Task 1 - k Nearest Neighbours Implementation Requirements: a. Implement the K-Nearest-Neighbours algorithm. Your code should include at least the following functions: 1. read_data: reads the wine.csv dataset, which includes the results of a chemical analysis of 178 wine samples grown in the same region in Italy but derived from three different cultivars. The analysis determined the quantities of 13 different features found in each of the three types of wines. (Some additional information on the dataset can be found in the attached file wines.names). 2. split_data: takes a percentage value as a parameter, which represents the relative size of the testing set. The function should randomly split the dataset into two groups: testing and training. For example, if the dataset includes 100 data items, then the function call split_data(0.3) should return two groups of data items: one that includes 70 random selected items for training, and the other includes the other 30 items for testing. Note: You may use the Python function random sample to split the data set. 3. euclidean_distance function: measures the distance between two wines based on their attributes. 4. KNN function: takes a training set, a single wine and an integer k, and returns the k nearest neighbours of the wine in the training set. 5. A classification function that finds the type of the wine. Your function should return the type (1,2 or 3) based on the majority of its k nearest neighbours. 6. A function that returns the prediction accuracy, i.e. the percentage of the wines in the test set that were correctly identified. b. The output of your program should include: 1. For each sample in each group (training and testing) print its real type, the classifier prediction and whether the prediction was correct (true/false). For each group print the prediction accuracy. For example: sample class = 1, prediction class = 1, prediction correct: True sample class = 1, prediction class = 2, prediction correct: False Training set accuracy: 99.47619047619048 X sample class = 1, prediction class = 1, prediction correct: True sample class = 1, prediction class = 2, prediction correct: True Testing set accuracy: 88.76543646533220 % C. Run your algorithm using different k values. d. Plot a graph that shows the accuracy of both sets (training and testing) in respect to k. Note: To make plots, you can use the Python library matplotlib. e. Try to use a different distance function (replacing the euclidean_distance from (4.) above). Does it change the results? In what way? (Improve or worsen the accuracy). The results should be included in the report.

Answers

Answer 1

The task requires implementing the K-Nearest Neighbours (KNN) algorithm for a wine classification problem using the provided wine dataset.

The dataset contains chemical analysis results for 178 wine samples, with 13 different features.

The implementation should include several functions. The "read_data" function reads the wine dataset from the "wine.csv" file. The "split_data" function randomly splits the dataset into training and testing sets based on a given percentage. The "euclidean_distance" function calculates the Euclidean distance between two wine samples based on their features. The "KNN" function takes a training set, a single wine sample, and an integer k, and returns the k nearest neighbours of the wine sample from the training set. There should also be a classification function that predicts the type of the wine based on the majority of its k nearest neighbours. Finally, an accuracy function is needed to calculate the prediction accuracy of the algorithm on both the training and testing sets.

The output of the program should include the real type and predicted type of each wine sample in both the training and testing sets, along with an indication of whether the prediction was correct or not. Additionally, the prediction accuracy for both sets should be printed.

To evaluate the algorithm, it should be run with different values of k. The accuracy of the training and testing sets should be recorded for each value of k. The results can then be plotted using the matplotlib library to visualize the accuracy trends with respect to k.

To explore the impact of a different distance function, an alternative distance metric can be implemented and substituted for the Euclidean distance in the KNN algorithm. The results obtained using this alternative distance function should be compared to the results using the Euclidean distance. The report should analyze whether the accuracy improves or worsens when using the alternative distance function and discuss the potential reasons behind the observed changes.

In summary, the task involves implementing the KNN algorithm for wine classification, splitting the dataset into training and testing sets, calculating distances between wine samples, predicting wine types, evaluating accuracy, plotting accuracy trends, and experimenting with different distance functions. The results and analysis should be presented in a report, including the impact of the alternative distance function on accuracy.

Learn more about dataset at: brainly.com/question/26468794

#SPJ11


Related Questions

Two columns of a relational table can have the same names.

a. True

b. False

Answers

Answer: True!

Explanation:

Two columns of a relational table can have the same names. If one of two identical relational tables has the last column moved to the first place, those two relational tables will no longer be  identical

Use your pythonanywhere account to write a program in python that satisfies the following tasks:
ask the user what their address is
using a print statement, tell them how many characters long their address is (use the format, "your address is 43 characters long.")
print the fifth character of their address (be careful—what position is the fifth character?)
determine whether the word "main" is in their address and display either true or false
print their address three times

Answers

Python program that satisfies the given tasks:

# ask user for their address

address = input("What is your address? ")

# print length of address

print(f"Your address is {len(address)} characters long.")

# print fifth character of address

print(f"The fifth character of your address is {address[4]}.")

# check if "main" is in address

if "main" in address:

   print("True")

else:

   print("False")

# print address three times

print(address * 3)

When you run this program, it will ask the user for their address and store the input in the address variable. It will then print the length of the address using string interpolation with the len() function. The fifth character of the address is printed using indexing with the string's subscript notation. It checks whether the word "main" is present in the address using the in operator and prints either "True" or "False" accordingly. Finally, the program prints the address three times by multiplying it with the integer 3.

Learn more about string; https://brainly.com/question/30392694

#SPJ11

Asymmetric encryption, also called _____ encryption uses two keys, a public key and a private key, which are mathematically related.

Answers

The other name for asymmetric encryption that uses two keys a public key and a private key, which are mathematically related is; Public key

Data Encryption

Asymmetric Encryption could also be called asymmetric cryptography, or public-key encryption or cryptography.

It is a process that utilizes a pair of related keys namely one public key and one private key to encrypt and decrypt a message as well as protecting it from unauthorized access.

In conclusion, the other name for asymmetric encryption here is public key

Read more about data encryption at; https://brainly.com/question/9238983

Subject attributes, object attributes and environment attributes are the three types of attributes in the __________ model.

Answers

Subject attributes, object attributes and environment attributes are the three types of attributes in the ABAC model.

What is Subject Attribute?

This refers to the place where the subject fields are stored and can only be defined for studies that require authorization in databases.

Hence, we can see that based on the three attribute types that are used that include Subject attributes, object attributes and environment attributes, these are found in the ABAC model.

Read more about subject attributes here:

https://brainly.com/question/17290596

#SPJ1

When constructing data-flow diagrams, you should show the interactions that occur between sources and sinks.

a. true
b. falsr

Answers

TRUE. When constructing data flow diagrams, it is important to show the interactions that occur between sources and sinks.

2 red and 2 overlapping balls in the center are surrounded by a green, fuzzy, circular cloud with a white line running through it. 2 green balls sit on the white line, and a line leading a bracket around the balls is labeled A. A line leading to a bracket overlapping the white line is labeled B.Identify the parts of the atom that are labeled in the diagram.Label A:Label B:

Answers

Answer: Label A: nucleus. Label B: Electron Cloud

Explanation: I got it right

Answer:

Label A is nucleus and Label B is electron cloud

Explanation:

Assuming a single-processor system, that load and store are atomic, that x is initialized to 0, and that x must be loaded into a register before being incremented (and stored back to memory afterwards), what are all the possible values for x after both threads have completed

Answers

Thread 2 read

Thread 1 read/write 4 times

Thread 2 write

Thread 1 read

Thread 2 read/write 4 times...

Drag the tiles to the correct boxes to complete the pairs.
Match the different aspects of the marketing information systems to the scenarios that portray them.

Answers

Interactive, pre-marketing, research, and mass communication eras are the ones that best fit the marketing eras to the scenarios that depict them.

What are the different marketing eras?Interactive, pre-marketing, research, and mass communication eras are the ones that best fit the marketing eras to the scenarios that depict them.Interactive era, Individualized mail sent to various clients based on their unique preferences.Pre-marketing era , a town crier enticing shoppers to purchase a novel product, assuring that it is a one-of-a-kind.Research era , data analysis to determine the needs of the consumer and corresponding product marketing.In the era of mass communication, a business might advertise its goods in newspapers, magazines, and on the radio.      

To learn more about Marketing eras refer to:

https://brainly.com/question/9350735

#SPJ1

What are three advantages of using desktop software on a desktop computer
rather than mobile software on a smartphone or tablet?
A. It is extremely portable and easy to transport.
B. Using a mouse allows more precision when selecting objects on
the screen.
C. It is easier to type in text quickly using a keyboard.
D. It offers more features, and the interface fits well on a bigger
screen.

Answers

Answer:

A. It offers more features, and the interface fits well on a bigger screen.

B. Using a mouse allows more precision when selecting objects on the screen.

C. It is easier to type in text quickly using a keyboard.

A writing guide in making a project correctly.

a.project proposal
b.project plan
c.project format
d.project template ​

Answers

Answer:

b

Explanation:

B Project plan hope this helps

What are the factors that affect self-confidence?

Answers

Answer:

The factors that affect self confidence are not having enough faith in yourself and letting what others say about you put you down

Explanation:

Plz mark brainlest it will help me so much

You will watch the short film Figueroa (2019) written, produced, and directed by Victor Hugo Duran. Then answer the following questions:

1. What kind of choices does Duran make in how he covers the scenes? Do you notice a pattern in the kinds of shots he uses?

2. Why do you think he uses the 2.4:1 aspect ratio? What does it do for his story?

3. Why do you think he holds the final shot for so long? How do you think the ending would be different if the shot was only half as long (before the credits come on).

Answers

The kind of choices that Duran makes in how he covers the scenes is

What is a Movie Synopsis?

This refers to the brief summary of a screenplay's core content that shows its plot points, conflict, resolution and protagonist's development, etc.

The reason why I think he uses the 2.4:1 aspect ratio is that he wants to cover the action from a wider angle to capture all the actions and activities of the characters.

The reason why I think he holds the final shot for so long is to show the empty room after the two boys had run off.

The ending would have been different if it was half as long because some other story element could have been displayed.


Read more about movie synopsis here:

https://brainly.com/question/1661803

#SPJ1

a(n) ____________________ is a memory location whose contents can be changed.

Answers

A variable is a memory location whose contents can be changed. In computer programming, variables are used to store and manipulate data during the execution of a program. They act as containers that hold different types of values, such as numbers, text, or objects.

Variables are essential for dynamic and flexible programming as they allow the program to store and modify data as needed. They have names or identifiers that are used to refer to them and can be assigned initial values or updated throughout the program's execution.

The contents of a variable can be changed by assigning new values to it using assignment statements or through various operations and computations performed in the program. This ability to store and modify data dynamically makes variables a fundamental concept in programming languages.

To learn more about Programming - brainly.com/question/14368396

#SPJ11

natasha, a network security administrator for an online travel portal, noticed that her website was the victim of an sql injection. she decided to study the sql queries to find which one made this vulnerability in the database, and she noticed the following sql code piece executed on the database: 'whatever' and email is null; what has been accessed by the attacker running this sql injection?

Answers

The information which has been accessed by the attacker running this SQL injection is that: The attacker has determined the names of different types of fields in the database.

What is SQL injection?

In Cybersecurity, SQL injection can be defined as code injection technique which is typically used by an attacker to exploit any web security vulnerability in a database especially by interfering with the queries that are being sent through a software application to the database.

What is a database?

A database can be defined as an organized and structured collection of data that're stored on a computer system as a backup and they're usually accessed electronically.

In this context, we can reasonably infer and logically deduce that this attacker was able to access the names of different types of fields which are stored in the online travel portal's database.

Read more on SQL injection here: https://brainly.com/question/25823241

#SPJ1

Complete Question:

Natasha, a network security administrator for an online travel portal, noticed that her website was the victim of an SQL injection. She decided to study the SQL queries to find which one made this vulnerability in the database, and she noticed the following SQL code piece executed on the database: 'whatever' AND email IS NULL;

What has been accessed by the attacker running this SQL injection?

The attacker accessed the data of specific users.

The attacker accessed the entirety of email address data from all users in the database.

The attacker has used the SQL injection to delete the table in the database.

The attacker has determined the names of different types of fields in the database.

int[] firstArray = { 1, 3, 7 };int[] secondArray = { 2, 4, 6, 8, 10 };int[] result = zipArrays(firstArray, secondArray);for (int i = 0; i < result.length; i++) {System.out.println(result[i]);}}public static int[] zipArrays(int[] firstArray, int[] secondArray) {// Your code here}

Answers

The code snippet zips together the elements from two arrays, `firstArray` and `secondArray`, and stores the result in the `result` array. It then prints each element of the `result` array.

The code snippet provided demonstrates the concept of "zipping" two arrays together. The `zipArrays` method, which takes two arrays (`firstArray` and `secondArray`) as parameters, is called to perform the zip operation. Inside the `zipArrays` method, the code implementation for the zip logic is missing and needs to be written.

The expected functionality of the `zipArrays` method is to combine the elements from both arrays in an alternating manner. For example, if `firstArray` contains [1, 3, 7] and `secondArray` contains [2, 4, 6, 8, 10], the expected result should be [1, 2, 3, 4, 7, 6, 8]. The specific implementation of the `zipArrays` method would involve iterating through both arrays and combining their elements according to the desired logic. After the `zipArrays` method is implemented, the resulting array is printed using a loop that iterates through the `result` array and displays each element using the `System.out.println()` method.

learn more about array here:

https://brainly.com/question/13261246

#SPJ11

A(n) _____________ is a program used to create and implement a database. operating system database management system information system database system

Answers

The program used to create and implement a database is called an operating system.

What is an operating system?

An operating system (OS) is a system that helps to manage and allocate computer resources. These computer resources are:

Central processing unit (CPU), Computer memory, File storage, Input/output devices,Network connections.

The most used operating system are;

Apple mac OS, Microsoft Windows, Go-ogle Android OS, Lin-ux Operating System, Apple iOS

Learn more about operating system:

https://brainly.com/question/24032221

help please !!
An example of substitution bias is capturing improvement in the picture quality of a TV. a) True b) False

Answers

Answer:

The answer is b) False

Explanation:

Substitution bias is a statistical bias that happens when clients replace one product for every other whilst the price of one product adjusts. As an example, if the charge of a flat-display tv goes down, purchasers may substitute a flat-display screen television for a CRT TV. This substitution bias would not capture the improvement in the image high-quality of the flat-display screen television.

In contrast, the development in the image high-quality of tv is an example of a nice alternate bias. excellent alternate bias happens when the quality of product modifications over time, however, the price of the product does now not change. this could make it tough too as it should measure the price change of a product over the years.

To learn more about Substitution bias,

https://brainly.com/question/32111623

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications.
(a) True
(b) False

Answers

TRUE , a traditional network design approach follows a structured analysis and design process similar to that used in building applications.

The statement "A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications" is True.

What is structured analysis and design process? Structured analysis and design process is a systems engineering process for creating software systems. It is a technique for examining, modeling, and breaking down a complicated software system into small, simple parts that are simple to comprehend, analyze, and improve. A design that has been properly structured is simple to comprehend, change, maintain, and extend. What is the traditional network design approach?

A traditional network design approach is a well-defined approach that breaks down the network design process into manageable pieces. The structured network design methodology is a modular, step-by-step approach that separates tasks into smaller, simpler components that can be completed in a logical order. This approach makes the design process more manageable and makes it easier to track progress. So, the given statement is True.

Learn more about structured analysis design https://brainly.com/question/16995069

#SPJ11

Which Excel IF function is not in the correct syntax?


= IF(A4<=250, 1, (IF(A4>250, 2, "MidPoint")))


= IF(B18=1, A18, 500-A18)


= IF(B18, A18, 500-A18)


= IF(A4<=250, 1, (IF(A4>250, 2, D5)))

Answers

The Excel IF function which is not in the correct syntax is: = IF(A4<=250, 1, (IF(A4>250, 2, D5))).

What is Microsoft Excel?

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., for analyzing and displaying spreadsheet documents by using rows and columns in a tabulated format.

The types of function in MS Excel.

In Microsoft Excel, there are different types of functions that are called predefined formulas and these include the following:

Average functionMinimum functionSum functionMaximum functionCount functionIF function

In this scenario, the Excel IF function which is not in the correct syntax is: = IF(A4<=250, 1, (IF(A4>250, 2, D5))) because A4 is referencing two different inequalities (values).

Read more on Excel formula here: brainly.com/question/26053797

#SPJ1

can I have some help?

can I have some help?

Answers

Answer: String

Explanation: A int would be the for a number. A string is for word(s). Hope this helped!

Answer:

A is correct, it is widely used, and it also sounds good.

Explanation:

Strings are connected, such as coding and bricks. For example "A string of events." String is widely used in lots of subjects, including coding. It is also easy to spot.

Do all careers or professions need computer science? Why or why not?

Answers

Answer:

Most careers or professions need computer science

Explanation:

As humanity is improving technological wise most jobs will be replaced and other jobs would come into play and in order for individuals to become employed in jobs that will be available in the future to come they will have to have a degree in computer science or know how to operate computers.

Answer:

No not all careers and professions require computer science

Explanation:

There are so many careers, many in which you may not sit in front of a computer. If you become a farmer, janitor, teacher or more you may not need computer science skills.

A user notices a laser printer is picking up multiple sheets of paper from one of its paper trays. The problem started last week and has gotten worse. Which of the following is MOST likely the cause of this problem ?
A. Separation pad
B. Feed roller
C. Registration roller
D. Duplex assembly

Answers

One of the paper trays of a laser printer starts to fill up with numerous sheets of paper, the user observes. The problem is most likely caused by a separation pad.

What is a disadvantage of a laser printer?

Laser printers are unable to print on several types of paper, in contrast to inkjet printers. Anything that is heat-sensitive cannot be passed through them. On home laser printers, simple graphics can be created, but clear images are challenging. If you want to print pictures, get an inkjet printer.

Why would you use a laser printer?

Popular computer printers like laser printers employ non-impact photocopier technology, which avoids damaging the paper with keys. A laser beam "draws" the document on a selenium-coated surface when a document is supplied to the printer.

To know more about laser printer visit:

https://brainly.com/question/5039703

#SPJ4

Most ________ are accompanied by several common utility programs, including a search program, a storage management program, and a backup program.

Answers

Answer:

operating systems

Explanation:

The operating systems is shortly known as OS. It is a system software which manages the software resources of the computer, computer hardware and also provides some common services for the various computer programs.

Most of the operating systems available in the market provides some common utility programs such as the search program, a backup program and a storage management program also.

Some common operating systems are : Linux, Microsoft Windows, Ubuntu, macOS, Unix, and many more.

Write a Python program in Python-IDLE(in Script mode), save and upload in the
classroom for the following. 1) To calculate addition, subtraction, multiplication
of any 2 values which you will input while running the program. 2) To input 5
values, calculate total and average of those five values.
Your answer​

Answers

num1 = int(input(“Enter First Number: “)
num2 = int(input(“Enter Second Number: “)
add_num = num1 + num2
sub_num = num1 - num2
mult_num = num1 * num2
div_num = num1 / num2
print(“Results”)
print(“Addition: “ + add_num)
print(“Subtraction: “ + sub_num)
print(“Multiplication: “ + mult_num)
print(“Division: “ + div_num)

What is an important theme in "Once Upon a Time"?


the unity between all peoples

the disintegration of South African society

the birth of a new nation

the importance of self-reliance

Answers

Answer:

The disintegration of South African society.

Explanation:

Nadine Gordimer's "Once Upon A Time" revolves around the racist "Apartheid" time of South African society where the whites 'dominate' the blacks. the story focuses on the societal issues between the two races and how it is detrimental to the overall lives of the people involved.

One important theme of the story is racism, "Apartheid" which seemingly dictates who is superior and who is not. The huge divide in not only the living spheres of the two groups of citizens but also in their approaches to society is indicative of the discriminative attitude and perception of the people, especially with the whites claiming themselves to be superior and 'civilized'. The book deals largely with the colonial mindset of the whites while also the structural bigotry apparent in the mindset of the people.

Thus, the correct answer is the second option.

Answer:

The disintegration of South African society.

Explanation:

Why error occurs during transmission? Explain different types of errors with suitable examples. 5 (b) How do you detect error using CRC? Generate the CRC code for the data word 1101011011 The divisor is x4+x+1. 7

Answers

During transmission, errors occur due to a variety of factors such as atmospheric conditions, system malfunction, or network errors.

Different types of errors include Single Bit Error, Burst Error, and Burst Error Correction. Here are the different types of errors with suitable examples: Single Bit Error: It occurs when one bit of data is changed from 1 to 0 or from 0 to 1 in data transfer. This type of error is mainly caused by a small amount of interference or noise in the transmission medium. For instance, a parity bit error.Burst Error: It occurs when two or more bits are incorrect during data transmission. A Burst Error occurs when bits of data are lost or changed in groups, which can affect multiple data bits at once. It can be caused by signal loss or attenuation in fiber-optic cables. Burst Error Correction: To overcome the issue of Burst Error, Burst Error Correction is used. This method divides data into blocks to detect and fix errors. Reed-Solomon coding and Viterbi decoding are two types of burst error correction techniques. There are different techniques for error detection, and the Cyclic Redundancy Check (CRC) is one of them. CRC checks the checksum at the receiver's end to ensure that the data was not corrupted during transmission. To detect errors using CRC, follow these steps: Divide the data word by the generator polynomial. Generator polynomial: x4 + x + 1 Divide 1101011011 by x4 + x + 1 and find the remainder by using the modulo 2 division method.1101011011 10011- 10011000- 10011000- 10010100- 10010100- 10000001- 10000001- 1111100- 1111100- 1001The remainder of the above step is the CRC code of the data word, which is 1001. Therefore, the CRC code for the data word 1101011011 is 1001.

know more about type of error.

https://brainly.com/question/31751999

#SPJ11

What does the touring test determine?

Answers

Answer:

The Turing Test is a method of inquiry in artificial intelligence (AI) for determining whether a computer is capable of thinking like a human being.

Explanation:

the date of creation can be added to a slide using the

Answers

Answer:

On the Insert tab, in the Text group, click Date & Time. In the Header and Footer box, do one of the following: If you want to add the date and time to your slides, click the Slide tab. If you want to add the date and time to your notes pages, click the Notes and Handouts tab.

Explanation:

The date of creation can be added to a slide by making use of the: "Insert" tab, "Text" group.

What is a slide?

A slide can be defined as a single page of a presentation that contains text-based information or images, which can be used by a presenter to teach, instruct and educate the audience on a topic.

In Microsoft Powerpoint, an end user can add the date of creation to a slide by making use of the "Insert" tab and "Text" group.

Read more on slides here: brainly.com/question/11741377

#SPJ9

CALCULATE THE PERCENTAGE OF FAT CALORIES TO TOTAL CALORIES. I got no idea how to do this in excel ;-;

CALCULATE THE PERCENTAGE OF FAT CALORIES TO TOTAL CALORIES. I got no idea how to do this in excel ;-;

Answers

Answer:

As you have the Fat Cal. in column C and the total calories in Column B, what you have to do is to divide column C by Column B.

For instance, in column E2, put the formula: =C2/B2.

Then drag the formula down so that the other formulas will be;

E3; =C3/B3

E4; =C4/B4

E5: C5/B5

E6: C6/B6

Then after that you go to the Home tab, then to the Number style section and format E2 to E5 to be percentages.

Other Questions
All cells receive the same DNA sequence during early development of the organism. Knowing this, why do some cells become bone cells and others become muscle? Which is equivalent to (-5)(8)?A. (5)(8)B. (-5)(-8)C. -[(5)(8)]. D. -[(5)(-8)] Rank the following processes by the amount of ATP produced per substrate, from most ATP to least (top-most being the highest). - Electron Transport Chain - Glycolysis (from one glucose) - Krebs Cycle (from one Acetyl-CoA) - Fermentation (from one pyruvate) Imagine that an exchange student from China visits your class. While your teacher discusses how the United States has a limited government,the Chinese student raises his hand and asks why the government has limited power. Which point best highlights why the US government haslimited power?A.A limited government means citizens pay fewer taxes.B.A limited government helps people avoid breaking the law.C.A limited government protects individual freedoms.D.A limited government prevents businesses from being too powerful. which if the following ionic compounds has the smallest lattice energy (the lattice energy least favorable to a stable lattice)? group of answer choices mgo bao csi lif Which number is irrational?A. 3.14B. 0.181818...C. V10D. V27/3 6. Who was the monk who wrote about the attack on Jerusalem? What bias might show in his account of theattack on Jerusalem? Is hip hop the music and culture of all marginalized and oppressed social groups, is it "black" music, both, or neither? Explain using specific examples from "Hip Hop Cuban All Stars", the Osumare, Helenon and Santos articles to support your argument. A bicyclist races on a bicycle with 12-inch-radius wheels. When she is traveling at a speed of 49 ft/sec, how manyrevolutions per minute are her wheels making?Her wheels are making rpm.(Round to the nearest thousandth as needed.) There is a bag filled with 4 blue and 5 red marbles.A marble is taken at random from the bag, the colour is noted and then it is replaced.Another marble is taken at random.What is the probability of getting 2 blues? Select all the correct answers.Which rivers were part of the worlds oldest known civilization?TigrisNileEuphratesIndusYellow 1. Why is Abraham considered the father of the Jewish faith?2. God promised to care for the Israelites as long as they . . . ?3. What is the Torah and what is the basis of it?4. What happened in 1948 to Palestine?5. What 2 countries have the most Jewish people in the world?6. Write out the following of the 10 Commandments:a. 1st Commandment: _______________________________________________________________b. 9th Commandment: _______________________________________________________________7. How do Orthodox Jews interpret the Torah?8. What is the Talmud? A 30 kg child climbs 15 m up a tree. What is the child's potential energy? (5y + 2x - 5) - (2y - 2x - 5) i need this in step by step any one out there to hear my pathetic call of help A 12.8-g sample of sodium completely reacts with 19.6 g of chlorine to form 32.4 g of sodium chloride. These data are A 12.8-g sample of sodium completely reacts with 19.6 g of chlorine to form 32.4 g of sodium chloride. These data are blank with the law of conservation of mass because the mass of reactants blank the mass of products. with the law of conservation of mass because the mass of reactants A 12.8-g sample of sodium completely reacts with 19.6 g of chlorine to form 32.4 g of sodium chloride. These data are blank with the law of conservation of mass because the mass of reactants blank the mass of products. the mass of products. ______ assisted General Washington at Valley Forge.a. Bernardo de Galvezb. Benedict Arnoldc. John Burgoyned. Horatio Gatese. Baron Von Steuben Find the percent of change3/8 to 5/8 Help this is due today Determining the distance to stars can be challenging. The parallax method is one way of finding the distance to many stars around us. Your research team measures the parallax of two stars that have a distance of 5 degrees from each other in the night sky : The first star has a parallax of 0. 11 arcsec, and the second has a parallax of 0. 13 arcsec. How far apart are the two stars from each other ? Express your answer in light-years When using the NPV method for a particular investsment decision, if the present value of all cash inflows is greater than the present value of all cash outflows, then ________.A. the discount rate used was too highB. the investment provides an actual rate of return greater than the discount rateC. the investment provides an actual rate of return equal to the discount rateD. the discount rate is too low