An instance of an abstract class can be created using _____. (Points : 2) the new operator
encapsulation
a public accessor
None of the above

Answers

Answer 1

Answer:

The correct answer for the given question is the new operator.

Explanation:

An abstract class is those which have the only declaration of the abstract method, not a definition. Any class which inherits abstract class must define all the method of abstract otherwise it also be abstract.

To declared any abstract class following syntax is used  

abstract class class name

{

// abstract method  

}

To create an instance of an abstract class we can use a new keyword. The new keyword created the instance of an abstract class.

encapsulation is the feature of object-oriented we cannot create an object by using encapsulation so this option is wrong.

The public is an access modifier we cannot create an object by using public keyword so this option is also wrong.

Therefore the correct answer is new.


Related Questions

. Dеclarе a onе-dimеnsional array of 30 doublеs (on thе stack) namеd rainfall

Answers

Answer:

double rainfall[30];

Explanation:

Here we are declared an onе dimеnsional array named " rainfall "  of size 30  and type double.To declared a onе dimеnsional array we can use the following syntax.

datatype array-name[size];

So double rainfall[30];

Following are the program in c++

#include<iostream> // header file

using namespace std; // namespace

int main() // main method

{

 double rainfall[30]={45.5,78.9,67.78}; // array declaration and storing values

for(int i=0;i<3;++i) // iterating loop

{

    cout<<rainfall[i]<<endl; // printing the array elements

}

   return 0;

}

Output:

45.5

78.9

67.78

A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest addressable memory unit is a word?

13

8

10

6

32

Answers

Answer:

The minimum number of bits necessary to address 8K words is 13.

Explanation:

You have the number of words to address that is 8000 words, a word is the smallest addressable memory unit.  

8000 words can be addressed with [tex]2^{n}[/tex]  units. Now you have to find the value of n that approximates to the number of words.  

[tex]2^2=4\\2^4=16\\2^7=128\\2^{10}=1024\\2^{12}=4096\\2^{13}=8192[/tex]

So you can see that 13 bits are needed to address 8K words.

Data aggregates

are used to perform calculations on individual records in a table or query.
cannot be used in a report.
perform calculations on entire columns of data.
return multiple values.

Answers

Answer: Perform calculations on entire columns of data

Explanation:

 Data aggregate is the process that gather the information and express into the form of summary. It basically used in the statistical analysis for calculating the entire column of the data.

The main purpose pf the data aggregate is that it collect more data or information about the specific variable of the given data. The data is basically available in the form of aggregate.

The data aggregate function easily produced the summarized data in the database.

Write c++ function that receives input a person’s first name and surname, and then just displays the initials. For example: John Peter Joe, the initials JPJ must be displayed

Answers

Answer:

void Initials(string firstName,string lastName)

{

   cout<<firstName[0];

   for(int i=1;i<firstName.length();i++)

   {

       if(firstName[i-1]==' ')

       {

           cout<<firstName[i];

       }

   }

   cout<<lastName[0];

    for(int i=1;i<lastName.length();i++)

   {

       if(lastName[i-1]==' ')

       {

           cout<<lastName[i];

       }

   }

   cout<<endl;

}

Explanation:

The above written code is the function Initials which prints the full name.Parameters provided in the function are firstname and lastname in the format of string.You should include string header file for this code to run.

Subtract the following the Hex numbers:

67h

2Ah

Result is =

Answers

Answer:

3D ( in hexadecimal )

Explanation:

Converting the given hexadecimal numbers to decimal:

 67 (HEX) = 16*6 + 7 = 103 (Decimal)

 2A (HEX) = 2*16 + 10 = 42 (Decimal)

Subtracting the two numbers: 103 - 42 = 61 (Decimal)

Converting the result to Hexadecimal format:

61 = 16* 3 + 13

13 corresponds to D in hexadecimal.

So result in hex is 3D.

To summarize, the subtraction result for the two given hexadecimal numbers is 61 in decimal format or 3D in hexadecimal.

Wireshark is an example of what type of utility? A) Packet sniffer B) Port scanner C) Vulnerability scanner D) Content filter

Answers

Answer:A) Packer sniffer

Explanation: Wireshark is analyzer of packet which are open sourced.It helps in providing the services like troubleshooting, development analysis etc with the help of sniffing activity.The sniffing of the packet that a user owns is the technique for analyzing.

Other options are incorrect because port scanner provides data regarding the technique for network connection,vulnerability scanner scan the vulnerability of the network and content filter is used for filtering the excess web pages.Thus, the correct option is option(A).

Final answer:

Wireshark is a Packet sniffer used for capturing and analyzing network traffic in a readable format, making it different from port scanners, vulnerability scanners, or content filters.

Explanation:

Wireshark is an example of a Packet sniffer. Packet sniffers are tools used for network troubleshooting, analysis, software and protocol development, and education. Wireshark, specifically, captures packets in real-time and display them in human-readable format. It allows users to see the details of the packets being transmitted over the network, giving an in-depth understanding of the network traffic. This utility is not designed to scan ports, detect vulnerabilities, or filter content, which distinguishes it from options B, C, and D respectively.

Rachel needs to include a new organizational chart in her project. Which type of illustration should she use?: *
a. ClipArt
b. Picture
c. SmartArt Graphic
d. WordArt

Answers

Answer:

Option C

Explanation:

The type of illustration used by Rachael to add a new organizational chart is SmartArt Graphic.

In this tool, the information or data or ideas a person uses in the project are represented visually.

The different layout choices like organizational charts, etc enables a person to select the one that fits the information provided in the project.

Some are design to convey particular form of messages or information while the others are used for simple purposes like highlighting the appearance of texts or bullets.

A level breach of security could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. А.low B. normal C, moderate D. high

Answers

Answer:

Option D is correct.

Explanation:

A high-level safety violation could be anticipated to have a serious or disastrous negative impact on organisational activities, organisational assets.

The effect of the violation on an organisation may be staggering, and sometimes unknown until the outcomes are achieved. It is strange that, owing to harmful or neglectful acts, the greatest incidents of compromise come from within the business ; it requires time for an organisation to recover.

A high-level security breach might have a serious or catastrophic impact on an employee's performance, assets, or people.

High-level security breach:

The impact of a violation on such an organization may be enormous, and the consequences are often unclear until they are realized.

It's odd that the majority of incidences of breach occur within the company as a result of damaging or negligent behavior; it takes time for an organization to recover.

Find out more information about 'Impact of a violation':

https://brainly.com/question/4543526?referrer=searchResults

______The statement #include < math.h > defines the name of the current program you are writing as "math". (T/F)

Answers

Answer:

False.

Explanation:

The statement #include<math.h> means it is telling the compiler to include the the C language library math.h. It contains different math mathematical functions such as pow,ceil,floor,log,log10 etc.

#include is a preprocessor directive and it is used to paste the code the file that is provided in the #include to the current file.

Answer:

The statement #include<math.h> means it is telling the compiler to include the the C language library math.h. It contains different math mathematical functions such as pow,ceil,floor,log,log10 etc.

#include is a preprocessor directive and it is used to paste the code the file that is provided in the #include to the current file.

Explanation:

there is the link https://study.com/academy/lesson/variability-in-statistics-definition-measures-quiz.html

.What are signals, how can they be used?

Answers

Answer:

 The signal is the function which that carry information about the particular phenomenon in the signal processing. A signal is also define as the change in the quantity which is observable.

In terms of telecommunication, a signal is the varying current, voltage and the electromagnetic wave which basically carries data or information. Signal can be in the form of audio, image and radar related.

A signal can be used be various signal processing system and telecommunication fr the transmission of information from one device to another device.    

Write a paragraph on the orgin or development of ONE of the following elementss of the Internet:

a.) Usenet

b.) Listserv or mailing list

c.) BITNET

d.) IRC

e.) HYPERTEXT

f.) any computer hardware or device used to acces the Internet

Answers

Answer:

 (C) BITNET :

 BITNET is basically established in united state (US) in the 1981 and used in the cooperative world as wide area computer networking. The term BITNET is originally known as because it is time network.

It is also known as forward type of the networking and the BITNET can easily transfer the data of email and files from one network server to another server. The BITNET typically uses the RSCS protocol for the purpose of networking job and it is also use in the internal IBM, which is known as Virtual network (VNET).  

The BITNET is basically developed by the city university of the new York. It is used in the mainframe operating system for implementation the virtual memory system (VMS).  

A ____ is any manipulation of data, usually with the goal of producing information.

decision

process

problem

system

Answers

Answer: Process

Explanation: Processing data in the computing field is referred as the manipulation and transformation of data into useful output. The raw data is transformed machine language data.The processing also consist of the operations performed on data.

Other options are incorrect because decision is the final judgement made regarding computing,problem is issue in system and system is the complete unit in which processing takes place.Thus, the correct option is process.

Write a program that allows the user to enter a time in seconds and then outputs how far an object would drop if it is in free fall for that length of time. Assume that the object starts at rest, there is no friction or resistance from air, and there is a constant acceleration of 32 feet per second due to gravity. Use the equation: distance = acceleration x time-squared divided by 2

Answers

Answer:

// here is code inn c++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

   int t;

   double acc=32;

   cout<<"Enter the time in seconds:";

   // read the time in seconds

   cin>>t;

   // Calculate the distance=acceleration x time-squared divided by 2

   double dis=acc*(t*t)/2;

   // print the distance

   cout<<"distance is: "<<dis<<" feet."<<endl;

return 0;

}

Explanation:

Read the time in seconds from user and assign it to variable "t". declare and initialize variable "acc" with 32.Find the distance as "dis=acc*(t*t)/2". Print the distance.

Output:

Enter the time in seconds:10

distance is: 1600 feet.

What are the two possible stereotypes allowed for package: (Points : 6) framework and private
modelLibrary and protected
framework and modelLibrary
framework and protected

Answers

Answer: framework and modelLibrary

Explanation: Stereotypes helps in the providing the control action to the class that is providing support to the other class in the  UML(Unified modeling language) model. For the package as the model element the stereotypes allowed are framework and modelLibrary.

framework stereotype applied on the package for providing due to  reusable components it persist. modelLibrary is the stereotype for the package that has reusable model elements.

Other options are incorrect because "private" and "protected" are not the stereotypes for the model element package.Thus the correct option is framework and modelLibrary.

A type of security control that takes measures to help restore a system is referred to as:


A.

preventative


B.

detective


C.

corrective


D.

all of the above

Answers

Answer:

C.  corrective

Explanation:

Security controls

These are actions or measures taken to maintain and/ or restore the security of the system. Security controls are categorized as corrective, preventive and detective, which are discussed below.

Corrective

Security controls which help in taking the corrective steps after the malicious activity has done damage to the system or restoring the security of the system are called corrective security controls.

These controls also act as preventive measures for future risks.

These controls perform the healing and have remedial action for the damage done to the system.

Once the system has been recovered, appropriate measures are put in place to avoid further damage.

The damage can be done to the computer system, its hardware and software resources or the data.

Examples include restoring the database from the backup file.

Updating or renewing antivirus software rectifies the security against virus.

For example, once the database has been restored, access control, antivirus and other measures are employed to prevent the database from being corrupted and to prevent system from being affected.

Preventive

Security controls which help in stopping the malicious activity from harming the system are called preventive security controls.

As per the name, these measures are employed to prevent any security breach.

These measures prevent any suspicious activity from taking place which may cause harm to the system.

Firewalls prevent unauthorized access.

Antivirus prevents malicious applications from running.

Login feature to give access only to authorized user.

Detective

Security controls which help in detecting the malicious activities and alerting the security personnel are called detective security controls.

As per the name, these measures are used to identify any suspicious activity and report them. Detective controls do not prevent or correct any security breach.

Alarms are employed to detect and alert any suspicious activity.

Intrusion detection system (IDS).

In an ideal situation, security controls are a combination of all the types mentioned above.

The type of security control involving measures that restore a system is referred to as: c. corrective.

What is Corrective Security Control?

A corrective security control can be defined as the type of security control measures that includes technical, administrative and physical measures which are initiated to help restore a system to its original state after a breach or an unauthorized activity has occurred.

Therefore, the type of security control involving measures that restore a system is referred to as: c. corrective.

Learn more about corrective security control on:

https://brainly.com/question/13484623

A confidential number used as an authentication factor to verify a user’s identity is called a:

a,PIN

b.User ID

c.Password

d.Challenge

Answers

Answer: (A) PIN

Explanation:

 PIN is the personal identification number which is basically used to verify the identity of the users. It is confidential number which is used as the authenticating factor.

The PIN is the combination of the number that is also use to authenticate the banking system with the users.

On the other hand, the other given options are incorrect because these are not used to identify the users identification process.

Therefore, Option (A) is correct.

.Why is it common practice to use a boot loader?

Answers

Answer:

Bootloader is the program that helps in the revitalizing the micro-controller of the operating system .It makes the operating system self programmable.It's main purpose is loading the tasks or operations to ensure the working interface between software and hardware whenever the system gets booted up.

It is also known as the bootstrap loader.It is necessary and common because it is the first mechanism that works whenever the system gets initialized or booted. Without this feature the reloading of the programs will  not be possible.

Using for loop . Input an integer and identify whether it's EVEN OR ODD ( without using modulo operator )

using only . C++ programming

Answers

Answer:

Following are the program in c++ language

#include<iostream> // header file

using namespace std; // namespace

int main()  

{

int n1,i; // variable declaration

cout<<"Enter Number: ";

cin>>n1; // input number

for(i=n1;i>1;i=i-2) // check the condition  

{

n1 = n1-2; // decrement the value of number by -2  

}

if(n1==0) // check if it is 0

cout<<"number is EVEN"<<"\n"; // print even

else

cout<<"number is ODD"<<"\n"; // print odd

return 0;

}

Output:

Enter Number: 45

number is ODD

Again run the program

Enter Number:10

number is EVEN

Explanation:

In this program, we input the number by a user in variable n1. After that, we iterate the for loop and initialize the value of a variable" i" in for loop and check the condition.

In each iteration, the variable n1 is decrement by 2 and store it n1.

Finally, check if n1==0 then it print number is EVEN  otherwise it print number is ODD.

What is the difference between congestion control and flow control? Where are each managed in TCP?

Answers

Answer: The differences between the flow control and congestion control are as follows:-

Flow control's traffic is controlled in the direction from sender to receiver whereas traffic control in congestion control be handles from the entrance of the network.Sender is reason for the traffic in flow control while transport layer creates the traffic in congestion control.Transport layer and data link layer are used for managing the traffic whereas congestion control has transport and network layer for handling the traffic.

The TCP for the congestion control works as elimination of the congestion in the sender's field in network layer and transport layer.Flow control is used in TCP to make surety about the non-overwhelming nature of sender towards receiver in the transport layer and data link layer.

What are some steps in object-oriented design process? Explain with examples.

Answers

Answer:

The following are some steps for the object oriented designing process that are:

First, define the proper modes and the context use in the system. Then, design the process of the object oriented system architecture and define its main feature by using the architecture.Identify the given object from the object oriented system for construction of the model of the system.Then, finally specify the object interface in the system.

For example:

For implementing the flow of pipe, Firstly break the transformation into the different level of stages and then define the output and input properly between the pair of the stages. Then, differentiate the operation of each stage of the updates pipeline.

Create a single line comment that says ""Print results to screen""

Answers

Answer:

//""Print results to screen""

Explanation:

In c,c++,java,javascript // is used for the single line comment.

syntax:- // comment.

Whatever text that is followed after // is commented means this line will not get executed by the compiler.

Comments are used to explain the code to other person who is working on the code or trying to understand that code.

The SORT statement is used in the ____________ to place records in a sort work file.

(Points : 2) IDENTIFICATION DIVISION
ENVIRONMENT DIVISION
DATA DIVISION
PROCEDURE DIVISION

Answers

Answer: Procedure division

Explanation:

 The SORT statement is basically used in the procedure division for placing the various records in the sort file. The SORT statement easily accept the records from the different files and then sorting them accordingly to the specific file key in the database.

The SORT statements are used in the procedure division but it does not used in the declarative portion in the sorting file. The SORT statement is basically coded in the form of independent and fixed segment.

. What physical characteristic does a retinal scan biometric device measure?

A. The amount of light reaching the retina

B. The amount of light reflected by the retina

C. The pattern of light receptors at the back of the eye

D. The pattern of blood vessels at the back of the eye.

Answers

Answer: D)The pattern of blood vessels at the back of the eye.

Explanation: The retinal scan is the techniques which is used in the bio-metric mechanism.The scanning of the retina's blood vessel pattern is capture by the scanner is the unique technique which is used for bio-metric purpose.

Blood vessel pattern is capture because it is present in unique form for every person and will help in distinguishing a person from another person while scanning.

Other options are incorrect because light reflection or reaching near retina and light pattern are not the unique way for identification while scanning a person.Thus the correct option is option(D).

In networking, what addressing type is used in sending an email to someone?

A) Broadcast B) Multicast C) Unicast

Answers

Answer: (C) Unicast

Explanation:

 According to the question, if we sending an email to someone individually then, uni-cast addressing type is used. The unit addressing is basically used to represent the single local area network interface.

The unit-cast frame sent only to the specific devices not to the group of the devices. The unitcast basically use between the one source to the one destination.

On the other hand, multicast and broadcast are incorrect because the frame sent to the group of the devices not the specific devices. Therefore, Option (C) is correct.

Answer:

for edge users

a microsoft account

Explanation:

What is a URN (include example)

Answers

Answer: URN(Uniform Resource Name) is the basically a subset of the Uniform Resource identifier(URL). It uses "urn"scheme for the working an implementation. Uniform resource name functions by identifying components uniquely through their name.

The most common example of URN is ISBN (International Standard Book Number)number which helps in the unique searching and identification of book.

Which of these is most closely associated with system control? (1 point) (Points : 1.5) boundary
environment
feedback
interface

Answers

Answer:C) Feedback

Explanation: System control is the controlling and managing activity of the system by commands ,regulations, management practices etc.It helps in the analyzation of the system and improving the ability of performing the tasks.Feedback is the component of the control system that is obtained as the output after the controlling  technique is applied in the system.

Other options are incorrect because environment is the surrounding of the system ,interface is the connection between the components of the system and boundary is not a technical term of control system.Thus, the correct option is option(C).

Create a program that will automatically add the fees and sales tax to a new car.Create a program to find the subtotal andd then total including sales tax. The program should receive a keyboard input representing the vale of the price of the car and the fees as well as the sales tax for the city the car is purchased in. San Francisco, Eurica, Concord California.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

double price,fee,tax;

double total;

cout<<"enter the price of car:";

// read the price of car

cin>>price;

cout<<"enter the fee:";

// read the fee

cin>>fee;

cout<<"enter the tax (in %):";

// read the tax

cin>>tax;

a

// total cost

total=price+fee+(price*tax)/100;

// print the cost

cout<<"total cost is: "<<total<<endl;

return 0;

}

Explanation:

Read the price of the car from user and assign it to variable "price",read fee and assign it to variable "fee" and tax to variable "tax".Then calculate the total cost of the car by adding the fee and tax of car to the price of car.

Output:

enter the price of car:1000

enter the fee:50

enter the tax (in %):10

total cost is: 1150

Program 1: I’m buyin’ a Ferrari! If you’ve ever travelled to another country, you know that working with different currencies takes a while to get used to. As of the date of making this assignment, there are 9,240.00 Guinean Francs to $1 USD. For this program, design (pseudocode) and implement (source code) a program that prompts the user for the amount of U.S. currency they have, and converts it into Ginean Francs.

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

int main()

{

// initialize one Guinean_Francs

   double Guinean_Francs=9240.00;

   int u_s_d;

   double tot_Guinean_Francs;

   cout<<"enter the amount in U.S dollar:";

   // read the dollar

   cin>>u_s_d;

   // conver it into Guinean_Francs

   tot_Guinean_Francs=u_s_d*Guinean_Francs;

   print the output

   cout<<"total Guinean Francs is :"<<tot_Guinean_Francs<<endl;

return 0;

}

Explanation:

Declare and initialize a variable "Guinean_Francs" with 9240.00.Then read the  U S dollar from user and assign it to variable "u_s_d".Then multiply u_s_d  with Guinean_Francs and assign it to tot_Guinean_Francs. This will be the  total Guinean Francs.

Output:

enter the amount in U.S dollar:25                                                                                                                            

total Guinean Francs is :231000  

What is meant by ""responsive design""?

Answers

Answer:

Supported by all devices,screen sizes and orientation.

Explanation:

Responsive design mostly used in Web designs.It is the approach in which the design of the web app must respond to behavior of user and the environment also based on the platform,screen size and orientation.

This should be done by using flexible grids,layouts and some smart use of CSS .

You can also use Bootstrap for responsive designs.

Placeholders are used to defend against what kind of hacking attack?

a

SQL Injection

b

Key stroke logging

c

Phishing

d

Denial of Service

Answers

Answer: (A) SQL injection

Explanation:

 Th SQL ( Structured query language) injection is the code injection method or technique that is basically used in data driven attack various applications. The SQL injections are basically used by hackers for attacking on various websites.

The SQL injection are used by the hackers to insert the malicious structured query language statement in the input state for the execution process in the database.  

When we use the SQL injection during that process, the attacker can easily access and modify the database.

Other Questions
Water at room temperature of 20.0C is poured into an aluminum cylinder which has graduation markings etched on the inside. The reading in the graduations is 300.0 cc. The cylinder with the water in it is then immersed in a constant temperature bath at a temperature of 100C. What is the reading for the level of water on the graduations of the cylinder after the water and the cylinder reach thermal equilibrium with the bath? The volume coefficient of expansion of water is 2.07 10 -4 K -1, and the linear coefficient of expansion of aluminum is 23.0 10 -6 K -1. 305.0 cc 303.5 cc 304.5 cc 304.0 cc 303.3 cc Please help me I help with this. What is the multiplicative rate of change for the exponential function f(x) = f start bracket x end bracket equals two start bracket five-halves end bracket superscript negative x what are some chemical properties of a rock? Suppose that a submarine inadvertently sinks to the bottom of the ocean at a depth of 1000m. It is proposed to lower a diving bell to the submarine and attempt to enter the conning tower. What must the minimum air pressure be in the diving bell at the level of the submarine to prevent water from entering into the bell when the opening valve at the bottom is cracked open slightly? Give your answer in absolute kilopascal. Assume that seawater has a constant density of 1.024 g/cm3. Different kinds of wood have different densities. The density of american white oak wood is generally 0.77 g/cm3. If Jim grabs a 38.5 cm3 piece of wood out of his pile of materials, what would the mass be if that pile was all american white oak? Is there any reason that mitosis could not occur in a cell whose genome is haploid? The following data were taken from the financial statements of The Amphlett Corporation, which is all equity financed. 2012 2013 Net sales $147,860 $163,585 Net income 26,765 30,340 Total assets 191,225 212,440 Shareholders' equity 101,975 121,165 Required Calculate the following ratios for 2012 and 2013: 2012 2013 a. Return on equity (round to one decimal place) Answer 0 % Answer 0 % b. Return on assets (round to one decimal place) Answer 0 % Answer 0 % c. Return on sales (round to one decimal place) Answer 0 % Answer 0 % d. Total assets to shareholders' equity (financial leverage) (round to two decimal places) Answer 0 Answer 0 e. Asset turnover (round to two decimal places) Answer 0 Answer 0 Find the values of x and y.(10x 61)(18y + 5)(x + 10) CAN SOMEONE HELP ME WITH THIS???????????????? If Shawn can produce donuts at a lower opportunity cost than Sue, then ____ (A) Shawn has a comparative advantage in the production of donuts. (B) Sue has a comparative advantage in the production of donuts. (C) Shawn should not produce donuts. (D) Shawn is capable of producing more donuts than Sue in a given amount of time The age of the universe is thought to be about 14 billion years. Assuming two significant figures, (a) write this in exponential notation in units of years, and (b) use the method shown in class to convert this to seconds. Give your answer in exponential notation. What step in the scientific method tests the hypothesis?communicate findingsquestionexperimentconclusion Orders for a computer are summarized by the optional features that are requested. The proportion of orders with no optional features is 0.40. The proportion of orders with one optional feature is 0.34. The proportion of orders with more than one optional feature is 0.26. (a) What is the probability that an order requests at least one optional feature? Round your answer to two decimal places (e.g. 98.76). (b) What is the probability that an order does not request more than one optional feature? Round your answers to two decimal places (e.g. 98.76). A solution contains a mixture of pentane and hexane at room temperature. The solution has a vapor pressure of 241 torr. Pure pentane and hexane have vapor pressures of 425 torr and 151 torr, respectively, at room temperature.What is the mole fraction of hexane? (Assume ideal behavior.) Which is an example of something heated by conduction?food heated in a microwave ovena waffle iron heated by coilspavement heated by the suna room heated by moving air PLEASE ANSWER FAST I WILL GIVE BRAINLY AND 20 POINTS!!!!!!!!Question 2 Multiple Choice Worth 5 points)Walking is not the most exciting form of exercise a person can take on for fitness. Yet it is low impact and requires no fancy equipment. That makes walking a simple activity for those new to exercise.Walicing is less likely than other exercises to cause injury to leg tendons and muscles. Al it requires is a good pair of sneakers-no cables, stylish outfits, or weights required. Of course, a person couldincrease the benefit of a workout by adding weights or speed walking How does the third sentence (That makes walkingsupport the main idea of the paragraph?It points out that walking is a good introduction to exercise for beginnersIt says that walking is too easy for people who have experience with exerciseIt points out that beginning exercisers may not like walking because it is too easyIt says that walking is less costly than other activities because it needs no equipment. The price of a calculator is currently $23, which is a 532% decrease from the price thirty years ago. What was the price of the calculator thirty years ago? What are the factors used to measure the "multinationality" of a company? Multiple Choice - Ratio of foreign sales to total sales - Ratio of foreign sales to total assets - Ratio of foreign employees to total employees - All answers are correct Depending on the cycle, washing a load ofclothes takes from 22 to 28 minutes. Diyingtakes an additional 20 to 30 minutes. Whatare the woun and maximum total timesto complete a load of laundry?