Write a function called median, that takes as parameter a full, sorted array of doubles and returns the median of the list. For a sorted list of odd length, the median is the middle value. For a sorted list of even length, the median is the average of the two middle values. Make an example function call in your main.

Answers

Answer 1

Answer: Provided in the explanation section

Explanation:

#include <stdio.h>

double median(double array[] , int n)

{

double med;

//if n is even then return average of middle of two element.

if(n%2==0)

med = ( array[(n-1)/2] + array[n/2] ) /2.0 ;

else

med = array[n/2];//if n is odd return middle element.

 

return (med);

}

int main()

{

double array[6] = {1.3,3.5,5,7.7,9.0,11};

//size store size of array.

int size=sizeof(array)/sizeof(double);

//call the median function.

double medvalue =median(array, size);

printf("median is : %lf\n",medvalue);

return 0;

}

//OUTPUT : median is : 6.350000

⇒ Provided is the Image of the code and output.

cheers i hope this helped !!

Write A Function Called Median, That Takes As Parameter A Full, Sorted Array Of Doubles And Returns The

Related Questions

You are the administrative assistant for the Psychology Department in your college, and they have assigned you to set up a small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users. For example, faculty will use the server to post and receive class assignments. Which edition of Windows Server 2016 is most appropriate for this situation?

Answers

Answer: Standard edition

Explanation:

Based on the information given in the question, the edition of Windows Server 2016 that is most appropriate for this situation will be the standard edition.

Since it's going to be fora small server to provide basic file services to faculty, staff, and students in that department, which currently has 122 users, the standard edition is appropriate.

Standard edition is ideal in a scenario whereby there's a non-virtualized environments or low density with regards to the population.

QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin

Answers

Answer:

Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.

Explanation:

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

Assume you have been contracted by a university to develop a database system to keep track of student registration and accommodation records. The university courses are offered by faculties. Depending on the student’s IQ, there are no limitations to how many courses a student can enroll in. The faculties are not responsible for student accommodation. The university owns a number of hostels and each student is given a shared room key after enrollment. Each room has furniture attached to it. (a) Identify the main entity types for the project. (b) Identify the main relationship types and specify the multiplicity for each relationship. State any assumptions that you make about the data. (c) Using your answers for (a) and (b), draw a single ER diagram to represent the data requirements for the project

Answers

Answer:

Explanation:

(a) The main entity types for the project are:

StudentCourseFacultyHostelRoomFurniture

(b) The main relationship types and their multiplicities are:

One student can enroll in many courses (1 to many)One course can be taken by many students (1 to many)One faculty can offer many courses (1 to many)One course can be offered by one faculty (1 to 1)One hostel can have many rooms (1 to many)One room can be assigned to many students (1 to many)One room has many pieces of furniture (1 to many)One piece of furniture can be in one room only (1 to 1)

Assumptions:

A student can only be assigned to one room.Each piece of furniture can only be in one room.

(c) Here's a diagram that represents the data requirements for the project:

** ATTACHED **

The diagram shows the relationships between the entities, with the multiplicities indicated by the symbols at the ends of the lines connecting them.

Assume you have been contracted by a university to develop a database system to keep track of student

The main entity types for this project would be Faculty, Student, Course, Room, and Furniture.

(a) The main entity types for the project are:

- Faculty

- Student

- Course

- Room

- Key

- Furniture

(b) The main relationship types and their multiplicities are as follows:

- Faculty offers courses (1:N)

- Students enroll in courses (M:N)

- Students hold a room key (1:1)

- Rooms have attached furniture (1:N)

Assumptions:

- Each student can enroll in multiple courses.

- The faculty is not responsible for student accommodation.

- Each room has furniture attached to it.

(c) See below for the ER diagram:

ER Diagram

Hence, the main entity types for this project would be Faculty, Student, Course, Room, and Furniture.

Learn more about the database here:

https://brainly.com/question/29412324.

#SPJ2

Assume you have been contracted by a university to develop a database system to keep track of student

In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation, what is the more likely range involved

Answers

100 miles i assume since the avarge antanna cover 5-50 miles

What does the icon look like to add a new worksheet to the current workbook?
O a paintbrush
O a triangle with an exclamation point inside
O a lightbulb
O a circle with a plus sign inside

Answers

Answer:

A circle with a plus sign inside

Explanation:

I took the test

guys can u guys help me write the program plz

guys can u guys help me write the program plz
guys can u guys help me write the program plz

Answers

public class MyProgram{

   public static void main(String [] args){

       System.out.println("*****");

       System.out.println(" ****");

       System.out.println("  ***");

       System.out.println("   **");

       System.out.println("    *");

   }

}

That's all there is to it. I hope this helps!


Match List
Match the function to its purpose.
square root
an approximation of 7
greatest common divisor of two integers
:: sqrt()
#pi
::gcd(0)

Answers

square root:: sqrt()

an approximation of 7#pi

greatest common divisor of two integers::gcd(0)

If you want Nud3s add me on sc Kermit4lyfe1

Answers

Answer:

que pinga this is a hw website not snap

Explanation:

bro are you okay umm

Write some keywords about touchscreen

Answers

\({\huge{\underline{\bold{\mathbb{\blue{ANSWER}}}}}}\)

______________________________________

\({\hookrightarrow{Keywords}}\)

touchscreentouch inputmulti-touchgesturesstylusresistivecapacitivehaptic feedbacktouch latencytouch accuracytouch sensitivitytouch screen technologytouch screen interfacetouch screen displaytouch screen monitortouch screen laptoptouch screen phone

To italicize text located within a text box, which grouping would you use? Effects Text Font Typography

Answers

Answer:

Font

Explanation:

It seems like the only real answer from reading the lesson

Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to _______.​ a. ​ tie the exception condition to a processing step b. ​ show which exception conditions are subordinate to other exceptions c. ​ provide an identifier for each exception condition d. ​ tie exception conditions to other diagrams or descriptions

Answers

Answer:

a) tie the exception condition to a processing step

Explanation:

Numbering exception conditions, in a fully developed use case description is helpful to tie the exception condition to a processing step

The fully developed use case description is useful for the documentation of the context, purpose, description, conditions, and workflow of each use case. Activity diagrams give a graphical image of the use case workflow and serve the purpose of illustrating the alternative paths through a business process.

is a formal document containing detailed information about the destruction of your
A
data.

Answers

Where is the formula

Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.

Answers

The three genuine statements almost how technology has changed work are:

Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.

With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.

Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.

Technology explained.

Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.

Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.

Learn more about technology below.

https://brainly.com/question/13044551

#SPJ1

explain the procedure you will undertake to create a new partition​

Answers

To create a partition from unpartitioned space follow these steps:

Right click This PC and select Manage.

Open Disk Management.

Select the disk from which you want to make a partition.

Right click the Un-partitioned space in the bottom pane and select New Simple Volume.

Enter the size and click next and you are done.


3. Based on the code you created in this Unit, propose a way to re-use most of the code
(with different information in the variables like "city" and "rates) for a part of a similar app
that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you’ve writted (you can defend your proposal if the connection is not immediately obvious).

Answers

One possible way to reuse the code for a similar app is to modify it for a hotel booking system. Instead of parking rates for different cities, the modified app could display room rates for different hotels in various cities.

The basic structure of the code can be kept the same, with adjustments made to the variable names, input fields, and calculations. The "city" variable can be replaced with a "hotel" variable, and the "rates" variable can be replaced with a "room rates" variable.

The user input can be modified to ask for the desired hotel and room type, and the app can display the available room rates for that selection.

To learn more about the booking system, follow the link:

https://brainly.com/question/28315659

#SPJ1

You work part-time at a computer repair store. You are building a new computer. A customer has purchased two serial ATA (SATA) hard drives for his computer. In addition, he would like you to add an extra eSATA port that he can use for external drives. In

Answers

Install an eSATA expansion card in the computer to add an extra eSATA port for the customer's external drives.

To fulfill the customer's request of adding an extra eSATA port for external drives, you can install an eSATA expansion card in the computer. This expansion card will provide the necessary connectivity for the customer to connect eSATA devices, such as external hard drives, to the computer.

First, ensure that the computer has an available PCIe slot where the expansion card can be inserted. Open the computer case and locate an empty PCIe slot, typically identified by its size and the number of pins. Carefully align the expansion card with the slot and firmly insert it, ensuring that it is properly seated.

Next, connect the power supply cable of the expansion card, if required. Some expansion cards may require additional power to operate properly, and this is typically provided through a dedicated power connector on the card itself.

Once the card is securely installed, connect the eSATA port cable to the expansion card. The cable should be included with the expansion card or can be purchased separately if needed.

Connect one end of the cable to the eSATA port on the expansion card and the other end to the desired location on the computer case where the customer can easily access it.

After all connections are made, close the computer case, ensuring that it is properly secured. Power on the computer and install any necessary drivers or software for the expansion card, following the instructions provided by the manufacturer.

With the eSATA expansion card installed and configured, the customer will now have an additional eSATA port available on their computer, allowing them to connect external drives and enjoy fast data transfer speeds.

For more question on computer visit:

https://brainly.com/question/30995425

#SPJ8

Question 6 of 10
If you want to design computing components for cars and medical
equipment, which career should you pursue?
A) hardware design
B) systems analysis
C) telecommunications
D) machine learning

Answers

Answer:

Hardware design.

Explanation:

When dealing with components to deal with computing, you need to deal with hardware. Ergo: if you're designing computing components for cars an medical equipment, you will need to pursue hardware design.

Software Security Integration involves which attributes? Select the correct option(s) and click submit. Estimation of Software Security Efforts & Software Security Budget Requirements Estimation of Software Security Efforts & Sign Off Criteria Definition Software Security Budget Requirements & Sign Off Criteria Definition Software Security Effort Estimation and Budget Requirements, Identification of teams to perform reviews & Defining Sign Off Criteria Submit​

Answers

Software Security Integration concerns which attributes to Estimation of Software Security Efforts & Software Security Budget Requirements

What is software security requirements?

A security requirement is a statement of needed security functionality that provides one of many different security properties of software is being satisfied. Security requirements are emanated from industry standards, applicable laws, and a history of past exposures.

What is software safety courses?

The types of security software for business websites contain computer antivirus, network security, SaaS security, content control system, e-commerce software, payment gateway software, content delivery network, bot comfort, and monitoring tool.  

To learn more about  security requirement, refer

https://brainly.com/question/2818423

#SPJ9

A number is a palindrome if its reversal is the same as itself. Write a program ReverseNumber.java to do the following:
1. Define a method call reverse, which takes a 4-digit integer and returns an integer in reverse. For example, reverse(1234) should return 4321. (Hint: use / and % operator to separate the digits, not String functions)
2. In the main, take user input of a series of numbers, call reverse method each time and then determine if the number is a palindrome number, for example, 1221 is a palindrome number, but 1234 is not.
3. Enhance reverse method to work with any number, not just 4-digit number.

Answers

The reverse method takes an integer as input and reverses it by extracting the last digit using the modulus operator % and adding it to the reversed number after multiplying it by 10.

The Program

import java.util.Scanner;

public class ReverseNumber {

   public static int reverse(int number) {

       int reversedNumber = 0;

       while (number != 0) {

           int digit = number % 10;

           reversedNumber = reversedNumber * 10 + digit;

           number /= 10;

       }

      return reversedNumber;

   }

   public static boolean isPalindrome(int number) {

       return number == reverse(number);

   }

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter a number: ");

       int number = scanner.nextInt();

       

       if (isPalindrome(number)) {

          System.out.println(number + " is a palindrome number.");

       } else {

           System.out.println(number + " is not a palindrome number.");

       }

   }

}

Read more about Java program here:

https://brainly.com/question/26789430

#SPJ1

Which work habits should you follow to increase work efficiency and avoid health issues?

Answers

Answer:

Just get good sleep, eat breakfast, and exercise.

Answer:

take periodic breaks and alternate between tasks

Help me with this digital Circuit please

Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please
Help me with this digital Circuit please

Answers

A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Thus, These circuits receive input signals in digital form, which are expressed in binary form as 0s and 1s. Logical gates that carry out logical operations, including as AND, OR, NOT, NANAD, NOR, and XOR gates, are used in the construction of these circuits.

This format enables the circuit to change between states for exact output. The fundamental purpose of digital circuit systems is to address the shortcomings of analog systems, which are slower and may produce inaccurate output data.

On a single integrated circuit (IC), a number of logic gates are used to create a digital circuit. Any digital circuit's input consists of "0's" and "1's" in binary form. After processing raw digital data, a precise value is produced.

Thus, A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.

Learn more about Digital circuit, refer to the link:

https://brainly.com/question/24628790

#SPJ1

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

The success of Eye of the storm exemplifies

Answers

Answer:

Explanation:

how citizen reporting with personal observations

Answer: how powerful social media can be .

Explanation:

why is this not working for my plus membership

Answers

Answer:

The overwhelming main cause for PlayStation Plus subscriptions not being recognised is because of PlayStation server maintenance which prevents your PS4 from communicating with Sony and discovering that you are a paid up PS Plus subscriber.

Select 3 true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)

The int type in Python3 cannot represent a number greater than 2^31-1.

A binary floating-point method is used to represent fractions in binary numbers.

The decimal number 0.1 cannot be expressed without error in binary floating-point format.

The float type in Python3 can represent decimal 0.1 without error.

Answers

The  true statements about Python primitive types are:

32.bit integer type (a.k.a. int32) can represent integer value from -2 31 (-2.147,483,648) to 2"31-1 (2,147,483,647) A binary floating point method is used to represent fractions in binary numbers. The decimal number 0.1 cannot be expressed without error in binary floating-point format.

What are the Python primitive types?

The Python is known to be made up of four primitive data types which are said to be:

Integer.Float.String.Boolean.

Note therefore that The  true statements about Python primitive types are:

32.bit integer type (a.k.a. int32) can represent integer value from -2 31 (-2.147,483,648) to 2"31-1 (2,147,483,647) A binary floating point method is used to represent fractions in binary numbers. The decimal number 0.1 cannot be expressed without error in binary floating-point format.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ1

A citizen of any group both

Answers

Answer:

Rights and Responsibilities

Explanation:

4. How do the words describing nature in
lines 12-14 contribute to the tone of the passage?


Answers

Can you add the passage ?


similarities between incremental and
prototyping models of SDLC

Answers

Prototype Model is a software development life cycle model which is used when the client is not known completely about how the end outcome should be and its requirements.

Incremental Model is a model of software consequence where the product is, analyzed, developed, implemented and tested incrementally until the development is finished.

What is incremental model in SDLC?

The incremental Model is a process of software development where conditions are divided into multiple standalone modules of the software development cycle. In this model, each module goes through the conditions, design, implementation and testing phases.

The spiral model is equivalent to the incremental model, with more emphasis placed on risk analysis. The spiral model has four stages: Planning, Risk Analysis, Engineering, and Evaluation. A software project frequently passes through these phases in iterations

To learn more about Prototype Model , refer

https://brainly.com/question/7509258

#SPJ9

What is the difference between a ROM chip and a RAM chip?
A. A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.
B. A ROM chip is volatile and will wipe its data in the case of a power failure. A RAM chip is non-volatile and will keep its data in the case of a power failure.
C. A ROM chip stores temporary data. A RAM chip stores permanent data.
D. A ROM chip stores permanent data. A RAM chip stores temporary data.

Answers

Answer:

A: A ROM chip is non-volatile and will keep its data in the case of a power failure. A RAM chip is volatile and will wipe its data in the case of a power failure.

Explanation:

ROM chips were widely used at the time of the old consoles, because with it you had an extremely fast and non-volatile memory, but this technology is very expensive and started to use CDs in the Consoles, while the RAM memory is a memory of execution random (RAM = RANDOM ACESS MEMORY).

Other Questions
The tendency for people to see their environment only as it affects them and as it is consistent with their expectations is known as __________ Group of answer choices Why is sampling without replacement acceptable with a large population?When a small sample is taken from a large population, the samples maintain their independence.When a large sample is take from a large population, the sample retains the characteristics of the original distribution.When a sample without replacement is taken, there is no requirement to maintain the same sample size.When a sample without replacement is taken, the samples will have the appropriate amount of data. What do digital artists add to films with actors? O nothing O make up O costumes O set design Two siblings live in a two-story house with a heating and cooling unit for each floor. The two have decided to conduct an experiment to determine the need to turn both units on throughout the daytime during the winter to stay warm. They decided to use both units for two weeks and recorded their observations. The following two weeks, they only used the downstairs unit and recorded their observations.Every day they charted whether upstairs and downstairs were either too cold, cold, warm, too warm, or hot. They tallied their results, learning that the two weeks of using both units; the house was a bit too warm. The month where only the downstairs unit was used, they noted downstairs and upstairs were warm. This did not support their prediction that it would be cold.They began to wonder how upstairs could still be warm during the daytime when only using the downstairs unit. What is the best possible explanation for upstairs being warm throughout the winter month when they only turned on the downstairs unit? 1) Juan purchased 3.4 pounds of nails at a cost of $4.50 per pound. Whatwas the cost of the nails? * A class gave a total of 186 kg of rice donated to 12 community pantries How many kg of rice did each community pantry receive? SHOW WORK FOR BRAINLIST DUE TODAY Which stage of the software development life cycle is the software is put into production to be sold to consumers?. what do we call the process of categorizing, differentiating, and attributing a particular racial character to a person or group of people? Imagine you had to sort all of the living things on earth into groups. How would you sort them? 7 penguins for $188.88 ________ each A property title search firm is contemplating using online software to increase its search productivity. currently an average of 50 minutes is needed to do a title search. The researcher cost is $4.00 per minute. Clients are charged a fee of $400. There is a software that would reduce the average search time by 15 minutes, at a cost of $3.5 per search. Calculate the change in productivity, in terms of revenue per dollar of input, if the firm uses the software. (omit the $ sign in your response and answer with two decimal points.) If the growth rate was 8 percent, enter that as ".08" and not " 8% ". That is, do not multiply the value by 100 . Enter a negative sign if required. Jack cleans windows for extra income. He charges $3.00 for a main floor window and $5.00 for a second-story window. How much will he earn if he cleans a house with 7 main floor windows and 6 second-story windows? Juett Company produces a single product. The cost of producing and selling a single unit of this product at the company's normal activity level of 70,000 units per month is as follows: Direct materials $29.60 Direct labour 5.80 Variable manufacturing overhead 2.50 Fixed manufacturing overhead 17.20 Variable selling & administrative expense 1.80 Fixed selling & administrative expense 6.70 The normal selling price of the product is $72.90 per unit. An order has been received from an overseas customer for 2,000 units to be delivered this month at a special discounted price. This order would have no effect on the company's normal sales and would not change the total amount of the company's fixed costs. The variable selling and administrative expense would be $1.10 less per unit on this order than on normal sales. Suppose the company is already operating at capacity when the special order is received from the overseas customer. What would be the total opportunity cost of taking on the special order delivered to the overseas customer? The scientists were right about the time the algae bloom would take place.Rewrite this sentence using more precise technical language. Mr Victor had 100 computes for sale. He sold w computers in the moming and (2w+3) computers in the afternoon. He had 7 computers left. How many computers did he sell in the morning? Select at least two digital communication strategies you can control to protect yourself. Explain why you chose them and how they can safeguard you if you feel like someone is trying to cause you harm. Can somebody help me as soon as possible Read these lines from the poem "The Black Snake" by Patricia Hubbell.Black snake! Black snake!Curving down the lawn,Glides like a waveWith its silver gone.What is the meaning of the imagery in these lines?The snake is trying to find its way back to the ocean.The snake moves as seamlessly and effortlessly as the ocean.The snake is as elusive and unpredictable as catching a fish.The snake is a creature of the water. PLEASE PLEASE ANSWER A college is building a new basketball court that is 88 feet long and 40 feet wide, but the wood for the court comes only in 8-meter planks that are 10 centimeters wide. How many planks are needed to surface the court?