What is the output of the following code snippet? int i = 1; while (i != 9) { System.out.print(i + " "); i++; if (i == 9) { System.out.println("End"); } } 1 End 1 End 1 End (but the loop is an infinite loop) 1 End (but the loop is an infinite loop) 1 2 3 4 5 6 7 8 End 1 2 3 4 5 6 7 8 End 1 2 3 4 5 6 7 8 End (but the loop is an infinite loop)

Answers

Answer 1

Answer:

1 2 3 4 5 6 7 8 End

Explanation:

int i = 1;

while (i != 9){

  System.out.print (i + " ");

  i ++;

  if (i == 9){

     System.out.println("End");

  }

}


Related Questions

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

Ryan is applying a sort to the data in a table that you have inserted in Word. Which option is important for most tables that have column headings?
• Sort in descending order.
• Sort in ascending order.
• Select the option "My List has Header Row."
• Choose the correct sort field.

Answers

Ryan is applying a sort to the data in a table that you have inserted in Word.By Choose the correct sort field option is important for most tables that have column headings.

What is statistics?

A statistics desk is a number cell wherein you may alternate values in a number of the cells and give you one-of-a-kind solutions to a problem. An appropriate instance of a statistics desk employs the PMT feature with one-of-a-kind mortgage quantities and hobby fees to calculate the low-priced quantity on a domestic loan you can set up in descending, or you may set up in ascending.

And D, has not have anything to do with this requirement. You do not have this feature to be had with you. Select the option, "My listing has header row" isn't always to be had to us. And clearly, you want to pick out the excellent type of discipline first. And then you may set up or type accordingly.

Read more about the column headings:

https://brainly.com/question/1788884

#SPJ2

Please help me!
The assignments option in my Microsoft Teams account is not visible. What should I do now?

Answers

some things you can try

sign out of teams and back in

refresh the page by pressing ctrl+r

try a different browser

contact Microsoft

-scava

Write a JAVA CODE CORRECTLY that starts with 2 strings. If one string is odd and the other string is even then it will place the odd string in the middle of the even string. But if both Strings are of odd length then it will concatenate the first letter of the first string with the LAST letter of the second string. And finally, if the strings are both of Even length then it will take the first half of the first string and concatenate it with the second half on the second string.

Java programming only!!
Use below to see if the code is correct
connectStrings(“hello”,“back”) → “bahellock”
connectStrings(“hello”,“bad”) → “hd”
connectStrings(“you”,“good”) → “goyouod”
connectStrings(“good”,”game”) → “gome”

public static String connectStrings(String str1, String str2)
{

}

Answers

Below iss a possible implementation of the connectStrings function in Java:

public static String connectStrings(String str1, String str2) {

   int len1 = str1.length();

   int len2 = str2.length();

   if (len1 % 2 == 1 && len2 % 2 == 0) {

       int mid = len2 / 2;

       return str2.substring(0, mid) + str1 + str2.substring(mid);

   }

   else if (len1 % 2 == 0 && len2 % 2 == 1) {

       int mid = len1 / 2;

       return str1.substring(0, mid) + str2 + str1.substring(mid);

   }

   else if (len1 % 2 == 1 && len2 % 2 == 1) {

       return str1.charAt(0) + str2.substring(len2-1);

   }

   else {

       int mid = len1 / 2;

       return str1.substring(0, mid) + str2.substring(mid);

   }

}

What is the Java programming?

It starts by checking the length of both strings, if the first string is odd and the second is even, it will place the odd string in the middle of the even string, by getting substrings of the second string before and after the middle index, and concatenating it with the odd string.

If both strings are odd, it will concatenate the first letter of the first string with the last letter of the second string. If both strings are even it will take the first half of the first string and concatenate it with the second half of the second string.

Therefore, You can test the function with the provided examples as follows:

System.out.println(connectStrings("hello", "back")); // Output: "bahellock"

System.out.println(connectStrings("hello", "bad")); // Output: "hd"

System.out.println(connectStrings("you", "good")); // Output: "goyouod"

System.out.println(connectStrings("good", "game")); // Output: "gome"

It should return the expected results.

Learn more about Java programming from

https://brainly.com/question/26789430

#SPJ1

Write a JAVA CODE CORRECTLY that starts with 2 strings. If one string is odd and the other string is

what are some similarity's between NES console and consoles today

Answers

Answer:

what he said

Explanation:

Answer:

bro my question got deleted for no reason

Explanation:

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:


Which tool can most easily be used to find synonyms for words in
your document?

Answers

Answer:

The Thesaurus

Explanation:

Answer:

The dictionary

Explanation:

Identify the type of vulnerability assessment used to determine the vulnerabilities in a workstation or server by performing configuration level check through the command line.

Answers

Configuration Assessment is used to determine vulnerabilities in a workstation or server by performing configuration level check through the command line and provides organizations with a baseline configuration against which they can evaluate the security posture of their systems.

The type of vulnerability assessment used to determine the vulnerabilities in a workstation or server by performing configuration level check through the command line is Configuration Assessment.Configuration assessment is a type of vulnerability assessment that is used to determine the vulnerabilities in a workstation or server by performing configuration level check through the command line.

In Configuration Assessment, a comparison of the configuration of a system to a known baseline is done to check for vulnerabilities, unauthorized modifications, deviations, etc. The assessment is typically done using automated tools, which can make the process faster and more accurate.Automated tools are used for the comparison process, which makes the process faster and more efficient.

The configuration baseline is established to ensure the system is configured according to the organization's policies and compliance requirements. Any deviations from the baseline configuration are identified as vulnerabilities that need to be addressed.The Configuration Assessment identifies system vulnerabilities by comparing the system configuration to the security policy. This assessment technique is a proactive approach to identify vulnerabilities in the system before they are exploited.

It can also be performed regularly to ensure that the system's configuration is in compliance with the organization's security policy. In conclusion, Configuration Assessment is used to determine vulnerabilities in a workstation or server by performing configuration level check through the command line and provides organizations with a baseline configuration against which they can evaluate the security posture of their systems.

Learn more about the word vulnerabilities here,

https://brainly.com/question/29451810

#SPJ11

Which field can be used to track the progress on tasks that a user has created? A. A. Subject
B. Start Date
C. Due Date
D. % Complete

Answers

The answer is D complete I believe

Give at lesat 3 examples of how is NLG (Natural Language Generation) beneficial and unbeneficial (pls support your points)

Answers

NLG (Natural Language Generation) is beneficial isuch as automating content creation, personalizing user experiences, and generating insights from data but have limitations including potential biases in generated content and difficulties in capturing nuanced human language.

How is NLG beneficial and unbeneficial?

NLG offers numerous benefits including the ability to automate the generation of content across different domains, such as news articles, product descriptions, and weather reports. This helps save time and resources by eliminating the need for manual content creation.

NLG systems may have limitations. One concern is the potential for biased content generation as the models are trained on existing data that may contain biases. This can lead to the generation of discriminatory or misleading content.

Read more about Natural Language

brainly.com/question/14222695

#SPJ1

NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience

NLG, or Natural Language Generation, is the method of generating natural language text using computer algorithms. It is a subfield of artificial intelligence that focuses on creating human-like texts, thereby making it easier for humans to interact with machines. Natural Language Generation is beneficial in many ways, but it also has its limitations. In this response, we will discuss the benefits and drawbacks of NLG in detail. Benefits of Natural Language Generation (NLG):

1. Efficient content creation: NLG algorithms can generate content faster than human writers, making it easier for businesses and publishers to create large amounts of content in less time. This is particularly beneficial for news and sports articles, where quick updates are required.

2. Consistent quality and tone: NLG can ensure that the content is written in a consistent tone and style, maintaining the brand's voice and values. In contrast, human writers can experience mood changes, which may influence the quality of their writing.

3. Personalization: NLG algorithms can create personalized messages and content, providing a better user experience for customers and clients. It can also be used for chatbots to provide human-like interactions with customers, improving customer satisfaction.

Unbeneficial of Natural Language Generation (NLG):1. Limited creativity: NLG algorithms can generate text based on the data it is fed. However, it lacks creativity and may fail to produce the same level of creativity as human writers. NLG cannot replace human writers' creativity, which is required in fields such as literature and poetry.

2. Dependence on data quality: NLG requires high-quality data to generate effective texts. Low-quality data may result in incorrect information and errors in the generated text.

3. Lack of empathy: NLG algorithms lack human empathy and understanding of social and emotional contexts. This may cause problems in situations that require a high level of emotional intelligence, such as counseling, medical diagnosis, and human resources. Therefore, NLG is beneficial in generating content quickly and accurately, maintaining consistency, and providing a personalized user experience. However, it has its limitations and cannot replace human creativity, empathy, and emotional intelligence.

For more questions on articles

https://brainly.com/question/25276233

#SPJ8

Manny copied a table from an ms excel file, closed the file, and then pasted the table in an ms word document. Where was the table stored after he copied it?.

Answers

The table was stored after he copied it into the RAM memory. It is a fundamental part of a computer.

What is the RMA memory?

Random Access Memory (RAM) is a fundamental part of the hardware of a computer device.

The RAM stores information of the operating system and applications in current use in order to be recovered rapidly during work.

This short-term memory (RAM) enables the management of different active tasks and applications.

Learn more about RAM memory here:

https://brainly.com/question/13196228

Which statements describe the use of style in word

Answers

Answer:

can be used to make Word documents look the same

saves the user time when doing formatting tasks

allows for the definition of reusable formatting

can be applied to paragraphs and fonts

Cuales son los dos tipos de mantenimiento que existen?

Answers

Answer:  

dpendiendo del trabajo a realizar, se pueden distinguir tres tipos de mantenimiento: preventivo, correctivo y predictivo.

Preventivo. Tareas de mantenimiento que tienen como objetivo la reducción riesgos. ...

Correctivo. ...

Predictivo. ...

Mantenimiento interno. ...

Mantenimiento externo

La clasificación más extendida se refiere a la naturaleza de las tareas, y así, el mantenimiento puede distinguirse en correctivo, preventivo, conductivo, predictivo, cero horas, y modificativo

Tareas de mantenimiento programado: lo componen el conjunto de tareas de mantenimiento que tienen por misión mantener un nivel de servicio determinado en los equipos, programando las revisiones e intervenciones de sus puntos vulnerables en el momento más oportuno

Explanation:espero haberte ayudado coronita plis soy nueva  en esto

system wherein money is moved electronically between accounts or organizations, in the case of insurance claims.

Answers

Electronic fund transfer (EFT) is a system that facilitates the movement of money electronically between accounts or organizations, including insurance claims.

It enables the secure and efficient transfer of funds without the need for physical checks or cash. EFTs are commonly used in various FINANCIAL transactions, such as direct deposit of salaries, online bill payments, and electronic insurance claim settlements.

In the context of insurance claims, EFT allows for the swift and convenient transfer of funds from insurance companies to policyholders or other relevant parties. When a claim is approved, the insurance company electronically transfers the claim amount to the designated bank account of the claimant, eliminating the need for paper checks and manual processing.

EFT in insurance claims offers several advantages, including faster payment processing, reduced administrative costs, enhanced security, and improved accuracy. It streamlines the payment workflow, accelerates claim settlements, and provides a convenient method for both insurers and claimants to track and manage transactions.

Overall, EFTs in the context of insurance claims contribute to a more efficient and seamless financial process, benefiting all stakeholders involved.

Learn more about Electronic fund transfer (EFT)  here:

https://brainly.com/question/31111870

#SPJ11

What does this loop that uses a range function do? for i in range(7, 15): print("goodbye") It prints "goodbye" 8 times, numbered from 7 through 14. It prints "goodbye" 9 times, numbered from 7 through 15. It prints "goodbye" 9 times. It prints "goodbye" 8 times.

Answers

Answer:

It prints "goodbye" 8 times.

Explanation:

The loop being described in this scenario would print "goodbye" 8 times. It would not include numbers detailing the range since the loop instructions only state for the system to print("goodbye") and nothing else. Also, it would only print it 8 times because in a range the endpoint is not included, this is mainly because in programming data structures tend to run on 0-based indexing.

Answer:

8 times is right

Explanation:

A European call has strike \( K=9 \) and expires in two time-steps. In CoxRoss-Rubinstein notation, the underlying asset has \( S=11, u=1.2 \) and \( d=1 / u \). If the return is \( R=1.03 \) over one

Answers

The European call option with a strike price \( K = 9 \) and a two-time-step expiration in the Cox-Ross-Rubinstein model can be evaluated as follows.

In the Cox-Ross-Rubinstein model, the underlying asset has a current price of \( S = 11 \), an upward movement factor of \( u = 1.2 \), and a downward movement factor of \( d = 1 / u \).

To calculate the option value, we need to determine the risk-neutral probability \( p \) and the expected return \( R \) over one time step. Given that the return \( R = 1.03 \), we can calculate the risk-neutral probability as:

\(\[ p = \frac{R - d}{u - d} = \frac{1.03 - 1 / u}{u - 1 / u} \]\)

Once we have the risk-neutral probability, we can calculate the option value using the risk-neutral pricing formula. However, the question does not provide the risk-free interest rate or the time to expiration in terms of years, which are necessary for the calculations. Without this information, it is not possible to determine the precise value of the European call option.

To know more about  Cox-Ross-Rubinstein model

brainly.com/question/20475299

#SPJ11

add an if branch to complete double_pennies()'s base case. sample output with inputs: 1 10 number of pennies after 10 days: 1024

Answers

The given function is incomplete and needs to be modified to get the correct output. The function name is `double_pennies()` and it is missing an if-else statement.

It takes in two arguments, `num_of_pennies` and `num_of_days`.The function doubles the number of pennies every day and returns the total number of pennies at the end of the given days.

The base case of the function has to be added to get the correct output for lower values of days, so the function looks like this:```def double_pennies(num_of_pennies, num_of_days):    

if num_of_days == 0:      

return num_of_pennies    else:        

return double_pennies(num_of_pennies * 2, num_of_days - 1)``

The above code will return the correct output for the given input of 1 and 10 which is:```number of pennies after 10 days: 1024```

To know more about statement visit:-

https://brainly.com/question/31655355

#SPJ11

what will be the answer of this python question with explanation?
for a in range(1,8,1):
print(a,a*a)

Answers

Answer:

The Python range() function returns a sequence of numbers, in a given range. The most common use of it is to iterate sequence on a sequence of numbers using Python loops.

Explanation:

make me branliis list pls if you do then thx

The way a student prepares for a test or reviews academic material is referred to as

a study environment.
study habits.
study hall.
a study schedule.The way a student prepares for a test or reviews academic material is referred to as

Answers

Answer:

study habits

Explanation:

Answer:

The Answer is Study Habits

Explanation:

Just got it right on edge

At which of the capability maturity model integration maturity levels, are processes well defined, understood, and consistent across the organization?.

Answers

At defined (quantitatively managed), the capability maturity model integration maturity levels, are processes well defined, understood, and consistent across the organization.

An organization's software development process can be developed and improved using the Capability Maturity Model (CMM). The model outlines a five-level evolutionary path of processes that get more ordered and systematic as they mature.

The Software Engineering Institute (SEI), a research and development facility supported by the U.S. Department of Defense (DOD) and now a part of Carnegie Mellon University, developed and promotes CMM. In order to address software engineering difficulties and, generally speaking, develop software engineering approaches, SEI was established in 1984.

More specifically, SEI was created to streamline the DOD's software-intensive system development, acquisition, and maintenance processes. SEI supports the widespread industrial use of CMM Integration (CMMI), a development of CMM. Additionally, the capability maturity model is still commonly employed.

CMM is comparable to ISO 9001, one of the International Organization for Standardization's ISO 9000 set of standards. The ISO 9000 standards outline an efficient quality system for the manufacturing and service sectors; ISO 9001 explicitly addresses the creation and upkeep of software.

To know more about  Capability Maturity Model click on the link:

https://brainly.com/question/14595603

#SPJ4


Communications PLC:
2. Which OSI Layers that is connected for communications
established and released

Answers

In communications, the establishment and release of connections involve multiple layers of the OSI (Open Systems Interconnection) model. The primary layers involved are the transport layer and the session layer.

What is the job of the transport layer?

The transport layer (Layer 4) is responsible for establishing and releasing connections between end-to-end communication endpoints. It ensures reliable delivery of data and manages flow control, error correction, and congestion control.

The session layer (Layer 5) provides the mechanism for establishing, managing, and terminating communication sessions between applications. It handles session establishment and teardown, synchronization, and checkpointing.

Read more about Open Systems Interconnection here:

https://brainly.com/question/22709418
#SPJ4

Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _____ tool to create a clean and consistent visual appearance for their spreadsheets.

Answers

The tool used by data analysts to create a clean and consistent visual appearance for their spreadsheets is called clear formats.

A database refers to an organized or structured collection of data that is typically stored on a computer system and it can be accessed in various ways. Also, each database has a unique formatting and this may result in data inconsistency.

In Computer science, a clean data is essential in obtaining the following:

Data consistencyData integrityReliable solutions and decisions.

Furthermore, spreadsheets are designed and developed with all kinds of tools that can be used to produce a clean data that are consistent and reliable for analysis.

In this context, clear formats is a kind of tool that is used by data analysts to create a clean and consistent visual appearance for their spreadsheets.

Read more on database here: https://brainly.com/question/15334693

A flower is an example of _______________? (Select the best answer.)

Question 2 options:

Water


Soil


Fauna


Flora


Air

Answers

Answer:

flora

Explanation:

Flora is plant life; fauna refers to animals. Fauna derives from the name of a Roman goddess, but the handiest way to remember the difference between flora and fauna is that flora sounds like flowers, which are part of the plant world; fauna, however, sounds like "fawn," and fawns are part of the animal kingdom.

I don’t quite understand the context of the question but if I were to guess, I would say the answer is “Flora” because it also means “relating to flowers.”

if your tired but still need to proofread your document,what should you do?
proof read it anyway
scan through it quickly
submit your work as is
walk away and come back later

Answers

Answer:

If i were to choose one i would, come back to it later. But the best thing to do is have somebody else proofread your essay, doc, or anything else, because its the best thing to have a second pair of eyes so they can suggest what you could fix or change or any opinions on your document. Not sure why you need this but i hope it helps <3

Have a great day <33 -Blazetoxic123

Answer:

A

Explanation:

A/an _________ is a piece of information that in some way describes an entity. It is a property of the entity and it quantifies, qualifies, classifies, or specifies the entity. Mark for Review
(1) Points
Table
ERD
Process
Attribute (*)

Answers

A/an Attribute is a piece of information that in some way describes an entity. It is a property of the entity and it quantifies, qualifies, classifies, or specifies the entity.

What is an Attribute? In computer science, an attribute is a property or a feature of an entity that can be sorted, categorized, or searched. An attribute is any part, feature, or aspect of an entity that can be named or described. An entity's attributes, when combined, give a precise and accurate description of the entity as a whole. An attribute is any type of data that can be assigned to an entity to help categorize, qualify, or quantifies it. For instance, a person can have attributes such as age, hair color, height, weight, and so on. These attributes can be used to filter, sort, and classify people in a variety of ways, depending on the requirements.

To learn more about entity; https://brainly.com/question/30552580

#SPJ11

A best practice is to make sure titles are inside the title-safe area and anything you want to show in a finished video is inside the _____ area.

Answers

The missing term in the given statement is "safe-action area."

What is this?

The safe-action area refers to the region within a video frame where important visual elements, such as text, graphics, or people's faces, should be placed to ensure they are visible on all types of screens. It is a slightly smaller area inside the safe-title area, which represents the outermost region where text and graphics can be placed without getting cut off by TV overscan or other display issues.

By placing essential visual elements within the safe-action area, you can ensure that your video's message is communicated clearly and effectively to your audience, regardless of the viewing device.

Read more about video frames here:

https://brainly.com/question/29590566

#SPJ1

Name two sensors which would be used in a burglar alarm system

Answers

kind of sensors used in a burglar alarm system:-Passive Infrared SensorsTomographic Motion Detector.Microwave Detectors.Ultrasonic Detectors.Photoelectric Beams.Glass Break Detectors.

1. Passive Infrared Sensor

This sensors type is passive in a way that it doesn't radiate its own energy. Instead, it detects the infrared light radiating from objects. This way, it can detect whenever there's a human or another living being in its field of view.

2. Photoelectric Beams

This is also another type of motion detector, but it doesn't work similarly to the others. For one, it doesn't have a coverage area. It only forms a fence, which triggers the alarm if broken.

It consists of two separate parts that form a sort of a fence made of IR beams. When someone steps into the beams, between the two parts, they trigger the alarm.

10. Version control is a way to store code files with a detailed history of every modification to that code. True or False
This is for computer programming, I’m having a really hard time in this class and I need some help with this question. Any incorrect or spam answers will be reported. Thanks in advance!

Answers

Answer:

true

Explanation:

I hope this helps

what is the name of software that enables hardware on a mainframe?

Answers

The name of the software that enables hardware on a mainframe is the Operating System.

An operating system is software that enables hardware on a mainframe. It controls the basic functions of the computer hardware such as input/output operations, memory allocation, and processing of data. It manages all the resources, such as hardware devices and software applications. Operating systems run on the computer's processor and make it possible for other software to run as well.

The main purpose of the operating system is to provide an environment where the user can interact with the computer and execute applications. Examples of mainframe operating systems are IBM's z/OS, UNICOS, and OpenVMS. These operating systems are designed to handle large amounts of data and transactions and provide features like job scheduling, file management, and security.

To know more about the operating system visit:

https://brainly.com/question/2806495

#SPJ11

it energy transferred to do cellular work

Answers

Yes, energy is required to perform cellular work in living organisms.

The energy is obtained from the breakdown of nutrients, such as glucose, through cellular respiration. During this process, the energy stored in glucose molecules is converted into a usable form called ATP (adenosine triphosphate) which is used by cells to perform various activities such as movement, growth, and reproduction. ATP is the primary energy currency of cells, and without it, cells cannot perform their functions.Energy is also required to transport molecules across cell membranes, maintain cellular structures, and carry out other essential cellular processes. Therefore, energy transfer is a critical component of cellular activities and is required for the survival and functioning of living organisms.

To know more about energy visit:

https://brainly.com/question/12429501

#SPJ4

Other Questions
TRUE / FALSE. once protein synthesis is completed, the protein that was synthesized may undergo further changes prior to its secretion or use within the cell. -4c - 1 > 15 Please help me and show your calculations ! The Founders of the United States wanted to establish a government based on the consentof the governed, but they did not believe in democracy. How did they address this paradoxin the way that they structured the government of the United States? What possiblyunintended consequences have resulted from their institutional design choices? I need help finding a hook to this topic, please Which term directly results in a greater need for resources, jobs, Heath care, and education Consider a closed economy that is described by the following modelC 300m +0.60YWhere:Y = incomeC consumptionI = 150m I = investmentG 400m G government spendingT = 0.25Y T = taxesNote to student: show all your calculations. Figures are in milions (m). Roundoff to two decimal places.2.1 Calculate the marginal propensity to save. (2)2.2 Calculate the multiplier. (3)2.3 Calculate the total autonomous spending. (2)2.4 Calculate the equilibrium income. (3)2.5 Use a fully labelled Keynesian graph to illustrate your calculations in 2.3and 2.4. (5)2.6 Calculate the government budget and explain whether there is a surpluSor a deficit. (5) Acquarium workers are making a mixture of salt water. The desired ratio is 90 grams of salt per liter of water. What is the ratio in ounces per gallon? What is the volume in cubic inches of a cylinder rounded to the nearest cubic inch with a radius of 9" in a height of 7" The ribosome-covered structure found in the cytoplasm of a cell is called the.Golgi apparatusBrough endoplasmic reticulumlysosomesmooth endoplasmic reticulum How people are affected by their environment The gulf of tonkin resolution increased the powers of which part of government? A balloon floats 18.5 kilometers East then 24.6 kilometers north what is the magnitude of the resultant vector WILL GIVE BRAINLIEST The number of lattes sold daily by two coffee shops is shown in the table.Shop A Shop B55 3652 4050 3447 3951 4448 4153 4053 38Based on these data, is it better to describe the centers of distribution in terms of the mean or the median? Explain. Mean for both coffee shops because the data distribution is symmetric Median for both coffee shops because the data distribution is not symmetric Mean for shop B because the data distribution is symmetric; median for shop A because the data distribution is not symmetric Mean for shop A because the data distribution is symmetric; median for shop B because the data distribution is not symmetric The postal service had a special deal. You could ship up to 2 kg for five dollars for alimited time. For Amy's friend's birthday, Amy wanted to ship her sweets and candy,and she wanted to get the best bang for her buck. She first made her cookies. Theyhad a mass of 400 grams. How many kilogram (s) of sweets and candy could Amystill ship if only the cookies were in the box for the five dollar special? Help me please :>>>>>>> What changes in the labor force causedunion membership to decline? A car depreciates in value 15% each year. If the original price of the car is $ 25 000, how much is the valueafter6 years had passed? Select one: a. $9428.74 b. $13050.16 c. $11092.63 d. $8014.43 What is NOT a factor of climate change?reforestationurbanizationcentralization Which of the following is true? Which of the following is NOT considered to be a characteristic of managerial accounting?a. It emphasizes decisions affecting the future.b. It is not mandatory.c. It emphasizes objectivity and verifiability.d. It emphasizes segment reports.