Add a String instance variable, messageUponExiting, to the Window class. This variable will be used to display a message when the user closes the window (for example, "Are you sure you want to quit?"). Furthermore, this variable should be accessible to all subclasses of the Window class, as each sort of window may require a different message upon exiting. Please provide the declaration of the instance variable only—nothing else.

Answers

Answer 1

Answer:

Following are the Declaration of instance variable which is mention above .

protected String messageUponExiting; // variable declaration

Explanation:

Here we declared a variable "messageUponExiting "  as string type.The String datatype parameter will hold the string value .We can use Protected access modifier because as mention in the question the variable must be accessible  in all of the subclass of windows.

Syntax of declaring any instance variable .

Access-modifier datatype variable-name;


Related Questions

Which professional organization is responsible for the development and continued monitoring of the curriculum standards for sport management degree programs?

A) AAHPERD
B) NCAA
C) NFHSA
D) NASSM

Answers

Answer:

Option D is correct.

Explanation:

The North American Society for Sport Management (NASSM), was established in 1985, and its purpose was to promote the study, research, and development in the field of sports management.

It currently publishes a research journal called the Journal of Sport Management, which is used as a model for sports management in several universities across the US.  

What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information?

Answers

Answer:

LDAP injection

Explanation:

LDAP injection is a kind of assault on a web application where hackers place code in a client input field with the aim of gaining unauthorized access in to the system or retrieve information.

At the point when a web application doesn't satisfactorily sanitize client provided input, hackers might have the option to change the construction of a LDAP statement which will run with similar permissions that executed the command.

A technology upgrading strategy is utilized by incumbent companies in a mature industry to deter entry by investing in costly upgrades that potential entrants would have trouble matching.​ True or False?

Answers

Answer:

The answer is TRUE.

Explanation:

A technology upgrading strategy is utilized by incumbent companies in a mature industry to deter entry by investing in costly upgrades that potential entrants would have trouble matching. That is a true statement.

The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless access points and separate networks for internal users and guests are required. Which of the following should separate each network? (Choose all that apply.)
(a)Channels
(b)Physical security
(c)Security protocols
(d)SSIDs

Answers

A. Channels C. Security protocols D.ssids

Write a function called check_nums that takes a list as its parameter, and contains a while loop that only stops once the element of the list is the number 7. What is returned is a list of all of the numbers up until it reaches 7.

Answers

Answer:

Following are the program in the Python Programming Language:

def check_nums(length): #define function

 my_lst=[]  #set list type variable

 n=0  #set integer type variable

 while(length[n] != 7): #set the while loop  

   my_lst.append(length[n])  #append liat in my_lst

   n+=1  #increament in n

   if(len(length)==n): #set if condition

     break  #break the loop

 return my_lst  #return the list

l=[4,6,2,55,16,7,81]  #set list variable and assign list init

print(check_nums(l)) #call and print the function

Output:

[4, 6, 2, 55, 16]

Explanation:

Here, we define a function "check_nums()" and pass an argument in its parentheses inside the function,

we set list data type variable "my_lst" and integer type variable "n"we set while loop and pass the condition is the variable "length[n]" is not equal to the 7 then, the value of "length[n] " is appends to the variable "my_lst" and increment in the variable "n" by 1.we set if condition and check when the length of the variable "length" is equal to the variable "n" then, break the loop and return the value of "my_lst".

Finally, set the list type variable "l" and assign the list of numeric value in it then, call and print the function "check_nums"

In this exercise, using the knowledge of computational language in python, we have that this code will be written as:

The code is in the attached image.

We can write the python as:

def check_nums(length):

my_lst=[]  

n=0  

while(length[n] != 7):  

  my_lst.append(length[n])  

  n+=1  

  if(len(length)==n):

    break  

return my_lst  

l=[4,6,2,55,16,7,81]  

print(check_nums(l))

See more about python at brainly.com/question/13437928

Write a loop that displays all possible combinations of two letters where the letters are 'a', or 'b', or 'c', or 'd', or 'e'. The combinations should be displayed in ascending alphabetical order:

Answers

Answer:

In what programming language?

Explanation:

A conventional uniprocessor has __________ .
a. a single instruction stream and a single data stream
b. a single instruction stream and multiple data streams
c. multiple instruction streams and a single data stream
d. multiple instruction streams and multiple data streams

Answers

Answer:

The correct option to the following question is option (A).

Explanation:

SISD is used in the uni-processors systems which executes an individual instruction streams at a time by which we control an individual memory for the storage of data.

It is the flow or the sequence of an individual data or instructions which controlled on the systems.

Whereas SISD is different from the SMID and it is not used in the Uni-processor systems

Assume that printStars is a function that takes one argument and returns no value. It prints a line of N stars (followed by a newline character) where N is the value of the argument received. Write a statement that invokes printStars to make a line of 35 stars.

Answers

Answer:

printStars(35);

Explanation:

public class Question {

   public static void main(String args[]) {

     printStars(35);

   }

   public static void printStars(int numberOfStars){

       for(int i = 1; i <= numberOfStars; i++){

           System.out.print("*");

       }

       System.out.print("\n");

   }

}

All ____ language programs tell the computer how to manipulate the contents of memory locations step-by-step.

functional
baseline
procedural
logical

Answers

Answer:

logical

Explanation:

logical

Write the definition of a function named sum_list that has one parameter, a list whose elements are of type int. The function returns the sum of the elements of the list as an int.

Answers

Final answer:

The function sum_list takes a list of integers as its parameter and returns the sum of these elements. An example provided in Python demonstrates how the elements of the list are summed up within a loop and returned as an int type.

Explanation:

The definition of a function named sum_list that has one parameter, a list whose elements are of type int, is a function that iterates through each element in the list, adding up the values to produce a cumulative sum. The function then returns this sum, which is also of type int.

Example in Python:

def sum_list(numbers_list):
   total = 0
   for number in numbers_list:
       total += number
   return total

This function sum_list can be used to calculate the sum of any list of integers passed to it as an argument.

Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices were stolen. Alan decides to implement full disk encryption on all mobile devices. What risk response did Alan take?

Answers

Disk encryption is highly risky response.

Explanation:

To protect or loss of serial data loss on mobile devices it is not advisable to implement full disk encrypted. Once full disk encrypted is implemented mobile access is very slow. End-user will complain to IT administrator.

Best solution either removes unwanted or unauthorized application from mobile to protect the data loss. Install antivirus program in each mobile.

Access or permission to application is removed so that mobile data loss can be avoided.  End user should also be advised not to click on any link which they receive through SMS messages or other through any applications.

In some organizations, facilities management is the identification, inventory, and documentation of the current information systems status—hardware, software, and networking configurations. _________________________

Answers

Answer:

Following are the statement is False

Explanation:

Because in the organizations there are the following computer components and software are managed by that person who is professional in the Information Technology department and IT administrator so this comes under IT management.

So, That's why the following statement is False.

Which of the following is not considered to be type of database client?A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.

Answers

Answer:

An analytical database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions

Explanation:

Analytical databases are optimized for analytics. This optimization is done so that the performance of query execution is faster and the database can be scaled easily.

It keeps data for business metrics, key performance indicators (KPI) etc. and provides information for business analytics.

Which terms are used in conditional logic functions? Check all that apply.

WHEN
IF
OR
NOR
IFTRUE
IFERROR

Answers

Answer:

The answer is "IF and IFERROR".

Explanation:

The conditional logic function is used in excel that use to generate a conditional equation. It is normal to use for many tasks to check whether facts are true or false and to make logical distinctions between words.

This function considers IF and IFTRUE as a conditional logic function. and others are not correct that can be defined as:

The NOR and OR is used as a boolean operator functions in excel that return true or false value only.IFTRUE and WHEN is used in programming language. It used as a macro and condition operator.

Condition statements are “IF, IFTRUE, IFERROR".

Explanation:

In programming languages  “IF <Conditon>’” is used. Normally if condition means, if given condition is true either single statement or multiple statement are executed.

With “IF <Conditon>” has “ELSE” or “ELSEIF <Conditonn>”, Else path execution of “IF <CONDITON>” is false.

Same “ELSEIF <CONDITION>” is executed  if “IF CONDITON” is false.

“OR and NOR” is logical operations, “When” is only on sql query mostly.

“IFTRUE” Mostly inbuilt function on some of programming languages, executer if condition is true.

“IFERROR” mostly inbuilt function on some of programming languages, execute if end error comes where assign value is wrong type or variable or identified is not found etc.

To output the contents of a fully-filled two-dimensional array using pseudocode, write out the elements in the columns within a row, before moving to the next row, using a ________ loop within another.

A. DOWHILE
B. REPEAT UNTIL
C. DO
D. None of the other answers are correct

Answers

Answer:

B.

Explanation:

Based on the information provided within the question it can be said that the loop that should be used is a repeat until loop. This is because this loop will continue cycling until a certain condition is met. In this situation, the loop breakout condition would be the output of the final element in the last column and row of the two-dimensional array.

Final answer:

To output the contents of a fully-filled two-dimensional array using pseudocode, you can use a nested FOR loop. The outer loop will iterate over the rows of the array, while the inner loop will iterate over the columns within each row.

Explanation:

To output the contents of a fully-filled two-dimensional array using pseudocode, you can use a nested FOR loop. The outer loop will iterate over the rows of the array, while the inner loop will iterate over the columns within each row. Here's an example:

FOR row = 1 TO number_of_rows
   FOR column = 1 TO number_of_columns
       OUTPUT array[row][column]
   END FOR
END FOR

In this pseudocode, number_of_rows and number_of_columns represent the dimensions of the array. The OUTPUT statement is used to display the value of each element in the array.

Which is an example of Raw Input?


a. Websites collect data about each person who visits.


b. Websites collect data about each person who visits, process the information and sends it to companies.

Answers

Answer:

Website collect data about each person who visits.

Explanation: Raw input or raw data is a type of data that has been collected or gathered from many sources, but have not been processed or filtered to obtain any type of information.

So, in given example the data of users, that has been collected from website is random data not information. This is the reason, "option A" is suitable example of Raw Input.

Lily's supervisor asked her to add visual interest to the company Web site by tilting images at a slight angle. Lily knows this transformation will differ depending on the browser used to view it. Which vendor prefix property will allow her to apply the transformation when the page is viewed in Chrome and Safari?

Answers

Answer: WebKit transform style

Explanation:

This is a type of vendor prefix which is a string of characters which are related to a specific browser engineer. WebKit is related to chrome, safari, Android browser.

You want to create Web pages that can easily adapt to and serve multimedia content to smartphones, tablets, gaming devices and smart TVs, as well as to traditional desktop computers, without the use of plug-ins.
Which of the following would be best suited for this purpose?

Answers

Answer:

HTML5

Explanation:

HTML5 has features to create a webpage or pages without using external plug ins. With the help  of API's we can alos add content related to multimedia.

​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the​ globe, with special​ time-keeping tools to synchronize the data and ensure the data are always consistent.

Answers

Answer:

distributed

Explanation:

According to my expertise in information technology, it seems that the type of database being described is a distributed database. Like mentioned in the question this is a database that works by saving information in data centers from various locations and information is processed through multiple database node. This allows information to be more secured, faster, and also acts as a fail-safe in case of any malfunction where data may otherwise be lost.

Final answer:

A distributed database allows for data storage across numerous machines globally, synchronized for consistent data, using a database management system to handle the datasets and a relational database management system to manage the data without reorganizing tables.

Explanation:

A distributed database makes it possible to store information across millions of machines in hundreds of data centers around the globe, with special time-keeping tools to synchronize the data and ensure the data are always consistent. Such databases utilize a database management system (DBMS) to create, store, maintain, manipulate, and retrieve large datasets distributed over multiple files and locations. Additionally, a relational database management system (RDBMS) is often employed in distributed databases to manage the data efficiently without the need for reorganizing the tables.

Relational databases

are characterized by their use of tables to organize data, which are related through primary and foreign keys. This structure effectively supports operations like updating, expanding, and deleting data, and allows for quick data manipulation and enhanced data accuracy through automated rules. Today's digital databases, supported by advanced DBMS and RDBMS technologies, are central to the Information Age, far surpassing the traditional filing cabinet by enabling the storage of vast amounts of data on networks and the Internet.

Distributed computing is a term that describes the work that autonomous computers can do to achieve a common goal, especially in respect to complex projects. Many areas of society, such as the healthcare industry, can profit from this model tremendously. For example, the search for a cure for cancer can be accelerated when scientists can reach across national boundaries to work closely together. Other goals that can be accomplished using distributed computing are:

Answers

Answer:

To find the solution of Global warming, to find the combination of some drugs and test them, etc.

Explanation:

Distributed computing can be described as when a number of computers connected on the network communicate with each other by passing messages, and these systems are known as distributed systems.

There are various goals that can be accomplished using distributed computing, one of them is to find the solution of Global warming, by coordinating with different areas.  

Another one is to find the combination of some drugs and test them to make new medicine.

____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
a. green-hat
b. grey-hat
c. white-hat
d. black-hat

Answers

Answer:

D) Black -hat

Explanation:

if any other colors of the hats will not work cuz the only way to go dark and scary is to use the black hat

Answer:

C

Explanation:

White-hat hackers are the ones who are in charge of testing the security systems.

Suppose you wish to write a method that returns the sum of the elements in partially filled array. Which is the best choice for a method header? Group of answer choices public int sum() public int sum(int[] values, int currSize) public int sum(int[] values) public int sum(int[] values, int size, int currSize)

Answers

Answer:

The Method header to this question is "int sum(int[] values, int currSize)".

Explanation:

According to the question, It is defined that choose the correct option which creates a method header sum and returns the sum of the array element. In given options, we choose option second because in this option method return type is int and use an integer variable that is "currSize" which calculate the sum and return its value and other option are not correct that can be described as:

In the first option, we create a method but we do not pass any parameter so it will not calculate the sum of array elements. In the third option, we create a method but we pass only one parameter that is an array. So, it will not calculate the sum of array elements correctly. In the fourth option, In this method, we pass three parameters that are "values, size and currSize" in which the size parameter not use.

That's why the answer to this question is option second which is "int sum(int[] values, int currSize)".

Concentric circles on a disk platter where data is stored;________
A new file system developed for Windows Server 2012;_________
It allows increased stability for disk storage and improved features for data recovery and error checking;__________

Answers

Answer:

Tracks

Resilient File System (ReFS)

Explanation:

Concentric circles on a disk platter where data is stored is called TracksThe new file system developed for Windows Server 2012 is called Resilient File System (ReFS). It allows increased stability for disk storage and improved features for data recovery and error checking

What version of Windows Server 2016 can be used to share the same physical computer through each person connecting a keyboard, mouse, and monitor to a USB hub that connects to the server?

Answers

Windows server 2016 standard version for minimally virtual environments.

Explanation:

Basically windows server 2016 it is operating system where installed in server platform and connected to local network or VPN or wide area network. Since it is server type of operation end user can configure domain server and active directory in big server.

Windows 2016 has six server types where provided by Microsoft. End user has to select operating systems depends on number user and load of traffic in network.  End users can upgrade possible by paying extra price. Best practice to reinstall the OS with minimal down time.

The CEO of your small company has asked you to connect his laptop computer to the small conference room led tv. The CEO will be showing a new promotional video that demonstrates the new company strategy through images and sounds. Which of the following cable types would work BEST for connecting his laptop to the display?
a. VGA
b.Composite
c.HDMI
d. DVI

Answers

Answer:

i think DVI works best if not VGA

Explanation:

The term that best describes the subversive use of computers and computer networks to promote a political agenda, with its roots in hacker culture often related to the free speech, human rights, or freedom of information movements is called:_______

Answers

Answer:

Hacktivism is the correct answer to the following statement.

Explanation:

Hacktivism is the process of hacking in which the hackers damage their opponents and affect them by changing in the political changes.

It is that type hacking in which hackers affect the social, religious and political beliefs but cyberterrorism is the hardest form of Hacktivism.

Hacktivism is done by the group of the criminals or the governments of the other countries but for the other reasons which is described above but it is also an illegal activity.

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.A. corporate spyB. ethical cyber criminalC. hacktivistD. white hat hackerE. data harvester

Answers

Answer: white hat hacker

Explanation:

Like other forms of hacker, white hat hackers also have wide range of knowledge of breaking into systems, overriding firewalls, bypassing security protocols and can also do all other things hackers do. But what differentiates white hat hackers is the motive behind what they do, in that they carry out all this test not for their personal gain but for the benefit of the owners and also with the approval of the owners. Because after carrying out tests on the ways of exploiting the loop holes in the system they reveal it to the manufacturer or system owners for correction.

How are 8-position, 8-contact (8P8C) modular connectors pinned to unshielded twisted-pair (UTP) cable, which is used for connecting computers and broadband modems to a local area network (LAN)?

Answers

An unshielded cable are twisted pair is used to connect modem in telecommunication industry to connect computer through telephone cable, Ethernet cables it is called as UTP cables.

Explanation:

These UTP cables are twisted cables where conducted are used in form of single circuit.

These types of UTP cables used to connect modem to establish connection to other networks for internet or connecting to other side computer or desktop or laptops.

UTP cables uses  rj-45 or rj-11  or rs232 or rs 499. Normally rs-45 with cat 5e cable is used to connect LAN. Rj-11 is used to connect to modem for dial purpose.

If we use ip networks RJ-45 will do both.

Final answer:

8P8C modular connectors, often called RJ45, are pinned to UTP cables using either T568A or T568B standards, with T568B being the most common in the US for LAN connections. Both cable ends must be pinned identically for proper functionality, and the twisted pair design helps reduce electromagnetic interference.

Explanation:

The 8-position, 8-contact (8P8C) modular connectors, commonly known as RJ45 connectors, are typically pinned to unshielded twisted-pair (UTP) cables according to the T568A or T568B standards. The difference between these two standards is the position of the orange and green wire pairs. The pinning for T568B, the most common standard in the US for connecting computers and broadband modems to a LAN, is as follows:

Pin 1 - White/OrangePin 2 - OrangePin 3 - White/GreenPin 4 - BluePin 5 - White/BluePin 6 - GreenPin 7 - White/BrownPin 8 - Brown

It's important to ensure that both ends of the UTP cable are pinned in the same way to function correctly. The primary purpose of using the 8P8C connector with UTP cable is for data transmission while maintaining the integrity of the signal through the twisted pairs which minimize electromagnetic interference.

Which statement about muzzleloaders is true? All muzzleloaders are rifles. All muzzleloaders have only one barrel. Muzzleloaders are safer and easier to use than modern firearms. Muzzleloaders are early firearms that are loaded from the open end.

Answers

Answer:

Muzzleloaders are early firearms that are loaded from the open end

Explanation:

A muzzleloader is any firearm into which the projectile and usually the propellant charge is loaded from the muzzle of the gun.

This is distinct from the more popular modern designs of breech-loading firearms.

Thus, muzzleloaders are early firearms that are loaded from the open end.

Early firearms that loaded with an open end were known as muzzleloaders.

Guns known as muzzleloaders are loaded by placing the bullet and propellant (such as black powder) into the open end of the weapon's barrel. Contrast this with contemporary firearms, which use cartridge-based gunpowder. Prior to the development of breech-loaded firearms, muzzleloaders had a long history and were frequently used. The most prevalent muzzleloaders are the single-barreled models, most often employed for target shooting and hunting. But double-barreled and even multi-barreled muzzleloaders are also available.

Therefore, the correct option is D.

Learn more about muzzleloaders, here:

https://brainly.com/question/29887462

#SPJ6

Your question is incomplete, most probably the complete question is:

Which statement about muzzleloaders is true?

All muzzleloaders are rifles. All muzzleloaders have only one barrel.Muzzleloaders are safer and easier to use than modern firearms. Muzzleloaders are early firearms that are loaded from the open end.

Jasper, a businessperson, has no connection with Yale University, but he has a new line of computer software that he would like to market to university students and faculty under the name of "Yale Software." Which statement is correct?a. Jasper may in all likelihood register the name "Yale Software" under the Lanham Act.b. It is unlikely that Jasper will be able to register the name "Yale Software," because it has a secondary meaning.c. Jasper may in all likelihood be able to copyright the name "Yale Software" under the Copyright Act.d. It is unlikely that Jasper will be able to register the name "Yale Software," because it falsely suggests a connection to an institution.

Answers

Answer:

The answer is letter D.

Explanation:

It is unlikely that Jasper will be able to register the name "Yale Software," because it falsely suggests a connection to an institution.

Other Questions
A pipe leads from a storage tank on the roof of a building to the ground floor. The absolute pressure of the water in the storage tank where it connects to the pipe is 3.0105Pa, the pipe has a radius of 1.0 cm where it connects to the storage tank, and the speed of flow in this pipe is 1.6 m/s. The pipe on the ground floor has a radius of 0.50 cm and is 9.0 m below the storage tank. Find the speed of flow in the pipe on the ground floor. Which south american countries does the tropic of capricorn pass through For the unity negative feedback system G(s) = K(s+6)/ (s + 1)(s + 2)(s + 5) It's known that the system is operating with a dominant-pole damping ratio of 0.5. Design a PD controller so that the settling time is reduced by a factor of 3, compared with the uncompensated unity negative feedback system. Compare the percentage overshoot and resonant frequencies of the uncompensated and compensated systems. Ben's Border Caf is considering a project which will produce sales of $16,000 and increase cash expenses by $10,000. If the project is implemented, taxes will increase from $23,000 to $24,500 and depreciation will increase from $4,000 to $5,500. What is the amount of the operating cash flow using the top-down approach? y = x^2-38x - y = 18 A sports drink recipe calls for 5/3 tablespoons of powered drink mix for every 12 ounces of water how many batches can you make with 5 tablespoons of drink mix and 36 ounces of water How many of your five weekly workouts do you get to design yourself,starting in the third week?OOOOA. fiveB. nonec. threeD. one 5. To advertise or not to advertise Suppose that Fizzo and Pop Hop are the only two firms that sell orange soda. The following payoff matrix shows the profit (in millions of dollars) each company will earn depending on whether or not it advertises: Pop Hop Advertise Doesn't Advertise Fizzo Advertise 8, 8 12, 4 Doesn't Advertise 4, 12 10, 10 For example, the upper right cell shows that if Fizzo advertises and Pop Hop doesn't advertise, Fizzo will make a profit of $12 million, and Pop Hop will make a profit of $4 million. Assume this is a simultaneous game and that Fizzo and Pop Hop are both profit-maximizing firms. If Fizzo decides to advertise, it will earn a profit ofmillion if Pop Hop advertises and a profit ofmillion if Pop Hop does not advertise. If Fizzo decides not to advertise, it will earn a profit ofmillion if Pop Hop advertises and a profit ofmillion if Pop Hop does not advertise. If Pop Hop advertises, Fizzo makes a higher profit if it chooses . If Pop Hop doesn't advertise, Fizzo makes a higher profit if it chooses . Suppose that both firms start off not advertising. If the firms act independently, what strategies will they end up choosing? Fizzo will choose to advertise and Pop Hop will choose not to advertise. Fizzo will choose not to advertise and Pop Hop will choose to advertise. Both firms will choose not to advertise. Both firms will choose to advertise. Beth exerts 14 Newtons of force to propel a 4.5 kilogram bowling ball down the lane. Describe how the ball will travel. Hank is often very sullen and severely depressed. Sometimes he will go days without getting out of bed. Yet every so often he has a burst of energy, lasting a week or two, when he doesn't sleep more than a couple of hours a day. During these times he often starts major renovation projects in his house, knocking down walls and tearing up floors in order to make his house into a "mansion." What disorder is Hank most likely exhibiting?A. bipolar disorderB. double depressionC. major depressive disorderD. dysthymia After a long, bloody war in which 100,000 soldiers and even more civilians were killed, this emperor became a Buddhist. This statement describes which of the following people? a. Nero.b. Asoka.b. Chandra Gupta II.c. Chandragupta Maurya. Which of the following places in Latin America is likely at the highest risk for a dengue outbreak? Which of the following places in Latin America is likely at the highest risk for a dengue outbreak? An urban, dry area. An urban area with several waterways. A rural area next to the ocean. A rural desert area with few trees. what is -9= n/15 - 10 The ________ approach argues that equilibrium exchange rates are achieved when the net inflow of foreign exchange arising from current account activities is equal to the net outflow of foreign exchange arising from financial account activities.A) balance of paymentsB) monetaryC) asset marketD) law of one price Cheryl is driving to her grandmothers house for the weekend. She drives at a constant speed of 60 miles per hour on the freeway. Time (Hours) 1 2 3 4 5 Distance (Miles) What are the five values that complete the Distance (Miles) row of the table? Is this relation a function? Explain your reasoning. Lamont and his lab partner were filling out a worksheet on microorganisms. The table they filled in was about microorganisms that were a type of fungus. The boys had to add a third column and list each type of fungus as either helpful or harmful. Lamont wrote helpful for all five examples, but his partner said that was incorrect. Do you support Lamont or his partner? Explain.A)Lamont is incorrect; athlete's foot is used to make food.B)Lamont is correct. Fungi are helpful, not harmful. We eat fungi.C)Lamont is incorrect. Two fungi on the list are harmful: salmonella and athlete's foot.D)Lamont is correct. All five types of fungi in the table are helpful because they do beneficial things. Assume the speed of light to be 299 792 458 m/s. If the frequency of an electromagnetic wave is 80,000 GHz (GHz = gigahertz = 109 Hz), what is the wavelength of that radiation? Express your answer in micrometres (m) what's the answer to 3(x-4)=12x Simplify.(3x22x+2)(x2+5x5)a.4x^2+3x3b.2x^2+3x3c.2x^27x+7d.2x^23x3 In land mammals, the pelvic girdle is the point where the leg bones attach to the rest of the skeleton. Whales also have a small pelvic girdle. What type of evidence for common descent would include the whale's pelvic girdle?