Develop a C++ program that simulates a user creating/entering a new password into a system.
You may presume that the username is irrelevant to complete this program.

Have the program ask the user to enter a proposed password as a string.

Validate that the password meets the following criteria:

Password must be at least ten characters long
Password must contain at least one uppercase letter
Password must contain at least one lowercase letter

Answers

Answer 1

C++ program for Validating password

#include <iostream>

#include<cstring>

using namespace std;

int main()//driver function

{

char password[100];//declaring variables password

int lower=0,upper=0,flag=1;

cout<<"Enter the password\n";//taking input

cin>>password;

int length = strlen(password);//finding length

for(int i=0;i<length;i++)

{

if(password[i]>=65&&password[i]<=90)/*checking string must contain at least one uppercase letter */

{

upper=1;

}

if(password[i]>=97&&password[i]<=122)/*Checking string must contain at least one uppercase letter*/

{

lower=1;

}

}

if(length<10)//checking that string length should be less than 10

{

flag=0;

cout<<"Password must be at least ten characters long\n";

}

if(upper==0)

{

flag=0;

cout<<"Password have to be at least one uppercase letter\n";

}

if(lower==0)

{

flag=0;

cout<<"Password have to be at least one lowercase letter\n";    

}

if(flag==1)//if all condition turns out to true,printing Valid Password  

{

cout<<"Valid Password";

}

}

Output

Enter the password  

 Ayushyadav

  Valid Password

Enter the password  

  Ayush

Password must be at least ten characters long

 Enter the password

anmolyadav

Password have to be at least one uppercase letter

ANMOLVIJWANI

Password have to be at least one lowercase letter


Related Questions

A ____ is a structure that allows repeated execution of a block of statements.

a.
loop control

b.
loop

c.
body

d.
Boolean expression

Answers

Answer:

loop

Explanation:

Loop is the one which is used to execute the specific statement again and again until the condition is true.

In the programming, there are 3 basic loop used.

1. for loop

Syntax:

for(initialization, condition, increment/decrement)

{

  statement;

}

the above statement execute until the condition in the for loop true when it goes to false, the loop will terminate.

2. while loop

Syntax:

initialization;

while(condition)

{

  statement;

increment/decrement;

}

it is work same as for loop and the increment/decrement can be write after or before the statement.

3. do while

syntax:

initialization;

do

{

   statement;

   increment/decrement;

}while(condition);

here, the statement execute first then, it check the condition is true or not.

so, if the condition is false it execute the statement one time. this is different with other loops.

Final answer:

A loop is a structure that allows repeated execution of a block of statements in programming. It is controlled by a condition that, when false, will terminate the loop to prevent an infinite loop.

Explanation:

The correct answer to the question is b. loop. A loop is frequently used in programming to allow the repeated execution of a block of statements until a specified condition is met. Loops are a form of conditional control flow that can drastically alter the execution path of a program.

For instance, a while-loop will continue to execute so long as its condition remains True. If the condition evaluates to False, the loop terminates and control is passed to the statements that follow. During each iteration within the loop, it is essential to modify some variables, such as the iteration variable, to ensure the loop does not continue indefinitely, potentially leading to an infinite loop.

---------------- is an operating systems ability to be easily enhanced over time

a) performance

b) portability

c) reliability

d) extensibility

Answers

Answer: Extensibility

Explanation:

Extensibility is one of the features which can be easily enhanced over time. As the term extensibility refers to the addition of new features and adding more features to the present modules. This does not change the internal organisation of the earlier modules in fact they add new and more improved features to the present.

True / False
. Fixed length instruction sets are generally slower to execute than variable-length instruction sets.

Answers

Answer: False

Explanation:

Fixed length instructions are faster than variable length instruction because the fixed length instruction uses one clock cycle for their instruction whereas variable instruction takes more than one clock cycle. As RISC uses fixed length instruction and its CPI(cycles per instruction) is less compared to CISC which uses variable length instructions.

So fixed length instruction sets are faster than variable length instruction.

vertical exchanges are typically used only to buy and sell materials required for an organization's support activities ( True or false)

Answers

Answer:

Vertical exchanges are typically used only to buy and sell materials required for an organization's support activities- False

This statement is false.

What is Software Testing ? How many types of testing we mayutilize for a component using CBSE approach ?

Answers

Answer:

Software testing is defined as, it the process of evaluation of the functionality of the system software application to check whether the software met the specified requirement or not and also used to identify defects which ensured that the product is free from all defects in order to produce the quality products.

Types of testing we may utilize for a component using CBSE approach are:

As, CBSE stands for the component based software engineering where  programmers should design and implemented software components in such a way that many different program can reuse them.

Unit testing Integration testing System testing

A magnetic disk has an average seek time of 8 ms. The transferrate is 50 MB/sec. The

disk rotates at 10,000 rpm and the controller overhead is 0.3msec. Find the average time to read or write 1024 bytes.

Answers

Answer:

11.32milisec.

Explanation:

Average seek time = 8ms

transfer rate = 50MB/sec

disk rotate = 10000 rpm

controller overhead = 0.3 msec

Average time = ?

Average time is the addition of the seek time, transfer time, rotation time and ontroller overhead

[tex]Average\,time = Seek\,time+Rotation\,time+Transfer\,time+Controller\,overhead[/tex]

now, find the rotation time,

Rotation time is the time at which half rotation is made.

[tex]Rotation\,time=\frac{0.5}{rotation\,per\,second}[/tex]

convert rotation per minute to rotation per second.

[tex]rps=\frac{10000}{60}[/tex]

substitute in the above formula.

[tex]Rotation\,time=\frac{0.5}{\frac{10000}{60} }=0.003sec[/tex]

or 3milisec

now, find the transfer time by formula:

[tex]Transfer\,time=\frac{Number\,of \,read\,or\,write\,bytes}{transfer\,rate}[/tex]

so, read or write bytes is 1024

[tex][tex]Transfer\,time=\frac{1024}{50*10^{6} }=0.02milisec[/tex][/tex]

The average time is:

[tex][tex]Average\,time= 8+3+0.02+0.3=11.32milisec[/tex][/tex]

A while loop's body can contain multiple statements, as long as they are enclosed in braces



True False

Answers

Answer:

True

Explanation:

while loop is used to execute the statement again and again until the condition is true. if condition False program terminate the while loop and start execute the statement outside the loop.

syntax:

initialize;

while(condition)

{

  statement 1;

  statement 2;

   to

  statement n;

}

we can write multiple statement within the braces. their is no limit to write the statement within the body of the while loop.

while terminate only when condition false

What happens when a returntype, even void, is specified as a constructor in Java?

Answers

Answer:

If a returntype is added to a constructor method in Java, it ceases to be a constructor and behaves like an ordinary class method with the same name as class name.

Explanation:

If a returntype is added to a constructor method in Java, it ceases to be a constructor and behaves like an ordinary class method with the same name as class name.

Constructors are special methods which are used for initializing the object. Constructors do not have a return type. If we add a return type to the constructor method , it does not play any role during object initialization and can be involved like any other object method.

Elevating privileges to those of an administrator is also called ___________________ escalation.

Answers

Answer: Privilege

Explanation:

Privilege escalation is type of intrusion attack whereby the attacker gain access into the system with the privileges of that of an administrator. This may be due to programming errors or any type of bug in the system. This attack is extremely dangerous because the attack can change the environment of the system as it gets the administrator rights and access.

What is the effect of this program?
#define MAX 50
int a[MAX], i, j, temp;
for(i = 0; i < MAX / 2; + + i)
{
temp = a[i];
a[i] = a[MAX - i -1];
a[MAX - i - 1] =temp;
}
A. Arranges the elements of array a inascending order
B. Counts the numbers of elements of agreater than its first element
C. Reverses the numbers stored in thearray
D. Puts the largest value in the last arrayposition
E. None of the above

Answers

Answer:

The answer is (C)

Let’s run the algorithm on a small input to see the working process.

Let say we have an array {3, 4, 1, 5, 2, 7, 6}. MAX = 7

Now for i=0,  i < 7/2, here we exchange the value at ith index with value at (MAX-i-1)th index. So the array becomes {6, 4, 1,  5, 2, 7, 3}. //value at 0th index =3 and value at (7-0-1)th index is 6. Then for i=1, i < 7/2, the value at index 1 and (7-1-1)=5 are swapped. So the array becomes {6, 7, 1,  5, 2, 4, 3}. Then for i=2, i < 7/2, the value at index 2 and (7-2-1)=4 are swapped. So the array becomes {6, 7, 2,  5, 1, 4, 3}. Then for i=3, i not < 7/2, so stop here. Now the current array is {6, 7, 2,  5, 1, 4, 3} and the previous array was{3, 4, 1, 5, 2, 7, 6}.

Explanation:

So from the above execution, we got that the program reverses the numbers stored in the array.

Final answer:

The provided program reverses the numbers stored in the array by swapping elements from the start of the array with their corresponding elements at the end until it reaches the middle of the array. The correct answer is C. Reverses the numbers stored in the array.

Explanation:

The effect of the provided program is that it reverses the numbers stored in the array a. It uses a for-loop to swap elements symmetrically from the start and end of the array towards the middle. Specifically, for each iteration of the loop, it takes an element from the beginning part of the array (indexed by i) and swaps it with the corresponding element from the end of the array (indexed by MAX - i - 1).

The correct choice from the given options is:

C. Reverses the numbers stored in the array

This code does not arrange the elements in ascending order, count elements, or specifically move the largest value to the last position, so options A, B, and D are incorrect.

What do you mean by preemptive and nonpreemptive multitasking and multithreading ?

Answers

Answer:

Preemptive multitasking is the operating system that control the processor by not involving in task cooperation and preemptive is the process of controlling the task. On the other hand, preemptive multi threading is the parallel processing system in which the execution of the thread is preemptive.

Non-preemptive multitasking is the process in which the processor are never involves with the task and it is used for many window applications. Whereas, in non preemptive multi threading when a thread are given control then, it continues run until it can control the blocks.

public class Myfile { public static void main (String[] args) { String biz = args[1]; String baz = args[2]; String rip = args[3]; System.out.println("Arg is " + rip); } } Select how you would start the program to cause it to print: Arg is 2 A. java Myfile 222 B. java Myfile 1 2 2 3 4 C. java Myfile 1 3 2 2 D. java Myfile 0 1 2 3

Answers

Answer:

java MyFile 1 3 2 2

Explanation:

Option is is the correct answer, whatever we pass as commadD line arguments can be accessed using String array args by passing index

Array indexes starts with zero, in our case when we say

java MyFile 1 3 2 2

its going to be store like args[0] = 1, args[1] = 3, args[2] = 2, args[3] = 2

now we are saying  System.out.println("Arg is " + rip);

it means its going to print Args is with value of rip i.e. 2 (rip=args[3])

What is the cause of thrashing?How does the systemdetect thrashing.Once it detects thrashing what can the system doto eliminate this problem

Answers

Answer:

Thrashing :- It is a situation when the system most of it's time is handling page faults, but the actual work done by CPU is very less.

Thrashing is caused by when a process is allocated too few number of frames, then there will be continuous page faults.The actual Utilization of CPU is very less.

Thrashing detection can be done by the system by determining the CPU Utilization as compared to degree of multi programming if it comes out to be less then there is thrashing.

Thrashing can be eliminated by decreasing the Degree of multi programming.

What are the first and the last physical memory addressesaccessible using
the following segment values?
a) 1000
b) 0FFF
c) 0001
d) E000
e) 1002

Answers

Answer

For First physical memory address,we add 00000 in segment values.

For Last physical memory address,we add 0FFFF in segment values.

NOTE-For addition of hexadecimal numbers ,you first have to convert it into binary then add them,after this convert back it in hexadecimal.

a)1000

For First physical memory address, we add 00000 in segment value

We add 0 at the least significant bit while calculating.

          10000 +00000 = 10000 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           10000 +0FFFF =1FFFF    (from note)

b)0FFF

For First physical memory address,we add 00000 in segment value

We add 0 at the least significant bit while calculating.

     0FFF0 +00000=0FFF0 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           0FFF0 +0FFFF =1FFEF (from note)

c)0001

For First physical memory address,we add 00000 in segment value

We add 0 at the least significant bit while calculating.

     00010 +00000=00010 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           00010 +0FFFF =1000F (from note)

d) E000

For First physical memory address,we add 00000 in segment value

 We add 0 at the least significant bit while calculating.

    E0000 +00000=E0000 (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           E0000 +0FFFF =EFFFF (from note)

e) 1002

For First physical memory address,we add 00000 in segment value

 We add 0 at the least significant bit while calculating.

    10020 +00000=10020  (from note)

For Last physical memory address,We add 0 at the least significant bit while calculating.

   we add 0FFFF in segment value

           10020 +0FFFF =2001F (from note)

ebay employs the _____ auction mechanism.

A. forward

B. reverse

C. dutch

D. proprietary ebay

Answers

Answer:

A. Foward

Explanation:

ebay employs the forward auction mechanism.

True of False - use T or FThe Exception class can be extended.

Answers

Answer:

T

Explanation:

java.lang.Exception class can be extended. That is you can define subclasses for the Exception class. In fact all out of the box Exception classes in Java like java.io.IOException, java.lang.NumberFormatException, javax.jms.JMSException extend the base class java.lang.Exception or its subclasses. The subclassing is valid because Exception class is not declared as a final class.

Answer:

true

Explanation:

Write a C++ code that will read a line of text and echo the line with all uppercase letters deleted. Assume the maximum length of the text is 80 characters. Example input/output is shown below.

Input:

Today is a great day!

Output:

oday is a great day!

Answers

Answer:

#include<bits/stdc++.h>

using namespace std;

int main()

{

   string st;

   getline(cin,st);

   int i=0;

   while(i<st.length())

   {

       if(isupper(st[i]))

       {

           st.erase(st.begin()+i);

           continue;

       }

       i++;

   }

   cout<<st<<endl;

   return 0;

}

Explanation:

I have included the file bits/stdc++.h which include almost most of the header files necessary.

For taking the input as a string line getline is used.

For checking the upper case isupper() function is used. cctype header file contains this function.

For deleting the character erase function is used.

True of False - use T or F An abstract class can be extended by another abstract class.

Answers

Answer:

T

Explanation:

an abstract class can be extended by another.the abstract class which is extending should be implemented by another class

Once the logical expression at the start of a while loop is false, the statements after the end statement are

executed.



True or False?

Answers

Answer:

True

Explanation:

the while loop is used to execute the statement again and again unti the condition is true. Once the condition is False, the program control terminate the while loop and execute the next statement after the while loop.

for example:

int i=0;

while(i<5)

{

i++;

}

cout<<i<<endl;

one the code execute the while loop run 5 times and in the 6th times the condition become False then program control moves to print statement.

Given a is 3, b is 4, and c is 5, what is the value of the expression
--a * (3 + b) / 2 - c++ * b?

Answers

Answer:

--a * (3 + b) / 2 - c++ * b = -13

Explanation:

First we have to evaluate (3+b) = 7

As a=3, so "--a" will be 2.

So we need to evaluate "--a * (3 + b) / 2" and as we know * and / has same precedence we have to follow left association.

So in "--a * (3 + b) / 2", "--a * (3 + b)" = 2*7 is evaluated first that is 14. then [tex]\frac{14}{2}[/tex] = 7.

Now in "c++*b" as c is post-incremented, so it will take 5 rather than 6.

So c++*b = 5 *4 = 20.

Now --a * (3 + b) / 2 - c++ * b = 7-20 = -13

Whichmultiplexing technique involves signals composed of lightbeams?

1 TDM

2 FDM

3 WDM

4 None of theabove

Answers

Answer:

3.WDM

Explanation:

WDM ( wavelength division multiplexing ) involves signals composed of light beams WDM is used in communication where fibers are used it is used for multiplexing of number of carrier signals  which are made of optical fibers by using different wavelength of laser light it has different wavelength so this WDM is used for signals composed of light beams it has property of multiplexing of signal

Why has the PCM sampling time beenset at 125 microseconds?

Answers

Answer Explanation:c

PCM( pulse code modulation) is a process for transmitting the analog data from one place to other place the signal which are used in pulse code modulation are binary that is only 0 and 1 using PCM all forms of analog data can be form including voice music etc.

to obtain pcm an analog signal is sampled at regular time interval the sampling rate is very high as compared to the frequency used by analog signal. the instant amplitude of analog signal at each sampling is being closer to the nearest several specific earlier levels.this process is called tantalization. in this the number of level is power of 2 so the sampling time is set as 125 microseconds.

Is the Internet a LAN or a WAN?

give the answer at least five line for one question

Answers

Answer:

Internet is a WAN (wide are network)

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

The Internet is a worldwide interconnected network with computers acting as nodes around the world. Communicating and sharing information between one another. LAN and WAN are connection types for the Internet.

LAN is a Local Area Network, which interconnects local computer nodes physically using Ethernet cables. Which are then connected to the internet itself.

WAN are wide area networks, which are usually interconnected through public communication services such as telephone cable.

Therefore the Internet is a WAN (wide are network)

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

There is no reason to put comments in our code since we knew what we were doing when we wrote it. TRUE

Answers

Answer:

False: There are reasons to put comments in our code. We should have the habit of that.

Explanation:

sometimes when we start to debug our program due to some error in execution, we don't recognize properly which code we have written for what purpose.if we distribute the code to others as a team, others get the intention of our code more clearly due to comments.The code can be reused taking it's sections to form an other program, where the comments has a vital role.

Where (what memory location) is the data read from for the following code:

ORG $3000
LDAA #$C2

Answers

Answer: ORG $3000 tell us that we want to load the program from the address $3000.

LDAA #$C2 tell us to load the value contained in the address present in the register C2 into the accumulator.

Explanation:

ORG instruction in  microprocessor does not have a fixed address. It tell us where to begin the execution of the program by loading into a starting address space. It does not uses fixed addressing

LDAA instruction uses indirect addressing by placing the value from the address present in the register. Here  the address is contained in register C2.

please exaplain to me, how people, Software andHardware relates specifically to
1. LANs
2. WANs

Answers

Answer:

No Answer

Explanation:

LAN : Local Area Network

Used to connect all the computers with in a building or some limited distance

so that people can share data  and applications between different computers

useful for Intranet applications

WAN: Wide Area Network

used to cover large geographical area. it is network of networks. useful for computer networking.In short a WAN connects several LAN

Write a program to display a message telling the educational level of a student based on their number of years of school. The user should enter a number indicating the number of years of school, and the program should then print the corresponding message given below. Be sure to use named constants rather than any numbers other than 0 in this program.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   int years;

   cout<<"enter the number of years of school: ";

   cin>>years;

   cout<<"The educational level is: "<<years<<endl;

}

Explanation:

First include the library iostream in c++ program for input/output.

then create the main function and declare the variable.

after that, display the message by using cout instruction for asking the user to enter the value.

then, cin instruction store the value in the declare variable.

finally, display the message with corresponding value.

Final answer:

The provided Python program prompts for a score between 0.0 and 1.0, validates the input, and then outputs the corresponding grade or an error message if the input is not a number or out of range.

Explanation:

Here is a Python program that prompts for a score between 0.0 and 1.0, checks whether the score is in the valid range, and then prints the corresponding grade based on the score provided:

# Define named constants for grade thresholds
GRADE_A = 0.9
GRADE_B = 0.8
GRADE_C = 0.7
GRADE_D = 0.6
try:
   score = float(input('Enter a score between 0.0 and 1.0: '))
   if score < 0.0 or score > 1.0:
       print('Error: Score is out of range.')
   elif score >= GRADE_A:
       print('A')
   elif score >= GRADE_B:
       print('B')
   elif score >= GRADE_C:
       print('C')
   elif score >= GRADE_D:
       print('D')
   else:
       print('F')
except ValueError:
   print('Error: Please enter a numeric input.')
The program uses try and except blocks to handle non-numeric inputs gracefully, outputting an error message in such cases. Depending on the score entered by the user, the appropriate grade is printed using comparison operations against the named constants defining grade thresholds.

T F A stub is a dummy function that is called instead of the actual function it

represents.

Answers

Answer: True, stub function is a dummy function that is called instead of actual function.

Explanation: A stub function is a function which has the name , parameters of a function but is used for production of the dummy output which is in correct form. It is put in a function so that it becomes convenient when a function is called it can be tested before it is completely written which saves the execution of wrong code.Therefore the given statement is true.

Other Questions
An airplane starts its takeoff by moving at 1.7 m/s. The plane must then accelerate at 3.0 m/s2 for the next 30s to reach its final takeoff speed. To the nearest tenth of a kilometer, how far does the plane travel while accelerating to its takeoff speed? who was the first president 1. Ernest Hemingway era un aficionado al ____. (A)toreo(B)lidiar(C)el traje de luces(D)la plaza de toros2. Asistio a muchas ___ y las describio en detalle en sus obras. (A)ruedos(B)corridas(C)toreos(D)la plaza de toros3. El ___ es la persona que mata al toro al final.(A)traje de luces(B)el ruedo(C)el matador(D)el toreo4. Siempre lleva un __ de colores brillantes. (A)torear(B)el matador(C)la corrida(D)traje de luces5. Manolete fue un ___ espanol muy famoso que fue herido por un toro y que murio al poco tiempo. (A)torear(B)toreo(C)lidiar(D)la plaza de toros6. No se permite que el publico baje al ___ porque los toros pueden ser muy peligrosos. (A)la matador(B)el trero(C)la corrida(D)ruedo7. Los toreros arriesgan sus vidas luchando contra el toro.(A) cierto(B) falso8. En que pais se encuentra la plaza de toros mas grande del mundo?(A)Espana(B)Mexico(C)Paraguay(D)Honduras9. Que hacian los celtibericos en sus templos circulares?(A)El torero(B)la plaza de toros(C)La matanza10. Que es el toreo segun un acifionado?(A)tortura(B)el rito(C)malo(D)bueno11. En julio de 2011, el Parlamento catalan abolio las corridas de toros en Cataluna. (A)cierto(B)falso12. Dnde es legal la tauromaquia?(A)Argentina(B)Cuba(C)Colombia(D)Chile13. Quin es el torero femenino ms famoso?(A)Penelope Cruz(B)Shakira(C)Sara Ramierez (D)Cristina Sanchez14. En qu ao naci Juanita Cruz?(A)1917(B)1922(C)1937(D)191215. Dnde naci Juanita Cruz?(A)Peru(B)Venezuela (C)Madrid(D)Chile16. Dnde se practica la corrida sin sangre?(A)Bolivia(B)Mexico(C)Uruguay(D)Ecuador17. Qu es una vestimenta que es una blusa y falda boradas de adornos brillantes?(A)traje de luces(B)los pantalones(C)los zapatos18. Cundo dice el pblico OLE?(A)el matador hizo un mal trabajo(B)el toro mata el matador(C)celebrar una accion19. Sin embargo, fue en la Espana del siglo ___ donde se desarrollo la corrida. (A)XVII(B)XVI(C)XVIII(D)XIV20. Hay mucha gente piensa que la tauromaquia es ___. (A)injustia y cruel(B)bueno ni malo(C)un deporte which graph represents a function with direct variatio? please help!!! Which ordered triple represents all of the solutions to the system of equations shown below?2x - 2y - z = 6-x + y + 3z = -33x - 3y + 2z = 9a(-x, x + 2, 0)b(x, x - 3, 0)c(x + 2, x, 0)d(0, y, y + 4)What is the solution to the system of equations shown below?2x - y + z = 44x - 2y + 2z = 8-x + 3y - z = 5a (5, 4, -2)b (0, -5, -1)c No Solutiond Infinite Solutions The point slope form of the equation of the line that passes through (-4, -3) and (12, 1) is y-1=1/4(x-12) what is the standard formula equation for this line? To pass science, a student must earn at least a grade of 70. How many students failed this science class? How did the beliefs held by Mohandas Gandhi and H0 Chi Minh compare? A.Both believed armed conflict was the only way to establish a new government. B.Both believed their country should be divided up along religious lines. C.Both believed communism should be spread to neighboring countries. D.Both believed colonial powers were exploiting the citizens of their country. If h(x) is the inverse of f(x), what is the value of h(f(x))?0 1o f(x) While driving in heavy traffic, Nathan narrowly misses hitting another car. After the event, his heart rate and blood pressure increase. According to Selye, Nathan is MOST likely in which phase of the general adaptation syndrome? (A) resistance (B) exhaustion(C) alarm reaction(D) primary appraisal Explain why the symptoms of celiac disease are consistent with the effects of celiac disease on the small intestine. A(n)_______ (rational /irrational) number answer is desired. Point W is located on QR so that QW/QR = 3/4. What are the coordinates of point W? Which of the following groups are most likely to grow as a percentage of the U.S. population Asian Americans Whites African Americans All of the above The acceleration of a baseball pitcher's hand as he delivers a pitch is extreme. For a professional player, this acceleration phase lasts only 50 ms, during which the ball's speed increases from 0 to about 90 mph, or 40 m/s.What is the force of the pitcher's hand on the 0.145 kg ball during this acceleration phase? Which shows one way to determine the factors of 4x3 + x2 8x 2 by grouping? Target ROI is 19% Invested Capital is $527956 Full Cost per unit $1446 Expected sales volume is 748 units. If the company prices each unit to earn the target ROI, what amount of profit would be added to the cost of each unit? Round your answer to the nearest whole dollar . Don't use dollar signs or commas when entering your answer. A general environmental analysis can be expected to produce all of the following EXCEPTa. objective answers.b. recognition of environmental trends.c. identification of organizational opportunities.d. identification of organizational threats. A photon has a momentum of 5.55 x 10-27 kg-m/s. (a) What is the photon's wavelength? nm (b) To what part of the electromagnetic spectrum does this wavelength correspond? the tolerance is +/-2% Two friends visited Washington D.C. for the weekend. Person 1 rode the subway one stop, 5 times at the peak fare price and four times at the off peak fare price for a total cost of $17.40. Person 2 rode with Person 1, 2 times at the peak fare price and three times at the off peak fair price for a total cost of $9.20. How much was the peak fare price?