Write a loop to draw the shape below using g.fillOval().

Answers

Answer 1

According to the question, a loop to draw the shape below using g.fillOval() are given below:

What is loop?

Loop is a control flow statement used in programming languages to execute a set of commands repeatedly. It is used to iterate through a list of objects or values, such as in a for loop, to execute a set of instructions for each value in the list. It can also be used to iterate through a range of numbers, such as in a while loop, or to repeat a set of instructions until a certain condition is met, such as in a do-while loop. Loops are a powerful tool for repetitive tasks, allowing a programmer to easily repeat a set of instructions without having to write them out multiple times. They also allow for efficient use of resources, as a loop can be set to run for a set number of times or until a certain condition is met.

for (int i = 0; i < 8; i++) {

   int x = 50 + i*50;

   int y = 50 + i*50;

   g.fillOval(x, y, 50, 50);

}

To learn more about loop

https://brainly.com/question/19706610

#SPJ1


Related Questions

Name two types of software you install to protect your computer from malware

Answers

Answer:

Antivirus software - like Norton, Kaspersky

Explanation:

The best way to guard against malware is to install antivirus software, such as Bitdefender, Norton, or Kaspersky. Antivirus software helps to prevent malware from being installed, and it can also remove malware from your computer.

Answer
1.Antivirus
2. Firewalls

Yael would like to pursue a career where she helps design office spaces that are comfortable and help workers avoid injuries. What should she study? plsss help me with this question.

A. ergonomics

B. semantics

C. botany

D. genomics

Answers

The option that that  Yael should study is A. Ergonomics.

What is the study about?

Ergonomics is the scientific study of designing products, systems, and environments to optimize human comfort and health, including the design of office spaces.

Therefore, Yael could study ergonomics to gain the skills and knowledge necessary to design office spaces that are safe, efficient, and comfortable for workers. An ergonomist might work with architects, interior designers, and other professionals to ensure that the design of an office space takes into account the needs of the workers who will be using it.

Learn more about injuries from

https://brainly.com/question/19573072

#SPJ1

Addressing data privacy is a portion of which part of your internal processes?.

Answers

The portion of a part of internal processes that addresses data privacy is: data hygiene.

What is Data Hygiene?

Data hygiene, which is also referred to as data cleaning, is an internal process that is run to detect and correct records that are inaccurate or corrupt and also identify incomplete or irrelevant parts of a data.

It also goes further in replacing, deleting, or modifying the coarse data. All these internal processes are data hygiene that addresses data privacy.

Therefore, the portion of a part of internal processes that addresses data privacy is: data hygiene.

Learn more about data hygiene on:

https://brainly.com/question/25099213

(Maximum 400 words) Describe how this period of Coronavirus (COVID-19) will influence and affect the STEM (Science, Technology, Engineering, and Mathematics) fields.

Answers

The period of coronavirus will have both negative and positive impacts on STEM fields.

However, the STEM (Science, Technology, Engineering, and Mathematics) fields have shown significant changes and impacts.

Here is how this period of COVID-19 will affect the STEM fields.

1. Technology

The current situation has increased the use of technology in various fields. Remote work and online meetings are becoming more popular, and this has led to increased technology usage. Technological advancements are expected in the future, leading to new business models that are more efficient.

2. Biomedical research

The COVID-19 pandemic has sparked the need for more biomedical research and led to an increase in research funding. Scientists are researching vaccines, treatments, and diagnostic tools, which is expected to lead to a better understanding of viruses and other infectious diseases.

3. Education

The pandemic has affected the education system globally, with many institutions closing and students learning from home. Teachers and educators are now incorporating technology in teaching, and the pandemic has accelerated the adoption of e-learning platforms. This has led to the development of new ways to learn and teach, and new online learning platforms are expected to emerge in the future.

4. Engineering

The pandemic has led to an increase in demand for essential supplies such as ventilators, personal protective equipment (PPE), and other medical devices. This has led to the development of new designs and manufacturing processes that are more efficient. The need for innovation has also led to the development of new solutions, such as 3D printing of medical supplies.

5. Mathematics

Mathematical models are used to understand the transmission of diseases, and the COVID-19 pandemic has led to the development of new models to understand the spread of the virus. These models help policymakers and public health officials make decisions to control the pandemic.

In conclusion, the COVID-19 pandemic has impacted STEM fields significantly, leading to new developments and innovations. With increased technology adoption, biomedical research, e-learning platforms, and engineering, the STEM fields are expected to change and adapt to the new normal. It is crucial to keep up with these changes and find ways to take advantage of the opportunities presented by the pandemic.

learn more about STEM fields here:

https://brainly.com/question/30082530

#SPJ11

Which functions are part of the array module? Select 2 options. Assume you have already entered these lines of code.

import array
arr = array.array('b',[5, 1, 2, 7, 6])

arr.index(3)

arr.sort()

arr.find(3)

arr.search(3)

arr.append(3)

Answers

Answer:

arr.index(3)

arr.append(3)

Edge2020

Answer:

arr.index(3)

arr.append(3)

Explanation:

hope you get 100%

consider the following diagram. which of the following best describes how the relationship between sales orders and products will be implemented in the resulting database? multiple choice the quantity ordered field will be included as a foreign key in the products table. the sales order id will be included as a foreign key in the products table. the product id will be included as a foreign key in the sales orders table. a new table will be created that contains both sales order id and product id as its composite primary key.

Answers

The correct answer is: "A new table will be created that contains both sales order id and product id as its composite primary key." To implement this relationship in a relational database.

The relationship between sales orders and products is many-to-many, as one sales order can contain multiple products, and one product can appear in multiple sales orders. To implement this relationship in a relational database, a new table is required to act as a bridge between the two tables. This table is commonly referred to as a junction table, linking the sales orders table and the products table through their respective primary keys (sales order id and product id) as a composite primary key. The junction table will also contain any additional fields that pertain to the relationship between sales orders and products, such as the quantity ordered. Therefore, option D is the best description of how the relationship between sales orders and products will be implemented in the resulting database.

learn more about database here:

https://brainly.com/question/30634903

#SPJ11

Moses wants to update the interface of a router. He plans on having a check on the current running configuration file and then wants to copy the running configuration file to the startup configuration file. Analyze which CLI mode Moses must use in this scenario.

Answers

The CLI mode that Moses must use in this scenario is to Use the EXEC mode to apply the changes.

What is the EXEC mode?

The user EXEC mode is known to be the first startup mode as it helps to start router configuration session.

Note that The CLI mode that Moses must use in this scenario is to Use the EXEC mode to apply the changes.

See options below

Analyze which CLI mode Moses must use in this scenario.

a.

Use the interface configuration mode to apply the changes

b.

Use the privileged EXEC mode to apply the changes

c.

Use the EXEC mode to apply the changes

d.

Use the global configuration mode to apply the changes

Learn more about CLI from

https://brainly.com/question/25480553

#SPJ1

What is the answer I will give brainliest

What is the answer I will give brainliest

Answers

The answer is 24kQr3

Give 2 example of application software and three advantages and disadvantages

Answers

The concurrent model in the software engineering has been defines the series of the events that will trigger the transition from the state to state for each of the software engineering activities.

What is the use of concurrent model?

The concurrent model has been used for the development of the client server applications. The advantages of this model are the following has that it has easy to the implement, the server TCP/IP logic has the simple and one listener has shared by many TPs.

The drawbacks of the model is that it increased the network overhead and delays due to the requirement of the TRM exchange and more CPU and resource intensive than is the Iterative model.

Therefore,The concurrent model in the software engineering has been defines the series of the events that will trigger the transition from the state to state for each of the software engineering activities.

Learn more about concurrent model on:

https://brainly.com/question/4237375

#SPJ1

an engineer learns a new security threat mitigation technique. the technique maps an ip address to a non-existent host, and is useful in stopping denial of service attacks. traffic heading to these ips can be captured for analysis or discarded. considering the available techniques, which might the engineer try to use? (select all that apply.)

Answers

A black hole in network architecture discards traffic without informing the source and before it reaches its final destination.

Using traffic routed to an IP address that an administrator mistakenly assigned to an invalid host as an example The two terms "sinkhole" and "black hole" are frequently used interchangeably. However, with sink holing, an admin typically still has some control over how to examine and forward the traffic that was collected. A software program known as a "packet sniffer" can be used to capture all network packets that are sent over a specific collision domain by using a network adapter card in promiscuous mode, which transmits all packets received on the physical network cable to an application for processing.

Learn more about network here-

https://brainly.com/question/15088389

#SPJ4

why womt this code work????

Answers

Answer: There is no code to look at.

Explanation:

Please comment your code.

Compute the determinant by cofactor expansion. At each step, choose a row or column that involves the least amount of computation. 300 4 483-7 20 200 521 7 (Simplify your answer.) COORD 300 4 483-7 200 0 521

Answers

The determinant of the given matrix can be computed using cofactor expansion, choosing the row or column with the least computation at each step.

How can the determinant be computed using cofactor expansion with minimal computation?

To compute the determinant using cofactor expansion, we choose the row or column that involves the least amount of computation at each step. In this case, we can choose the second column since it has the most zeros, simplifying the calculations.

We expand along the second column by multiplying each element by its cofactor and then summing the results.

This process continues recursively until we reach a 2x2 matrix, where the determinant can be easily computed. By choosing rows or columns strategically, we can minimize the number of computations required, making the process more efficient.

Learn more about cofactor expansion

brainly.com/question/31669107

#SPJ11

c = 7

while (c > 0):
  print(c)
  c = c - 3

Answers

The three of the following will be printed c = 7, while (c > 0):, print(c), c = c - 3 are 0, 1, 7. The correct options are a, b, and g.

What is the output?

Input and output are terms used to describe the interaction between a computer program and its user. Input refers to the user providing something to the program, whereas output refers to the program providing something to the user.

I/O is the communication between an information processing system, such as a computer, and the outside world, which could be a human or another information processing system.

Given: c = 7 while(c > 0): print(c) c = c-3 In the first iteration: 7 is printed after that c becomes 4 Now 4 is greater than 0.

Therefore, the correct options are a. 0 b. 1 and g. 7.

To learn more about output, visit here:

https://brainly.com/question/14582477

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Which three of the following will be printed?

c = 7

while (c > 0):

  print(c)

  c = c - 3

Group of answer choices

0

1

3

4

5

6

7

choose if you want to keep signing in with your face or fingerprint

Answers

Answer: Fingerprint

Explanation: Facial recognition is more convenient however there are some instances that fingerprint is more reliable. Facial recognition cannot detect a face with makeup on or you're wearing glasses unless you had that during the registration. And, your face cannot be recognized in dim areas as well.

computers can store huge amount of data permanently. true or false

Answers

Answer: This is False
Explanation:

The security field will be needed through an organization's life.

a. True
b. False

Answers

True that will always be needed in the security filed

when you reply to an email message, attachments are returned to the sender along with your response. question 10 options: true false

Answers

The statement "when you reply to an email message, attachments are returned to the sender along with your response" is false because attachments are not always returned to the sender when you reply to an email message.

If you select "Reply," typically only the body of the original message will be included in your response, and any attachments that were included with the original message will not be included in your response.

However, if you select "Reply All" and the original message included attachments, those attachments may be included in your response to all recipients of the original message.

Therefore, whether or not attachments are included in your response to an email message depends on how you choose to reply, and it's important to be mindful of attachments when replying to messages.

Learn more about email message https://brainly.com/question/14404792

#SPJ11

Which of the following is NOT a method for applying the SDLC model?
ITIL
Lean
IPO
Agile

Answers

Answer:

IPO is not a mehod for applying the SDLC .

Eclipse Holdings (Eclipse) supplies encrypted portable data storage devices, using newly developed technology, across the European region. Following regulatory approval, the most recent device released to the market by Eclipse, the B65, has been selling extremely well over the last three months. The device has primarily been purchased by large organisations across Europe in response to new legislation requiring encryption of data on all portable storage devices. Eclipse’s quality department, when performing its most recent checks, has identified a potentially serious design flaw in terms of protecting data on these devices.

What is the primary risk category that Eclipse would be most concerned about?
a.Reputational.
b.Legal/Regulatory.
c.Financial.
d.Strategic.
e.Operational.

Answers

B). Legal/Regulatory. is the correct option. The primary risk category that Eclipse would be most concerned about is: Legal/Regulatory. Eclipse Holdings (Eclipse) supplies encrypted portable data storage devices, using newly developed technology, across the European region.

Following regulatory approval, the most recent device released to the market by Eclipse, the B65, has been selling extremely well over the last three months.The device has primarily been purchased by large organizations across Europe in response to new legislation requiring encryption of data on all portable storage devices.

Data breaches are taken seriously by regulatory authorities and can result in fines and penalties.Consequently, if Eclipse doesn't comply with legal and regulatory requirements, the company's reputation and finances could be harmed. As a result, Eclipse Holdings (Eclipse) would be most concerned about Legal/Regulatory risk category.

To know more about Eclipse visit:
brainly.com/question/29770174

#SPJ11

ffour features of assembler ​

Answers

A program that translates assembly language into machine code is known as an assembler.

Which are the basic features of assembler?It transforms the fundamental commands and operations from assembly code into binary code that a particular kind of processor can understand.Compilers produce executable code, just like assemblers do.Key characteristics of the assembler for ARM and Thumb code, Unified Assembly Language (UAL).ARM and Thumb code NEON Single Instruction Multiple Data (SIMD) instructions.Instructions for Vector Floating Point (VFP) in ARM and Thumb programs.Code assembly instructions for the PXA270 processor using wireless MMX technology.The following list of assembly language characteristics is provided:It allows the use of mnemonic operation codes rather than numerical ones and provides details about any code mistakes.The machine address of the symbolic operand is not required because this language makes it easier to specify it.

To learn more about assembler refer

https://brainly.com/question/13171889

#SPJ9

What symbol must be used at the end of an if statement?
:
.
#

Answers

Answer:

period thats the answer .

Explanation:

2nd one

the answer is d i think

What do you like least about coding in python?​

Answers

Something I dislike is it emphatically controverts decades of programming experience with its syntax.

Complete the sentence.

It is important that both IT professionals and governments always keep _________ in mind for emerging technologies.

Options
1. Artificial intelligence
2. Intellectual property rights
3. Ethical principles

Most only pick one

Answers

Answer:

It is important that both IT professionals and governments always keep Intellectual property rights in mind for emerging technologies.

Explanation:

sorry if im wrong

The complete sentence is:  It is important that both IT professionals and governments always keep Intellectual property rights in mind for emerging technologies. The correct option is 2.

What is Intellectual property?

Intellectual property is those properties that are unique and created by humans. These properties have the copyright of that people so that other people will not steal the work and if they want the work, they have to pay for it.

Some intellectual properties are patents, copyrights, trademarks, and trade secrets. These are the arts, discoveries, technologies, and literature. Government should take care of these people and properties at the time of emerging technologies.

Thus, the correct option is 2. Intellectual property rights.

To learn more about Intellectual property, refer to the link:

https://brainly.com/question/18650136

#SPJ5

Write an LMC program as follows instructions:
A) User to input a number (n)
B) Already store a number 113
C) Output number 113 in n times such as n=2, show 113
113.
D) add a comment with a details exp

Answers

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

The LMC program can be written as follows:

sql

Copy code

INP

STA 113

INP

LDA 113

OUT

SUB ONE

BRP LOOP

HLT

ONE DAT 1

Explanation:

A) The "INP" instruction is used to take input from the user and store it in the accumulator.

B) The "STA" instruction is used to store the number 113 in memory location 113.

C) The "INP" instruction is used to take input from the user again.

D) The "LDA" instruction loads the value from memory location 113 into the accumulator.

E) The "OUT" instruction outputs the value in the accumulator.

F) The "SUB" instruction subtracts 1 from the value in the accumulator.

G) The "BRP" instruction branches back to the "LOOP" label if the result of the subtraction is positive or zero.

H) The "HLT" instruction halts the program.

I) The "ONE" instruction defines a data value of 1.

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

To know more about LMC program visit :

https://brainly.com/question/14532071

#SPJ11

I have no errors in the code but for some reason it doesn't work... what i'm missing?

I have no errors in the code but for some reason it doesn't work... what i'm missing?

Answers

The JavaScript code that you have written is one that tends to retrieves data from a table that is called "Busiest Airports" . The corrected code is given below.

What is the getColumn code about?

In regards to the given code that was corrected, the user input is one that can be obtained from the text input element with the use of the ID "yearInputBox" via the act of getText function as well as been saved in a variable named inputYear.

Therefore, when there is a match that is found, the output is said to be made by the use of the corresponding elements that is obtained from the year, as well as country, and that of airport arrays, and later on set to the "outputBox" element via the use of the setText function.

Learn more about code from

https://brainly.com/question/26134656

#SPJ1

See text below



1

var year getColumn("Busiest Airports", "Year");

var country = getColumn ("Busiest Airports", "Country");

var airport = getColumn("Busiest Airports", "Airport");

onEvent("goButton", "click", function() {

/*call the "calculateOutput" function here,

*passing in the user input as a paremeter 10 */

calculateOutput (getText("year InputBox"));

function calculateOutput (years){

var output="";

for (var i = 0; i < year.length; i++) { /*write the list element being accessed*/ if (years[i] == "inputYear"){ output "In "

=

+ year + "the busiest airport was

11

+ country + "

in "airport[i];

21

}

}

setText("outputBox", output );

}

I have no errors in the code but for some reason it doesn't work... what i'm missing?

Fill in the blank with the correct term.
A _____ sort starts by comparing the first item in the list to the remaining items, and swaps where the first item is greater than the later item.
Then it compares the second item in the list to the rest.
This continues until it compares the second last item to the last item.

Answers

Its bubble sort!!! Thats my final answer! Youre welcome

Jodi is travelling to sam fransisco for a conference. she has stored her powerpoint slides on microsofts web app

Answers

Answer:

Okay? Wheres the question?

Explanation:

A nested "if" statement only executes if the "if" statement in which it is nested evaluates to True. True False

Answers

The given statement "a nested "if" statement only has an impact if the "if" statement it is contained within evaluates to True" is TRUE.

What is a nested "if" statement?

The use of nested IF functions, or one IF function inside another, increases the number of outcomes that may be tested and allows for the testing of numerous criteria.

Based on their performance, we wish to assign each student a grade.

Return an A if Bob's score in B2 is greater than or equal to 90.

Only if the "if" statement in which it is nested evaluates to True does a nested "if" statement take effect.

The OR function allows you to test many conditions in each IF function's logical test and returns TRUE if any (at least one) of the OR arguments evaluates to TRUE.

Therefore, the given statement "a nested "if" statement only has an impact if the "if" statement it is contained within evaluates to True" is TRUE.

Know more about the nested "if" statement here:

https://brainly.com/question/14915121

#SPJ4

Please write legibly or type. Show your nork to the extent possible.
1. Translate the high-level language code below into assembly instructions. The variables A, B, C, D, E and F are located in the memory and can be accessed by their label (e.g.. LOAD RI, A will load A from the memory into R1). Minimize the number of instructions in the assembly code that you write.
$$
F=(A+B)^*(C-D)(E-D)
$$
a) Write the code for an accumulator architecture
b) Write the code for a stack architecture. Assume that the division (subtraction) operation divides (subtracts) the topmost value in the stack by the second topmost value.
c) Write the code for a register-memory architecture
d) Write the code for a load-store architecture
e) Compare and count the number of instructions and memory accesses between the differem ISAs in the previous parts of the questions $({a}, {b}, {c}$ and ${d})$.

Answers

The translation of the high-level language code below into assembly instructions is given below:

The high-level language translation

a) Accumulator Architecture:

LOAD A

ADD B

STORE TEMP1

LOAD C

SUB D

STORE TEMP2

LOAD E

SUB D

MUL TEMP2

STORE TEMP3

LOAD TEMP1

MUL TEMP3

STORE F

b) Stack Architecture:

PUSH A

PUSH B

ADD

PUSH C

PUSH D

SUB

PUSH E

PUSH D

SUB

MUL

MUL

POP F

c) Register-Memory Architecture:

LOAD R1, A

ADD R1, B

LOAD R2, C

SUB R2, D

LOAD R3, E

SUB R3, D

MUL R2, R2, R3

MUL R1, R1, R2

STORE F, R1

d) Load-Store Architecture:

LOAD R1, A

LOAD R2, B

ADD R3, R1, R2

LOAD R4, C

LOAD R5, D

SUB R6, R4, R5

LOAD R7, E

SUB R8, R7, R5

MUL R9, R6, R8

MUL R10, R3, R9

STORE F, R10

e) Comparison:

Accumulator: 13 instructions, 10 memory accesses.

Stack: 12 instructions, 6 memory accesses.

Register-Memory: 9 instructions, 6 memory accesses.

Load-Store: 11 instructions, 8 memory accesses.

Stack and Register-Memory architectures are more concise in this example, with Register-Memory having the fewest instructions.


Read more about computer architectures here:

https://brainly.com/question/30454471

#SPJ4

Your boss has approved your project team’s recommendations to increase productivity (select a specific organization that is applicable to you, if desired). Many of your recommendations will result in significant change to the organization. You have been tasked to lead the change effort.



As part of your plan you want to build momentum by generating short-term wins. What is not a characteristic of a short-term win?

Answers

Answer:

A. Visible to senior leadership, but not lower levels of the organization.

Explanation:

John Kotter explained that short-term wins are clear, real, unambiguous, tangible, and visible to all. Short-term wins involve goals that do not take a long time before they are completed and this makes the results clearly seen by all.

So when I plan to build momentum by generating short-term wins, the results should be visible to all in the organization and not just to senior leadership.

Other Questions
which of the following is most like the ability to appreciate art as it is described in the passage? The Moon has almost no atmosphere, whereas the Earth has a thick atmosphere. Earth's atmosphere traps heat to make the surface temperature range narrower than it otherwise would be. The atmosphere also causes the Earth to have weather. The Moon has a surface temperature range than Earth, and thunderstorms occur on the Moon. Which action by President Franklin D. Roosevelt most increased the powers of the executive branch? PLEASE HELP ME ITS DUE IN 10 MINUTES I WILL MARK BRAINLIEST !!!!Select the procedure that can be used to show the converse of thePythagorean theorem using side lengths chosen from 6 cm, 8 cm, 10 cm, and12 cm.O A. Knowing that 62 +102 + 122, draw the 6 cm side and the 10 cmside with a right angle between them. The 12 cm side will fit toform a right triangle.B. Knowing that 82 + 102 > 122 draw the 8 cm side and the 10 cmside with a right angle between them. The 12 cm side will fit toform a right triangle.O C. Knowing that 62 + 82 = 102, draw the 6 cm side and the 8 cm sidewith a right angle between them. The 10 cm side will fit to form aright triangle.D. Knowing that 62 +82 = 102, draw any two of the sides with a rightangle between them. The third side will fit to form a right triangle. the motion of a piston in an auto engine is simple harmonic. if the piston travels back and forth (side to side) over a distance of 12 cm, and the piston has a mass of 1.5 kg, what is the maximum speed of the piston and the maximum force acting on the piston when the engine is running at 3 800 rpm? want 100 POINTS AND BRAINIST ANSWER THS Q AND ITS TIMED SO PLZ HELP ITS L ARTSWhat do the bold words in this sentence show about the writer's opinion?Learning to cook is not difficult; in fact, it is fairly simple if you know how to read a recipe.The writer thinks that people should learn to cook because it's easy.The writer believes that everyone knows how to cook.The writer does not think that knowing how to cook is very important.The writer wants to learn to cook.What does your point of view add to your research project?It helps people see you as more reliable.It makes people want to learn more about your topic.It makes your opinions more believable.All of these are true.What is an analysis statement?a statement that expresses an opinion about information or texta statement that uses a statistic to make a pointa statement that expresses a fact found in research notes a triangle undergoes a dilation with a scale factor of 9/5. the resulting triangle is _[blank]_ the original triangle. How to find the volume of a trapezoidal prism calculator?. According to Passage A, while the brothers were scorned and discredited publicly (line 69), as mentioned in Passage B, they were indeed skilled inventors because: which of these is a similarity between early Indus river valley and early Chinese ci ( shang) civialations Please help!!!! Thank you What did all dictators have in common leading up to world war 2?How did the lend lease act serve as a preaches or to the United States entering world war 2?Was the bombing of Pearl Harbor inevitable? Do you think it could been prevented? The height, h, in feet of a piece of cloth tied to a waterwheel in relation to sea level as a function of time, t, in seconds can be modeled by the equation h = 15 cosine (StartFraction pi Over 20 EndFraction t). How long does it take for the waterwheel to complete one turn? 5 seconds 10 seconds 20 seconds 40 seconds. Name the group of freshwater lakes along the border of Canada and the United States.A. The Great Salt LakesB. The Great LakesC. The Glacial LakesD. The Finger Lakes Draw Conclusions Suppose that A and C are real numbers and A is not 0. What are the x- and y-intercepts of the equation Ay = C? Explain. Why are auditors only assuring financial statements and provideaudit opinion in all material aspects instead of all aspects T/F. inner and outer classes do not have access to each others instance variables and methods. suppose miss roxanne davenport is 25 years old right now and puts away $1,800 per quarter in an account that returns 6% interest. a. [4 pts] how much will be in the account when she turns 65? Solve -5 = 3x - 14.X=__ Which two statements are true about the wave shown? A. The wave could be transmitting light. B. The wave is a transverse wave. C. The wave is a mechanical wave. D. The wave could be transmitting sound. You buy vegan shredded cheese in 5lb bags. Your recipe for burritos requires 3 ounces of vegan cheese per serving. How many servings can you make per 5lb bag