Computer Science (IT). My lecture was asking to do the final year project but i still haven't got the title. Does anyone can give me good recommendation of what the project i should do for my final year project?

Answers

Answer 1

Answer:

Hi, of course.

Project ideas:

Household temperature monitoring  Internet of things

Registration of people entering a shopping center during peak hours  with Internet of things

Smart houses with Internet of things

Explanation:

At the moment I am working on projects related to Internet of things and it is a fantastic world in which to enter, try searching  Internet of things fundamentals on yt and you soak up the subject, then you can start looking on the first hello world in arduino with Internet of things.

In this moment I'm working on a gps tracker for a public buses and it's not too hard as it's sound.

I hope it's help you

Answer 2

Choose a final year project that interests you and showcases your skills, such as machine learning, web development, mobile apps, cybersecurity, or IoT. Engage with faculty for guidance and consider past coursework to generate ideas.

Here are some recommended project ideas:

Machine Learning Algorithms: Develop a project that uses machine learning algorithms to solve a real-world problem, such as predicting stock market trends or diagnosing medical conditions based on patient data.Web Development: Create a comprehensive web application, perhaps an e-commerce site or a social networking platform, focusing on both front-end and back-end development.Mobile Application Development: Build a useful mobile app, such as a fitness tracker, budgeting tool, or educational game. Include features that integrate with various APIs for an enhanced user experience.Cybersecurity: Design a system for detecting and preventing cybersecurity threats, which could involve creating a new type of firewall, intrusion detection system, or a secure communication protocol.Internet of Things (IoT): Develop an IoT solution, like a smart home automation system or an environment monitoring network, utilizing sensors and cloud computing for data analysis and real-time monitoring.

When choosing a project, consider what interests you the most and what areas you want to become more proficient in. Engage with faculty members who have expertise in your area of interest for mentorship and guidance. Additionally, reflect on past coursework that you found particularly engaging or challenging, as it might spark project ideas.


Related Questions

The ____ is the type to which all operands in an expression are converted so that they are compatible with each other.

a.
data type

b.
primitive

c.
unifying type

d.
numbered

Answers

Answer: the correct answer is c. unifying type .

Explanation:

The unifying type is the type to which all operands in an expression are converted so that they are compatible with each other.

what are the different type of topologies..?

Answers

Answer: There are different types of topologies are: 1) Bus topology, 2)Star topology, 3)Ring topology  

Explanation:  The physical layout in which the network connection are made is known as topology.

Types of topologies are explained as:

1) Bus topology-

It is a type of network where every device is connected to a single cable, which runs one end to another.  In this data is transmitted in one direction only and it is also known as linear bus topology.It is cost effective because they can be run in a single cable.

2) Star topology-

In star topology every node in the network is connected to one central node. The central node or hub also acts as a repeater and it can manage the entire network from one location.

3) Ring topology-

In this topology computers are connected to each other in circular format and every device in a network will have two neighbors. In this the risk of collision is very low and low cost to install.

Write a c++ program that accepts a string from the user and then replaces all occurrences of the letter e with the letter x

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   string str;

   cout<<"Enter the string: ";

   cin>>str;

   for(int i=0;str[i]!='\0';i++){

       if(str[i]=='e'){

           str[i]='x';

       }

   }

   cout<<"the string is: "<<str<<endl;

  return 0;

}

Explanation:

First, include the library iostream for using the input/output instructions.

Create the main function and declare the variables.

Then, use the cout instruction and print the message on the screen.

cin store the string enter by the user into a variable.

After that, take a for loop and if-else statement for checking the condition if the string contains the 'e', then change that alphabet to 'x'.

This process continues until the string not empty.

Finally, print the updated string.

Why must you be careful when handling a hard drive?

Answers

You must be careful while handling a hard drive because If you’re not careful with it the hard drive may corrupt or crash.

TRUE/FALSE



10. The Intel 8259 Programmable Interrupt Controller (PIC) schedules the handling of interrupts according to their priority levels.

Answers

Answer:

TRUE

Explanation:

The Intel 8259 is a device designed for 8085 and 8086 intel microprocessor.

The Intel 8259 Interrupt Controller (PIC) accept the requests from the  I/O devices and check whether the requests is of the higher priority than the ongoing request serviced by CPU. Interrupt is issued to the CPU based on priorities,if the request is of higher priority than ongoing service then Interrupt will be issued the ongoing service will pause and the new request will be processed. If new request has less priority then no interrupt will be issued, New request will wait for CPU to free.      

 

Define an I/O port. Which functions are performed by it?

Answers

Answer:

I/O port is an input output port of a computer which is capable of receiving (input) and sending (output) data. The main function of a I/O port is to send and receive data. As it is used to transfer data. Device such as keyboards is an input device and printer is an output device.  

For example - Modem is an input output port and device where we can connect it with the computer is called I/O port.

When an integer is subtracted from a pointer variable, the value of the pointer variable is decremented by the integer times half the size of the memory to which the pointer is pointing.

True

False

Answers

Answer:

False

Explanation:

When you apply subtraction (arithmetic operation) on Pointer variable ,then pointer variable is decremented by the (integer*sizeofmemory).

Example

            #include<stdio.h>

           //driver function

             int main()

          {

            float *ptr=(float *)100; //initializing  ptr as pointer type

            ptr=ptr-2; //subtracting pointer by 2(integer)

           printf("New Value of ptr is %u",ptr);

            return 0;

          }

Output

New Value of ptr is 92

Explanation of Code

ptr = ptr   - 2 * (sizeof(float))

   = 100  - 2 * (4) //float size is 4 bytes

   = 100  - 8

   = 92

Does Logarithms and Algorithms same things?

Answers

Answer: No, logarithms and algorithms are not the same things.

Explanation:

Logarithms:- It is usually mention term in the mathematical field. It is mentioned as the  function used for determination of exponent of base where the base is equal to some known number.

Algorithms:- It is a procedure which is used for solving any certain type of problem using tools like flowchart, programming languages etc. It is usually a term that is mentioned in computer science or mathematics to solve a problem in steps , instruction or other ways.

Which type of partitioning is performed onRelation-X?

a. Horizontal Partitioning

b. Vertical Partitioning

c. Replication

d. Noneof above

Answers

Answer: B) Vertical Partitioning

Explanation:

As, vertical partitioning is performed on Relation X, it is used for dividing the relation X vertically in columns and it involves creation of tables and columns. They also use some additional tables to store left out columns. We cannot partition the column without perform any modification of value of the column. It only relies on keeping the particular attributes of relation X.

The goal of quality assurance is toprovide management with the data needed to determine whichsoftware engineers are producingthe most defects.
i. True

ii. False

Answers

The answer to your question is true

Enterprise Resource Planning (ERP) is an example of a single user database.

A.

True

B.

False

Answers

Answer:

false

Explanation:

Under what circumstances would a user bebetter off using a time-sharing system rather than a PC or asingle-user workstation?

Answers

Answer:

Time and Money

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

A time-shared system has its benefits compared to a PC or single-user workstation. Firstly, if more than one person is working on the same project it can save time instead of finishing a part on a single-user workstation and having to move, upload and download constant information.

Secondly, and most importantly is probably the amount of money or investment needed for for more than one workstation. Having a time-shared system saves a huge amount of money for a company especially if the company is tight on a budget.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Write multiple if statements. If car_year is 1969 or earlier, print "Few safety features." If 1970 or later, print "Probably has seat belts." If 1990 or later, print "Probably has antilock brakes." If 2000 or later, print "Probably has airbags." End each phrase with a period and a newline.

Answers

The task involves writing multiple if statements to classify car safety features based on the car's year. The conditions must be evaluated in ascending order to print out the correct safety features associated with each time period.

When writing multiple if statements in a programming context to classify the safety features of a car based on its year, you would structure your code similar to this:

if car_year \<= 1969:
   print("Few safety features.\n")
elif car_year \< 1990:
   print("Probably has seat belts.\n")
elif car_year \< 2000:
   print("Probably has antilock brakes.\n")
else:
   print("Probably has airbags.\n")

This series of if statements evaluates the variable car_year and prints a message related to the safety features that the car is likely to have, depending on its manufacture year. It's important to place the conditions in ascending order by year, so the correct message is printed as soon as its condition is met.

What is queue operations in datastructures?

Answers

Answer:

Queue- It is a data structure,unlike stacks we can insert and delete elements from both sides.

It works on the principle FiFo(first in first out) i.e the element which is inserted at the starting will be the one for deleting.  

We can perform many operations on queue like enqueue(),dequeue() and many more.

Queue Operations

enqueue()-This operation is used to add elements in Queue,we add element to rear.

         Example-

           Queue.prototype.enqueue = insertval(5)

               {  

                  this.array.push(5);  //inserting elements to a queue

                }  

dequeue()-This operation is used to remove elements from Queue,while removing data from front.  

Example-

           Queue. prototype. dequeue = removalval(5)

           {  

             this.array.pop(5);  //removing elements from a queue

           }

peek()-This operation is used to get the element from front i.e first element.

   Example-  

                      int peek()

                          {

                             return queue[front];

                          }

isfull()-This operation is used to check whether the queue is full or not.

 Example-

         bool isfull()

                 {

                 if(rear == MAXSIZE - 1) //checking queue is full

                     return true;

                 else

                      return false;

               }

isempty()-This operation is used to check whether the queue is empty or not.

  Example

 bool isempty()

     {

    if(front < 0 || front > rear)  //checking queue is empty or not

        return true;

   else

        return false;

     }

Assume that to_the_power_of is a function that expects two int parameters and returns the value of the first parameter raised to the power of the second parameter. Write a statement that calls to_the_power_of to compute the value of cube_side raised to the power of 3 and that associates this value with cube_volume.

Answers

Answer:

#include <iostream>

#include <math.h>

using namespace std;

int to_the_power_of(int first, int second){

   

   int result = pow(first, second);

   

   return result;

}

int main()

{

   int side;

  cout<<"Enter the side of cube: ";

  cin>>side;

 

  int volume = to_the_power_of(side, 3);

 

  cout<<"The volume is "<<volume<<endl;

 

  return 0;

}

Explanation:

include the library iostream and math.h for using the input/output instruction and pow() function.

create the main function and declare the variable.

then, print the message for asking to enter the value from user.

the enter value is then store in the variable using cin instruction.

then, call the function with two parameters. program control move to the define function and  calculate the first parameter raised to the power of the second parameter.

then return the result to the main function and finally print the result.

For java

Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards, then backwards. End each loop with a newline. Ex: If courseGrades = {7, 9, 11, 10}, print:

7 9 11 10 10 11 9 7

Hint: Use two for loops. Second loop starts with i = NUM_VALS - 1.

Answers

Answer:

public class array{

    public static void main(String []args){

       int[] array = {2,4,7,1,9};

       int num_vals = array.length;

       for(int i=0;i<num_vals;i++){

           

           System.out.println(array[i] + " ");

       }

       for(int i=num_vals-1;i>=0;i--){

           

           System.out.println(array[i] + " ");

       }

    }

}

Explanation:

First create the class in the java programming.

Then create the main function and declare the array with values.

Store the size of array in num_vals variable by using the function array.length.

create a for loop to iterate the each element in the array and then print on the screen with spaces and newline.

it traverse the loop from first to last.

Then, again create the for loop to iterate the each element in the array and then print on the screen with spaces and newline but the traversing start from last to first.

Hypercompetition implies that any architecture must be designed with maximum flexibility and _____ to ensure it can handle the imminent business changes. modularity quantity scalability sustainability availability

Answers

Answer:

scalability

Explanation:

Hypercompetition implies that any architecture must be designed with maximum flexibility and scalability to ensure it can handle the imminent business changes.

T F Functions should be given names that reflect their purpose.

Answers

Answer:

true

Explanation:

FUNCTION: functions are the collection of statements which are used in C programming any program that can not be run without a function, anyone can divide their code in different functions. A function declare  the compiler about the name of the function , a function definition provides the actual body of the function so from above discussion it is clear that the function should be given names that reflects their purpose

Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print a newline. Ex: If numInsects = 8, print:

8 16 32 64
import java.util.Scanner;

public class InsectGrowth {
public static void main (String [] args) {
int numInsects = 0;

Answers

The question is about writing a Java while loop to double a number without exceeding 100, relevant to Computers and Technology in a high school context. The loop prints each doubled value followed by a space and stops before the number reaches 100, after which it prints a new line.

The subject of the question is related to Computers and Technology, particularly focusing on programming and the use of while loops in Java. A while loop is used to repeatedly execute a block of code as long as a specified condition is true. In the context of the student's question, the goal is to use a while loop to double a positive integer without exceeding a certain threshold (in this case, 100).

To solve the problem, we need to set up a while loop that continues to operate as long as the doubled value of numInsects is less than 100. Here is the code snippet that accomplishes this:

while (numInsects < 100) {
   System.out.print(numInsects + " ");
   numInsects *= 2;
}
System.out.println();

This loop starts by checking if the current value of numInsects is less than 100. If it is, the value is printed followed by a space, and then numInsects is doubled. The process repeats until the condition is no longer true (i.e., numInsects is 100 or more), at which point a newline is printed to conclude the output.

Values that are sent into a function are called _________.

Program Output

Answers

Answer:

Argument

Explanation:

The function is the block of the statement which performs the special task.

when we define the function in the program then we have to call that function.

the syntax for defining the function:

type name(parameter_1, parameter_2,...){

    statement;

}

the syntax for calling the function:

name( argument_1, argument_2,...);

Meaning of parameter and argument

The argument is used to send the value into the function definition. this can be passed by value or pass by reference.

The parameter is used to receive the value send by calling function.

Therefore, the answer is the Argument.

An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b) A counterfeit Wifi connection in a coffee shop that appears to be genuine c) A duplicate badge that allows a nasty person entry into a data center d) Someone who looks just like the Chief Information Officer, but steals data

Answers

Answer:

A

Explanation:

An “evil twin” in the context of computer security is a virus-laden attachment that looks just like a sincere attachment. Hence option a is correct.

What is computer security?

Computer security is defined as the defense of computer systems and data against damage, theft, and improper use. The same techniques used to safeguard other valuable or sensitive equipment, such as serial numbers, doors and locks, and alarms, are often employed to protect computer hardware.

A rogue Wi-Fi access point (AP) that poses as a genuine one and provides access to sensitive data without the end user's knowledge is known as a "evil twin assault." With a smartphone or other internet-capable gadget, some readily available software, and an attacker, it is simple to construct an evil twin.

Thus, an “evil twin” in the context of computer security is a virus-laden attachment that looks just like a sincere attachment. Hence option a is correct.  

To learn more about computer security, refer to the link below:

https://brainly.com/question/5042768

#SPJ5

What is the difference between the throw statement and the throws clause?

Answers

Answer:

throw and throws represent different constructs in Java programming language.

Explanation:

throw is used to explicitly throw an Exception from within a code segment.

For example:

public void throw_test(String str){

        if(str==null) throw new NullPointerException();

}

throws is used to specify an exception list which may be thrown by a method:

For example:

public String readFromFile(File f) throws IOException {

.....

// Some code fragment which could throw a IOException

}

Describe how you can use multiple arguments in a method.

Answers

Answer:

name(argument_1, argument_2, argument_3,.......);

Explanation:

The function is a block of the statement which performs the special task.

Syntax for calling the function:

name(argument_1, argument_2, argument_3,.......);

we write the name of the function and passed the arguments.

we can pass any number of arguments with separator ',' in the function calling.

for example:

1. print(name, value, count, a, b);

2. print(name, value);

Here, name, value, count,a and b are the arguments of the function.

if we does not pass any argument, the function still valid in the programming.

we can pass from Null to any number of argument.

Final answer:

To use multiple arguments in a method, separate them with a comma within the method's parentheses. This approach enables methods to perform more dynamic and flexible operations with variable inputs. An example includes a method to add two numbers, defined with two arguments, which are supplied in the same order when the method is called.

Explanation:

Using multiple arguments in a method allows for more dynamic and flexible code, enabling the method to perform tasks with variable inputs. In programming, a method can be understood as a set of instructions that performs a particular task. Arguments are inputs you give to a method so that it can perform its task with specific data. To use multiple arguments, you simply separate them with a comma within the parentheses of a method call.

For example, if you have a method designed to add two numbers, you might define it as follows: add(int num1, int num2). Here, num1 and num2 are the arguments. When calling this method, you would provide two numbers as arguments like add(5, 7), instructing the method to add 5 and 7.

In more complex scenarios, such as in object-oriented programming, methods might require multiple arguments of different types, such as strings, integers, or even objects. This variety allows developers to construct highly customizable and efficient code. For instance, a method for creating a user profile might require several arguments such as name, age, and email address: createUserProfile(String name, int age, String email).

When designing methods that accept multiple arguments, it’s important to consider the order of arguments, as they must be supplied in the same order when the method is called. Additionally, leveraging method overloading - defining multiple methods with the same name but different parameters - increases flexibility and readability in how methods can be used with varying arguments.

A graph of an organization'snet income over the past 10 years is an example of an analogmodel.
True
False

Answers

Answer:

True

Explanation:

Analog model

It is a representation of target model,it include charts,models of electric and mechanical system and graphs also.The size of this model is not fixed it may vary according to the requirements,so it may be small or big.

As per question,the graph is representing net income of an organization, it also representing a model(target) for the company that's why we can call it an Analog model.

The ArrayList class ____ method returns the current ArrayList size.

a.
length

b.
size

c.
rows

d.
capacity

Answers

Answer:

b. size

Explanation:

We can use the size() method of java.util.ArrayList to determine the size of an  ArrayList in Java. The size() method of the ArrayList class returns an integer which is equal to the number of elements present in the ArrayList.

Below is an example code to illustrate the use of the size() method of the ArrayList:-

     ArrayList<Integer> aList = new ArrayList<Integer>(5);

      aList.add(25);

     aList.add(2);

     aList.add(5);

     aList.add(22);

     System.out.println("Size of the array list: " + aList.size());

This will print the size of the array list as 4 since we've added four numbers into the array list.

Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline.

Answers

Answer:

void print_popcorn_time(int bag_ounces){

   if(bag_ounces < 3){

       cout<<"Too small"<<endl;

   }else if(bag_ounces > 10){

       cout<<"Too large"<<endl;

   }else{

       cout<<(6 * bag_ounces)<<"seconds"<<endl;

   }

}

Explanation:

The function is the block of the statement which performs the special task.

For checking the condition in the program, the if-else statement is used.

It can check the condition one or two but if we want to check the more than two different conditions then the continuous if-else statement is used.

syntax of continuous if else:

if(condition){

statement;

}else if(condition)

statement;

}else{

statement;

}

In the question, there are three conditions;

1. bag_ounces is less than 3

2. bag_ounces greater than 10

3. else part.

we put the condition in the above if-else statement and print the corresponding message.

Answer:

def print_popcorn_time(bag_ounces):

   if bag_ounces < 3:

       print("Too small")

   elif bag_ounces > 10:

        print("Too large")

   else:

        bag_ounces = bag_ounces * 6

        print(bag_ounces, "seconds")

Explanation:

def print_popcorn_time(bag_ounces): #fed function

   if bag_ounces < 3:  #1st if statement

       print("Too small") #print function

   elif bag_ounces > 10: #else if

        print("Too large") #print than print

   else:  #else:

        bag_ounces = bag_ounces * 6 #do work

        print(bag_ounces, "seconds") #print

Describe the input/output characteristic of a workstation/PC thatcan be used by engineers for computer-aided design.

Answers

Answer and Explanation:

The characteristics of input/output of PC/workstation can be described as:

Input/Ouput devices works as the interface between the user and the device. It provides us to give commands to our system and get the outputs as per the commands or instructions provided.

Input devices are those which allow us to give instructions or commands to our system like that of a keyboard in a PC, it allows us to write into our system and give commands to it to perform a particular task. these instructions are then converted into signals to be readable by the system(machine language). Another input device is mouse.

Output devices are those which provides us with the desired results converted in the form readable by us. Like monitor of our PC displays the desired results and same goes for printer it prints the results.

There are different input/output files for different operating systems as in 'C' there is a whole library for input/out commands.

Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?

a- Downplay any negative points.

b- Be positiveand brief.

c- Makeaction easy.

d- Showbenefits to receiver.

Answers

Answer: d)- Show benefits to receiver

Explanation: Indirect plan is the approaching a person in a indirect manner and just giving the hint about the main idea rather than presenting the main idea. For creating interest section the idea of attracting the receiver by showing the benefits of the plan is the major option. Because just by sharing the benefit and hint of plan,receiver tends to be attracted towards the plan .

- What is the final value of the variable myPar given the following code fragment? int counter = 5; int myPar = 1; do { myPar = myPar + 2; counter = counter + 1; } while(counter <= 1);

Answers

Answer:

3

Explanation:

do-while is the loop statement used for executing the part of the code again and again until the condition not false.

when the condition is false, the program terminates the loop statement and starts executing the next of the do-while statement.

It has the special property, it executes the statement first and then checks the condition.

So, it executes the statement once if we provide the condition false.

Another side, the other loop statement like for loop, while loop they check the condition first and then start executing the statement if condition true.

In the question, the counter is 5 and myPar is 1

then the program executes the statement first.

so, myPar = 1+2=3

myPar assigns through the value 3. then counter increase by one.

the counter value becomes 2.

then check the condition 2 <= 1, condition false and program terminate.

Therefore, the answer is 3.

wHAT ARE THE 5 LAYERS in the internet protocol stack andwhat are the principal responsibilities of eack of theselayers.?

Answers

Answer: The 5 different layers in the IP stack are as follows:

1. Physical Layer

2. Data Link Layer

3. Network Layer

4. Transport Layer

5. Application Layer

Explanation:

The functions of the different layers are:

The physical layer is concerned with transfer of bits  across the different nodes, The data link layer is concerned with transmission of frames with error detection and correction. The network layer is concerned with routing the packets across various nodes in the router. The transport layer deal with the implementation of protocols such as TCP and UDP. The Application layer host a numerous software applications such as  HTTP, SMTP for client server connections.

Other Questions
The data shown on the scatter plot below demonstrates the relationship between the time of day and the total numberof calories that a teenager consumes throughout the day.That as time ___________,the total number of calories that a teenager consumes throughout the day___________.Blank A options:Stays the sameIncreasesDecreasesBlank B options:Stays the sameDecreasesIncreases Determine the theoretical probability of rolling a number larger than two and a standard 66 sided cube Which of the following is a criterion by which game meats are evaluated by the USDA? A. Diet B. Size C. Country of origin D. Color an electric clothes dryer has a resictance of 16 Ohms it drawes 15 A of current what is the voltage in volts of the wall outlet that it is pluged into 18-r=12[tex]18 - r = 12[/tex] Which of the following best describes a fission reaction involving lithium? (1 point) A. Two lithium atoms form bonds with each other, absorbing a large amount of energy.B. The nuclei of lithium atoms join together to form heavier isotopes, and energy is released.C. An atom of lithium absorbs electrons, undergoes an increase in energy level, and splits into fragments.D. The nucleus of an atom of lithium splits, resulting in smaller fragments and the release of a large amount of energy. What literary device is an author using when he or she uses words to communicate the opposite of their literal meaning What is the probability of an event that is impossible? Suppose that a probability is approximated to be zero based on empirical results. Does this mean that the event is impossible? Hammer Time Company sells hammers that it purchases at a cost of $5. Hammer Time sells the hammers for $15. Last year, it sold 12,000 hammers. The company estimates that it can sell 5,000 more hammers than last year if it decreases the selling price to $10 per hammer. What is the budgeted sales revenue if Hammer Time implements the decrease in selling price? Mixed 3 liters 20% solutions with 2 liters 70% solution. Whats the final concentration, Two infinite parallel surfaces carry uniform charge densities of 0.20 nC/m2 and -0.60 nC/m2. What is the magnitude of the electric field at a point between the two surfaces? the simple form of business ownership ? help pleaseeeee solve 3-x/2=>12 Consider two copper wires. One has twice the length and twice the cross-sectional area of the other. How do the resistances of these two wires compare? A) Both wires have the same resistance. B) The shorter wire has twice the resistance of the longer wire. The longer wire has twice the resistance of the shorter wire. D) The longer wire has four times the resistance of the shorter wire. E) The shorter wire has four times the resistance of the longer wire. Given that the first term and the common difference of an arithmetic progression are 6 and 3 respectively. Calculate the sum of all terms from 4th term to the 14th term. A set of equations is given below: equation C:y=5x+10 equation D:y=5x+2 which of the following best describes the solution to the given set of equations? One solution no solution two solutions infinitely many solutions 1. Let a; b; c; d; n belong to Z with n > 0. Suppose a congruent b (mod n) and c congruent d (mod n). Use the definitionof congruence to(a) prove that a + c congruent b + d (mod n).(b) prove that ac congruent bd (mod n).Expert Answer A cube has side length 0.7 metres.Work out the total surface area of the cube.Give your answer in square centimetres ____ are systems in which queues of objects are waiting to be served by various serversA.Queuing networksB.Queuing systemsC.Holding systems I really need this answer