Your friend just came back from a weekend hike and they excitedly gave you a Python list of birds they saw on their trip. Unfortunately, they were not careful about their notes, having things such as "sparrow" and "SPARROW" written down originally. They want you to write a function which takes this disorganized list of bird names as an input and returns just a list of the unique bird species they saw. Please make all the strings lower case.

Answers

Answer 1

The Python function `get_unique_birds` takes a disorganized list of bird names as input, converts them to lowercase, and returns a list of unique bird species.

Sure! Here's a Python function that takes a disorganized list of bird names, converts them to lowercase, and returns a list of unique bird species:

```python

def get_unique_birds(bird_list):

   unique_birds = set()

   for bird in bird_list:

       unique_birds.add(bird.lower())

   return list(unique_birds)

```

- The function `get_unique_birds` takes `bird_list` as an input parameter, which represents the disorganized list of bird names.

- `unique_birds` is initialized as an empty set to store the unique bird species.

- The function iterates through each bird name in `bird_list`.

- `bird.lower()` is used to convert the bird name to lowercase.

- The lowercase bird name is added to the `unique_birds` set using the `add` method. This ensures that only unique bird species are stored in the set.

- Finally, the function converts the `unique_birds` set back to a list using the `list` function and returns it.

You can use the function like this:

```python

bird_list = ["sparrow", "Sparrow", "eagle", "Eagle", "Pigeon", "pigeon"]

unique_birds = get_unique_birds(bird_list)

print(unique_birds)

```

Output:

```

['eagle', 'sparrow', 'pigeon']

```

In the example above, the input list `bird_list` contains duplicate bird names with different cases. The `get_unique_birds` function converts all the names to lowercase and returns a list of unique bird species.

Learn more about Python here: brainly.com/question/30391554

#SPJ11


Related Questions

Choose the correct option that completes the sentence.
Individuals are taught how to avoid falling prey to cybercriminals through

Good practice continuity

network security

cybercrime education

end-user education

Answers

Answer: end-user education

Explanation: Correct on Edg 2021.

Individuals are taught how to avoid falling prey to cybercriminals through: D. end-user education.

What is cybersecurity?

Cybersecurity refers to a preventive practice that involves providing end-user education to users and business organizations, so as to protect their computers, networks, software programs, servers and sensitive data from potential attack, theft, damage, or unauthorized access (usage) by cybercriminals.

This ultimately implies that, end-user education is a strategic process that is used to teach individuals and business organizations how to avoid falling prey to cybercriminals.

Read more on cybersecurity here: https://brainly.com/question/14286078

You can use the ____ to change the order of the wat windows are stacked.

A). taskbar
B). Open bar
C). toolbar
D). Menu bar

Answers

Answer:

A

Explanation:

Q2-2) Answer the following two questions for the code given below: public class Square { public static void Main() { int num; string inputString: Console.WriteLine("Enter an integer"); inputString = C

Answers

The code given below is a basic C# program. This program takes an input integer from the user and computes its square. The program then outputs the result. There are two questions we need to answer about this program.

Question 1: What is the purpose of the program?The purpose of the program is to take an input integer from the user, compute its square, and output the result.

Question 2: What is the output of the program for the input 5?To find the output of the program for the input 5, we need to run the program and enter the input value. When we do this, the program computes the square of the input value and outputs the result. Here is what the output looks like:Enter an integer5The square of 5 is 25Therefore, the output of the program for the input 5 is "The square of 5 is 25".The code is given below:public class Square {public static void Main() {int num;string inputString;Console.WriteLine("Enter an integer");inputString = Console.ReadLine();num = Int32.Parse(inputString);Console.WriteLine("The square of " + num + " is " + (num * num));}}

To know more about output  visit:

https://brainly.com/question/14227929

#SPJ11

write an e-mail to your parents/guardian(s) to explain how data and data management are likely to evolve over the next 10 years.

Answers

Dear Mom/Dad/Guardian,Hope you are doing well. Today, I am writing to explain how data and data management are likely to evolve over the next 10 years. Data is a term that refers to the raw, unprocessed facts, figures, and statistics that are generated in large amounts by organizations or individuals.

The management of data refers to the process of collecting, storing, processing, and analyzing this data to gain insights, make decisions, and achieve specific objectives.Nowadays, data is an essential resource for organizations in all industries. Therefore, managing data is critical for businesses to remain competitive and relevant in the market. Over the next ten years, data is expected to evolve in many ways. For instance, data is likely to become more complex and voluminous, which will require more sophisticated tools and technologies to manage it effectively.

Moreover, data is likely to become more diverse in terms of its sources, formats, and structures, which will make it more challenging to integrate and analyze.In addition, there is likely to be a significant shift towards real-time data management, which will require businesses to process and analyze data in real-time to respond to changing market conditions. Furthermore, there is likely to be an increase in the use of artificial intelligence and machine learning to automate data management processes, including data integration, cleansing, and analysis.Overall, data and data management are likely to evolve significantly over the next 10 years, and it will be crucial for individuals and organizations to adapt to these changes to remain relevant and competitive in their respective fields.I hope this explanation provides you with a good understanding of how data and data management are expected to evolve over the next decade.Thank you and Best Regards,Your name

TO know more about that management visit:

https://brainly.com/question/32216947

#SPJ11

Alvin has created a non-extensive site map of all the commonly visited pages of his website. What is such a site map called?

А. XML site map

B. simple site map

C. standard site map

D. HTML site map

E. advanced site map

Answers

Answer:

А. XML site map

Explanation:

Indeed, the XML site map is the modern term used to describe a non-extensive site map containing details such as the commonly visited pages of a website.

Alvin's XML site map would allow search engines to have a  record of commonly visited pages of his website.

scan the reading selection. questions scan for cognates and list a few of them. based on the cognates you found, what do you think this document is about?

Answers

Cognates are words or phrases that are basically the same in both English and Spanish. The document is based on the confirmation of details which depends on the particular context.

What are some examples of cognates?

Some examples of cognates may significantly include metro, hospital, idea, escape, lava, visa, sociable, inevitable, funeral, original, cereal, horrible, and motor.

A cognate is a word that is related in origin to another word, such as the English word brother and the German word Bruder or the English word history and the Spanish word historia. The words were derived from the same source; thus, they are cognates.

Therefore, the document is based on the confirmation of details which depends on the particular context.

To learn more about Cognates, refer to the link:

https://brainly.com/question/22565512

#SPJ1

When delivering digital technologies to clients, what is a best practice to make those solutions sustainable?

Answers

When delivering digital technologies to clients, a best practice to make those solutions sustainable is: A. Recommend the client spread out their data centers to distribute energy usage globally.

What is a computational sustainability?

Computational sustainability can be defined as a process through which societal, economic, ecological and societal resources are balanced for the future well-being of humanity, especially by developing computational models and using mathematical and information science techniques.

In this context, we can infer and logically deduce that a best practice to make solutions sustainable is recommending that client should spread out their data centers to distribute energy usage globally when delivering digital technologies to clients.

Read more on computational sustainability here: https://brainly.com/question/25719495

#SPJ1

Complete Question:

When delivering digital technologies to clients, what is a best practice to make those solutions sustainable?

A. Recommend the client spread out their data centers to distribute energy usage globally.

B. Sign non-disclosure agreements when a solution will have a negative environmental impact.

C. Incorporate sustainability into the design and build of the solution from the beginning.

D. Review the solution after building and look for ways to improve sustainability.

instructions related to i/o devices are typically privileged instructions, that is, they can be executed in kernel mode but not in user mode. give a reason why these instructions are privileged. next

Answers

Input/output (I/O) operations involve communication between the CPU and devices such as keyboards, mice, printers, and storage devices.

These operations require direct access to hardware, which can pose a security risk if not controlled properly. If an unprivileged user could execute I/O instructions, they could potentially gain unauthorized access to sensitive data or cause system malfunctions.

By making I/O instructions privileged, only the operating system kernel or other privileged software can execute them. This helps to ensure that I/O operations are performed safely and securely, and that user-level processes do not have unfettered access to system resources.

When a user-level process requires I/O access, it must make a system call to request the kernel to perform the operation on its behalf. The kernel then verifies the request and performs the operation using its privileged access to the I/O devices.

To know more about I/O devices, click here:

https://brainly.com/question/29757735

#SPJ11

when data is collected and turned into information, it is called​

Answers

Answer:

its called data processing

Explanation:

...

Explanation:

When data is collected and turned into information, it is called program .

which method is used for decommissioning a defective change and removing it from the deployment pipeline?

Answers

the deployment pipeline can be resumed, and the fix can be moved forward. This approach is ideal for ensuring that only high-quality code is released to production and that all code changes are subjected to rigorous testing and review.

 A deployment pipeline is a set of stages and automation that enables a change to be incrementally delivered from development to production with rigorous testing.  The following are the steps for decommissioning a defective change and removing it from the deployment pipeline:

Step 1: The first step in decommissioning a defective change is to identify the error.

Step 2: When an error is discovered, the deployment pipeline must be stopped to prevent the error from spreading. Step 3: When the issue has been identified, a developer must investigate it and assess whether it can be fixed.

Step 4: Once the issue has been identified and fixed, testing must be performed to ensure that the fix has resolved the issue.

To know more about deployment pipeline visit:

https://brainly.com/question/30092560

#SPJ11

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
questions.
Online Content: Site 1
What are some specific ways that businesses use the internet?

Answers

Answer:

to find a answer in brainly

Answer:

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional

questions.

Online Content: Site 1

What are some specific ways that businesses use the internet?

Choose the correct answers. The process of classifying information ......

a. Should be resulted from multidisciplinary workshops

b. is the main objective of information security

c. is a one-time activity

d. should be done on an ongoing basis

Which is not an advantage of information classification

a.Identifying critical asset

b.Promoting sound risk management

c.Ensuring the safety of human resources

d.Facilitating decision-making and helping target investments in terms of information protection

Which is not a risk treatment option?

a.Eliminating the risk

b.Mitigating the risk

c.Transferring the risk

d.Accepting the risk

e.Avoiding the risk

Answers

1. The process of classifying information should be done on an ongoing basis, and it is not a one-time activity resulting from multidisciplinary workshops or the main objective of information security.


2. Ensuring the safety of human resources is not an advantage of information classification, while identifying critical assets, promoting sound risk management, and facilitating decision-making are advantages.
3. Avoiding the risk is not a risk treatment option, but eliminating, mitigating, transferring, and accepting the risk are valid options.
1. The process of classifying information is an ongoing activity that involves categorizing information based on its sensitivity, importance, or level of confidentiality. It is not a one-time activity resulting from multidisciplinary workshops. While information security aims to protect information, classification itself is not its main objective.
2. Ensuring the safety of human resources is not an advantage of information classification. However, identifying critical assets is an advantage as it helps prioritize protection efforts, promoting sound risk management allows for effective allocation of resources, and facilitating decision-making and targeting investments in information protection enhances overall security measures.
3. Avoiding the risk is not a risk treatment option. The valid risk treatment options include eliminating the risk by removing the cause, mitigating the risk by implementing controls, transferring the risk through insurance or contracts, and accepting the risk by acknowledging and living with it within acceptable limits. Avoidance implies not engaging in activities that pose a risk, which is different from treating or managing the risk.

learn more about workshop here

https://brainly.com/question/31026752



#SPJ11

help help help

Read the list of courses from a technical school (w3schools).

Which courses would prepare for you for a career in web development?
(Choose more than one answer)

Designing for Usability
Introduction to Networks
Technical Writing
Cybersecurity

Answers

The courses that would prepare you for a career in  web development are:

Designing for UsabilityTechnical Writing

To prepare for a career in web development, the following courses from a technical school like W3Schools would be beneficial:

Designing for Usability: This course focuses on user-centered design principles and techniques, teaching you how to create web interfaces that are intuitive, user-friendly, and visually appealing. It covers topics such as user research, information architecture, wireframing, and prototyping.Technical Writing: Effective communication is crucial in web development. This course teaches you how to write clear, concise, and well-structured technical documentation. You'll learn about writing for different audiences, organizing information, using appropriate language and style, and documenting code and processes.

Taking these courses will help you develop important skills for a career in web development. Designing for Usability will enhance your ability to create user-friendly websites, while Technical Writing will improve your communication skills, enabling you to document and explain your work effectively.

Courses like Introduction to Networks and Cybersecurity may be valuable in other IT fields, but they are not directly related to web development and may not be as relevant to this specific career path.

For more such question on Designing

https://brainly.in/question/56183783

#SPJ8  

How to contact the school administrator? I have a very big problem with my school account I forgot password and Google keep saying Contact your domain admin for help so I know that I need to contact the school admin that give me the school account but the thing is she is no longer at school I contact her with her personal email help me plz

Answers

Answer: you can contct with her email or call the school

Explanation:its just wht u do

Explain the following term ( a) GUI ( b) WIMP


please give me the answer of this question

don't spam​

Answers

Explanation:

here you go mark my brainlist plzz

Explain the following term ( a) GUI ( b) WIMPplease give me the answer of this questiondon't spam
Gsjsbsjsgdbajavajabjabsusbsbbsbsbshshshs

Are the following scenarios a breach of confidentiality, integrity or availability? Explain your reasoning.



In September of 2017, Equifax announced a data breach that exposed the personal information of 147 million people. How did this exposure breach the CIA Triad?



Downloading what appears to be a legitimate app, a user installs malware which contains keylogging software. What type of breach is the downloading of malware?



An email phishing attack results in ransomware, in which the files and folders on a computer are encrypted. What type of breach is ransomware?



How do fake social media accounts breach the CIA Triad?

Answers

The Equifax data breach violated confidentiality by exposing the personal information of 147 million people. Social Security numbers and other private information were accessible to the attackers.

What are the data's confidentiality, accessibility, and integrity?

You must be assured that your data is secure against unauthorised access. Integrity – Your data must be trustworthy. Accessibility – You must have access to your data.

What constitutes a violation of integrity?

Failure to act with integrity is BREACH. For instance, if you promise to be on time for a meeting then arrive late, your tardiness is seen as a BREACH of INTEGRITY. BREAKS destroy TRUST; they render you unreliable and make you appear less important to the group.

To know  more about data visit:-

https://brainly.com/question/11941925

#SPJ1

NEED HELP LIKE RIGHT NOW PLS
John has two ATM transactions but only one of them has a fee (Interac). Why?
A. Interac is an out-of-network ATM and First Bank charges customers if they use out-of-network ATMs.

B.First Bank charges customers for using their ATMs.

C.Banks charge fees if you take out less than $100 at an ATM machine.

D.The first ATM transaction is free but all additional ATM transactions have a fee.

Answers

Answer:

c answer

Explanation:

you chose to attend a college that is known for its arts program as you would like to develop your talents further. this is an example of how group of answer choices

Answers

Choosing a college known for its arts program to develop your talents further is an example of how personal preferences impact decision-making.

An individual's personal preferences or choices can influence their decision-making process when it comes to choosing a college. It is normal for individuals to have unique interests, goals, and priorities that impact the college they choose, which is why there are various types of colleges with different programs, cultures, and environments.The decision-making process of choosing a college can be influenced by personal preferences, cultural background, financial status, location, values, and social network.

Additionally, the choice of college can influence the individual's academic performance, social life, and future career opportunities. Attending a college with an arts program can provide the person with opportunities to learn, grow, and develop their artistic talents, which can be beneficial in their future career. Such a college can help the individual achieve their career goals and build a professional network through internships, exhibitions, or collaborations with professionals in the field.

Learn more about decision-making: https://brainly.com/question/1249089

#SPJ11

What is the difference between a class and an object in Python?

Answers

Answer:   A class is a template for creating Python objects within a program, whereas the object itself is an instance of the Python class. You can think of a class as a blueprint for an object that includes the available functions and data variables.

Explanation:

A collection of data (variables) and methods (functions) that act on those variables constitutes an object. A class, similarly, is a blueprint for that object. A class can be compared to a rough sketch (prototype) of a house.

if we run the bfs code starting at dog and assume that the get connections method always iteratures through its neighbors alphabeticallly

Answers

The assumption that the get_connections method iterates through neighbors alphabetically, the BFS (Breadth-First Search) algorithm starting at "dog" would explore the nodes in a specific order.

Assuming the graph contains the following nodes and connections

graph = {    "dog": ["cat", "fox"],

   "cat": ["dog", "elephant"],

   "fox": ["dog"],

   "elephant": ["cat"]}

The BFS algorithm starting at "dog" would follow these steps:

Initialize an empty queue and an empty set to track visited nodes.

Get the connections (neighbors) of "dog" alphabetically: ["cat", "fox"].

Enqueue each unvisited neighbor into the queue ("cat", "fox") and mark them as visited.

Continue the process until the queue is empty.

The order of exploration would be: "dog" -> "cat" -> "elephant" -> "fox".

Learn more about assumption  here

https://brainly.com/question/30799033

#SPJ11

Which of the following is not a key component of a structure?
A. Name
B. Properties
C. Functions
D. Enumerations

Answers

Answer:

D i think

Explanation:

choose all that apply: what should the technicians do before replacing any suspected failed part in a no post situation?

Answers

Reinstall cables and parts. Re-run diagnostic procedures while removing specific components to pinpoint the problem.

What will you need to do after changing a Chromebook's system board?

To set VPD information and install the Chrome OS on a Chromebook after changing the system board, you must run RMA Shim. When using a Chromebook, the RMA shim tool.

What actions should a user take to protect BIOS settings prior to system recovery?

When the BIOS recovery screen appears, let go of the CTRL + ESC key on the keyboard. Press the Enter key after selecting Reset NVRAM (if available) on the BIOS Recovery screen. To save the present BIOS settings, choose Disabled and hit Enter.

To know more about cables visit:-

https://brainly.com/question/14835381

#SPJ1

Which is a best practice that can prevent viruses and other malicious code.

Answers

Computer viruses and malicious software have the ability to cause significant damage to computer systems and data. Best practices are techniques or methods that are generally accepted as effective for preventing viruses .

The following is a list of best practices that can help prevent viruses and other malicious code:1. Install Anti-Virus Software: The most important step in preventing viruses and other malicious code is to install antivirus software. Antivirus software scans all files that are opened, downloaded, or transferred from one system to another. It will detect and remove any virus or malware found.2. Keep Operating Systems and Applications Up to Date: Keep all operating systems and applications up to date by installing updates and patches as soon as they are released.

Use Strong Passwords: Strong passwords are one of the best defenses against viruses and other malicious code.4. Be Careful What You Click: Be wary of links and attachments in emails and social media messages. Only download files and click on links from trusted sources.5. Avoid Pirated Software: Pirated software is a common source of viruses and other malicious code.6. Use a Firewall: A firewall can prevent unauthorized access to your computer or network. It can also block malicious software from communicating with the Internet.7. Backup Your Data: Regular backups of important data are essential. In case of an attack, backups can be used to restore lost or corrupted data.

To know more about software visit:

https://brainly.com/question/32237513

#SPJ11

CMS delegates its daily operations of the Medicare and Medicaid programs to

Answers

CMS delegates its daily operations of the Medicare and Medicaid programs to state governments.

The Centers for Medicare & Medicaid Services (CMS) is the federal agency responsible for managing the Medicare and Medicaid programs. CMS contracts with state governments to handle daily program operations, including eligibility determinations, claims processing, and provider enrollment.

What is the Centers for Medicare & Medicaid Services (CMS)?

The Centers for Medicare & Medicaid Services (CMS) is a federal agency within the United States Department of Health and Human Services (HHS). The CMS is responsible for managing several national health programs that aim to provide affordable, high-quality health care to Americans.

These programs include:

Medicare: A health insurance program that provides coverage to seniors and people with disabilities.Medicaid: A joint federal-state program that provides health insurance to people with low income and limited resources.The Children’s Health Insurance Program (CHIP): A joint federal-state program that provides health insurance to children and families who don’t qualify for Medicaid, but who can’t afford private insurance.The Health Insurance Marketplace: A federal health insurance exchange created by the Affordable Care Act that allows individuals and small businesses to compare and purchase health insurance plans.

The CMS works to ensure that these programs are operating efficiently and effectively. It also provides guidance and support to states, healthcare providers, and other stakeholders involved in implementing these programs.

Know more about CMS here :

https://brainly.com/question/1909464

#SPJ11

What is an example of a manufactured product ?
A. A shirt purchased at a store
B. Cotton in a field
C. Wood on a sheep’s back
D. Silk made from a worm

Answers

A shirt purchased in a store

Answer:

A shirt purchased at a store

Explanation:

in which tab does the "freeze panes" command appear?

Answers

The "freeze panes" command typically appears in the "View" tab of applications like Microsoft Excel or similar spreadsheet software.

This command allows users to freeze specific rows or columns in place while scrolling through a large dataset. It is useful when working with extensive spreadsheets to keep headers or important information visible as you navigate through the data. By freezing panes, you can ensure that certain rows or columns remain fixed while the rest of the sheet scrolls. The "View" tab usually contains various display and layout options, making it a logical place to find the "freeze panes" command and manage the visual aspects of the spreadsheet.

Learn more about freeze panes here;

https://brainly.com/question/31580647

#SPJ11

what is the primary benefit of using buffers for file i/o? question 1 options: the program runs faster. the program uses less memory. all input data is kept in the file until needed. all output data is immediately written to a file. the entire file is input at once.

Answers

The primary benefit of using buffers for file input/output (I/O) is that the program can run faster.

Buffers allow the program to read or write data from or to the file in larger, more efficient chunks instead of accessing the file one character or byte at a time. This reduces the number of system calls needed to perform I/O operations and can significantly improve the program's performance.

While using buffers may also help reduce memory usage by temporarily storing data in memory rather than reading or writing directly to the file, this is not the primary benefit of using buffers.

Similarly, using buffers does not necessarily mean that all input data is kept in the file until needed, nor does it guarantee that all output data is immediately written to a file.

The size and behavior of the buffer depend on the specific implementation and configuration of the I/O operation.

Using buffers does not imply that the entire file is input at once, as the buffer may be filled and emptied in smaller chunks depending on the needs of the program.

Learn more about buffer here:

https://brainly.com/question/30174606

#SPJ11

AP CSP

The cost of a customer’s electricity bill is based on the number of units of electricity the customer uses.


For the first 25 units of electricity, the cost is $5 per unit.

For units of electricity after the first 25, the cost is $7 per unit.


Which of the following code segments correctly sets the value of the variable cost to the cost, in dollars, of using numUnits units of electricity?

AP CSPThe cost of a customers electricity bill is based on the number of units of electricity the customer

Answers

The code segment that correctly  sets the value of the variable cost to the cost, in dollars, of using numUnits units of electricity is as follows:

IF numUnits ≤ 25

Cost ← numUnits × 5.

ELSE

Cost ← 25 × 7 (numUnits -25) × 5.

Thus, the correct option for this question is D.

What is a Code segment?

A code segment may be defined as one of the parts or divisions of a program in an object file or in memory, which contains executable instructions in order to reveal some set of information in output form.

According to the context of this question, the IF and ELSE function is used in the program where IF is used when the electricity unit of a user comes to 25 or below, while ELSE is used when a user consumes more than 25 unit of electricity.

Therefore,  the correct option for this question is D.

To learn more about Code segment, refer to the link:

https://brainly.com/question/25781514

#SPJ1

What does the Flippy Do Pro show about representing very small numbers?

Answers

Answer:

it shows number that is near the target figure, but not the actual figure

Explanation:

What Flippy Do Pro reveal about representing a very small number is a number that is near the expected number in value. This is because Flippy Do Pro would not reveal some particular lesser numbers in their precise value.

However, this often results in roundoff blunder, which is mostly caused by the inability of bit compositions to depict the outcome of numbers as it should precisely be.

select all of the true statements about financial literacy.

Answers

Financial literacy refers to the ability to understand and manage personal financial matters effectively. It is essential to possess a basic level of financial literacy to make informed decisions about spending, saving, and investing.

Financial literacy is particularly vital for young adults who are beginning to establish financial independence.The following are the true statements about financial literacy:

1. Financial literacy is critical for individuals of all ages and economic backgrounds.

2. It involves the ability to understand and manage financial matters effectively.

3. Financial literacy includes the ability to create a budget and stick to it, understand credit scores, and evaluate investment options.

4. Financial literacy education should begin early in life, with basic financial concepts taught in schools.

5. Financial literacy can lead to financial stability, reduced stress, and greater financial security.

To know more about personal visit:

brainly.com/question/15576745

#SPJ11

Other Questions
What happened when John White arranged for a peace conference with the areas American Indians? The Trojan Horse was used to: ?A) fight against the antagonistB)give access to the cityC) to keep the townsmen from accessing the cityD) none of the above If polygon A is a parallelogram, and polygon B is a rectangle, which of theBfollowing is true?35WPolygon A35 Z90A90PolygonBA. Polygon A and B are parallelograms so neither can becircumscribed by a circle.90"90DOB. Polygon B represents the only parallelogram that a circle cancircumscribe because opposite angles are supplementary.C. Both polygon A and B are quadrilaterals, therefore a circle cancircumscribe either one.D. Polygon A can be circumscribed by a circle because oppositesides must be supplementary. Find the values for a, b, c, from the number line change 4-1/2 to a improper fraction please help it's for my final solve for x how to get sick with fever fast simplify (-243)^-3/5 the two distinctly different types of franchise systems are_____ franchise and______ franchise. (2x+ 2) +(3 - 5x) 4.) (3x3 - 4x4) +(2x + 5x4) anyone know?? u dont have to explain it i just need the right answer. ty!! Ocean water moves around the world's ocean basins by a combination of two processes. What are they and how are they defined? Latitudinal currents - move ocean water around ocean basins following east-west directed wind currents Longitudinal currents - move ocean water around ocean basins along north-south directed wind currents Longshore currents - upper portion of the ocean moves parallel to continental margins Abyssal circulation - deep ocean water moves across the abyssal plain in response to global wind patterns Surface currents - upper portion of the ocean is moved by friction between the water's surface and the wind Thermohaline circulation - deep ocean water moves across the bottom of ocean basins in response to differences in density created by changes in temperature and salinity Surface currents - moves water around the world's ocean basins along the seafloor in response to friction between the water's surface and the wind Thermohaline circulation - the upper portion of the world's oceans circulates in response to differences in temperature and density the table shows how much money lydia spends on her dog walker.which equation best represents the relationship? the quotient of a number and 15 plus 1 the weakening of rock due to expansion and contraction resulting from temperature changes is known as process command line args and get the simulation parameters (e.g., alg, quantum, inputfile) create/initialize the necessary data structures (ready q and io q (double linked lists of pcb), identify the reagents that can be used to achieve the following transformation: 1) conc,. h2so4, heat, 2) oso4 In 1865 a pond was surrounded by open fields today the same area is swampy and surrounded by a forest which process is responsible for this change? f(x) = x^2 - 4, X is greater/less than 0(a) Find the inverse function of f.F^-1(x) = PLEASE HELP QUICKLY ILL GIVE BRAINLIEST THANKS AND 5 STARS.