Consider a class ClassName whose methods are listed below. What class is it?

ClassName(){...}
boolean isEmpty(){...}
void display(){...}
boolean search(int x){...}
void insert(int i){...}
void remove(int x){...}

Answers

Answer 1

Answer:

An implementation of java.util.List interface

Explanation:

Given class consists of the following constructs:

ConstructorisEmpty,search, displayinsert,remove

It supports inserting and removing an element at a specified index. It also supports search and display operations.

These are characteristics of an object which implements the java.util.List interface ( For example: ArrayList or user-defined customList ).


Related Questions

Write an if statement that assigns to the variable biggest the Greatest value contained in variables i, j and k, Assume the three values are distinct.

Answers

Answer:

if(i > j && i > k) // check if i is greatest

{

   biggest = i;

}

else if( j> i && j > k) // check j is greatest

{

    biggest = j;

}

// else highest is k

else                // otherwise k is greatest

{

   biggest = k;

}

Explanation:

Following are the program in c++ language

#include<iostream> // header file

using namespace std; // namespace

int main() // main function

{

int i,j,k;// varaible declaration

int biggest;

cout<<" \nenter the value i,j and k:\n ";

cin>>i>>j>>k;

if(i > j && i > k) // check if i is greatest

{

   biggest = i;

}

else if( j> i && j > k) // check j is greatest

{

    biggest = j;

}

// else highest is k

else                // otherwise k is greatest

{

   biggest = k;

}

cout<<" the biggest number is :"<<biggest;

return(0);

}

Output:

enter the value i,j and k:

67

8

9

the biggest number is :67

In this  program we check the following condition:

if(i > j && i > k) then it store the value of i into biggest variable .

if( j> i && j > k) then it store the value of j into biggest variable .

otherwise the value of k is store into biggest variable .

 

Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if the user entered month 2 and year 2000, the program should display that February 2000 has 29 days. If the user entered month 3 and year 2005, the program should display that March 2005 has 31 days.Here is a sample run of this program:Enter a month in the year (e.g., 1 for Jan): 1Enter a year: 2009January 2009 has 31 daysExercise 3.11Liang, Y. Daniel. Introduction to Java Programming (8th Edition)

Answers

Answer:

Following are the program in JAVA language  

import java.util.Scanner; // import package

import java.util.Calendar; // import package

public class Main // class main  

{  

public static void main(String[] args) // main function  

{  

Scanner input = new Scanner(System.in); // for user input  

Calendar calendar = Calendar.getInstance(); //get calendar instance for methods  

int nYear , nMonth , date =1 , nDays;

String MonthOfName = "";

 System.out.print(" Enter a month in the year :");

 nMonth = input.nextInt(); //input Month

 System.out.print("Enter a year :");

 nYear = input.nextInt(); //Input Year

 switch (nMonth) //Find month name via 1-12

 {

  case 1:

MonthOfName = "January";

nMonth = Calendar.JANUARY;

break;

case 2:

MonthOfName = "February";

nMonth = Calendar.FEBRUARY;

break;

case 3:

 MonthOfName = "March";

nMonth = Calendar.MARCH;

break;

 case 4:

 MonthOfName = "April";

nMonth = Calendar.APRIL;

 break;

 case 5:

MonthOfName = "May";

nMonth = Calendar.MAY;

break;

case 6:

MonthOfName = "June";

nMonth = Calendar.JUNE;

break;

case 7:

 MonthOfName = "July";

nMonth = Calendar.JULY;

break;

 case 8:

MonthOfName = "August";

nMonth = Calendar.AUGUST;

break;

case 9:

MonthOfName = "September";

nMonth = Calendar.SEPTEMBER;

break;

case 10:

MonthOfName = "October";

nMonth = Calendar.OCTOBER;

break;

case 11:

 MonthOfName = "November";

nMonth = Calendar.NOVEMBER;

break;

case 12:

MonthOfName = "December";

nMonth =Calendar. DECEMBER;

         }        

 calendar.set(nYear, nMonth, date); // set date to calender to get days in month

nDays=calendar.getActualMaximum(Calendar.DAY_OF_MONTH); // get no of days in month

System.out.println(MonthOfName + " " + nYear + " has " + nDays + " days."); //print output

}

}

Output:

Enter a month in the year : : 09

Enter a year : 2019

September 2019 has 30 days.

Explanation:

In this program we have take two user input one for the  month and other for the year Also take two variables which are used for storing the month name and no of days in a month. with the help of switch we match  the cases  and store the month value .After that  set the date to calender with help of calendar.set(nYear, nMonth, date) method and  To get the number of days from a month  we use  calendar.getActualMaximum(Calendar.DAY_OF_MONTH);  method and finally print year and days.

 

     

.In Linux what command sequence do we enter to stop a program?

Answers

Answer:

exit command is used to stop the program.

Explanation:

exit command is used to exit the shell when it is currently running.It can take one or more arguments exit[n] and exits the shell and returns the status of n.

exit with parameters

exit [n] exits the shell and returns the status of n.

exit without parameters

exit exits the shell and returns the status of last command that is executed.

A use case model describes what a system does without describing how the system does it. (Points : 1.5) True
False

Answers

Answer:

The correct answer is true.

Explanation:

By definition, a use case is a list of events that defines the interactions between an actor and a system to achieve a goal. Generally, Use cases are used by functional analysts at a higher level to represent requirements, missions or stakeholder goals.  

What is the Java source filename extension? What is the Java bytecode filename extension?

Answers

Answer:

The extension of java source filename is .java and the extension of bytecode filename is .class

Explanation:

The java program is saved with the classname along with .java extension. The .java extension indicated that the particular file in java file.

Suppose we have a program  

public class Main1

{

public static void main(String[] args) {

 System.out.println("Hello:");

}

}

This program is saved as :Main1.java

To compile this program in command prompt we use javac Main1.java.

On compiling the java program it will be converted into byte code which has extension .class filename extension. So on compile, this program will be converted into Main1.class

Please discuss the differences between the array implementation and the linked list implementation of queues. List the advantages and disadvantages of each implementation.

Answers

Answer:

Arrays and linked list are data structures used to store data but it has some advantages and disadvantages.It Is important keep in mind thath both of them are completely usefull in it own case

Explanation:

Advantages:

Linked list: It doesn't have a size limitationIt is easy insert new elementsit doesn't have memory limitationArray:It is possible access random elementsThe memory requirements are less than linked list

Disadvantages:

Linked list:It is not possible access random element in the listit Require more memory to store the pointer to the next elementArray:It is expensive insert new elementsit is fixed sizeit needs continuos memory (memory limitation)

A sequential file stored on a(n) ____________ can be updated in place.

(Points : 2) direct access storage device
paper tape
punch card file
line printer

Answers

Answer: Direct access storage device

Explanation:

 The sequential file is the simple method for organization of different types of files. The files and records are basically stored in the direct access storage device in the sequentially manner so that we can directly access the particular file according to the requirement.

The direct access storage device basically allow the any file and elements to access directly from the given storage device and address. It is less time consuming method so that it increase the overall efficiency of the system.

On the other hand, all the other options are not associated for storing the sequential file. Therefore, Direct access storage device is the correct option.

Why would you use a database system instead of traditional file system

Answers

Answer:

Traditional database system is the system that contains all the data in the computer files on a computer system. The organization of the data is done in the form of files sets. In this system, large amount of data is not properly accessible due to inefficiency and also consumes lot of time.

Instead of the traditional system,database system is used, which has the collection of the data that gets stored in the database management system(DBMS).They can be managed by the operating system.

They have qualities like consuming large amount of data, any type of information, independent to work ,less time-taking development of application for etc. which is not present in traditional system.Thus database system are chosen over the traditional system.

.What is systemd? How is it used?

Answers

Answer:

 The systems is the type of the linux initialization system approach that basically include on demand features and used in tracking process in the linux control system as service manager.

The systemd also run or compile in terms of the user context and manage the additional system resources. The systemd file are basically used in the timer unit section to enable the individual unit in the particular timer section.

It basically provide various tools and the utilities that help in the various system tasks.    

Many business databases consist of multiple tables with ____ among them.

Relationships

Arrows

Objects

Constraints

Answers

Answer: Relationship

Explanation:

 Many organization and business consist multiple tables with the relationship when the multiple data in the table are basically associate with the multiple data in the another table.

When we create a database, then foe each entities we use separate table for every particular entities. The relationship between the multiple table is basically used to represent multiple data in the database.

There are basically different type of the relationship in the database that are:

One to one relationshipOne to many relationshipMany to many relationship  

 

The most common solution to supply chain uncertainties is to build inventories or __________ as insurance.
a. safety stock
b. stockouts
c. continuous replenishment
d. restocking

Answers

Answer: a)Safety stock

Explanation: Safety stock is the collection of item or goods of any particular company so that they do not face out of stock situation.This stocks helps in the situation when the sale of goods are more than expected rate and additional stock is not present to be used in the uncertain situation.

Safety stock acts as the insurance because of its extra inventory in the uncertain situation.Other options are incorrect because stock-out means the stock of items getting finished, continuous replenishment is notification about the sales on daily basis and restocking is the refilling of the items in stock upon the request when the goods get out of stock.Thus the correct option is option(a)

What are the 7 types of Bootstrap buttons?

Answers

Answer:

The 7 types of bootstrap buttons are as following:-

.btn-default

.btn-primary

.btn-success

.btn-info

.btn-warning

.btn-danger

.btn-link

Explanation:

These are the 7 types of different bootstrap buttons there is also one more type that is called simple button .btn  .

Default button is of white color.

Primary button is of blue color.

success button is of green color.

info button is of greenish blue color.

warning button is of orange color.

danger button is of red color.

link button is of no color.

you are engaged in affinity analysis. what does this mean?

a. grouping entities and attributes in logically organized table structures.

b. looking for data that logically attracts interest.

c. capturing all relevant information about a topic in a single interview with subject matter experts

d. searching for pattern matches

Answers

Answer:

The answer is d.seaching for pattern matches.

Explanation:

Affinity analysis is a technique of data analysis and data mining used to discover relationships among activities performed by a group of interest. It's applied to process where the group of interest records information of their activities and that can be identified. In other words, this technique is used to analyze the behavior of people to identify patterns to determine links into potential purchases.

__________ use a challenge response mechanism in which a server challenges a user with a number, which a user must then enter into a device to calculate the response number.

Answers

Answer: Authentication

Explanation:

 Authentication is the mechanism of the challenge response in which it basically allow the server to challenge the user with the number without revealing any password.

Then the user must enter that particular password to enter into the device for calculating the particular response number. Then it basically compute the given response by apply hash function in the server challenge that combine the users password.  

Final answer:

Two-factor authentication (2FA) tokens or one-time password (OTP) tokens use a challenge response mechanism to enhance security in multi-factor authentication systems. A server sends a challenge number to the user, who then inputs it into a device that calculates a response using a secret key and algorithm. This system provides added security beyond traditional login credentials.

Explanation:

Devices that use a challenge response mechanism where the server challenges a user with a number, and the user must then enter this number into a device to calculate a response number, are known as two-factor authentication (2FA) tokens or one-time password (OTP) tokens.

These tokens are often used in multi-factor authentication systems, providing an extra layer of security beyond just a username and password. When a user attempts to log in, the server sends a unique challenge, such as a nonce or a time-based number. The user enters this challenge into their 2FA or OTP device, which then uses a pre-shared secret key and an algorithm to generate a response. The user enters this response back into the system to authenticate.

Examples of such devices include hardware tokens, like RSA SecurID, which display a number that changes periodically and must be entered during login, and software tokens, which run on smartphones or other devices using apps like Authy.

Is spread spectrum transmission done for security reasons in commercial WLANs?

Answers

Answer: No

Explanation: Spread spectrum transmission is the wireless transmission technique for the wide channel that helps in decrement of the potential interference.The transmission of signal is based on the varying the frequency knowingly to achieve larger bandwidth.

The use of spread spectrum transmission in the WLAN(wireless local area network)is used for the regulatory purpose The regulation is the controlling of the area  through policies.Thus,security is not the service that is provided to WLAN by spread spectrum transmission.

The parameters needed for a MySQL database connect string are

a

host name

b

user name

c

password

d

All of the above

Answers

Answer:

d. All of the above.

Explanation:

The parameters required to for a MYSQL database connect string are as following:-

Host Name.User Name.Password.New link.Client flags.

So  among  the  given  options all of them  are  required  and  those are host name,user name,password.

Hence the answer to this question is option d all of the above.

To edit a form, use

datasheet view.
design view.
layout view.
layout view or design view.

Answers

Answer: Design view

Explanation:

 We use design view for editing and modifying the forms. The design view is basically used to create the form and then also edit the form structure. It is also capable for reducing the scope in the particular structure.

In the design view, we can use the property sheet for modifying the properties in the form and also control its features in the particular section of the form structure.

It basically provide the wide variety of comprehensive form structure and it basically helped to organize the proper information in the form.  

Answer: layout view

Explanation; on edge

What is ‘verification’?

Answers

Answer: Verification in the terms of the computer field is defined as the process which is for testing of the consistency and the accuracy of the information, algorithm, data, etc. Verification is carried out by the approval or disapproval method after the checking process.

This techniques helps in verifying whether the function,algorithm ,data that has been accessed in the system is complete and precise or not so that it can properly function in the operating system.

The default behavior for Connector/Python is to use __________ results.

a

buffered

b

unbuffered

c

uninitialized

d

list-based

Answers

Answer: (C) Uninitialized

Explanation:

 The default behavior is basically used as the uninitialized result for the connector and python. As a matter of course, MySQL Connector/Python doesn't cradle or pre-fetch results. This implies after a question is executed, your program is in charge of bringing the information.

This stays away from unnecessary memory use when inquiries return huge outcome sets. On the off chance that you realize that the outcome set is little enough to deal with at the same time, you can get the outcomes promptly by setting supported as "TRUE".

Write a C++ program that will convert distance measurements from miles to kilometers. Specifically, the program needs to convert 0, 10, 20, 30, 40 , 50, 60, 70, 80, and 90 miles to kilograms displaying both the number of miles and the number of kilograms on the same line.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// loop that will convert 0,10,20.....90 miles to kilometer

   for(int a=0;a<=90;a=a+10)

   {

   // convert miles to kilometer

       double kilo_m=a*1.609;

       // print the result

       cout<<a<<" miles is equal to "<<kilo_m<<" kilometer."<<endl;

   }

return 0;

}

Explanation:

Run a for loop from 0 to 90.First change 0 miles to kilograms by multiply 1.609. Then Increment "a" by 10 until it "a" is less or equal to 90.And change them into kilometer.

Output:

0 miles is equal to 0 kilometer.

10 miles is equal to 16.09 kilometer.

20 miles is equal to 32.18 kilometer.

30 miles is equal to 48.27 kilometer.

40 miles is equal to 64.36 kilometer.

50 miles is equal to 80.45 kilometer.

60 miles is equal to 96.54 kilometer.

70 miles is equal to 112.63 kilometer.

80 miles is equal to 128.72 kilometer.

90 miles is equal to 144.81 kilometer.

How many bytes are there in 256 Kbytes?

Answers

Answer:

256000 bytes.

Explanation:

One Kilo byte(KB) consists of 1000 bytes.So the number of bytes in 256 kilo bytes is :-

1 kilobyte = 1000 bytes.    

256 kilo bytes = 256 x 1000 bytes.  

256 kilo bytes = 256000 bytes.  

Also 1 bytes consists of 8 bits.

1 kb = 1000 bytes.

1GB Giga byte = 1024 kilo bytes.

1 TB Tera Byte = 1024 Giga Bytes (GB).  

Hence the answer to this question is  256,000 bytes.

An oral defamatory statement is ____.

Abuse
Slang
Slander
Defamation

Answers

Answer: Slander

Explanation: Slander is the orally spoken statement that has the defamatory meaning.The meaning of the defamatory statement is having the negative, false, hatred, ridicule etc feeling in the hidden form.This statement shows the false intention.

Slander is marked as the untrue defamatory statement .Other options are incorrect because abuse is statement containing abusive language, slang contains the informal language and defamation is the false claim .Thus the correct answer is slander.

From an IT perspective, which of the following best describes BI and BI apps?
a. Stand-alone
b. Support a specific objective
c. A collection of ISs and technologies
d. Web-based systems designed for for-profits

Answers

Answer:a)Stand-alone

Explanation: Stand-alone application is the application that is found on the system of every client.In accordance with the IT section, Business intelligence can be transferred into stand-alone application .This helps in the development of the essence of the system at an independent level.

Other options are incorrect because supporting a certain factor will not make it independent, cannot act as the group of ISs technology or web system for gaining profit.Thus,the correct option is option(a).

How can encryption be used to ensure message integrity?

Answers

Answer: Encryption technique is the method for encoding of the information or confidential data which can only be used by the authorized user. The decryption of the message is done by the key that is provided to the authorized party.

Integrity is the property which makes sure that the data is secured and non accessible by the unauthorized party.Thus, encryption makes sure that data does not gets accessed by unauthorized unit that is assuring about the data integrity.

. What is an APT? What are some practical strategies to protect yourself from an APT?

Answers

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

Sound Internal AuditingStrong Password Accessing PoliciesStringent policies for accessing any deviceIntroduction and implementation of multi factor authenticationStrong IDs and sound honeypot solutions

In MIPS architecture, the Program Counter is:

A register that stores the next instruction to be executed

A register that stores the address of the next instruction to be executed

A binary counter that counts how many instructions have been executed

A control circuit that steps through a sequence of instructions

A register that stores the current location in memory to read and write from

Answers

Answer: A register that stores the address of the next instruction to be executed

Explanation: Program counter is register of the CPU(central processing unit) .It contains the memory address of the instruction that is to be executed in next turn after the present instruction is executed.This is also known as the instruction pointer .The cycle followed by the counter is fetch ,decode and execute.

Other options are incorrect because it does not store next instruction,does not count number of instruction or stores the memory for reading and writing.It also does not act as a control circuit.

Business competition is no longer limited to a particular country or even a region of the world.
True
False

Answers

Answer:

The best answer to the question: Business competition is no longer limited to a particular country or even a region of the world:___, would be: True.

Explanation:

Globalization has changed the way that all aspects of human life, and human activities develop. Globalization has meant the erasing of limitations that were placed primarily on trade and economic activities, but it also extended to other aspects of life. Because of technology advancements, especially in communications, connectivity, and travelling, the world is now easily connected and limitations are only placed up to a certain level. Thus, and especially economically, business competition has become a global issue too, with now more and more presence of multinational businesses, companies that extend not necessarily to one country, or even one region of the world, but extend to any region that will allow them to enter for business exchanges.

In object-oriented development, why is it necessary to use drivers and stubs in testing?

Answers

Answer: In object-oriented approach for the development of operating system requires stub and driver as essential part for the creation of proper interaction of the object oriented components with the external system.They help in testing of the module.

Stub is the unit that acts as a piece of code which fills in the place of the missing section in the system. The functions of the system module is tested by stub .

Driver is the part that helps in citing the system modules under the testing conditions.It is the piece of code that creates the calling function simulation.

What is an operating system? What are the main functions of a modern general purpose operating system?

Answers

Answer:

An operating system is a software that allows a user to run other applications on a computing device. The applications generally are not designed to interface directly with hardware, almost all of the applications are written to run on an operating system, in order to become independent of the hardware design.

The main function of an operating system are:

manage the hardware resources of a computer: central processing unit, memory, disk drives, and printers. establish a user interface to facilitate the interaction human-computer. execute and provide services for software applications.

Time and weather Write a program to take as input and 4-digit number from the user. The first two digits represent the day of the month and the last two digits represent the month of the year. The program should then display the following: "It's winter" if the month entered is 12, 1 or2 . "It's Spring" if the month entered is 3, 4, or 5 "It's Summer", if the month entered is 6,7, or 8 "It's Fall", if the month entered is 9, 10, or 11 The program should also display the current week number of the month

Answers

Answer:

#here is program in python

#read 4 digit number

date=int(input("enter the date:"))

#first 2 digit is day

day=int(date/100)

#last 2 digit is month

month=date%100

#find the week of the month

if day<=7:

  week=1

elif day>=8 and day<=14:

  week=2

elif day>=15 and day<=21:

  week=3

elif day>=22 and day<=28:

  week=4

elif day>=29:

  week=5

#check for Winter

if month in [12,1,2]:

  print("week {} of Winter.".format(week))

# check for Spring

elif month in [3,4,5]:

  print("week {} of Spring.".format(week))

#check for Summer

elif month in [6,7,8]:

  print("week {} of Summer.".format(week))

#check for Fall

elif month in [9,10,11]:

  print("week {} of Fall.".format(week))

Explanation:

Read a 4 digit number from user.first 2 digits represents the day and last 2 month.Then find the week of the month.If the month is in [12,1,2] then it will print "Winter" and week of that month.If month is in [3,4,5] then print "Summer" with week.If the month is in [6,7,8] then "Summer" and if the month is in [9,10,11] then "Fall".

Output:

enter the date:1212

week 2 of Winter.

Other Questions
On three examinations, you have grades of 85, 78, and 84. There is still a final examination, which counts as one grade In order to get an A your average must be at least 90. If you get 100 on the final, what is your numerical average? (Type an integer or a decimal) Given the function, d(t) = 50t, the variable t represents which of the following? Select all that apply. input output function independent variable dependend variable will give brainlyist if you want it Determine the resulting polynomial: f(x)=10x5g(x)=2x2+4x4 Find: f(x)g(x) What is the correct definition of speed? Which scientist first proposed physical laws to mathematically describe the effect of forces on the motions of bodies? There are 300 passengers on board an airplane. 2/3 of them are men, 1/4 are women and the rest are children. How many children are there? The length of a school bus is 12.6meters.if 9 school buses park end to end with 2meters between each one, whats the total length from the front of the first bus to the end of the last bus? As Rajan watches television, he sees a commercial for a local dry cleaner and then remembers that he needs to move some laundry from the washer to the dryer. Seeing the dry cleaning commercial has served as a(n) _____ for Rajan. a) visual image b) transient cue c) retrieval cue d) source memory What does it mean if Gram-negative bacteria are found in the sample? Why would they be present in the sample? In photosynthesis, ATP and electrons from light reactions are used in ___________a. glycolysisb. krebs cyclec. oxidative phosphorylationd. calvin cycle Your friend, Suzie Whitson, has designed a new type of outdoor toy that helps children learn basic concepts such as colors, numbers, and shapes. Suzies product will target two groups: day care centers in warm climates and home school programs. Her company is Jiffy Jet and costs for last month follow: Factory rent $ 3,030 Company advertising 1,060 Wages paid to assembly workers 31,400 Depreciation for salespersons vehicles 2,140 Screws 595 Utilities for factory 825 Assembly supervisors salary 3,640 Sandpaper 125 Presidents salary 5,050 Plastic tubing 4,080 Paint 240 Sales commissions 1,330 Factory insurance 1,010 Depreciation on cutting machines 2,120 Wages paid to painters 8,000 Assume that Suzie Whitson has decided to begin production of her outdoor childrens toy. Required: 1 and 2. Identify each of the preceding costs as either a product or a period cost. If the cost is a product cost, decide whether it is for direct materials (DM), direct labor (DL), or manufacturing overhead (MOH) and also identify each of the preceding costs as variable or fixed cost. Which dynasty ruled China during the period depicted on this map? A the Han dynasty B the Ming dynasty C the Qin dynasty D the Yuan dynasty Explain who the old man calls mother and what he calls my mothers gate Gamiel and Aliyah go out to eat and Gamiel does not leave a tip for the waiter. If Aliyah explains his behavior by saying that he is cheap, she is making a(n) __________ attribution. If Aliyah explains his behavior by saying the service was terrible, she is making a __________ attribution. a. temporary; permanent b. personal; situational c. unstable; stable d. uncontrollable; controllable Lourdes is making a frame in the shape of a parallelogram. She adds diagonal braces to strengthen the frame. Parallelogram A B C D is shown. Diagonals are drawn from point A to point C and from point D to point B and intersect at point E. The length of D E is (3 y + 6) centimeters, the length of E B is (5 y minus 10) centimeters, and the length of E C is (2 y + 4) centimeters. How long is the brace that connects points B and D? 8 cm 16 cm 30 cm 60 cm What happened as a result of the October War in 1973? a. OPEC was formed as an oil cartel in Austria. b. Russia increased its production of oil, averting an energy crisis. c. OPEC increased the price of its oil by about 400 percent. d. Ayatollah Khomeini led the Iranian revolution to increase its output of oil stocks. Excerpt from The Rainbow, Chapter X (excerpt) D. H. Lawrence Gudrun and Ursula were co-mates. The second child, with her long, sleepy body and her endless chain of fancies, would have nothing to do with realities. She was not for them, she was for her own fancies. Ursula was the one for realities. So Gudrun left all such to her elder sister, and trusted in her implicitly, indifferently. Ursula had a great tenderness for her co-mate sister. It was no good trying to make Gudrun responsible. She floated along like a fish in the sea, perfect within the medium of her own difference and being. Other existence did not trouble her. Only she believed in Ursula, and trusted to Ursula. From this passage, what can be understood to be implicitly stated? A)Gudrun and Ursula don't see eye to eye. B)Gudrun is likable, while Ursula is unlikable. C)Gudrun is a daydreamer; Ursula is practical. Eliminate D)Gudrun and Ursula don't understand one another. What threats did African Americanscontinue to face in the South, and what measuresdid Congress take to deal with these threats? what is the value of 6*7-3^2*9+4^3please show work will give 5 stars and brainliest Intercultural communication is best described as __________. Group of answer choices communication between persons of different cultures all that a social group has produced and developed the transmission of culture from one generation to another processes that modify a persons culture through contact with other cultures"