What did Aristotle teach?

Answers

Answer 1

Philosophy, I beleive. He tought Sikander liturature and eloquence, but his most famous teachings were of philosophy.

Answer 2

Aristotle taught the world science. He was considered the best scientists of his time.


Related Questions

Write a procedure called Str_nextWord that scans a string for the first occurrence of a certain delimiter character and replaces the delimiter with a null byte. There are two input parameters: a pointer to the string and the delimiter character. After the call, if the delimiter was found, the Zero flag is set and EAX contains the offset of the next character beyond the delimiter. Otherwise, the Zero flag is clear and EAX is undefined. The following example code passes the address of target and a comma as the delimiter:

Answers

Answer:

Str_nextword PROC, pString:PTR BYTE, ; pointer to string delimiter:BYTE ; delimiter to find push esi mov al,delimiter mov esi,pString cld ; clear Direction flag (forward) L1: lodsb ; AL = [esi], inc(esi) cmp al,0 ; end of string? je L3 ; yes: exit with ZF = 0 cmp al,delimiter ; delimiter found? jne L1 ; no: repeat loop L2: mov BYTE PTR [esi-1],0 ; yes: insert null byte mov eax,esi ; point EAX to next character jmp Exit_proc ; exit with ZF = 1 L3: or al,1 ; clear Zero flag Exit_proc: pop esi ret Str_nextword ENDP

Explanation:

push esimov al,delimitermov esi,pStringcld ; clear Direction flag (forward)L1: lodsb ; AL = [esi], inc(esi)cmp al,0 ; end of string?je L3 ; yes: exit with ZF = 0cmp al,delimiter ; delimiter found?jne L1 ; no: repeat loopL2: mov BYTE PTR [esi-1],0 ; yes: insert null bytemov eax,esi ; point EAX to next characterjmp Exit_proc ; exit with ZF = 1L3: or al,1 ; clear Zero flagExit_proc:pop esiretStr_nextword ENDPStr_nextword ENDP

Where do I look for a deep learning mentor who can assist me in my career?​

Answers

The answer:

You have to pay for it man!

Explanation:

You can find a lot of services from Fiverr and Upwork etc. But that would need to pay a lot for it.

Choose all items that represent characteristics of a cover letter:
A: asks for an interview for a specific job

B: lists prior positions held

C: is brief – never longer than one page

D: is required at job fairs

E: demonstrates enthusiasm and knowledge of the company and position

Answers

Answer:

The answers are:

A: asks for an interview for a specific job

C: is brief- never longer than one page

E: demonstrates enthusiasm and knowledge of the company and position

Hope this helps!

The cover letter represents the following things:

A: asks for an interview for a specific job

C: is brief – never longer than one page

E: demonstrates enthusiasm and knowledge of the company and position

What is a cover letter?

A cover letter is a summary form of the resume of a person that informs the hiring manager of the company about what position the job is being required, it is not more than a single page.

The cover letter shows the enthusiasm level of the candidate, his knowledge, and position he is standing currently based on the knowledge.

Learn more about cover letter, here:

https://brainly.com/question/10626764

#SPJ2

How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.

Answers

Answer:

i choose choice D

Explanation:

reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit

Write a function "doubleChar(" str) which returns a string where for every character in the original string, there are two characters.

Answers

Answer:

//Begin class definition

public class DoubleCharTest{

   

   //Begin the main method

    public static void main(String [ ] args){

       //Call the doubleChar method and pass some argument

       System.out.println(doubleChar("There"));

    }

   

    //Method doubleChar

    //Receives the original string as parameter

    //Returns a new string where for every character in

    //the original string, there are two characters

    public static String doubleChar(String str){

        //Initialize the new string to empty string

       String newString = "";

       

        //loop through each character in the original string

       for(int i=0; i<str.length(); i++){

            //At each cycle, get the character at that cycle

            //and concatenate it with the new string twice

           newString += str.charAt(i) + "" + str.charAt(i);

        }

        //End the for loop

       

        //Return the new string

       return newString;

       

    } //End of the method

   

} // End of class declaration

Sample Output:

TThheerree

Explanation:

The code above has been written in Java and it contains comments explaining each line of the code. Kindly go through the comments. The actual lines of executable codes have been written in bold-face to differentiate them from comments.

A sample output has also been given.

Snapshots of the program and sample output have also been attached.

Write a function "doubleChar(" str) which returns a string where for every character in the original
Write a function "doubleChar(" str) which returns a string where for every character in the original

When should programmers use variables to store numeric data?

Answers

Programmers should use variables to store numeric data when they need to reference and use the same data multiple times throughout a program.

What is program?

A program is a set of instructions that can be executed by a computer to perform a specified task. It can be written in any of a number of programming languages, such as C, Java, Python or Visual Basic. Programs can range from simple scripts that automate a task, to complex applications with many features. Programs are designed to solve a particular problem or provide a specific benefit to the user.

Variables are a convenient way to store and access data that may be needed in multiple different places.

To learn more about program
https://brainly.com/question/28028491
#SPJ1

The data files from a computer-assisted questionnaire software program can be downloaded at the researcher's discretion; however, different formatting options, including SPSS-readable files, may not be available. Group of answer choices True False

Answers

Answer:

False.

Explanation:

When data files are sourced from a computer-assisted questionnaire software program. The data files can be downloaded at the researcher's discretion, different formatting options can be used on the data files, and SPSS (Statistical Product and Service Solutions)-readable files are also available.

For instance, the CAPI (Computer-Assisted Personal Interview), CAWI (Computer-Assisted Web Interview)  and CASI (Computer-Assisted Self Interview) software program collects data from potential targeted population in a survey. These data can be downloaded by the originator of the survey with its SPSS (Statistical Product and Service Solutions)-readable files.

Also, if the researcher wishes to edit or format the data, it is very possible to achieve.

Happy Thanksgiving!!!!

Happy Thanksgiving!!!!

Answers

Yoo, you too, bro!

                                            Have a nice time with your family

                                                   

How to use the screen mirroring Samsung TV app

Answers

If you want to show what's on your phone or computer screen on a Samsung TV, you can do it by these steps:

Make sure both your Samsung TV and the thing you want to copy are using the same Wi-Fi.

What is  screen mirroring

The step also includes: To get to the main menu on your Samsung TV, just press the "Home" button on your remote.

The  screen mirroring is Copying or making a duplicate of something. They are repeating each other's words to try to fix the problem between them. This is the way to show what is on your computer or phone screen on another screen by using wireless connection.

Learn more about  screen mirroring from

https://brainly.com/question/31663009

#SPJ1

4) Create a text file (you can name it sales.txt) that contains in each line the daily sales of a company for a whole month. Then write a Java application that: asks the user for the name of the file, reads the total amount of sales, calculates the average daily sales and displays the total and average sales. (Note: Use an ArrayList to store the data).

Answers

Answer:

Here's an example Java application that reads daily sales data from a text file, calculates the total and average sales, and displays the results:

import java.util.ArrayList;

import java.util.Scanner;

import java.io.File;

import java.io.FileNotFoundException;

public class SalesDemo {

   public static void main(String[] args) {

       // Ask the user for the name of the file

       Scanner input = new Scanner(System.in);

       System.out.print("Enter the name of the sales file: ");

       String fileName = input.nextLine();

       // Read the daily sales data from the file

       ArrayList<Double> salesData = new ArrayList<>();

       try {

           Scanner fileInput = new Scanner(new File(fileName));

           while (fileInput.hasNextDouble()) {

               double dailySales = fileInput.nextDouble();

               salesData.add(dailySales);

           }

           fileInput.close();

       } catch (FileNotFoundException e) {

           System.out.println("Error: File not found!");

           System.exit(1);

       }

       // Calculate the total and average sales

       double totalSales = 0.0;

       for (double dailySales : salesData) {

           totalSales += dailySales;

       }

       double averageSales = totalSales / salesData.size();

       // Display the results

       System.out.printf("Total sales: $%.2f\n", totalSales);

       System.out.printf("Average daily sales: $%.2f\n", averageSales);

   }

}

Assuming that the sales data is stored in a text file named "sales.txt" in the format of one daily sale per line, you can run this program and input "sales.txt" as the file name when prompted. The program will then calculate the total and average sales and display the results.

I hope this helps!

Explanation:

Which of the following are recommended ways to address run-time errors? Choose all that apply.

Delete the suspect lines of code and issue the program without that function.

Add error routines that allow the program to execute fully even when unanticipated data is entered.

Create error messages to alert the user to an error in data entry.

Create controls in the program that ensure the input of proper data.

Answers

Answer:

2. Add error routines that allow the program to execute fully even when unanticipated data is entered.

3. Create error messages to alert the user to an error in data entry.

4. Create controls in the program that ensure the input of proper data.

Explanation:

Mark me brainliest plz

Answer:

2 3 4 i got it right

Explanation:

When scaling up a vector image, which of the follow does NOT happen? (1 point)

The image becomes blurry and harder to see.

The image keeps its sharpness no matter how large it gets.

The computer can fill in information to make each point more detailed.

The image's colors remain the same.​

Answers

The first one I think
Since the quality of a vector imagine does not depend on resolution bc it is made of vectors

Brainly account. How to open?

Answers

You would have to take a picture of TOR work your working on or you can type it in here and myself and other will be Able to help you:)

Internet Retailing

Visit an e-commerce Web site such as Amazon.com and find a product you would like to purchase. While looking at the page for that item, count the number of other products that are being offered on that page.

Activity

Answer the following questions: What do they have in common? Why are they appearing on that page?

Answers

When I visited the e-commerce Web site such as Amazon.com and find a product that I would like to purchase which is a laptop, The thing that the sellers have in common is that they are trusted and verified sellers, their product presentation is nice and has warranty on it.  The reason they are appearing on that page is because the product are similar.

What is E-commerce site website?

The term e-commerce website is one that enables customers to buy and sell tangible products, services, and digital commodities over the internet as opposed to at a physical store. A company can process orders, receive payments, handle shipping and logistics, and offer customer care through an e-commerce website.

Note that there are numerous eCommerce platforms available, each with its own set of characteristics. The optimal eCommerce platform will therefore rely on your demands, available resources, and business objectives.

So, for instance, if you're a novice or small business owner looking to set up an online store in only a few clicks, go with a website builder like Hostinger. Oberlo, on the other hand, boasts the best inventory management system for dropshippers and is the top eCommerce platform overall.

Learn more about e-commerce Web site  from

https://brainly.com/question/23369154
#SPJ1

Place yourself in the position of a network designer. You have customers that are looking to improve their network but need your help. Read over each scenario to get an idea of what the customer currently has and what they will need of the new network. Customer may not always know exactly what they need so reading in between the lines is a great skill to start working on.

After picking out the requirements the customer is in need of solving, complete research on real world devices that may be a good fit for them. This can include new devices, services and cables depending on the customers' needs. Once you have finished your research make a list of the devices you are recommending to the customer. Each device/service will need an explanation on why you chose it, the price, link to the device and a total budget for reach scenario. Think of your explanation as a way of explaining to the customer why this device would fit their specific needs better than another one.

There is no one way of designing any network. Your reasoning for choosing a device is just as important as the device itself. Be creative with your design!
Scenario A: young married couple, the husband is an accountant, and the wife is a graphic designer. They are both now being asked to work from home. Their work needs will be mainly accessing resources from their offices but nothing too large in file size. They have a 2-story townhome with 1600 square feet space. There is a 2nd floor master bedroom with a streaming device, a 1st floor office space with a streaming device and living room with a 3rd streaming device. The wife works from the master bedroom while the husband works mainly in the office space. Their ISP is a cable provider, and they have a 200 Mbps download and a 50 Mbps upload service account. The cable modem is in the office space and they currently pay $5 a month to have an integrated wireless access point (WAP) but no ethernet capability. The office space will need to have a LaserJet printer connected to the network via ethernet Cat-5E cable. They want to stop paying the monthly $5 and have their own WAP. The WAP needs to have an integrated switch that can provide them reliable work-from-home connectivity, with at least 4 ethernet ports for growth, and steady streaming capability for their personal viewing. Budget for the network infrastructure improvement is under $2500.

Answers

The Ubiquiti Networks UniFi Dream Machine (UDM) is the perfect instrument to fulfill the couple's networking requirements.

What does it serve as?

The all-inclusive device serves as a Router, Switch, Security gateway, and WAP delivering stable home-working performance. It provides four Ethernet ports operating at the most advanced WiFi 6 specifications, enabling convenient streaming for entertainment.

Besides its user-friendly mobile app assisting with setting up and management processes, the UDM accommodates VLANs so users can segment their network in order to heighten security.

Costing around $299 – obtainable from either Ubiquiti’s site or Amazon - and Cat-6 Ethernet cables costing roughly $50 for every five on Amazon, the total expenditure comes to $350, conveniently fitting in the prearranged budget of $2500.

Read more about budget here:

https://brainly.com/question/6663636

#SPJ1

A server accepts and processes requests from clients. The server keeps the results of the most recent requests in memory as a cache. The processing of each request takes 15 ms.
If the requested result is not in the memory cache, additional 75 ms are needed to access the disk.
On average, 80% of all requests can be serviced without disk access. The creation of a new thread takes 10 ms.
(a) To minimize average response time, should the server be implemented as a single-threaded or a multi-threaded process? Justify your answer.
(b) What percentage of requests would have to be satisfied without disk access for the two approaches to break even?

Answers

In question (A) my answer would be a multi-
stranded process as in terms of time reduction
many configurations can be used because there is a feature to do multiple tasks at once.

In Question (B) In my opinion 80% of all
applications can be used without disk access

In order to minimize average response time, the server be implemented as a multi-threaded process as it'll help in time reduction.

What is a server?

It should be noted that a server means a computer that provides data and resources to clients over a network.

The percentage of requests would have to be satisfied without disk access for the two approaches to break even will be 80%.

Learn more about server on:

brainly.com/question/17062016

#SPJ2

Who designed the Analytical Engine in the 1830s? Alan Turing Alan Turing Charles Babbage Charles Babbage Bill Gates Bill Gates Steve Wozniak Steve Wozniak

Answers

Charles Babbage Charles Babbage

You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative

Answers

Answer:

The answer is:

A) Absolute cell reference

Explanation:

An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.

Hope this helped you!! Have a good day/night!!

Answer:

A is the right option absolute

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

Which of the following best describes an insider attack on a network?
OA. an attack by someone who uses fake emails to gather information related to user credentials
OB. an attack by someone who becomes an intermediary between two communication devices in an organizatio
OC. an attack by a current or former employee who misuses access to an organization's network
O D. an attack by an employee who tricks coworkers into divulging critical information to compromise a network

Answers

An attack by a current or former employee who misuses access to an organization's network ca be an insider attack on a network. The correct option is C.

An insider attack on a network refers to an attack carried out by a person who has authorized access to an organization's network infrastructure, either as a current or former employee.

This individual intentionally misuses their access privileges to compromise the network's security or to cause harm to the organization.

Option C best describes an insider attack as it specifically mentions the misuse of network access by a current or former employee.

The other options mentioned (A, B, and D) describe different types of attacks, but they do not specifically involve an insider with authorized access to the network.

Thus, the correct option is C.

For more details regarding network, visit:

https://brainly.com/question/29350844

#SPJ1

Imagine that you are a sound designer for a new spy/mystery film. In a pivotal scene, the lead character discovers that a mentor has betrayed her. She confronts her mentor on the rooftop of a high-rise building at night. What would you, as the sound designer, do to maximize the impact of this emotional scene? Your answer should be at least 150 words.

Answers

Answer:

I would of made the sound deep, somewhat emotional, like with violin or piano in the background, while the dialog played. If the mentor were to push the lead character off the building, I would add some music that was intense, to add onto it, and when the character would start to fall, the music would get deeper and quieter, and make the music cut out as the character fell the rest of the way. If somebody saved the person, like somebody were to save them by grappling onto a building and snatching the person, the music would go up, and be a bit more up beat.

that would be what I would of put if I were to have that same question on something.

I hope that helped you!

What are the four components of the Universal Systems Model?

Answers

Answer:

output, process, input, and feedback

Explanation:

Small organizations with only a few computers can manage each device in an ad hoc way without standardization. Larger organizations need to use standardization to scale their ability to support many users. Consider what you’ve learned about Active Directory and Group Policy and how they can be used to simplify user support and desktop configuration. You can search the Internet for examples. Create a posting that describes your thoughts on how Active Directory and Group Policy improve management in large organizations.

Answers

Organizational security is the principal application of Group Policy Management. Group policies, also known as Group Policy Objects (GPOs), enable decision-makers and IT professionals to deploy critical cybersecurity measures throughout an organization from a single place.

What is an Active Directory?

Microsoft Active Directory has a feature called Group Policy. Its primary function is to allow IT administrators to manage people and machines throughout an AD domain from a single location.

Microsoft Active Directory is a directory service designed for Windows domain networks. It is featured as a set of processes and services in the majority of Windows Server operating systems. Active Directory was initially exclusively used for centralized domain management.

Group Policy is a hierarchical framework that enables a network administrator in charge of Microsoft's Active Directory to implement specified user and computer configurations. Group Policy is essentially a security tool for applying security settings to people and machines.

Learn more about Active Directories:
https://brainly.com/question/14469917
#SPJ1

In Excel, is there a way to have two variables added together like this?

x = x + y where, for example, x=2 y=3
x = 2 + 3
then making cell x = 5 rather than the original 2

Answers

Yes, in Excel, one can perform the above Operation. Note that the instruction must be followed to get the result. See the attached image for the output.

How can this be done?

In separate cells, enter the x and y values. Enter 2 in cell A1 and 3 in cell A2, for example.

Enter the formula "=A1+A2" in another cell. Enter "=A1+A2" in cell A3, for example.

When you press enter or return, the calculation result (5) will appear in cell A3.

If you replace the value of x with the computation formula, it will result in a circular reference error.

A circular reference in Excel indicates that the calculation in a certain cell refers to it's own result once or several times.

Note that x cannot be equal to x + y except y is 0.

Learn more about Excel:
https://brainly.com/question/31409683
#SPJ1

In Excel, is there a way to have two variables added together like this?x = x + y where, for example,

#Write a function called "in_parentheses" that accepts a
#single argument, a string representing a sentence that
#contains some words in parentheses. Your function should
#return the contents of the parentheses.
#
#For example:
#
# in_parentheses("This is a sentence (words!)") -> "words!"
#
#If no text appears in parentheses, return an empty string.
#Note that there are several edge cases introduced by this:
#all of the following function calls would return an empty
#string:
#
# in_parentheses("No parentheses")
# in_parentheses("Open ( only")
# in_parentheses("Closed ) only")
# in_parentheses("Closed ) before ( open")
#
#You may assume, however, that there will not be multiple
#open or closed parentheses.
#Write your function here!
def in_parentheses(a_string):
import re
regex = re.compile(".*?\((.*?)\)")
result = re.findall(regex, a_string)
return(result)
#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print (including the blank lines):
#words!
#
#as he is doing right now
#
#
#!
print(in_parentheses("This is a sentence (words!)."))
print(in_parentheses("No parentheses here!"))
print(in_parentheses("David tends to use parentheses a lot (as he is doing right now). It tends to be quite annoying."))
print(in_parentheses("Open ( only"))
print(in_parentheses("Closed ) only"))
print(in_parentheses("Closed ) before ( open"))
print(in_parentheses("That's a lot of test cases(!)"))

Answers

Answer:

import regex as re

def in_parentheses(a_string):

   regeX = re.compile(".*?\((.*?)\)")

   result = re.findall(regeX, a_string)

   return str(result).replace("[","").replace("]","")

print("test 1: "+in_parentheses("Open ( only"))

print("test 2: "+in_parentheses("This is a sentence (words!)."))

#Write a function called "in_parentheses" that accepts a #single argument, a string representing a sentence

PLEASE HELPP!!!!!
Select all that apply.
Proper numeric keyboarding technique includes:

1.looking at the keys
2.resting your fingers gently on the home keys
3.stiffening your fingers
4.keeping your wrist straight
5.pressing the keys squarely in the center

PLEASE HELPP!!!!!Select all that apply.Proper numeric keyboarding technique includes:1.looking at the

Answers

Answer:

1, 2 and 5

Explanation:

see picture to make sure they are in the correct order for you.

PLEASE HELPP!!!!!Select all that apply.Proper numeric keyboarding technique includes:1.looking at the

Answer:

resting your fingers gently on the home keys

keeping your wrist straight

pressing the keys squarely in the center

discuss seven multimedia keys​

Answers

Answer:

Any seven multimedia keys are :-

□Special keys

Alphabet keys

Number keys

□Control keys

Navigation keys

Punctuation keys

Symbol keys


Which strategy helps job seekers organize and track their job search progress efficiently?

Answers

A job seeker who is using an online resources for the job search shows that how technology as well as the internet in the particular has been helped to simplify our everyday life.

What is the use of online resources in finding a job?

The use of the online resources in the job search provides a much faster way of reaching and covering a wide range of available jobs within and far beyond your immediate geographical range.

Before the internet, the job searches were typically done manually, and the process has been consumed a lot of time and the resources and was mostly limited a certain geographical range.

Therefore, nowadays, someone in the US can easily apply for a job post on the internet all the way in Germany.

Learn more about internet on:

https://brainly.com/question/13308791

#SPJ9

A Lost link is an interruption or loss of the control link between the control station and the unmanned aircraft, preventing control of the aircraft. As a result, the unmanned aircraft performs pre-set lost link procedures. Such procedures ensure that the unmanned aircraft:

Answers

Answer:

There is nothing to answer from this statement.

Explanation:

Can you rephrase the statement into question?


please help with this question

please help with this question

Answers

The answer would be Algorithm
Your answer is “D” algorithm
Algorithm means a process or set of rules to be followed
Other Questions
if a household has $40,000 in taxable income and its tax liability is $20,000, the household's average tax rate is A train travels a total of 42 km at a constant speed of 85 km/h.How long is its journey? Give your answer in minutes and seconds, to the nearest seconds Prove the following? Find the HCF of 4xyz"; 30xyz and 36xyz a care plan for a bed-ridden patient includes turning every two hours to prevent pressure ulcers. the patient is cooperative, but complains that the process is painful. which action demonstrates the principle of fidelity the stanford-binet, wais, and wisc tests are all types of PLSSA HELP MEDescribe a way to transform to . Be specific A single circular loop of radius 0.23 m carries a current of 2.6 A in a magnetic field of 0.95 T. Part A Find the angle the plane of the loop must make with the field if the torque is to be half its maximum value. Express your answer using two significant figures. = nothing Request Answer Question 1 (1 point) There were 3 friends that decided to race their bikes down a hill without peddling. They all approached the top of the hill with a velocity of 2m/s. When they got down to the bottom of the hill 15 seconds later, they had achieved a velocity of 15m/s. To their surprise, they all made it down at the same time. What was their acceleration? a 1.15 m/s2 b 7.5 m/s2 c .87 m/s2 d 1 m/s2 Question 2 (1 point) What is the acceleration of a 450 horsepower race car if the car had a mass of 1000Kg and began at a velocity of 10m/s. After 1.75 sec., the car has a velocity of 45m/s? a 10 m/s2 b 25.71 m/s2 c 4.5 m/s2 d 20 m/s2 Question 3 (1 point) A car going 75 mph (35 m/s) hits a wall and comes to a stop. It takes 1.25 s for the car to come to a stop. What is the acceleration of the car? a -60 m/s2 b 60 m/s2 c -28 m/s2 d 28 m/s2 Question 4 (1 point) An Olympic skier starts from rest the top of a hill, accelerating down the hill until he comes to a turn 12 seconds later. his velocity at the turn is 55 m/s, what was his acceleration when he got to the turn? a -.22 m/s2 b .22 m/s2 c 4.58 m/s2 d -4.58 m/s2 Question 5 (1 point) A boy rolls a tennis ball down the hallway and it takes 4.5 seconds to come to a stop. If the ball started with a velocity of 17m/s, what was the acceleration of the ball? a 3.78 m/s2 b -3.78 m/s2 c -4.5 m/s2 d 0 m/s2 The table below shows the after-tax income and consumption spending for a nation. a. Calculate the dollar amount of savings, the marginal propensity to consume (MPC), and the marginal propensity to save (MPS) for each level of income. Instructions: Enter your answers for savings as a whole number. Round your answers for MPC and MPS to one decimal place. The major types of symptoms noted in schizophrenia include? Is there a difference between [tex]-\frac{x}{y}[/tex] and [tex]\frac{-x}{-y}[/tex] ?Do they mean different things? What is the value of the expression -(-4)(-6)-3/5(10+15) 1/2x+3/4y=103/4-y=4 In each of the following find the pdf of Y.(a) Y = X2 and fX(x) = 1, 0 < x < 1(b) Y = log X and X has pdf Determine for each of the following which of the figures labeled (1) through (10) can be classified under the given term: Write and evaluate the definite integral that represents the volume of the solid formed by revolving the region about the x-axis.y = x4, y = x7 The gratifications that people seek from media are often determined by their attitudes toward media. For example, if you believe sitcoms provide entertainment, and you like to be entertained, you will meet your entertainment needs by watching sitcoms.True False How do we use energy transformation in our daily lives? alyssa purchased and installed a photo editing app on her home desktop computer. she also needs to use the app at work and wants to install a copy on her laptop. how can she determine whether this is legal?