical online request. Instead of using port 80, HTTPS services by default utilize port 443.

Therefore, the correct options are b. Port 443 and d. SSH.

To learn more about secure protocols, refer to the link:

https://brainly.com/question/14600532

#SPJ1

Write a python program to check whether the number is divisible by 7. If its divisible, print its divisible otherwise find previous number and the next number which is divisible by 7​

Answers

f = int(input("Enter a number: "))

if(f%7==0):

   print("It's divisible by 7.")

else:

   if(f<7):

       print("7")

   else:

       print(str(f-(f%7))+", "+str(f+(7-(f%7))))

What does the message on a web page that says “Sorry, but our server is down” mean?
The database is incompatible with the network connection.
There is a problem with the cables that physically translate data.
The network of computers that should be sending the information the computer requested is not working.
The hosting company for that website has been hacked.

Answers

The database is incompatible with the network connection.

The message on a web page that says “Sorry, but our server is down” mean; The database is incompatible with the network connection.

What is Computer Network?

Computer Network is a term that describes the connection of one or multiple computers to a server such as Local Area Network( LAN)or Wide Area Network (WAN) basically for the purpose of transferring electronic files among connected computers.

We know that a network can have several client computers and only one server.

The message on a web page that says “Sorry, but our server is down” mean; The database is incompatible with the network connection.

Hence, option A is correct about the statement.

Learn more about the computer network here;

https://brainly.com/question/17369668

#SPJ2

Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.

Answers

What I think the highest is carbon dioxide . Because we use a lot of CO2 in every single day . So image that for 365 . We use a lot of carbon dioxide . In which that is ruining our earth

Which type of computer/IT architecture is limited to a central computer system?
a) Mainframe
b) Web-services
c) Peer-to-peer
d) Wireless
e) Server-to-server

Answers

The type of computer/IT architecture that is limited to a central computer system is Mainframe. Therefore the correct option is option A.

Computer Architecture is the design of computer components such as processor and memory, along with their interconnections, in order to achieve an optimum balance of performance, speed, and cost-effectiveness.

The different types of computer architectures are: Centralized architecture Distributed architecture Hybrid architecture Centralized architecture is a type of architecture that is restricted to a central computer system.

This architecture is often used in mainframe computers, where the central computer is a large, powerful machine that is shared by many users at once. Thus, the answer is Mainframe.

For such more question on Mainframe:

https://brainly.com/question/26705497

#SPJ11

Which printing options are available in the Print menu? Check all that apply.

portrait or landscape orientation
font size and color
printer selection
custom margin settings
Save As features
Print Preview

Answers

1

3

4

6

mam nadzieje że pomogłem                                                  

Answer:

1 potrait or landscape orientation

3 printer selection

4 custom margin settings

6 print preview

Which action is taken by a layer 2 switch when it receives a layer 2 broadcast frame?.

Answers

Answer:

When a Layer 2 switch receives a frame with a broadcast destination address, it floods the frame to all ports except the port on which it received the frame.

Explanation:

Which part of the packet contains the sequencing information that's used by TCP to reassemble packets

Answers

Answer:

During the TCP startup and teardown sequence, a "phantom byte" causes the sequence number and acknowledgment number fields to increment by 1 even though no data is exchanged. This phantom byte can be confusing when you have just learned that the sequence number field increments only when data is sent.

Explanation:

(10 points) For EM algorithm for GMM, please show how to use Bayes rule to drive \( \tau_{k}^{i} \) in closed-form expression.

Answers

The closed-form expression for \( \tau_{k}^{i} \) in the EM algorithm for GMM is derived using Bayes rule, representing the probability that observation \( x_{i} \) belongs to the kth component. By dividing the likelihood and prior by the sum of all such terms, we arrive at the desired expression.

In EM algorithm for GMM, Bayes rule can be used to derive the closed-form expression for \( \tau_{k}^{i} \).

The expression is as follows:$$\tau_{k}^{i} = \frac{p_{k}(x_{i}|\theta_{k})\pi_{k}}{\sum_{j=1}^{K}p_{j}(x_{i}|\theta_{j})\pi_{j}}$$where, \(x_{i}\) is the ith observation, \(\theta_{k}\) represents the parameters of the kth component, \(p_{k}(x_{i}|\theta_{k})\) represents the probability of \(x_{i}\) belonging to the kth component, and \(\pi_{k}\) is the mixing proportion of the kth component.

To derive this expression using Bayes rule, we can use the following steps:1. Using Bayes rule, we can write the posterior probability of the kth component as:$$p_{k}(\theta_{k}|x_{i}) = \frac{p_{k}(x_{i}|\theta_{k})\pi_{k}}{\sum_{j=1}^{K}p_{j}(x_{i}|\theta_{j})\pi_{j}}$$2.

Since we are interested in the probability that the ith observation belongs to the kth component, we can simplify the above expression as:$$p_{k}(x_{i}|\theta_{k})\pi_{k} = \tau_{k}^{i}p_{k}(\theta_{k}|x_{i})\sum_{j=1}^{K}\tau_{j}^{i}p_{j}(x_{i}|\theta_{j})$$3. Dividing both sides of the above equation by \(p_{i}(x_{i})\), we get:$$\tau_{k}^{i} = \frac{p_{k}(x_{i}|\theta_{k})\pi_{k}}{\sum_{j=1}^{K}p_{j}(x_{i}|\theta_{j})\pi_{j}}$$This is the closed-form expression for \( \tau_{k}^{i} \) that we were looking for.

For more such questions algorithm,Click on

https://brainly.com/question/13902805

#SPJ8

Feedback? CHALLENGE ACTIVITY 1.17.1: Selection sort. 340308.1909202.qx3zqy7 Jump to level 1 2 What is the list after the first outer loop iteration? [9, 1, 8, 4, 6] > --D- D- 3 Ex: 110, 15 0, 12 0, 16 9,14 ] 3 4 Check Next Feedback? How was this section? 6 91 Provide feedback

Answers

As a question answering bot, I cannot provide feedback on your work as I am not able to see what you have done. However, I can help you with answering the question.

What is the list after the first outer loop iteration?

In the selection sort algorithm, the first element of the unsorted part is selected as the minimum. In each iteration of the outer loop, the minimum value in the unsorted list is selected and swapped with the leftmost value in the unsorted list. The list after the first outer loop iteration would be: [1, 9, 8, 4, 6]

Given list is [9, 1, 8, 4, 6]. In the first iteration, the algorithm will select the minimum element from the unsorted list, which is 1. It will then swap 1 with the first element of the unsorted list, which is 9, resulting in the list [1, 9, 8, 4, 6].Therefore, the list after the first outer loop iteration is [1, 9, 8, 4, 6].

Learn more about algorithm: https://brainly.com/question/13800096

#SPJ11

There is one clear definition of IT. True False

Answers

Answer:

That is False. it has more definitions not only one.

Write a section of code that asks the user for their last name and then will create A new string produced by randomly splitting their name into two parts and reversing their order.
Example: "computer" may produce the result "utter comp".

Answers

import random

name = input("Enter your last name: ")

w = random.randint(0,len(name)-1)

txt = name[0:w]

txt1 = name[w:]

print(txt1+" "+txt)

I hope this helps!

What is wrong with the following code snippet? Language: Java 1 byte[] data = null; 2 FileInputStream stream = null; 3 File file = new File("example.txt"); 4 try { 5 stream = new FileInputStream(file); 6 data = stream.readAllBytes(); 7 catch (java.io.IOException ignored) { 8 } finally { 9 stream.close(); 10} Select the correct answer: The file may be closed before all data is read. If an error is raised, the file will remain open. If opening the file fails, a different error is raised. Not all bytes from the file are read.

Answers

The correct answer is: The file may be closed before all data is read. The try block does not have a corresponding catch block for the IOException that can be raised by the readAllBytes() method.

This can result in the file not being closed properly if an exception is raised. To fix this issue, a catch block should be added to handle the IOException and close the stream in the finally block. Additionally, it is not guaranteed that all bytes from the file will be read as the readAllBytes() method may not be able to read the entire file in one go. It is recommended to use a loop to read the data in chunks instead.

learn more about IOException here:

https://brainly.com/question/15068332

#SPJ11

To improve his score on a security self-assessment, Saul set up his laptop so that the first thing he must do when he turns it on is _____.

Answers

To improve his score on a security self-assessment, Saul set up his laptop so that the first thing he must do when he turns it on is to enter a strong and unique password or passphrase to log in to the system.

This helps ensure that only authorized users can access the laptop and its data, and reduces the risk of unauthorized access or data breaches. Additionally, Saul may have enabled other security measures such as full disk encryption or multi-factor authentication to further enhance the security of his laptop.

You can learn more about security self-assessment  at

https://brainly.com/question/30369803

#SPJ11

write a program which gives an easy mathematics quiz. the program should display two random numbers which are to be added together, like this: 117 213 ----- the program should ask the user to enter their answer. if the answer is correct, the user should be congratulated. if the answer is wrong, the right answer should be displayed and the user should be scolded. don't forget to: generate random numbers ask the user if they want to be tested again. if they don't want another math problem, the program should end. if they do want to try again, the new problem should display.

Answers

If the user wants to try again, then the program should generate a new problem.The basic steps for writing the program are given below:

Step 1: Import the random module to generate random numbers. The code for importing the random module is given below:import random Step 2: Use the random.randint() function to generate two random numbers. The code for random numbers is given below:num1 = random.randint(1, 1000)num2 = random.randint(1, 1000)

Step 3: Add the two random numbers to get the expected answer. The code for adding two numbers is given below:expected_answer = num1 + num2

Step 4: Ask the user to enter their answer. The code for asking the user to enter their answer is given below:user_answer = int(input("Enter the answer: "))

Step 5: Compare the user's answer with the answer. If the user's answer is correct, then congratulate the user. If the user's answer is incorrect, then display the correct answer and scold the user. The code for comparing the user's answer with the expected answer is given below:if user_answer == expected_answer:print("Congratulations! Your answer is correct.")else:print("Sorry! Your answer is incorrect. The correct answer is", expected_answer)

Step 6: Ask the user if they want to try again. If the user wants to try again, then generate a new problem. If the user doesn't want to try again, then end the program. The code for asking the user if they want to try again is given below:choice = input("Do you want to try again? (Y/N) ")if choice == 'N' or choice == 'n':break In the above code, the break statement is used to exit the loop if the user doesn't want to try again.The complete code for the program is given below:import randomwhile True:    num1 = random.randint(1, 1000)    num2 = random.randint(1, 1000)    expected_answer = num1 + num2    user_answer = int(input(f"Add the following two numbers: {num1} + {num2} = "))    if user_answer == expected_answer:        print("Congratulations! Your answer is correct.")    else:        print(f"Sorry! Your answer is incorrect. The correct answer is {expected_answer}.")    choice = input("Do you want to try again? (Y/N) ")    if choice == 'N' or choice == 'n':        breakThe above code generates two random numbers and asks the user to add them. If the user's answer is correct, then the program congratulates the user. If the user's answer is incorrect, then the program displays the correct answer and scolds the user. The program asks the user if they want to try again, and if the user doesn't want to try again, then the program ends. If the user wants to try again, then the program generates a new problem.

for more such question on generates

https://brainly.com/question/29927475

#SPJ11

Joe is having a hard time understanding how IPv6 addresses can be shortened. Let's say for example, that he has the following IPv6 address. How can it be compressed or shortened and still be valid

Answers

The IPv6 address can be compressed or shortened by removing leading zeros from each 16-bit section and by replacing consecutive sections of zeros with a double colon (::), but only once in the address.

In IPv6 addresses, each section consists of 16 bits represented by four hexadecimal digits. To compress or shorten an IPv6 address, leading zeros in each section can be removed. For example, if a section is "0001", it can be compressed to "1".

Additionally, consecutive sections of zeros can be replaced with a double colon (::). However, this compression can only be applied once in an address. For example, if there are consecutive sections of zeros like "0000:0000", they can be compressed to "::".

These compression techniques help to reduce the length of IPv6 addresses and make them more manageable and easier to read, while still maintaining their validity and representing the same network location.

You can learn more about IPv6 address at

https://brainly.com/question/28901631

#SPJ11

Whats the overall mood of the song Rags2Riches by rod wave

Answers

Answer:

9.5/10

Explanation: Because you can vibe with the muisc but i just dont like the name so with out the name 10/10

Answer:

it would be a sad/get turnt

Gemma wanted the code to play the meow sound, then say "Hello" for 2 seconds and then finally move 10 steps when she clicks on the green flag. It doesn't seem to be working. In the second box, draw the correct code. Original Code when space key pressed play sound meow say Hello! for 2 secs move 10 steps Corrected Code​

Answers

The corrected code for Gemma's desired behavior when clicking on the green flag:

The Code

When green flag clicked

  play sound meow

  say Hello! for 2 seconds

  move 10 steps

Please note that the code should be placed under the "When green flag clicked" event, rather than the "space key pressed" event as mentioned in the original code. This ensures that the desired actions will occur when Gemma clicks on the green flag.

Read more about code here:

https://brainly.com/question/29493300
#SPJ1

PLS HELP!!
Flowchart and Algorithm is used to solve simple problems that does not have conditions

true or false???

Answers

On one side true and on the other side is false since the algorithm work differently depend on the data it input

If a president is unpopular two years after the are elected what is most likely to happen in the midterm elections

Answers

Since World War II, the President's party has lost an average of 26 seats in the House and an average of four seats in the Senate. The party of the current president typically loses ground during midterm elections.

What do midterm elections mean in politics?One-third of the Senate's members are elected (or reelected) every two years, or their seats are vacated at the conclusion of the term. A "midterm election" is what is referred to when this biennial fight does not fall on the same day as a presidential election.Since World War II, the President's party has lost an average of 26 seats in the House and an average of four seats in the Senate. The party of the current president typically loses ground during midterm elections.Every two years there are elections for Congress. Voters elect every member of the House of Representatives and one-third of the senators. Between presidential elections and midterm elections, there is a lag. Midterm elections were held for the House of Representatives in November 2022.    

To learn more about "Midterm election" refer to:

https://brainly.com/question/29312295

#SPJ1

Since World War II, the President's party has lost an average of 26 House seats and four Senate seats per year. During midterm elections, the current president's party typically loses ground.

What do midterm elections mean in politics?Every two years, one-third of the Senate's members are elected (or reelected), or their seats are vacated at the end of the term. When this biennial battle does not coincide with a presidential election, it is referred to as a "midterm election."Since World War II, the President's party has lost an average of 26 House seats and four Senate seats per year. During midterm elections, the current president's party typically loses ground.Congress elections are held every two years. Every member of the House of Representatives and one-third of the senators are elected by popular vote. There is a lag between presidential elections and midterm elections.

To learn more about "Midterm election" refer to:

https://brainly.com/question/1298300

#SPJ1

what is the null and alternative hypothesis for an independent t-test?

Answers

The null hypothesis for an independent t-test states that there is no difference between the two groups being compared (i.e. there is no significant difference in their means). The alternative hypothesis states that there is a difference between the two groups being compared (i.e. there is a significant difference in their means).

The null hypothesis for an independent t-test is that there is no difference between the means of the two groups being compared. In other words, the null hypothesis states that any observed differences between the groups are due to chance and not due to a true difference in the populations.

The alternative hypothesis, on the other hand, is that there is a difference between the means of the two groups being compared. The alternative hypothesis is what the researcher is trying to prove, and it is the opposite of the null hypothesis.

See more about null hypothesis at https://brainly.com/question/4436370.

#SPJ11

Samuel wanted to paste the value and the formula attached from cell B6 to cell F16. Which methods will work? Check all that apply.

Answers

Answer:

Select cell B6, copy, and paste special into F16.

Select cell B6, Ctrl+C, and Ctrl+V into F16.

Select cell B6, copy, and paste into F16.

Explanation:

got it right on edge.

The methods that will work for Samuel are:

Select cell B6, copy, and paste special into F16.Select cell B6, Ctrl+C, and Ctrl+V into F16.Select cell B6, copy, and paste into F16.

How to determine the appropriate method?

There are several ways to copy formulas in Microsoft Office Excel.

Some of these ways are:

Direct pastingPaste special

The direct pasting is divided into two ways

Ctrl+c and Ctrl+vUsing the Copy and paste function

The above ways mean the same thing, and they can be achieved using the following instructions

Select cell B6, Ctrl+C, and Ctrl+V into F16.Select cell B6, copy, and paste into F16.

To paste the formula by paste special, Samuel must use the following instruction:

Select cell B6, copy, and paste special into F16.

Read more about Excel formulas at:

https://brainly.com/question/14299634

#SPJ2

A photograph is created by what
A) Silver
B) Shutters
C) Light
4) Mirror

Answers

A photograph is created by Light.

What are photographs made of?

Any photograph created is one that is made up of Support and binders.

The steps that are needed in the creation of a photograph are:

First one need to expose or bring the film to light.Then develop or work on the imageLastly print the photograph.

Hence, for a person to create a photograph, light is needed and as such, A photograph is created by Light.

Learn more about photograph from

https://brainly.com/question/25821700

#SPJ1

the process of raking and cutting out defective mortar and replacing it with fresh mortar is called: group of answer choices string-lining. tuck pointing. reglet installation. finger-jointing. parging.

Answers

The process of raking and cutting out defective mortar and replacing it with fresh mortar is called reglet installation .

What is  Reglet installation?

Reglet flashing is put between a wall and a metal roof on the exterior of a building. The reglet is fitted in conjunction with a counter flashing, such as an endwall or sidewall, through a small joint that is cut in the wall.

What is the purpose of Reglet flashing?

Between a wall (or the rear of a parapet wall) and a roof, reglet flashing is put. This flashing is used in conjunction with counter flashings to prevent leaks in a roof's 90-degree edge, one of the most important parts of the structure.

Learn more about Reglet flashing

brainly.com/question/14101138

#SPJ4

Which field uses computer programs to automate tasks so that they can be performed better than by humans ?
Bioinformatics

Robotics


Telecommunications

Network administration

Answers

The field uses computer programs to automate tasks so that they can be performed better than by humans is known to be Robotics.

Which field uses computer programs to automate tasks?

Robotics is seem as a field of engineering that is known to be based on the design and making of robots.

Note that Robots are often used to carry out tasks that are said to be hard for humans to perform and as such, the field uses computer programs to automate tasks so that they can be performed better than by humans is known to be Robotics.

Learn more about Robotics from

https://brainly.com/question/13515748

#SPJ1

what is a file named TR/Dldr.Adload.ugkeo doing on my computer

Answers

Answer:

That's brainly's way of making sure you're not a bot

Explanation:

I don't actually know

Answer:

did you download any file from this user or this similar link look at the picture below. If you please take it to someone who know how to get rid of viruses

what is a file named TR/Dldr.Adload.ugkeo doing on my computer


George took a photograph of a guitarist while he was playing a slow, somber song. Which technical aspect of photography has he used to convey
this emotion?

Answers

Answer-
The technical aspect of photography that George has used to convey the slow, somber emotion of the guitarist's playing is the use of shutter speed. By using a slow shutter speed, George has captured a longer exposure time, allowing the camera to capture the motion of the guitarist's hands as he plays the guitar, creating a sense of movement and flow. The resulting image would likely show blurred motion, conveying the emotion of the slow, somber song being played.

- I Hope This Helps! :)
• Please Give Brainliest

is the george washingting carver apart of the indencence day or no if u get it right 31 points

Answers

Answer:

No

Explanation:

He was involved with different recipes with peanuts. Nothing with independents day.

Other Questions
1. Using the data table below, model (draw) the orbital motion of the two planets (D andN).A. Determine the distance based on the mass and amount of force.a. In the chart, write 'more' or 'less', then be sure to represent the distance inyour model drawing.B. Be sure to represent the objects' masses appropriately.C. Include gravitational force arrows in your model.D. On your drawing mark where the planet will be increasing and decreasing in velocityfor each planetMassDistanceGravitational ForceSun10XX28Planet DPlanet N633Make sure to attach your drawn model in the space below. The "quantitative easing" policies of the Fed during, and following, the financial crisis of 2008-2009, resulted in(A) rapid growth of both the money supply and nominal GDP.(B) rapid growth of the money supply and a substantial increase in the rate of inflation.(C) low interest rates and a sharp decline in the velocity of the money supply.(D) low interest rates and a sharp increase in the velocity of the money supply Describe the new reforms of the Papacy. Be specific. How does water quality affect other aspects of nature? - Is a 3-day cold period in May an example of weather or climate? Explain your answer. What kind of societies did the haudenosaunee people form long ago? they lived in clans and did not trace their lineage. they lived in clans and traced their lineage on the mothers side. they lived as separate families and traced their lineage on the fathers side. they lived as separate families and only tribal leaders traced their lineage. Which of the following is the best definition for the term "evolution"?Group of answer choicesA change in the frequency of genes in a population over timeA measure of the successfulness of the most fit creatures in a populationA measure of the change of a specific trait in an individual over timeA change in the shape of an individual or group over timeA change in the abilities of the strongest creatures in a population Now, write a letter to your constituents about the importance of this amendment and why it should be passed. Remember to make your claim, give at least one reason to support it, and explain why the counterclaim is wrong.(I'm doing mine on the 14th amendment) Es Mexico is experiencing high inflation while Canada is enjoying a steady GDP and stable inflation. What should happen in theforeign exchange market?A)a depreciation of Mexico's currencyB)a decrease in the supply of Mexico's currencyC)a decrease in the demand for Canada's currencyD)an increase in the supply for Canada's currency omg please help me with the ones with the red dot ts for my math geometry class (1) Full. A binary tree is full if each non-terminal node has exactly two children. Give an array-based implementation of such a tree. Hint. Express the indexes of an array in binary. Is 0.725 greater then 0.75 decimals may someone help me find the increasing and decreasing ?? Compare the electric and gravitational force between the electron and the proton in a hydrogen atom. The electric charge of the electron is -1.60x10-19C and the same but positive for the proton. The electrons mass is 9.11x10-31 kg, while the protons mass is 1.67x10-27kg. Assume the distance between them is 5.3x10-11 m. If an astronaut goes on a space walk outside the space station, she will quickly float away from the station unless she has a tether holding her to the station. True or false?. Which if the following is a possible delay in in hospital care to definitive treatment for patients experiencing an acute myocardial infarction Consider the points A=(2,1,2),B=(3,2,3) and C=(4,3,4). Find the true statement. (a) None of the other statements is true. (b) The line through A and B also goes through the point C. (c) The three points are vertices of a triangle whose area is 2 . (d) The three points are vertices of a triangle whose area is 1 . Sylvia is found to have a deficiency of calcium, or calci ___.a. rrheab. peniac. rrhaged. emia i need all of the answers THANK UU Select the correct graph down below for Part AThen solve Part B of the question