Business customers pay $0.006 per gallon for the first 8000 gallons. If the usage is more than 8000 gallons, the rate will be $0.008 per gallon after the first 8000 gallons. For example, a residential customer who has used 9000 gallons will pay $30 for the first 6000 gallons ($0.005 * 6000), plus $21 for the other 3000 gallons ($0.007 * 3000). The total bill will be $51. A business customer who has used 9000 gallons will pay $48 for the first 8000 gallons ($0.006 * 8000), plus $8 for the other 1000 gallons ($0.008 * 1000). The total bill will be $56. Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.

Answers

Answer 1

Answer:

#include <bits/stdc++.h>

using namespace std;

int main()

{

   // variables

   char cust_t;

   int no_gallon;

   double cost=0;

   cout<<"Enter the type of customer(B for business or R for residential):";

   // read the type of customer

   cin>>cust_t;

   // if type is business

   if(cust_t=='b'||cust_t=='B')

   {

       cout<<"please enter the number of gallons:";

       // read the number of gallons

       cin>>no_gallon;

       // if number of gallons are less or equal to 8000

       if(no_gallon<=8000)

       {

           // calculate cost

           cost=no_gallon*0.006;

           cout<<"total cost is: $"<<cost<<endl;

       }

       else

       {

           // if number of gallons is greater than 8000

           // calculate cost

           cost=(8000*0.006)+((no_gallon-8000)*0.008);

           cout<<"total cost is: $"<<cost<<endl;

           

       }

       

   }

   

   // if customer type is residential

   else if(cust_t=='r'||cust_t=='R')

        {

           

       cout<<"please enter the number of gallons:";

       // read the number of gallons

       cin>>no_gallon;

       // if number of gallons are less or equal to 8000

       if(no_gallon<=8000)

       {

           // calculate cost

           cost=no_gallon*0.007;

           cout<<"total cost is: $"<<cost<<endl;

       }

       else

       {// if number of gallons is greater than 8000

       // calculate cost

           cost=(8000*0.005)+((no_gallon-8000)*0.007);

           cout<<"total cost is: $"<<cost<<endl;      

       }        

   }

return 0;

}

Explanation:

Ask user to enter the type of customer and assign it to variable "cust_t". If the customer type is business then read the number of gallons from user and assign it to variable "no_gallon". Then calculate cost of gallons, if  gallons are less or equal to 800 then multiply it with 0.006.And if gallons are greater than 8000, cost for  first 8000 will be multiply by 0.006 and  for rest gallons multiply with 0.008.Similarly if customer type is residential then for first 8000 gallons cost will be multiply by 0.005 and for rest it will  multiply by 0.007. Then print the cost.

Output:

Enter the type of customer(B for business or R for residential):b                                                                                            

please enter the number of gallons:9000                                                                                                                      

total cost is: $56  


Related Questions

A standard group of eight bits makes up a byte.

True

False

Answers

Think the answer is false

Answer:

false

Explanation:

i agree with top

Which of the following is the best reason to use a macro?: *
a. You want to send a personalized form email to many people
b. You want to correct the citations in a research paper
c. You want to automate a repetitive task to save time
d. You want to build a table based on an Excel spreadsheet

Answers

Answer:c)You want to automate a repetitive task to save time

Explanation: Macro is the program that is utilized when there is a requirement of a task or operation to be repeated in a automatic way.This helps in saving the time without commanding the same operation to take place manually.

This program works by taking the into and generating the preset output sequence. Other options are incorrect because it does not help in email functions, correction of the citation in documents or generation of the table.Thus, the correct option is option(c).

The use of macros is best suited for automating repetitive tasks, which saves time and increases efficiency, especially in applications like Excel. C is correct.

The best reason to use a macro is to automate a repetitive task to save time. Macros are used to streamline activities such as data entry in Excel, through repetitive tasks like keyboard shortcuts or Automatic Completion. These utilities are designed for users to quickly navigate worksheets and automate tasks; thus, eliminating the need to perform monotonous actions.

Automation in general allows you to focus on more important activities rather than getting bogged down with tedious tasks. For instance, you might use macros to write little programs for formulas you use frequently, adding efficiency to your workflow.

Why do we need to pass a size as well as the array to any function/procedure where we want it to use this array?

Answers

Explanation:

In C++ or C we don't have a function which tells us the size of array which is required.So it is necessary to pass the size of the arrays in the function.At the time of declaration we declare the size of the array more than we need.Then we store the elements upto the size which is necessary.So the actual size of the array is larger than the size we needed.So hence it is necessary to pass the size of the array.

Who distributes IP Address?

Answers

Answer:

 The IP address is the internet protocol address that is basically assign to every device that is particularly connected to the network of the computer. The internet protocol is basically useful for the communication.

The main function of the IP address is that:

Used in the location addressingFor the network and host interface identification.

The IP address is basically distributed by the IANA ( Internet assigned number authority) and the main responsibility of the internet protocol is to distribute the IP address with the help of the RIR (Regional internet registries).

Which of the following functions is NOT performed at layer 6 of the OSI model? (Please select one of the four options)

Routing of the message

Encryption

Compression

Converting the message to a format that is understood by the destination

Answers

Answer:  The function that is NOT performed at the layer 6 of the OSI model from the options presented, is the first one: Routing of the message.

Explanation:

In the OSI model, Layer 6 is called the Presentation Layer, and is basically responsible of taking the message forwarded by one Application Layer protocol (like HTTP) and formatting it a way that can be uniquely decoded at his intended destination.

This processes can include Encryption and Compression, among others.

So, Layer 6 is not responsible for routing the message (this is a function of the Layer 3, the Network Layer).

write a program to insert student grade and print the following

90 -> A
> 80 -> B
> 70 -> C
> 60 -> D
< 60 -> "Fail"

Answers

Answer:

The answer is the program, in the explanation

Explanation:

I am going to write a C program.

int main(){

int grade = -1; /*The grade will be read to this variable*/

/*This loop will keep repeating until a valid grade is inserted*/

while(grade < 0 || grade > 100){

         printf("Insert the student's grade: %n");

         scanf("%d", &grade);

}

/*The conditional according to the grade value*/

if (grade >= 90){

     printf("Your grade is A\n");

}

else if (grade >= 80 && grade < 90){

     printf("Your grade is B\n");

}

else if (grade >= 70 && grade < 80){

     printf("Your grade is C\n");

}

else if (grade >= 60 && grade < 70){

     printf("Your grade is D\n");

}

else{

    printf("You got a failling grade\n");

}

return 0;

}

what are indexes in a database?

a Indexes are locations of tables within a database.

b Indexes are the quick references for fast data retrieval of data from a database.

c Indexes are the slow references for fast data retrieval of data from a database.

d Indexes are the quick references for fast data inserts of data.

Answers

Answer: A) Indexes are locations of tables within a database.

Explanation: The index of a database is a data structure that improves the speed of operations, by means of a unique identifier of each row of a table, allowing rapid access to the records of a table in a database. It has an operation similar to the index of a book, keeping pairs of elements: the element to be indexed and its position in the database.

Write a java program that will take 2 String inputs and perform the following operation on them: a) Show length of the strings b) Concatenate two strings c) Convert those two strings to uppercase.

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

   // main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

 // scanner object to read input from user

Scanner scr=new Scanner(System.in);

 // string variables

String st1,st2;

System.out.print("enter the first string:");

 // read the first string

st1=scr.nextLine();

System.out.print("enter the second string:");

 // read the second string

st2=scr.nextLine();

// part (a)

 // find length of each string

System.out.println("length of first string is: "+st1.length());

System.out.println("length of second string is: "+st2.length());

//part(b)

 // concatenate both the string

System.out.print("after Concatenate both string: ");

System.out.print(st1+st2);

// part(c)

 // convert them to upper case

System.out.println("first string in upper case :"+st1.toUpperCase());

System.out.println("second string in upper case :"+st2.toUpperCase());

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read two strings st1 and st2 with scanner object.In part a, find the length of each string with the help of .length() method and print the length.In part b, concatenate both the string with + operator.In part c, convert each string to upper case with the help of .toUpperCase()  method.

Output:

enter the first string:hello

enter the second string:world!!

length of first string is: 5

length of second string is: 7

after Concatenate both string: hello world!!

first string in upper case :HELLO

second string in upper case :WORLD!!

The month of February normally has 28 days. But if it is a leap year, February has 29 days. Write a program that asks the user to enter a year. The program should then display the number of days in February that year. Use the following criteria to identify leap years: 1. Determine whether the year is divisible by 100. If it is, then it is a leap year if and only if it is also divisible by 400. For example, 2000 is a leap year, but 2100 is not. 2. If the year is not divisible by 100, then it is a leap year if and only if it is divisible by 4. For example, 2008 is a leap year, but 2009 is not.

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

public class Main

{

// main method of the class

public static void main(String[] args) {

    // scanner object to read input from user

    Scanner s=new Scanner(System.in);

      // ask user to enter year

       System.out.print("Enter the year:");

       // read year

      int inp_year=s.nextInt();

      // check the leap year

      if(((inp_year % 4 == 0) && (inp_year % 100!= 0)) || (inp_year%400 == 0))

      {

      // print the day in the February of leap year

          System.out.println("Year "+inp_year+" has 29 days in February.");

      }

      else

      System.out.println("Year "+inp_year+" has 28 days in February.");

}

}

Explanation:

Read year from user and assign it to variable "year" with scanner object. Check the entered year is a leap year or not. A year is divisible by 100 and then check if it divisible by 400. If both condition is true then year is leap year.If year is not divisible by 100 and divisible by 4 then also it is a leap year. if year is leap then there will be 29 days in February of that year. Else there will 28 days in the February.

Output:

Enter the year:2000

Year 2000 has 29 days in February.

Enter the year:2002

Year 2002 has 28 days in February.

Final answer:

To check if a year makes February have 29 days, you must evaluate if it is divisible by 4 but not 100, unless it's also divisible by 400. A programming example demonstrates how to calculate this in Python.

Explanation:

The Gregorian Calendar is what we use today, which has 28 days in February unless it's a leap year. To determine if it's a leap year, you must check if the year is divisible by 4 but not 100, unless it's also divisible by 400. Here's a straightforward way to write a program in Python that calculates this:

year = int(input('Enter a year: '))
if year % 100 == 0:
   if year % 400 == 0:
       print('February has 29 days.')
   else:
       print('February has 28 days.')
else:
   if year % 4 == 0:
       print('February has 29 days.')
   else:
       print('February has 28 days.')

This condition checks for the criteria set forth to determine if February in the input year would have 28 or 29 days.

Write program to calculate the sum of the following series where in is input by user. (1/1 + 1/2 + 1/3 +..... 1/n)

Answers

Answer:

#here is code in Python.

#read the value n from user

n=int(input("enter the value of n:"))

#variable to store the total sum

sum_n=0

for i in range(1,n+1):

# find the sum of series

   sum_n=sum_n+1/i

#print the sum

print("sum of the series is: ",sum_n)

Explanation:

Read the value of n from user. Create and initialize a variable sum_n with 0. Run a for loop to calculate sum.Initially sum_n is 0, then for value of i=1  1/i will be added to the sum_n.Then in next iteration for i=1, 1/2 added to sum_n. Similarly loop will run util i equals to n.Then sum_n will store the sum of the

series.

Output:

enter the value of n:5

sum of the series is:  2.283333333333333

If you declare a variable as an instance variable within a class, and you declare and use the same variable name within a method of the class, then within the method, a) the variable used inside the method takes precedence b) the class instance variable takes precedence c) the two variables refer to a single memory address d) an error will occur

Answers

Answer:

Option(a) is the correct answer for the given question.

Explanation:

If we declared a variable with the same name in class and method both then the variable which is declared inside the method overrides the definition of variable which is declared in class .It means the variable which is used inside the method takes precedence.

For example:

public class Main

{

int c=90; // class varaible or instance varaible

void sum1()

{

   int c=4; // method having same name as class varaible name

   c=c+10;

   System.out.println(c);

}

public static void main(String[] args)

{

 Main ob=new Main();

 ob.sum1();

}

}

Output:

14

In this example the variable 'c' is declared in both class and function but variable c takes the precedence inside the method sum1() and display 14.

Final answer:

When a variable is declared as an instance variable within a class and the same variable name is declared and used within a method of the class, the variable used inside the method takes precedence over the class instance variable.

Explanation:

When a variable is declared as an instance variable within a class, and the same variable name is declared and used within a method of the class, the variable used inside the method takes precedence over the class instance variable. This is because local variables within a method have higher priority than instance variables in terms of accessing and modifying their values. The local variable and instance variable are separate and refer to different memory addresses.

A(n) ____ can be a spreadsheet showing all the costs to be incurred by the system and all the benefits that are expected from its operation.

Answers

Answer: Cost or benefit analysis

Explanation: Cost or benefit analysis is the technique that is carried out in the business organization for the evaluation and testing of the decision, process and functioning. This method helps in the calculation of the benefits regarding the cost.

Cost analysis can evaluate the benefit of the cost as well as the deduction of the cost from benefits gained.It is used for making the decision related with finance in a particular organization.

-What is/are the goal/s of Business Intelligence systems?

Answers

Answer: Business intelligence system is a system that is used in the field of business and organizations for generations of the strategy and plans to make decision. This system consist of the business intelligence(BI) tools. It creates a connection in the different information/data and takes them to the business organization.

Business intelligence system has goals like:-

Increasing daily salesFast the growth rate of the businessimproving the rental performanceGaining more profit

One advantage of using a security management firm for security monitoring is that it has a high level of expertise.

True

False

Answers

Answer: True

Explanation: Security management firm is the organization that provides protection to the system, functions,data, people etc of any particular business organization.They are highly capable of the problem avoidance, management of risk and other such issues.

The monitoring of the security done by the people and devices of the security management firm are more reliable and assured due to the expert skill they persist in the security field. Thus, the given statement is true.

Answer:

The correct answer to the following question will be True.

Explanation:

Security management firm is the organization that provides security to any particular business organization's network, processes, records, people etc.They are highly capable of avoiding the problem, handling the danger and other such problems.

Communicate to workers that maintaining the network is in the best interests not only of the company but also of consumers.Raise knowledge of security issues amongst workers.Provide appropriate training for the health of employees.Track user behavior to determine implementation of the protection.

The security monitoring performed by the security management firm's people and equipment is more accurate and confident due to the experience they retain in the field of security. Therefore, the statement given is valid or True.

How to determine if the function f(x) = x^2 + 3 from real numbers to real numbers is Injective, surjective, or bijective

Answers

Answer:

The function is not injective.

The function is not surjective.

The function is not bijective.

Explanation:

A function f(x) is injective if, and only if, [tex]a = b[/tex] when [tex]f(a) = f(b)[/tex].

So

[tex]f(x) = x^{2} + 3[/tex]

[tex]f(a) = f(b)[/tex]

[tex]a^{2} + 3 = b^{2} + 3[/tex]

[tex]a^{2} = b^{2}[/tex]

[tex]a = \pm b[/tex]

Since we may have [tex]f(a) = f(b)[/tex] when, for example, [tex]a = -b[/tex], the function is not injective.

A function f(x) is surjective, if, and only if, for each value of y, there is a value of x such that [tex]f(x) = y[/tex].

We have that y is composed of all the real numbers.

Here we have:

[tex]f(x) = y[/tex]

[tex]y = x^{2} + 3[/tex]

[tex]x^{2} = y - 3[/tex]

[tex]x = \sqrt{y-3}[/tex]

There is only a value of x such that [tex]f(x) = y[/tex] for [tex]y \geq 3[/tex]. So the function is not surjective.

A function f(x) is bijective when it is both injective and surjective. So this function is not bijective.

What is CSMA/CD and how does it work?

Answers

Answer:

Carrier Sense Multiple Access / Collision Detection abbreviated as CSMA/CD, is known as a set of rules that determines how a network devices tends to respond when devices attempt to use data channel simultaneously. It tends to work by detecting a collision in the medium and backing off as necessary. Consider a LAN with several hosts. When one of them transmits a frame, it tends to listens on medium in order to check whether medium is busy.

Discuss the purpose of these Windows CLI commands

Answers

Answer:

 The window CLI command in the computer is basically stand for the command line interface. The command line interface is basically define as interacting with the various computer programs where the users use the command in the program by using various command lines.

The basic purpose of the CLI commands is that it takes less resources of the computer system. In earlier year of the computing this command used as a standard way for interacting with the computer other than mouse.

The command line interface (CLI) is basically handle the interface of the program. It is also known as command line processor.

. What are regressions?

Answers

Answer:

 Regressions is the statistical analysis that is basically used for the measurement in different type of the investing data and financial data.

It is basically used to determined the relationship between the depended and independent variable.

By using regression, it include various types of the technology for analyzing and modeling various types of variable. It is also used in many business to predict the various exchange rate and stock prices.

The MAC address is a _____ bit number.

Answers

Answer:

48.

Explanation:

MAC addresses are 48 bits or 6 bytes or 12 digit hexadecimal numbers.There are three formats of writing the MAC address which are as following:-

MM-MM-MM-SS-SS-SS

MMM.MMM.SSS.SSS

MM:MM:MM:SS:SS:SS

MAC address also called the physical address is a binary number which is used to  uniquely identify the computer network adapters.MAC address is assigned to the system at the time of manufacturing.

Answer: 48 bits

Explanation:MAC (Media Access control) address is the the unique identity provided to the device in a particular network. The communication taking place in a networking is done by the MAC address .

MAC address is a hexadecimal value of 12 digit which is found on the network interface card (NIC). The address is of 6 bytes which is equals to 48 bits.

Example of MAC address- 00:0b:95:9a:62:15

 

With the help of a for-loop, write a C++ program to input and display any multidimensional matrix.

Answers

Answer:

// here is code in C++ to demonstrate a 2-dimensional array.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

int r,c;

cout<<"enter the number of row:";

// read the value of row

cin>>r;

cout<<"enter the number of column:";

// read the value of column

cin>>c;

// create a 2-d array

int arr[r][c];

// read the value of array

cout<<"enter the elements of array:"<<endl;

for(int a=0;a<r;a++)

{

   for(int b=0;b<c;b++)

   {

       cin>>arr[a][b];

   }

}

cout<<"elements of the array are:"<<endl;

// print the array

for(int a=0;a<r;a++)

{

   for(int b=0;b<c;b++)

   {

       cout<<arr[a][b]<<" ";

   }

   cout<<endl;

}

return 0;

}

Explanation:

Here we have demonstrate a 2- dimensional array. In which, how to read the elements and how to print elements of array.Read the value of row and column from user.Create a 2-d array of size rxc. then read the elements of array either row wise or column wise. Then print the elements.To print the elements, we can go either row wise or column.

Output:

enter the number of row:3

enter the number of column:3

enter the elements of array:

1 2 3

9 8 7

2 4 6

elements of the array are:

1 2 3

9 8 7

2 4 6

What is a 'balanced' dfd?

Answers

Answer:

 The balanced DFD (Data flow diagram) is the concept of the balancing all the state and incoming and also outgoing flow in the system.

The balanced data flow diagram basically ensure that the output and input data flow maintain the consistency in the DFD and are properly aligned the flow of data.

A balanced DFD does not include any type of flowchart in the control statement and also does not contain any crossing lines.

Answer:

It is how you place an input then you get an output of a graphic

Explanation:

.Visual Studio .NET’s ___________ feature displays all the members in a class

a.real-time error checking

b.Quick Info

c.outlined code

d.Intellisense

Answers

Answer:d)Intellisense

Explanation: Visual Studio.NET is the tool for the development of the application .Intellisense is the type of code that is found in the Visual Studio.NET which is used for the intelligent completion of text or code. The factors present in the Visual studio NET has are tracking of the values, increasing the understanding of code,presenting the class member etc.

Other options are incorrect because real time error checking is for the checking of the error raising at the time of execution, Quick info is for gaining data rapidly and outlined code are for display of the hierarchical structure of codes.Thus, the correct option is option(d).

Discuss the major features of optical disk memory system.

Answers

Answer:

Some major features of the optical disk memory system are that:

The optical disk system has high storage capacity and store maximum data in the optical disc.  Optical discs are very cost effective and inexpensive for manufacture the optical discs. The optical disk used the laser light for reading the data or information in the optical disk.It basically offer 27 gigabytes on the single 12 centimeter optical memory disk system.

Describe what a relational database is and why relational databases are needed.

Answers

Answer:

 The relational database is basically used as the set of the table in which the data can be easily accessible without any re-organizing the table in the database.

In the structured query language (SQL), the relational database is used as the standard users and API ( Application programming interface).

Relational database is basically needed to store the information or data in the form of tables. Due to the relational database, we can easily compare the data or information because the data are arranged in the form of columns.

If variable x has value 2 and y has value 2, what is the value of the following Jack expression?

(x + 3) / (4 - y)

Answers

Answer:

The value of the following expression is "2".

Explanation:

Here x has value 2 means x=2,and y has value 2 means y=2.

so (x+3)/(4-y)

  (2+3)/(4-2)

5/2 it gives 2 because /(slash) operator gives the quotient part .The slash    operator divide the left hand operand by the right hand operand.On dividing 5/2 it returns integer value i.e 2.

A circuit-switching scenario in which Ncs users, each requiring a bandwidth of 10 Mbps, must share a link of capacity 150 Mbps. What is the maximum number of circuit-switched users that can be supported?

Answers

17
Find y if the line through (5,3) and (-3, y) has a slope m = -

What does the metric column in a routing table do?

Answers

Answer:

 The metric column basically indicate the cost of the route in the routing table and also decide correct route in the routing table.

In the routing table, the lowest metric route is more preferable route as compared to others. In the networking, the routing table is basically used to store the data or information in the form of table in the router.

In the computer network, the routes are listed for the particular destination in which the routes are basically associate that particular routes.

Why is wider channel bandwidth good?

Answers

Answer:

The wider channel bandwidth is efficient and good as it help in increasing the speed of the transmission. Due to the wider channel of the bandwidth it also lead to consuming less energy of the battery and make cost effective.

Due to the wider bandwidth, the number of clients can easily share and transfer the data in the channel and also make the transmission complete.

If the channel of the bandwidth is double then, the single transmission can easily carry more data. Hence, it also lead to double the speed of the transmission.

. A database management system (DBMS) is general purpose software that _____________________ and _______________________ a database.

Answers

Answer: Creating and managing

Explanation:

 A database management system (DBMS) is basically the general purpose software that helps in creating and managing  the database system. The database management system basically provide the systematic way for creating, updating and managing the data for the users.

The DBMS basically make possible to the end users to read, create, delete and also update the given data in the database system.  

Final answer:

A database management system (DBMS) is a software that enables the creation, storage, and manipulation of large datasets. It allows users to easily manage databases and perform complex queries to retrieve specific data.

Explanation:

A database management system (DBMS) is a general-purpose software that allows for the creation, storage, maintenance, manipulation, and retrieval of large datasets distributed over one or more files.

For example, Microsoft Access and Oracle are commercial software packages that provide DBMS functionality. With a DBMS, users can easily create and manage databases, perform complex queries to retrieve specific data, and ensure the security and integrity of the stored information.

Convert (126)10 to binary.

Answers

Answer:

[tex]126_{10}=1111110_2[/tex]

Explanation:

In order to get this convertion done, we have to divide by two the decimal number, take note of the quotient and reminder, then divide the result by two until the result of the division is zero.

[tex]126| 2[/tex]

[tex]quotient_1=63\\remainder_1=0[/tex]

[tex]63| 2[/tex]

[tex]quotient_2=31\\remainder_2=1[/tex]

[tex]31| 2[/tex]

[tex]quotient_3=15\\remainder_3=1[/tex]

[tex]15| 2[/tex]

[tex]quotient_4=7\\remainder_4=1[/tex]

[tex]7| 2[/tex]

[tex]quotient_5=3\\remainder_5=1[/tex]

[tex]3| 2[/tex]

[tex]quotient_6=1\\remainder_6=1[/tex]

[tex]1| 2[/tex]

[tex]quotient_7=0\\remainder_7=1[/tex]

Now the last remainder is the most significant bit, and the first remainder the least significative, so:

[tex]126_{10}=1111110_2[/tex]

Other Questions
Hurry please help!!!Identify the gerund and gerund phrase in the following sentences:"Facing his teachers was never frightening for him." Write x'" = x + t as a first order system Why did the Britishcolonies fight? What is the difference between frontend and backend web development? In art class Ms smith is working on polygons. She want the students to Create a picture of the polygons. She points out to the class That there is are three sides to a triangle, 4 sides on a quadrilateral , 5 sides on a pentagon, and six sides on a hexagon, How many more side are on a hexagon than on a quadrilateral What is the value of y when this code executes?def foo(x) :if x >= 0 :return 6 * xy = foo(-10)y = Noney = 60y = -60y = 20 Which famous scientist is credited as the founder of the scientific method?AristotleJohn DaltonSir Francis BaconSir Isaac Newton What is a party caucus? A)a closed meeting between two or more House committees B)a meeting between the majority leader of the House and the majority leader of the Senate C)a meeting between a House committee and its corresponding Senate committee D)a closed meeting of a party's House or Senate members The following passage would be appropriate for a document aimed at a multicultural audience: Two companies found themselves in the financial equivalent of sudden-death overtime. The first to raise the necessary capital would be the one to survive. True or false? which statement besy describes how the calormeter can be used to determine ghe specific heat capacity of the metal sample You are on a train traveling east at speed of 28 m/s with respect to the ground. 1) If you walk east toward the front of the train, with a speed of 1.5 m/s with respect to the train, what is your velocity with respect to the ground? (m/s east)2) If you walk west toward the back of the train, with a speed of 2.1 m/s with respect to the train, what is your velocity with respect to the ground? (m/s, east)3) Your friend is sitting on another train traveling west at 22 m/s. As you walk toward the back of your train at 2.1 m/s, what is your velocity with respect to your friend? (m/s, east) What is the magnitude of the sum of the two vectors A = 36 units at 53 degrees, and B =47 units at 157 degrees. A 15-year-old female presents to the ER following a physical assault. She has internal damage to the neck with deep bruising. X-ray reveals fractures of the hyoid bone and tracheal and cricoid cartilage. Which of the following most likely caused her injuries?A. Chemical asphyxiation.B. Choking asphyxiation.C. Ligature strangulation.D. Manual strangulation. supppose we already have a list called words, containing all the words(i.e., string).Write code that produce a sorted list with all duplicate words removed. For example, if words ==['hello', 'mother','hello','father','here','i','am','hello'], your code would produce the list ['am','father','hello','here','i','mother']. Seth traveled 1 mile in 57.1 seconds how many miles per hour does he drive which expression has the greatest value |-21|, |14|, |30|, |-45| A recipe requires 3 cups of sugar. You can only measure using 2/5 cups. how many 2/5 cups are needed for the recipe A much-used and potent managerial tool for determining whether a company performs particular functions or activities in a manner that represents "the best practice" when both cost and effectiveness are taken into account is benchmarking. a) resource/capability mapping. b) value chain analysis. c) competitive capability analysis. d) SWOT analysis. A federal law requires that employers with 15 or more employees take steps to "reasonably accommodate" the religious needs and practices of their employees. A law, such as this one, that gives rights and imposes duties is an example of an ______ law. What is an agora, and how is it used?