A bowl contains 20 candies; 15 are chocolate and 5 are vanilla. You select 5 at random. What is the probability that all 5 are chocolate?

Answers

Answer 1

Answer: 0.1937

Explanation:

Given : A bowl contains 20 candies; 15 are chocolate and 5 are vanilla.

If we select 5 candies, then the number of ways to select them is given by permutations.

The number of ways to select 5 candies is given by :-

[tex]^{15}P_5=\dfrac{15!}{(15-5)!}=\dfrac{15\times14\times13\times12\times11\times10!}{10!}=360360[/tex]

The number of ways of selecting any 5 candies out of 20:-

[tex]^{20}P_5=\dfrac{20!}{(20-5)!}\\\\=\dfrac{20\times19\times18\times17\times16\times15!}{15!}\\\\=1860480[/tex]

Now, the probability that all 5 are chocolate :-

[tex]=\dfrac{360360}{1860480}=0.193691950464\approx0.1937[/tex]

Hence, the probability that all 5 are chocolate =0.1937

Answer 2

Answer:

A bowl contains 20 candies; 15 are chocolate and 5 are vanilla.

If we select 5 candies, then the number of ways to select them is given by permutations.

The number of ways to select 5 candies is given by :-

^{15}P_5=\dfrac{15!}{(15-5)!}=\dfrac{15\times14\times13\times12\times11\times10!}{10!}=360360

15

P

5

=

(15−5)!

15!

=

10!

15×14×13×12×11×10!

=360360

The number of ways of selecting any 5 candies out of 20:-

\begin{lgathered}^{20}P_5=\dfrac{20!}{(20-5)!}\\\\=\dfrac{20\times19\times18\times17\times16\times15!}{15!}\\\\=1860480\end{lgathered}

20

P

5

=

(20−5)!

20!

=

15!

20×19×18×17×16×15!

=1860480

Now, the probability that all 5 are chocolate :-

=\dfrac{360360}{1860480}=0.193691950464\approx0.1937=

1860480

360360

=0.193691950464≈0.1937

Hence, the probability that all 5 are chocolate


Related Questions

Write a program that asks the user to enter five different, integer numbers. The program then reports the largest number and the smallest number.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

  int mi=INT_MAX;

   int mx=INT_MIN;

   int Num;

   cout<<"enter five different Numbers:";

   // read 10 non-negative Numbers

   for(int a=1;a<=5;a++)

   {

       // read the input number

       cin>>Num;

     // find maximum

       if(Num>mx)

       {

           mx=Num;

       }

       // find minumum

       if(Num<mi)

       {

           mi=Num;

       }

   }

   // print maximum and minimum

   cout<<"maximum of five numbers is: "<<mx<<endl;

   cout<<"minimum of five numbers is: "<<mi<<endl;

return 0;

}

Explanation:

Declare two variables "mi" & "mx" and initialize them with INT_MAX and INT_MIN respectively.Then read the five number from user and compare it with "mi" & "mx" ,if input is greater than "mx" then update "mx" or if input is less than "mi" then update the "mi". After all the inputs, "mi" will have smallest and "mx" will have largest value.

Output:

enter five different Numbers:6 19 3 44 23

maximum of five numbers is: 44

minimum of five numbers is: 3  

2.4: Star Pattern Write a program that displays the following pattern: * *** ***** ******* ***** *** * Output. Seven lines of output as follows: The first consists of 3 spaces followed by a star. The second line consists of 2 spaces followed by a 3 stars. The third consists of one space followed by 5 stars, and the fourth consists just of 7 stars. The fifth line is identical to third, th sixth to the second and the seventh to the first. CLASS NAMES. Your program class should be called StarPattern

Answers

Answer:

// here is code in java.

public class NAMES

{

// main method

public static void main(String[] args)

{

int n=4;

// print the upper half

for(int a=1;a<=n;a++)

{

for(int b=1;b<=n-a;b++)

{

// print the spaces

System.out.print(" ");

}

// print the * of upper half

for(int x=1;x<=a*2-1;x++)

{

// print the *

System.out.print("*");

}

// print newline

System.out.println();

}

// print the lower half

for(int y=n-1;y>0;y--)

{

for(int z=1;z<=n-y;z++)

{

// print the spaces

System.out.print(" ");

}

for(int m=1;m<=y*2-1;m++)

{

// print the *

System.out.print("*");

}

// print newline

System.out.println();

}

}

}

Explanation:

Declare a variable "n" and initialize it with 4. First print the spaces (" ") of the upper half with the help of nested for loop.Then print the "*" of the upper half with for loop. Similarly print the lower half in revers order. This will print the required shape.

Output:

  *

 ***

*****

*******

*****

 ***

  *

What frequency band or bands do 802.11g, 802.11a, 802.11n, and 802.11ac use?

Answers

Answer:

802.11g: [tex]2.4Ghz[/tex]

802.11a: [tex]5Ghz[/tex]

802.11n: [tex]2.4Ghz[/tex]  and  [tex]5Ghz[/tex]

802.11ac: [tex]5Ghz[/tex]

Explanation:

802 is a Wi-Fi standard established by the IEEE in which, according to the corresponding standard, a data transmission rate is related.

About some of those standars:

802.11a: works with connections up to 54Mbps, operates in the 5GHz band,

802.11b: Works with connections up to 11mbps, operates in the 2.4GHz band,

802.11g: works with connections up to 54mbps, operates in the 2.4GHz band,

802.11n: Works with connections up to 600mbps, operates in the 2.4GHz and 5GHz band,

802.11ac: works with connections up to 1300Mbps, operates in the 5GHz band,

-What are the primary activities of the Business Intelligence system?

Answers

Answer:

 The primary activity of the business intelligence system are as follow:

Data acquisition:

 The data acquisition in the business intelligence system is the process of organizing all the source of the data. It is the process of cleaning, relating and cataloging all the source of the data.

Analysis the business intelligence:

It is the process of planning and creating the strategy of the business intelligence. It also involve the data mining and proper knowledge of the management of the business intelligence system.

When would one use an executive summary?

Answers

Answer:

Every time you present your results to a person in a managerial position or who does not have expertise in the technical details and processes you followed to get your results

Explanation:

When it comes to software projects documentation, you generally have to build a report that will be read by different people. These people come from different backgrounds and know the project to a different extent. For this reason, the project should contain sections that facilitate the understanding of the reader.

In general, the first section of a project report is an executive summary. The executive summary is a concise description of the project, starting from the problem context and description, including the results, conclusions, and recommendations.

It should be no more that one page long and it should be written in a general language so whoever reads it understands what is your project about.

Write a for loop that displays your name and student number 12 times.

Example:

Mary Kaur ----- 123456

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object

       Scanner s=new Scanner(System.in);

        // variables

      String s_name;

      int s_num;

      System.out.print("Please enter the name:");

       // read the student name

      s_name=s.nextLine();

      System.out.print("Please enter the number:");

       // read the student number

      s_num=s.nextInt();

       // print name and number 12 times

      for(int i=0;i<12;i++)

      {

          System.out.println(s_name+"----"+s_num);

      }

   }catch(Exception ex){

       return;}

}

}

Explanation:

Create a scanner class object to read input from user.Read the student name and the number from user and assign them to variable "s_name" and "s_num".Print the student name and number 12 times with the help of for loop.

Output:

Please enter the name:Mary Kaur

Please enter the number:123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

Mary Kaur----123456

An object contains data and the instructions that manipulate the data (Points : 2) True
False

Answers

Answer:

True

Explanation:

An object is used as a central concept in OOP. It contains data (state it represents) and behaviors (the message) that has a meaning in your software application. Most programmers like using object-oriented programming languages because of these objects it carries. These objects make it easier to build solutions with complete functionalities effectively. It represents the properties which are the data state and a method which is what it can do. A customer’s object data or property, for instance, is every key detail of the customer while the method is what this object can do with the data.

Examination of Internet records in order to reveal the identity of an anonymous poster is defined as

Doxing
Filtering
Spamming
Hacking

Answers

Answer: Doxing

Explanation: Doxing which is also referred as doxxing is defined as the revealing or publishing of the private records or information to the public.It is considered as the illegal practice which is base on the the internet service.The publicizing of the private data or confidential information is punishable offence.

Other options are incorrect because filtering is the elimination of the not required content, spamming is the activity of sending undesired bulk messages and hacking is the attacking of the system using false means to corrupt and steal data.Thus the correct option is doxing.

. What is tokenizing?

Answers

Answer:

 The term tokenizing is the process of splitting the data or some text into the minimal useful or meaningful units.

The tokenzing break the sequence of the string into various keywords, words and meaningful phrases. This process of breaking different elements is also known as token.

Token is the individual sentence and word in the tokenizing process and some of the characters are marked as discarded in this process such as punctuation.  


Explain what is meant by "big data". Write three examples for Big Data.

Answers

Explanation:

Big Data :- It describes a large volume of data - both unstructured and structured that swamp a business on a day-to-day basis.Big data is very important for a company because it help to determine the root cause of the failures in real time,detects fraudulent,recalculate risks.

Big data in healthcare industry.

Big data in education industry.

Big data in media and entertainment industry.

Big data refers to the massive volumes of data that require advanced tools for processing and analysis. Examples include social media data, healthcare data, and e-commerce data. These large datasets offer new insights and create value in various fields.

Understanding Big Data :

Big data refers to the massive volume of information that exceeds the processing capacity of traditional data management tools. This concept not only highlights the vast quantity of data available but also emphasizes the advanced techniques required to analyze it. By leveraging large scale data sets, we can extract new insights, predict trends, and create new value in various fields.

Examples of Big Data :

Social Media Data: Platforms like Face book, Twi tter, and In stagram generate enormous amounts of data daily through user interactions, posts, likes, and shares.Healthcare Data: Medical records, patient history, and real-time health monitoring systems create vast datasets that can be used to improve patient care and predict health trends.E-commerce Data: Online retailers such as Amazon track user behavior, purchase history, and product reviews to personalize shopping experiences and improve inventory management.

Which of the following is a color effect that can be used to emphasize text?: *
a. Edging
b. Shading
c. Highlighting
d. Choices B and C

Answers

Answer: (C) Highlighting

Explanation:

Highlighting is the process in which we can use the different effects of the color for highlight the background and also used for emphasize the text. Highlight is very useful in highlighting the important line, text and any kind of special word.

It is mostly used for draw attention towards the important sentence in the given whole page or paragraph by highlighting some important line or words.

On the other hand, all the other options are incorrect as they does not involve in the color effect for emphasize the text.

Therefore, (C) is correct option.

Which of the following is supported by a primary key?

Changeable over time
May be null
Unique
Updateable

Answers

Answer:

Unique.

Explanation:

Unique is supported by a primary key because of primary key we can uniquely identify the tuple so the attribute which has been set as primary key must contain values that are unique and these values cannot be null.These values should not be changeable over time and updateable because there is a chance if these values are manipulated a copy of it may be present in that attribute.So the primary key won't be able to uniquely identify the tuple.

.Draw the following sine wave in the time domain, showing amplitude and phase:

s(t) = 3sin (2π2t + π)

Answers

Answer with Explanation:

Part 1)

The given sine wave is as

[tex]y=3sin(2\pi t+\pi)[/tex]

The graphical representation of the wave is shown in the attached figure:

Part 2)

For a general wave equation [tex]y(t)=Asin(\omega t+\phi )[/tex]

'A' is defined as amplitude of the wave

[tex](\omega t+\phi )[/tex] is defined as phase of the wave

Upon comparing with the given wave function we observe

1) Amplitude of the given wave is 3

2) Phase of the given wave [tex](2\pi t+\phi )[/tex]

Array aggregate assignment is possible in Java.

True or False

Answers

Answer: True

Explanation:

    Yes, the given statement is true that the array aggregate assignment are possible in the java. As, the array assignment is basically possible in the structure and array assignment.

The assignment statement is basically generated by the array and structure assignment and it is also known as master variable.

The actual statement and prefix is basically applied to the assignment statement for the null value.

Network 192.168.0.0 /16 is a private address pool. How many networks of 62 hosts can be created from it. (Include the first and last networks)

Answers

Answer:

1024

Explanation:

In the given network 192.168.0.0/16 there are 16 network bits and remaining 16 bits out of 32 bits can serve as host bits.

Now 62 hosts can be accomodated in 6 bits since [tex]2^{5}< 62<2^{6}[/tex]. Thus out of 16 hosts bits only 6 are needed to accomodate 62 hosts.

Therefore remaining 10 bits can be used to define other network address within the main network address.

So there can be total [tex]2^{10}= 1024[/tex] networks of 62 hosts.  

Write a program in c++ that asks the user for a sequence of n​integers, where the user provides the number of elements n​ then each of the elements. After storing the n​ values in the array, ask the user for a value to search within those elements and return the index of the first instance (starting with 0 as the first element). Each integer should be stored in an array in the order they were read from the user. Follow the prompts and output format listed below. The user is expected to enter no more than 256 elements, the array should be able to hold no less and no more​ than 256.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// function that return the first occurrence of item

int fun(int a[],int item,int n)

{

   for(int y=0;y<n;y++)

{// find first occurance

   if(a[y]==item)

   // return index

   return y;

}

}

// main function

int main()

{

// variables

int n,item;

// array that holds 256 number only

int a[256];

cout<<"enter the value of n:";

//read the value of n

cin>>n;

// if n is greater than 256, it will again ask for input

while(n>256)

{

   cout<<"value of n should be less than 256:"<<endl;

   cout<<"enter value of n again:";

   cin>>n;

}

// read n numbers

cout<<"enter "<<n<<" numbers:";

for(int x=0;x<n;x++)

{

   cin>>a[x];

}

// read item to be searched

cout<<"enter the number to be searched:";

cin>>item;

// calling the function and print the index

cout<<"item found at index "<<fun(a,item,n)<<endl;

}

Explanation:

Declare a variable "n" and create an array of size 256.Then read the value of "n". If n is greater than 256 then it will again ask user to enter a number less than 256.Then it will read "n" numbers from user and store them into array.Then it will read item to be searched and call the function with parameter array, item and n. function will find the first occurrence of the item and return its index.

Output:

enter the value of n:280

value of n should be less than 256:

enter value of n again:7

enter 7 numbers:12 4 7 9 7 6 21

enter the number to be searched:7

item found at index 2

What class of DSS focuses on simulation and optimization?

Answers

Answer:

Model-Driven DSS

Explanation:

Model-Driven DSS emphasizes direct exposure and manipulation of a model like optimization, statistical, simulation models and financial model.

Model-driven DSS uses data and variables obtained by policy-makers to help decision-makers to analyze a situation. However, they are generally not data-intensive, which is normally a very massive database which is not required for model-driven DSS.

Do you know some website that can make a questionnaire? And I can use the link then put up on the social media so that everyone can do it.​

Answers

Answer:

You can use the following websites for more of a simple and smooth experience

SoGoSurvey.

Survey Monkey.

Typeform.

Google Forms.

Client Heartbeat.

Zoho Survey.

Survey Gizmo.

Survey Planet.

Hope this helped!

Explanation:

Answer:

brainly!

Explanation:

i think this is what you are talking about

.A(n) ____________ conversion occurs when C# converts one data type to another and the programmer has not provided code to perform the conversion.

a.explicit

b.implicit

c.narrowing conversion

d.widening

Answers

Answer:

The correct answer for the given question is option(b) i.e "Implicit conversion".

Explanation:

Implicit conversion converts one datatype to another without forcefully .it convert the one datatype to another automatically.The implicit type is a type safe  conversion .

For  example

int i = 57;  

float f = l;  // convert i to f without  forcefully.

The explicit conversion converts one datatype to another forcefully .This type of conversion is not a type safe conversion.

double d = 765.12;  

int i = (int)d;  // convert d to i forcefully

so the correct option is option(b).

: How can Internet technologies help a business form strategic alliances with its customers, suppliers, and others?

Answers

Answer:

Get much money

Explanation:

Beause the people need money

Write a program that converts a line of data containing three integers so that the data appears on three separate lines.

Answers

Answer:

Following are the program in C language

#include <stdio.h>// header file

int main() // main function

{

   int x1,y1,z1; // variable declaration

   printf(" Enter the three number :");

   scanf("%d%d%d",&x1,&y1,&z1); // input the three number by user

   printf(" Number 1:%d",x1); // dispaly number 2

   printf("\n");// move the control to next line

   printf(" Number 2:%d",y1);// dispaly number 2

   printf("\n");// move the control to next line

   printf(" Number 3:%d",z1);// dispaly number 3

return 0;

}

Output:

Enter the three number :12 23 45

Number 1:  12

Number 2: 23

Number 3: 45

Explanation:

In this program we have declared three variable x1, y1, z1 of type int .After that we take the input from user  by using scanf function and finally  printed the value on the three separate lines.

Since intergers can only be positive numbers, it is always best to declare all numbers as floating point numbers.

True or False.

Answers

Answer:

False.

Explanation:

Integers can be both negative number and positive numbers.There is no need to declare negative integers as floating point numbers since they can accept negative numbers.The minimum possible value of int is INT_MIN and this value is negative.

So hence we can say that the answer to this question is false.

How long is a subnet mask? (Please select one of the four options)

24 bits

32 bytes

32 bits

16 bits

Answers

Answer: 32 bits

Explanation:

 The subnet mask basically contain 32 bits number which performed various function in terms of mask in the IP address. There are mainly two types IP address that are:

Host portNetwork port

The 32 bit is the mask that is used for the host networking address in the single IP address. If the string represent 1, it means that the subnet mask is the part of the network.  

 

In a LOS communication, consider d = 60km, the requirement is to make two antennas (transmitter and receiver) such that the height of one antenna should be four time of the other. Considering this, find the appropriate heights of these two antennas.

Answers

Answer:

for ratio 1:4

height for antenna 1 = 42.36

and height for antenna 2 =169.46

Explanation:

given data

distance d = 60km

height h1 = 4 h2

to find out

find the appropriate heights of these two antennas

solution

we know here that distance between 2 antennas  in LOS ( line of sight ) is express as

[tex]d = 3.57\sqrt{kh}[/tex]   ......................1

here d is distance and k is curvature of earth i.e 4/3  and h is height

we know height is 1:4 so total height is 5 part to get ratio

put value in equation 1

[tex]60 = 3.57\sqrt{\frac{4}{3} h}[/tex]  

solve it we get

h = 211.83

so for ration divide by 5

[tex]\frac{211.83}{5}[/tex]

= 42.36

so for ratio 1:4

so height for antenna 1 = 42.36

and height for antenna 2 = 4 × 42.36 = 169.46

Explain the ‘V-Model’ for software testing?

Answers

Answer: V-model for software testing is referred to as a type of Systems development life cycle  model under which a process tends to be executed in sequential manner i.e. V-shape. It is also referred as Verification & Validation model. This is mostly based on company of testing period for a development stage. The development of each and every step is associated with testing phase. Therefore next phase will start only, once the previous stage has been completed i.e. each development activity,has a testing activity corresponding.

. A program will ""fall through"" a case section if it is missing the __________ statement.

Answers

Answer: Break statement

Explanation:

  In the computer programming language, the break statement is the statement that mainly control the loop statement and it is basically used to terminating the given loop.

When the break explanation is experienced from inside the loop, then the iteration of the loop stops there and control comes back immediately from loop to the main proclamation in the loop. The program fall thorough the case section in the program if it missing the execution of the  break statement.

 

The exception classes are in packages in the ________.

a.)Compiler b.)JVM c.)Java API d.)Ex class

Answers

Answer: Compiler

Explanation:

 The exception classes are basically occur during the compilation of the program in the system. The exception is the event which disrupt the flow of the instruction.

It basically provide a way to transfer the control in the one part of the program to another program. The exception class is also known as run-time exception that basically indicate the condition in the class application.

All the other options are not in the form of packages in the exception class. Therefore, compiler is the correct option.

Write a program that prompts the user to enter the minutes (e.g., 1 billion), and displays the number of years and days for the minutes. For simplicity, assume a year has 365 days. Here is a sample run: Enter the number of minutes: 1000000000 1000000000 minutes is approximately 1902 years and 214 days

Answers

Answer:

// here is code in c++.

// include headers

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

long long int minutes,years,days;

long long int s;

cout<<"please enter the minutes:";

 // read the minutes

cin>>minutes;

 // make a copy

s=minutes;

 // calculate days

days=minutes/1440;

 // calculate years

years=days/365;

 // calculate remaining days after years

days=days%365;

// print the result

cout<<s<<" minutes is equal to "<<years<<" years "<<days<<" days."<<endl;

return 0;

}

Explanation:

Read the number of minutes from user and assign it to variable "minutes" of long long int type.Make a copy of input minutes.Then calculate total days by dividing the input minutes with 1440, because there is 1440 minutes in a day.Then find the year by dividing days with 365.Then find the remaining days and print the output.

Output:

please enter the minutes:1000000000                                                                                                                          

1000000000 minutes is equal to 1902 years 214 days.

-What is the purpose of a Business Intelligence system?

Answers

Answer: Business intelligence(BI) system is the tool that is used in the business field through companies and organization. The main cause of using BI system because it acts as the collection of the methods and technologies that help in the changing the raw and rough data to useful information which improves the functioning of the organization.

It provides better functioning by identification of the appropriate data,managing the information and making it efficient in a manner to make it presentable. These features make the organization to easily access the data and improves operations.

Name three recent advances that are influencing OS design.

Answers

Answer:

The three recent advances are:

1. Cloud Technology

2. Asynchronous Transfer Mode

3. GUI technology

Explanation:

1. Cloud Technology:

Withe the advent of this technology it has become more convenient to store and access the programs and data over the internet.

The increase in the use of this technology has influenced the Operating system to be designed in a more distributed manner.

2. Asynchronous Transfer Mode:

This mode allows the data transfer by using the methodology of flow control for the transfer of start and stop data bits.

The increased use of ATM for the transfer of data bit stream between components to obtain greater through put  has also influenced the design of the Operating System.

3. Graphic User Interface (GUI technology):

With the help of indicators (visual) and graphical icons, this technology allows the interaction with electronic devices.

The progress in this technology and the interfaces it provided the users with has been through many changes thus influencing the operating system  

to improvise their design thus enabling the smooth User Interface experience.

Other Questions
Evaluate the expression.38 +16 - 12 - 2 - (302)Enter your answer in the box. PSYCHOLOGY! A _________ is a graphical representation of association between variables.A. scatterplotB. regression plotC. graphical plotD. variable plot Which country sent Johan Printz to explore North America?A. SwedenB. PortugalC. SpainD. United States Lara allocates wealth between two periods: youth (time 1) and old age (time 2).Currently (in her youth) she has $8,000 in cash. She can borrow and lend at the bankat a rate of 15% between time 1 and time 2 (that is, lending $1 in youth will give her$1.15 in old age). Her only investment opportunity other than the bank is a projectthat costs $5,000 now in her youth and has a payoff of $6,000 in her old age. What isthe most Lara can consume in her old age? Assume Lara cannot consume a negativeamount in her youth. Write the pseudocode for a function named getFirstName that asks the user to enter his or her first name, and returns it. Write the main module that declares a variable called name, calls getFirstName (setting its return value into name), and displays that name with a user-friendly message. A stunt man drives a car at a speed of 20 m/s off a 28-m-high cliff. The road leading to the cliff is inclined upward at an angle of 20. How far from the base of the cliff does the car land? What is the car's impact speed? Celene told her coworker, "I'm glad Jin will be working with us on our project. Because he is Asian, he can create the budget because Asians are whizzes with math." Celene's statement is an example of _______________. Why do fish have a high nutritional value? How many times greater is the flux from a star that is 8.50 times hotter than our Sun? times greater 2nd attempt See Hint How many times greater is the flux from a star that is 8.50 times hotter than our Sun? 2.92 times greater 1st attempt Feedback How many times greater is the flux from a star that is 8.50 times hotter than our Sun? 8.50 times greater Internally, computers are constructed from circuitry that consists of small on/off switches. What is the most basic circuitry-level language that computers use to control the operation of those switches called? Only financial institutions can borrow from the Fed.TrueFalse Predict the effects of the following types of gene mutations on the protein encoded by that gene (your answer can be just a few words for each). Nonsense mutation Missense mutation Synonymous (silent) mutation Single nucleotide insertion or deletion Three nucleotide deletion Chromosomal translocation the complementary angle of 45 15 pointsWhat is the value of x in the equation ?StartFraction one-half EndFraction left-parenthesis n minus 4 right-parenthesis minus 3 equals 3 minus left-parenthesis 2 n plus 3 right-parenthesis. 213 Increasing rake angle will decrease the tendency for Built-Up-Edge to form. a) True b) False DeWayne has decided to seek psychotherapy for some personal difficulties he has been having. While on the telephone with one possible clinician, he asks her to describe the kind of treatment approach that she uses with clients. "I dont limit myself to a single theory or approach," the therapist answers. "Instead I operate in a(n) _________ fashion, integrating various treatment approaches based on the specific needs of each client." Which of the following is an example of something that could be predicted with information on a species "climate envelope"?Group of answer choicesThe reproductive rate of that speciesThe growth rate of the speciesThe survival rate of the speciesThe range that the species could potentially inhabit Over a period of several years, a large hospital kept track of the number of births of babies displaying the trait achondroplasia. Achondroplasia is a very rare autosomal dominant condition resulting in dwarfism with abnormal body proportions. After 120,000 births, it was noted that there had been 27 babies born with achondroplasia. One physician was interested in determining how many of these dwarf babies result from new mutations and whether the apparent mutation rate in his area was higher than normal. He looked up the families of the 27 dwarf births and discovered that 4 of the dwarf babies had a dwarf parent. What is the apparent mutation rate of the achondroplasia gene in this population? Is it unusually high or low? Joe and Max shake hands and say goodbye. Joe walks east 0.40 km to a coffee shop, and Max flags a cab and rides north 3.65 km to a bookstore. How fare apart is there destination? A car starts out when the air temperature is 288 K. The air pressure in the tires is 460 kPa. After driving a while, the temperature of the air in the tires increases to 298 K. What is the pressure in the tires at that point, assuming the volume remains constant?(A) 476 kPa(B) 498 kPa(C) 488 kPa(D) 563 kPa(E) 512 kPa