When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c. aborts program execution d. returns to the calling function

Answers

Answer 1

Answer:

sorry this is tought

Explanation:

no idea


Related Questions

What is the different type of secondary memory of a computer system.? explain

Answers

Explanation:

Solid state storage devices

optical storage devices

magnetic storage devices

complete the concept map on computer as outlined below​

Answers

Answer:

Here is your answer.

have a great day

complete the concept map on computer as outlined below

What is the difference between Information Technology and Communication Technology?​

Answers

Answer:

Explanation:

information tech is technology that teaches you information, and communication tech is tech that lets you talk to family and friends and meet new people.

Answer:

The main difference between information technology and communication technology is that Information technology is a subject that is use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise whereas a Communication technology is the use of computers to communicate with family and friends.

Longer speeches should be separated into the paragraphs of:
a) About 300 words or 9-12 lines in the transcription tool.
b) About 100 words or 3-4 fines in the transcription tool.
c) About 200 words or 6-8 fines in the transcription tool.
d) About 50 words or 1-3 lines in the transcription tool.

Answers

Answer:

b) About 100 words or 3-4 fines in the transcription tool.

Explanation:

Transcription tools are the software that helps in converting the audio or speeches into texts. Traditionally, the process of transcription was done manually. With teh advancement of technologies and software, transcription software is developed. They help in transcribing the audios and videos into texts. These are useful in many sectors of business, medical, and legal areas.

One of the rules of transcription involves the division of long speeches into paragraphs. It is advised to divide the paragraph into about 100 words or 3-4 lines.

a programmer is asked to write code to generate and display a random odd number between 1 and 1,000. which of the following code segments will always successfully display a random number that is odd? Select TWO answers.
A.
num <-- 2
REPEAT UNTIL ( (num MOD 2) = 1 )
{
num <-- RANDOM (1, 1000)
}
DISPLAY ( num )
B.
num <-- RANDOM (1, 1000)
IF ( (num MOD 2) = 1 )
{
DISPLAY ( num )
}
C.
REPEAT UNTIL ( ((RANDOM (1, 1000)) MOD 2) = 1 )
{
num = 0
}
DISPLAY ( RANDOM (1, 1000) )
D.
oddNum <-- false
REPEAT UNTIL ( oddNum )
{
num <-- RANDOM (1, 1000)
IF ( (num MOD 2) = 1 )
{
oddNum <-- true
}
}
DISPLAY ( num )

Answers

The correct answers that will always successfully display a random number that is odd A and D.

Why are they correct?

A.

This code segment initializes num to 2, and then repeatedly generates a random number between 1 and 1000 until an odd number is found. The condition checks whether the number is odd by using the modulus operator. Once an odd number is found, the loop terminates and the odd number is displayed.

D.

In this code segment, a boolean variable oddNum is initialized to false. The code then enters a loop that repeatedly generates a random number between 1 and 1000 until an odd number is found. When an odd number is found, oddNum is set to true, which breaks the loop. Finally, the odd number is displayed.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

Assume a fully associative write-back cache with many cache entries that starts empty. Below is sequence of eight memory operations (The address is in square brackets):

Read Mem[300];

Write Mem[100];

Write Mem[100];

Read Mem[200];

Write Mem[200];

Read Mem[100];

Write Mem[100];

Write Mem[100];

Answers

Answer:

Please mark me the brainliest

We can use the following steps to simulate the given sequence of memory operations in a fully associative write-back cache:

Explanation:

1. Read Mem[300]:

  - The cache is empty, so we have a cache miss and bring the block containing Mem[300] into the cache.

  - The block is now in the cache.

 

2. Write Mem[100]:

  - The cache currently only contains a block for Mem[300], so we have a cache miss and bring the block containing Mem[100] into the cache.

  - The block is now in the cache.

  - The value of Mem[100] in the cache is updated with the new value.

 

3. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

  - Note that this write operation is redundant, since the value of Mem[100] was already updated in step 2.

 

4. Read Mem[200]:

  - The block containing Mem[200] is not in the cache, so we have a cache miss and bring the block into the cache.

  - The block is now in the cache.

 

5. Write Mem[200]:

  - The block containing Mem[200] is already in the cache, so we have a cache hit.

  - The value of Mem[200] in the cache is updated with the new value.

 

6. Read Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is not changed.

 

7. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

 

8. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

  - Note that this write operation is redundant, since the value of Mem[100] was already updated in step 7.

At the end of these operations, the cache contains blocks for Mem[200] and Mem[100], with the value of Mem[200] being the most recent value written to that address. The value of Mem[100] in the cache is the same as the value written in step 8.

The probability that the price of a commodity is increasing is 0.62 and the probability that the price is decreasing is 0.18 . What is the probability that the price of the commodity remains constant. Solved numerically​

Answers

bahug ka itlog hduxuwlowv heusuowjdd

Which quantity measures the rate at which a machine performs work?

Answers

Answer:

The SI unit of energy rate

Explanation:

is the watt, which is a joule per second. Thus, one joule is one watt-second, and 3600 joules equal one watt-hour.

In the program below, numA is a
def multiply(numA, numB):
product = numA* numB
return product
answer = multiply(8,2)
print (answer)

parameter

qualifier

accumulator

return value

Answers

Answer:

parameter

Explanation:

In the function 'multiply' you can pass values in that are to be used inside the function. These are called 'parameters' and are in parentheses after the function name.

- A qualifier is a name that adds extra information, such as 'final' to prevent reassignment

- An accumulator is a variable you use to sum up a bunch of values

- A return value is a mechanism to pass the result of a function back to the calling program (into 'answer' in above example).

An internet filter is firewall software used to block a users access to specific internet content. An internet filter can be installed on which three of the following

Answers

An internet filter can be installed on a variety of devices, including:Computers: Internet filters can be installed on individual computers, whether they are desktops, laptops, or tablets.

This allows users to control their own access to certain websites or types of content.Routers: Some routers have built-in internet filtering capabilities, which allow network administrators to control access to specific websites or types of content for all devices connected to the network.Mobile devices: Internet filters can also be installed on smartphones and other mobile devices, which can be particularly useful for parents who want to restrict their children's access to certain types of content while using their mobile devices. internet filters can be installed on a range of devices, depending on the specific needs of the user or organization. By blocking access to certain websites or types of content, internet filters can help to protect users from harmful or inappropriate content, and promote responsible internet use.

To learn more about laptops click the link below:

brainly.com/question/30551024

#SPJ1

Suppose a friend gives you a computer, but when you try to start it, a message appears asking for a BIOS password. You can't contact the friend to find out the password. How should you proceed?

Answers

Answer:

Clear the CMOS

Explanation:

The CMOS stores the BIOS settings.

The are two schools of ____________ are Symmetry and Asymmetry.

Answers

The two schools of design that encompass symmetry and asymmetry are known as symmetrical design and asymmetrical design.

Symmetrical design is characterized by the balanced distribution of visual elements on either side of a central axis. It follows a mirror-like reflection, where the elements on one side are replicated on the other side, creating a sense of equilibrium and harmony.

Symmetrical designs often evoke a sense of formality, stability, and order.

On the other hand, asymmetrical design embraces a more dynamic and informal approach. It involves the intentional placement of visual elements in an unbalanced manner, without strict adherence to a central axis.

Asymmetrical designs strive for a sense of visual interest and tension through the careful juxtaposition of elements with varying sizes, shapes, colors, and textures.

They create a more energetic and vibrant visual experience.

Both symmetrical and asymmetrical design approaches have their merits and are employed in various contexts. Symmetry is often used in formal settings, such as architecture, classical art, and traditional graphic design, to convey a sense of elegance and tradition.

Asymmetry, on the other hand, is commonly found in contemporary design, modern art, and advertising, where it adds a sense of dynamism and creativity.

In conclusion, the schools of symmetry and asymmetry represent distinct design approaches, with symmetrical design emphasizing balance and order, while asymmetrical design embraces a more dynamic and unbalanced aesthetic.

For more such questions on symmetry,click on

https://brainly.com/question/31547649

#SPJ8

write a program that keeps taking integers until the user enters in python

Answers

int main {

//variables

unsigned long num = 0;

std::string phrase = " Please enter your name for confirmation: " ;

std::string name;

//codes

std::cout << phrase;

std::cin>> name;

while ( serial.available() == 0 ) {

num++;

};

if ( serial.avaliable() > 0 ) {

std::cout << " Thank you for your confirmation ";

};

};

If you had to make a choice between studies and games during a holiday, you would use the _______ control structure. If you had to fill in your name and address on ten assignment books, you would use the ______ control structure.



The answers for the blanks are Selection and looping. Saw that this hasn't been answered before and so just wanted to share.

Answers

The missing words are "if-else" and "looping".

What is the completed sentence?

If you had to make a choice between studies and games during a holiday, you would use the if-else control structure. If you had to fill in your name and address on ten assignment books, you would use the looping control structure.

A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.

Learn more about looping:
https://brainly.com/question/30706582
#SPJ1

Could YOU Please help me out of this question This is how I started typing but at the end I got stuck My half of the answers I attached. please Help I will give you brainiest


we will work on text processing and analysis. Text analyzers could be used to identify the language in which a text has been written (language detection), to identify keywords in the text (keyword extraction) or to summarize and categorize a text. You will calculate the letter (character) frequency in a text. Letter frequency measurements can be used to identify languages as well as in cryptanalysis. You will also explore the concept of n-grams in Natural Language Processing. N-grams are sequential patterns of n-words that appear in a document. In this project, we are just considering uni-grams and bi-grams. Uni-grams are the unique words that appear in a text whereas bi-grams are patterns of two-word sequences that appear together in a document.


Write a Java application that implements a basic Text Analyzer. The Java application will analyze text stored in a text file. The user should be able to select a file to analyze and the application should produce the following text metrics:


1. Number of characters in the text.

2. Relative frequency of letters in the text in descending order. (How the relative frequency that you calculated compares with relative letter frequencies in English already published?)

3. Number of words in the text.

4. The sizes of the longest and the shortest word.

5. The twenty most repeated uni-grams (single words) in the text in descending order.

6. The twenty most repeated bi-grams (pairs of words) in the text in descending order.


Test your program in the file TheGoldBug1.txt, which is provided.

Answers

The given program based on the question requirements is given below:

The Program

public static void analyzeChar(String text)

{

text = text.toLowerCase();

char [] characters = new char[26];

int [] rep =new int[26];

//populate the array of characters

char ch = 'a';

for (int i =0; i < characters.length; i++)

{

characters[i] = ch;

ch++;

}

itz72

//System.out.println(Arrays.toString(characters));

//System.out.println(Arrays.toString(rep));

//how many times each characters repeats

for (int i =0 ; i < text.length (); i++ )

{

ch = text.charAt(i);

if(ch>= 'a'&& ch<= 'z')

{

rep[(int)(ch-'a')]++;

}

itz72

}

//show the number of repetitions

for (int i = 0; i < rep.length; i++)

{

System.out.println("character" + characters[i] + "reapeats"+ rep[i]);

}

}

itz72

public static void calcNumChar(String text)

{

System.out.println("The number of characters is: " + text.length());

}

public static String getText(String fileName) throws IOException

{

String line = "", allText = "";

//open the file

File file = new File(fileName);

Scanner inputFile = new Scanner(file);

//read the file

while(inputFile.hasNext())

{

line = inputFile.nextLine();

//System.out.println(line);

allText=allText + (" " + line);

}

itz72

//close the file

inputFile.close();

return allText;

}

public static String getFilename()

{

String file;

Scanner kb = new Scanner(System.in);

System.out.print("Enter the name of the file: ");

file = kb.nextLine();

return file;

}

}

This script contains numerous functions that aid in the examination and manipulation of written materials. This program determines the incidence of every letter present in the supplied text, tallies the overall character count, and includes the ability to import text from a file.

Read more about programs here:

https://brainly.com/question/26497128

#SPJ1

Most operating system have GUI as part of the system, which is the following best describes an operating system GUI

Answers

A Graphical User Interface (GUI) is the component of an operating system that allows users to communicate with the system using graphical elements. GUIs are generally used to give end-users an efficient and intuitive way to interact with a computer.

They provide an easy-to-use interface that allows users to manipulate various objects on the screen with the use of a mouse, keyboard, or other input device.The primary function of an operating system GUI is to make it easier for users to interact with the system.

This is done by providing visual feedback and a simple way to access various system functions. GUIs can be customized to suit the user's preferences, which means that they can be tailored to meet the specific needs of different users.Some of the key features of a GUI include the use of windows, icons, menus, and buttons.

Windows are used to display information and applications, while icons are used to represent various objects or applications on the screen. Menus and buttons are used to provide users with a way to access various system functions, such as saving a file or printing a document.

The use of a GUI has become a standard feature of most operating systems. This is because GUIs make it easier for users to interact with computers, and they provide an efficient and intuitive way to access various system functions.

For more such questions on Graphical User Interface, click on:

https://brainly.com/question/28901718

#SPJ8

What is returned by datetime(1970, 1, 1).strftime('%Y-%d-%B') in Python?

Answers

Answer:

1970-01-January

Explanation:

Given

datetime(1970, 1, 1).strftime('%Y-%d-%B')

We start by analysing the give code segment.

date time means that we want to work with dates and time

1970,1,1 is the date time we're working with

strftime represents the format we want the time to be

('%Y-%d-%B) = Year - Day - Month as full name

Analysing the date itself, we have

(1970, 1, 1) = ('%Y-%d-%B')

By comparison

%Y = Year = 1970

%d = Day = 01

%B = Full name of the month

If month = 1, then we understand that the month is January..

So,

%B = January

Bringing the results together;

(1970, 1, 1) = ('%Y-%d-%B') = "1970-01-January"

differences between a small office and a big office​

Answers

the size and what’s in the office

The third assignment involves writing a Python program to compute the cost of carpeting a room. Your program should prompt the user for the width and length in feet of the room and the quality of carpet to be used. A choice between three grades of carpeting should be given. You should decide on the price per square foot of the three grades on carpet. Your program must include a function that accepts the length, width, and carpet quality as parameters and returns the cost of carpeting that room. After calling that function, your program should then output the carpeting cost.
Your program should include the pseudocode used for your design in the comments. Document the values you chose for the prices per square foot of the three grades of carpet in your comments as well.
You are to submit your Python program as a text file (.txt) file. In addition, you are also to submit a test plan in a Word document or a .pdf file. 15% of your grade will be based on whether the comments in your program include the pseudocode and define the values of your constants, 70% on whether your program executes correctly on all test cases and 15% on the completeness of your test report.

Answers

Answer:

# price of the carpet per square foot for each quality.

carpet_prices=[1,2,4]

def cal_cost(width,height,choice):

 return width*height*carpet_prices[choice-1]  

width=int(input("Enter Width : "))

height=int(input("Enter Height : "))

print("---Select Carpet Quality---")

print("1. Standard Quality")

print("2. Primium Quality")

print("3. Premium Plus Quality")

choice=int(input("Enter your choice : "))

print(f"Carpeting cost = {cal_cost(width,height,choice)}")

Explanation:

The cal_cost function is used to return the cost of carpeting. The function accepts three arguments, width, height, and the choice of carpet quality.

The program gets the values of the width, height and choice, calls the cal_cost function, and prints out the string format of the total carpeting cost.

You are a knowledge engineer and have been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications. What are some sample questions you would ask the loan manager at a bank?​

Answers

As a knowledge engineer, it should be noted that some of the questions that should be asked include:

What do you expect in the loan application process?How is the loan going to be processed?What do you expect from the applicant to fund the loan?

A knowledge engineer simply means an engineer that's engaged in the science of building advanced logic into the computer systems.

Since the knowledge engineer has been assigned the task of developing a knowledge base for an expert system to advise on mortgage loan applications, he should asks questions that will be vital for the loan process.

Learn more about engineers on:

https://brainly.com/question/4231170

how do you unblock things on a school cromebook?

Answers

Answer:

School chromebooks are usually controlled/managed my administrators or teachers, so if you wanted to unblock things on a school chromebook you would have to ask an administrator or teacher at your school.

Describe the examples of expressions commonly used in business letters and other written communications with some clearer alternatives:

Answers

When writing business letters and other written communications, it is important to use expressions that convey your message clearly and professionally.

Here are some examples of commonly used expressions in business letters along with clearer alternatives:

1. "Enclosed please find" → "I have enclosed"

  This phrase is often used to refer to attached documents. Instead, simply state that you have enclosed the documents.

2. "As per our conversation" → "As we discussed"

  Rather than using a formal phrase, opt for a more conversational tone to refer to previous discussions.

3. "Please be advised that" → "I want to inform you that" or "This is to let you know that"

  Instead of using a lengthy phrase, use more straightforward language to convey your message.

4. "In regard to" → "Regarding" or "Regarding the matter of"

  Use a more concise phrase to refer to a specific topic or issue.

5. "We regret to inform you" → "Unfortunately" or "I'm sorry to say"

  Instead of using a lengthy expression, choose simpler words to deliver disappointing news.

Remember, it is important to maintain a professional tone while also ensuring that your message is clear and easy to understand. Using simpler alternatives can help improve the readability of your business letters and written communications while still maintaining a polite and professional tone.

For more such questions on letters,click on

https://brainly.com/question/18319498

#SPJ8

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.
You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

Answers

Note that it is TRUE to state that you must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

How is this so?

Azure Event Hubs, a   data streaming platform,can be integrated with Azure Active Directory (Azure AD) for authentication and authorization purposes.

This ensures that requests to access and utilize Event Hubs resources are authorized and controlled through Azure AD, providing secure and authorized access to the application.

Learn more about Azure Active Directory at:

https://brainly.com/question/28400230

#SPJ1

You are developing an application to ingest and process large volumes of events and data by using Azure Event Hubs.

You must use Azure Active Directory (Azure AD) to authorize requests to Azure Event Hubs resources.

True or False?


4. Why do animals move from one place to another?​

Answers

Answer:

Animal move from one place to another in search of food and protect themselves from their enemies.They also move to escape from the harsh climate. Animal move from one place to another in search of food,water and shelter.

Answer:

Animals move one place to another because he search food and shelter

 A ………….. is a basic memory element in digital circuits and can be used to store 1 bit of information.

Answers

Answer:

A memory cell

Explanation: Research has proven that ;

The memory cell is also known as the  fundamental building block of computer memory.

It stores one bit of binary information and it must be set to store a logic 1 (high voltage level) and reset to store a logic 0 (low voltage level).

Python question

The following code achieves the task of adding commas and apostrophes, therefore splitting names in the list. However, in the case where both first and last names are given how would I "tell"/write a code that understands the last name and doesn't split them both. For example 'Jack Hansen' as a whole, rather than 'Jack' 'Hansen'.

names = "Jack Tomas Ponce Ana Mike Jenny"

newList = list(map(str, names.split()))

print(newList) #now the new list has comma, and apostrophe

Answers

Answer:

You can use regular expressions to match patterns in the names and split them accordingly. One way to do this is to use the re.split() function, which allows you to split a string based on a regular expression.

For example, you can use the regular expression (?<=[A-Z])\s(?=[A-Z]) to match a space between two capital letters, indicating a first and last name. Then use the re.split() function to split the names based on this regular expression.

Here is an example of how you can use this approach to split the names in your list:

(Picture attached)

This will give you the output ['Jack', 'Tomas', 'Ponce', 'Ana', 'Mike', 'Jenny', 'Jack Hansen']. As you can see, the name "Jack Hansen" is not split, as it matches the pattern of first and last name.

It's worth noting that this approach assumes that all first and last names will have the first letter capitalized and the last names capitalized too. If this is not the case in your data, you may need to adjust the regular expression accordingly.

Python questionThe following code achieves the task of adding commas and apostrophes, therefore splitting

What tool is available in Word Online?
Show Document
Watermark
Mark Entry
Page Numbers

Answers

Answer:

WATERMARK

Explanation:

SORRY IF MY ANSWER IS WRONG I HOPE THIS HELPED YOU AS MUCH AS POSSIBLE

A security administrator is adding a NAC requirement for all vpn users to ensure the connecting devices are compliant with company policy. Which of the following items provides the HIGHEST assurance to meet this requirement?

a. Implement a permanent agent.
b. Install antivirus software.
c. Use an agentless implantation.
d. Implement PKI.

Answers

Answer:

c. Use an agentless implementation.

Explanation:

A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.

Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.

In this scenario, a security administrator is adding a network access control (NAC) requirement for all vpn users to ensure the connecting devices are compliant with company policy. The item which provides the highest assurance to meet this requirement is to use an agentless implementation because the network access control (NAC) codes do not reside on the host device and the end user does not have to download any link to use it.

Imagine you're an Event Expert at SeatGeek. How would you respond to this customer?

* Hi SeatGeek, I went to go see a concert last night with my family, and the lead singer made several inappropriate comments throughout the show. There was no warning on your website that this show would not be child friendly, and I was FORCED to leave the show early because of the lead singer's behavior. I demand a refund in full, or else you can expect to hear from my attorney.

Best, Blake

Answers

By Imagining myself as an Event Expert at SeatGeek.I would respond to the customer by following below.

Dear Ronikha,

Thank you for reaching out to SeatGeek regarding your recent concert experience. We apologize for any inconvenience caused and understand your concerns regarding the lead singer's inappropriate comments during the show.

We strive to provide accurate and comprehensive event information to our customers, and we regret any oversight in this case.

SeatGeek acts as a ticket marketplace, facilitating the purchase of tickets from various sellers. While we make every effort to provide accurate event details, including any warnings or disclaimers provided by the event organizers, it is ultimately the responsibility of the event organizers to communicate the nature and content of their shows.

We recommend reaching out directly to the event organizers or the venue where the concert took place to express your concerns and seek a resolution.

They would be in the best position to address your experience and provide any applicable remedies.

Should you require any assistance in contacting the event organizers or obtaining their contact information, please let us know, and we will be happy to assist you further.

We appreciate your understanding and value your feedback as it helps us improve our services.

Best regards,

Vicky

Event Expert, SeatGeek

For more such questions Event,click on

https://brainly.com/question/30562157

#SPJ8

obtain the Truth tables to the following Boolean expressions, and prove the solution's in sagamath
1)B'C'+A
2)(A'+B)'C
3)A'C'+BC+A​

Answers

The answer to your question is b☺️☺️
Other Questions
Which expenses can be most safely eliminated if a chef's income decreases? (1 point)Column AColumn BColumn CColumn D If the nominal interest rate is 5 percent and the inflation rate is 2 percent, what is the real interest rate?a. 10 percentb. 7 percentc. 3 percentd. 2.5 percent 46 ---> ? ---> ? = 460complete this function machine by usin two of the functions shown below a) times by a 100 b) divide by 10 c) times by 10,000 d) divide by 1000 e) times by 10 f) times by a thousand why was clarisse considered odd or even dangerous? she wanted to know how things happened. she wanted to know why things happened. What is a manufacturers goal when using specialization? Arable land is land is no longer able to promote growth of agricultural changes. True False USINGcircuit maker toDesign a simple8-bit Ring Counter by using 74ls194. The counter should count inthe following order:10000000, 01000000,00100000, 00010000, 00001000 - Include why did people travel in ancient time the relatively small number of impact craters and the near absence of small craters on the surface of venus are thought to be a result of: Social studies exam tomorrow Help? a doctor prescribes a 200 mg antibiotic tablet to be taken every eight hours. it is known that the body eliminates 80% of the drug in eight hours. (a) how much of the drug is in the body just after the second tablet is taken? after the third tablet? second tablet mg Manufacturers, wholesalers, retailers, service companies, not-for-profit organizations, and government agencies that buy products and services for their own use or for resale are known as ______. Multiple choice question. secondary users intermediate buyers alternate consumers organizational buyers Una visita de ultratumba Which of the following is not an attribute of a lockbox system? Select one: a. Stronger control over receipts of cash from clients b. An average shorter float period for receivables C. Cash receipts collected once per day by the bank d. Payment of a service charge to the bank e. Extension of time to pay vendor invoices The currency trading market is close to being a perfectly competitive market. However, currency trading markets may not be competitive because. What type of cell response would take the longest amount of time (on the scale of minutes to hours) to execute? a. one that involves a change in gene expression b. one that uses a phosphorylation event to activate an enzyme c. one that involves the firing of an action potential along a neuron d. one that involves the release of secretory vesicles An Air Force plane left Nairobi and flewtoward Istanbul at an average speed of 380km/h. A cargo plane left sometime laterflying in the opposite direction with anaverage speed of 220 km/h. After the AirForce plane had flown for ten hours theplanes were 5120 km apart. How long didthe cargo plane fly? 1. A motorboat travels 196 meters in 20 seconds. What is the motorboat's unit rate of speed?Step1. Write equivalent ratios.The boat's rate of speed is 196m/20 secs.Let X represent the unknown. The second ratio is: xM/1 sec.Step2. set up and solve a proportion.19/20 = X/1196 . ------------= 20 .---------------=---------X = -------The unit rate ------ meters per second. Question 1Given that AD is parallel to BC, determine the measurement of B in the trapezoid.ResponsesA 135135B 6565C 115115D 9595Question 2Determine the value of y.ResponsesA 7070B 115115C 105105D 110 ALWAYS use significant figure rules. Remember that these rules apply to all numbers that are measurements. In working this problem, assume the value of "g" to be 9.8 m/s2 with two (2) significant digits unless otherwise stated. One complete wave passes a putrefying pile of poached pickerel in 0.50 seconds. The piled pickerel protrude 20 cm along the beach. Calculate its velocity. _____ cm/s 5.0 20. 10. 40.