ebay employs the _____ auction mechanism.

A. forward

B. reverse

C. dutch

D. proprietary ebay

Answers

Answer 1

Answer:

A. Foward

Explanation:

Answer 2

ebay employs the forward auction mechanism.


Related Questions

Under Rule 504 ofRegulation D, a company can sell up to ______ of securitiesin

any 12-monthperiod.

a. $50,000

b. $100,000

c. $500,000

d. $1,000,000

Answers

Answer:

5,000,000 (5 million) of securities in any 12-month period.

Explanation:

Based on my extensive research on regulations. Rule 504 of Regulation D provides an exemption for having to register under the federal securities laws. This is usually for companies that are in business with products or services that are considered as securities or commodities. This Rule allows a company to sell up to 5,000,000 of securities in any 12-month period.

This answer is not part of the list of available answers but it is correct. Those answers may be outdated.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

What is transaction? Differentiate between pre-emptiveand non pre-emptive transactions

Answers

Answer: Transaction is the process of processing information in a standalone system or distributed system. There are two basic types of systems which are preemptive and non preemptive transactions.

Explanation:

Transaction can be complete successfully or it can fail but it can never be partially completed. Computer processes which completes in its entirety or  does not complete at all are termed as processes.

Preemptive processes are those where the cpu is allotted to a process for a definite time . The cpu can be given to another process if it has higher priority.

Whereas in non preemptive processes the cpu once allotted to a process cannot be assigned to another process until job is finished for the first process.

What applications work best with multiplexing?Why?

Answers

Answer:

Multiplexing is the process of combining multiple analog and digital signal into one signal over a shared medium and it is most efficient service, which is provided by the transport layer protocol. The main purpose of multiplexing is that signal are transmitted efficiently.

It contains applications as:

Client-server Application

Many to single client-server application

Many to many client-server application

Many client to many server application is the best because it is improving server application and processing a client request within a group on any server.

In Java a sub class of a/an______ can override a method of itssuper class and declare it ___________ . In that case the subclassmust be declared abstract.
Abstract class, non abstract class
non abstract class, abstract
non abstract class , reference data type
overloaded class, private

Answers

Answer:

non abstract class,abstract

Explanation:

In java a sub class of a concrete class or non abstract class can override a method of its upper class  and declare it abstract . This is because it does not happen very often, but it is useful when the implementation of  the method in the upper class is not valid in the  subclass .

Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same backward as forward. Blank, punctuation marks and capitalization do not count in determining palindromes. Here is some examples of palindromes:

Radar
Too hot to hoot
Madam!I'm adam

Answers

A C++ program to determine if a given string is a palindrome involves converting the string to the same case, removing non-alphanumeric characters, and then checking if the string is equal to its reverse. Below is a sample code that performs these steps:

#include

#include

#include

#include

bool isPalindrome(const std::string& str) {

   std::string sanitized;

   for (char ch : str) {

       if (std::isalnum(ch))

           sanitized += std::tolower(ch);

   }

   std::string reversed = sanitized;

   std::reverse(reversed.begin(), reversed.end());

   return sanitized == reversed;

}

int main() {

   std::string input;

   std::cout << "Enter a string to check if it is a palindrome: ";

   std::getline(std::cin, input);

   bool result = isPalindrome(input);

   if(result) {

       std::cout << "The string is a palindrome." << std::endl;

   } else {

       std::cout << "The string is not a palindrome." << std::endl;

   }

   return 0;

}

In the above program, the function isPalindrome takes a string and creates a sanitized copy by iterating over each character, checking if it is alphanumeric (ignoring spaces and punctuation), and converting it to lowercase. After constructing the sanitized string, it creates a reversed version and compares the two. The main function reads a string from the user, calls the isPalindrome function, and outputs the result.

__________ is a mathematical model of a real system in the form of a computer program.
(A) Transmitter
(B) Spreadsheet
(C) Simulation
(D) Modulation

Answers

Simulation is a mathematical model of a real system in the form of a computer program.

Answer is Simulation- (C)

Answer:

The correct answer is letter "C": Simulation.

Explanation:

A computer simulation is an algorithm, computer software or a network of servers that have the goal of creating a simulation of an abstract model of a given system. The model is made up of equations that replicate the functional relationships that the real system could have.

What is the most popular service that was supported by almost every early computer networks? In your opinion, what’s the reason for that service to be most popular?

Answers

Answer:

The most popular service supported by every early computer networks:-

Telnet

SMTP(Simple Mail Transfer Protocol)

Reason are as following:-

Telnet:-

When there the number of internet using  people was very less They used to get connected with LAN and Telnet.

It was very useful for bidirectional interactive text oriented communication.  

SMTP:-

SMTP(Simple Mail Transfer Protocol) introduced in 1982 and was one of the most used protocol for e-mails.

It is still used extensively and  It was used for very long time to send and receive email messages for a very long time.

Hence, these are the computer network protocols that are being used as the popular devices.

Write a program in which you input three numbers they canhave decimals so float values and the program gives you the minvalue out of the three. Please need asap thank you

Answers

Answer:

Following is the c++ code:-

#include <bits/stdc++.h>

using namespace std;

int main() {

   float a,b,c;//declaring three float variables..

   cout<<"enter values"<<endl;

   cin>>a>>b>>c;//taking input..

   float mi=min(a,b);//finding minimum in a and b..

   mi=min(mi,c);// finding minimum from mi and c.

   cout<<mi<<endl;//printing the answer.

return 0;

}

Explanation:

I have taken three float variables to hold the values.

then I am finding the minimum in a and b and storing it in mi.

Then finding minimum from mi and c so we will get our final minimum number.

The relational database model was created by E.F. Codd.

A.

True

B.

False

Answers

The answer is A. True

Explanation:
E. F Codd, invented he model in the year 1970.

What is stand-alone LDAP server?

Answers

Answer:

A stand-alone LDAP server is defined as to remove the load from a server that does multi function tasks. It is more efficient when we use one or more LDAP configurations .

Light weight Directory Access Protocol (LDAP) is a client and server protocol used for accessing directory data. It  helps in reading and editing the directories over IP networks and runs directly over Transmission control protocol and internet protocol used simple string format for transferring of data.

Write a program to print out the digits of a number in English. For example, if the number is 153, the output should be “One Five Three.” This program should allow users to input the number by using keyboard

Answers

Answer:

#include <bits/stdc++.h>

using namespace std;

string value(int i)//function return the string of the integer..

{

  if(i==0)

  return "Zero";

  if(i==1)

  return "One";

  if(i==2)

  return "Two";

  if(i==3)

  return "Three";

  if(i==4)

  return "Four";

  if(i==5)

  return "Five";

  if(i==6)

  return "Six";

  if(i==7)

  return "Seven";

  if(i==8)

  return "Eight";

  if(i==9)

  return "Nine";

}

int main() {

int n,a[100],c=0;

cout<<"Enter the integer"<<endl;

cin>>n;//taking input of n..

while(n>0)//storing the integer in the array in reverse order..

{

    int digit=n%10;

    a[c++]=digit;

    n/=10;

}

int s=0,e=c-1;

while(s<=e)//reversing the array.

{

    int temp=a[s];

    a[s]=a[e];

    a[e]=temp;

    s++;

    e--;

}

for(int i=0;i<c;i++)//printing the string according to the number..

{

    cout<<value(a[i])<<" ";

}

cout<<endl;

return 0;

}

Output:-

Enter the integer

230

Two Three Zero

Explanation:

I have created a function which returns string according to the integer.So i have taken an array to store the digits of the number and reversing it so the number is stored as it is in the array.Then printing the numbers accordingly.

After inserting (or deleting) a node from an AVL tree, the resulting binary tree does not have to be an AVL tree.

True

False

Answers

True,After inserting (or deleting) a node from an AVL tree, the resulting binary tree does not have to be an AVL tree.

After inserting or deleting a node from an AVL tree, the resulting binary tree does not necessarily have to be an AVL tree. Here's a detailed explanation:

An AVL tree is a self-balancing binary search tree where the heights of the two child subtrees of any node differ by at most one. When performing operations such as insertion or deletion in an AVL tree, it is crucial to maintain this balancing property to ensure that the tree remains an AVL tree.

However, during the process of insertion or deletion, the balance factor of nodes may become violated, causing the tree to lose its balance. This imbalance can occur due to various factors such as rotations, double rotations, or node restructuring.

In some cases, after inserting or deleting a node, the resulting binary tree may still satisfy the AVL tree property without requiring any additional adjustments. In these cases, the tree remains an AVL tree.

However, there are scenarios where the resulting tree violates the AVL property and becomes unbalanced. In such cases, it is necessary to perform rebalancing operations to restore the AVL property. These operations typically involve rotations or restructuring of nodes to ensure that the heights of the subtrees remain balanced.

Therefore, it is true that after inserting or deleting a node from an AVL tree, the resulting binary tree does not have to be an AVL tree. Maintaining the AVL property may require additional adjustments to restore balance, making it possible for the resulting tree to deviate from the AVL tree structure initially.

Which of the following is used to verify a user's identity? A) Identification B) Authentication C) Validation D) Authorisation E) Accountability

Answers

Answer:

A? "A means of proving a person identity"

Explanation:

Write each of the following decimal values in binary. (Can please show me how you did arithmetic you to perform the conversion.)
47
14
81
102
241

Answers

Answer:

47 → 101111

14 → 1110

81 → 1010001

102 → 1100110

241 → 11110001

Explanation:

There are two ways to calculate binary equivalent of decimal values:

Divide the number by 2 as in the image, keep the reminder to right. then divide the divisor by 2 and keep the reminder to right and so on. Then read the reminders from top to bottom.Or you can start putting 1 at the nearest power of 2 that is smaller than decimal integer, then subtract that value from the decimal integer. Again put 1 at nearest power of 2 and so on.

       e.g.

       For 102, we put 1 at 64. than 102[tex]-[/tex]64 = 38

                      then put 1 at 32, now 38 [tex]-[/tex] 32 = 6.

                      then put 1 at 4, now 6 [tex]-[/tex] 4 = 2.

                      then put 1 at 2, now 2[tex]-[/tex]2 = 0.

                      so put 0 at 1 and all other places except those where we put 1.

What will the following C code print out?

int x = 7, y = 5;

if (x > 5)

if (y > 5)

printf(“x and y are > 5”);

else

printf(“x is <=5”);
a) “x and y are > 5”

b) “x is <=5”

c) nothing will be printed

Answers

Answer:

x is <=5

Explanation:

If-else is the statement that is used to execute the statement when the condition is true.

syntax:

if(condition){

    statement;

}else{

    statement;

}  

if we do not provide the curly bracket, still the statement is valid.

in the question, x =7 and y=5

then, check the condition 7 > 5 condition true. it moves to the next if statement and check 5 > 5, condition false. Then it moves to the else part and executes the statement.

and print the output "x and y are > 5".

The purpose of a database is to help people stop using spreadsheets.

Answers

Answer:

Yes, the purpose of a database in a way is to stop people from using spreadsheets but, it is also so much more.

Explanation:

Databases are a vastly improved form of a spreadsheet. They allow Computer Scientists to automatize a company's information. Giving them the ability to instantly add, retrieve, and modify specific information within a database of hundreds or even thousands of entries. All this with little or no human input. Thus saving a company time and money as opposed to using a regular spreadsheet which requires manual input from an employee.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

What is the difference between an argument and a parameter variable?

Answers

Answer:

The value enter in the function calling is called argument. Argument passed to function.

The variable declare in the function to capture the pass value from the calling function is called parameters.  

Explanation:

Argument is used in the calling function and parameter is used in the defining the function.

for example:

//create the function

int count(parameter_1, parameter_2,.....)

{

  statement;

}

count(argument_1. argument_1,.....);   //call the function

True / False
The architecture of a computer determines its machine language.

Answers

Answer: True

Explanation:

The architecture of the computer determine the processor and it determines whether we will have fixed length instructions or variable length instructions.

We have CISC and RISC architectures which uses different types of instructions and the data are processes in different machine languages.

Write a do-while loop that asks the user to enter two numbers. The numbers should be added and the sum displayed. The user should be asked if he or she wishes to per- form the operation again. If so, the loop should repeat; otherwise it should terminate.

Answers

The do-while loop for the given problem is shown below.  

do  

{  

  // user asked to enter two numbers  

  cout<<"Enter two numbers to be added."<<endl;  

  cin>>num1;  

  cin>>num2;  

  sum = num1 + num2;  

 

  // sum of the numbers is displayed  

  cout<<"Sum of the two numbers is "<<sum<<endl;  

  // user asked whether to perform the operation again  

  cout<<"Do you wish to continue (y/n) ?"<<endl;  

   cin>>choice;  

}while(choice != 'n');  

The variables to hold the two numbers and their sum are declared as float so that the program should work well for both integers and floating numbers.

float num1, num2, sum;

The char variable is taken since it holds only a single-character input from the user, 'y' or 'n'.

char choice;

The whole program is given below.

#include <iostream>

using namespace std;

int main() {

float num1, num2, sum;

char choice;  

do  

{  

  // user asked to enter two numbers  

  cout<<"Enter two numbers to be added."<<endl;  

  cin>>num1;  

  cin>>num2;  

  sum = num1 + num2;  

  // sum of the numbers is displayed  

  cout<<"Sum of the two numbers is "<<sum<<endl;  

  // user asked whether to perform the operation again  

  cout<<"Do you wish to continue (y/n) ?"<<endl;  

  cin>>choice;  

}while(choice != 'n');

cout<<"Quitting..."<<endl;

}

All of the followingshould be followed by entrepreneur for being effective

leader,EXCEPT:

a. Show respect foremployees

b. Show concern foremployees’ welfare

c. Try to do everythinghimself

d. Encourage and praiseothers

Answers

Answer:

C - Try to do everything himself

Explanation:

It is usually never advisable for an entrepreneur to attempt to do everything themselves. Delegation (assigning a task to a subordinate) is an important aspect of entrepreneurial leadership, this benefits the entreprenuer himself and allows his employees to feel a sense of confidence because they were trusted witht the task and it is a chance to show what they are capable of.

. If you executean infinite recursive function on a computer it will executeforever.
a. True
b.False

Answers

Answer:

b. False

Explanation:

If you execute an infinite recursive function on a computer it will NOT execute forever.

ETL stands for ---------------o Extract, transform and loado Extended transformation loadingo Enhanced logical transformation

Answers

Answer:

Extract, transform, and load

Explanation:

ETL stands for extract, transform, and load.

In a ____ queue, customers or jobs with higher priorities are pushed to the front of the queue.

A.
structured

B.
divided

C.
priority

Answers

Answer: In a priority queue, customers or jobs with higher priorities are pushed to the front of the queue.

Explanation:

A queue is an abstract data type which is an ordered set of elements. The elements are served in the order in which they join the queue. The first element which was put in the queue is processed first.  

The operations performed on queue data type are dequeue and enqueue.

Dequeue refers to removal of the first element from the queue after it has been serviced.

Enqueue refers to the arrival of new element when the element is added at the end of the queue.

A priority queue is another implementation of a queue. All the elements in a priority queue are assigned a priority. The element with the higher priority is served before the element with a lower priority. In situations of elements having same priority, the element is served based on the order in which the element joined the queue.

In programming, a priority queue can be implemented using heaps or an unordered array. Unordered array is used based on the mandatory operations which are performed on the priority queue.

The mandatory operations supported by a priority queue are is_empty, insert_with_priority and pull_highest_priority_element. These operations are implemented as functions in programming.

The is_empty confirms if the queue is empty and has no elements.

The insert_with_priority puts the new element at the appropriate position in the queue based on its priority. If the priority of the element is similar to the priority of other element, the position of the new element is decided based on the order of joining the queue.

The pull_highest_priority_element pulls the element having the highest priority so that it can be served before other elements. The element having the highest priority is typically the first element in the priority queue.

In operating system, priority queue is implemented to carry out the jobs and/or tasks based on their priority.

What is the difference between“Internetwork and the Internet”?

Answers

Answer: Inter-network-It is the network that gets created joining of many networks together and form a individual large network .

Internet- it is the global network that contains that contains the collection of all the networks.

Explanation:

Internet is the network at a global level which has the access to connect the various computer network together and inter-network is the network having the combination of many network together to form a single unit of network  .Internet usually forms the connection using routers , servers etc and inter-network uses LAN's ,PAN's etc. to form the connection

How do you return a value from a function?

Answers

Answer:

return instruction used to return a value from a function.

Explanation:

Function is a block of statement which perform the special task.

Syntax for define a function:

type name(parameter_1, parameter_2,...)

{

  statement;

return variable;

}

In the syntax, type define the return type of the function. It can be int, float, double and also array as well. Function can return the array as well.

return is the instruction which is used to return the value or can use as a termination of function.

For return the value, we can use variable name which store the value or use direct value.

Given an array of integers an). The array is already NOT write C++ statements to fill the array eye write C++ statements that print to the screen how many values in the how many values are odd. In addition, the statements output to the scre the array that are even. s

Answers

Answer:

#include<iostream>

using namespace std;

int main () {

   int n;

   int odd=0,even=0;

  cout<<"Enter the number of element store in the array: ";

  cin>>n;

  int arr[n];

  for(int i=0;i<n;i++){

     cin>>arr[i];

  }

  for(int i=0;i<n;i++){

       if(arr[i]%2==1){

           odd++;

       }else{

           even++;

       }

  }

  cout<<"The number of odd values is: "<<odd<<endl;

  cout<<"The number of even values is: "<<even<<endl;

}

Explanation:

Include the library iostream for input/output.

Create the main function and declare the variables.

Then, print the message on the screen and store the value enter by the user for the size of the array. After that, take a for loop and store the values in the array enter by the user.

then, take a for loop for traversing to the array and check the condition for odd and even by using if-else statement.

for odd: If odd values divided by 2 it gives 1 remainder.

for even: If even values divided by 2 it gives zero remainder.

if condition true, then update the counter.

finally, print the result.

This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.



1. do-while

2. while

3. for

4. infinite

5. None of these

Answers

Answer:

This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.: for - 3.

Infinite means not stop. Something that keeps going and going! So the answer would have to be 4 :)

how to write a function "void funct()" which will accept a string from the user as input and will then display the string backward.

Answers

Answer:

#include <bits/stdc++.h>

using namespace std;

void funct(){

   string name;

   cout<<"enter the string: ";

   cin>>name;

   

    reverse(name.begin(), name.end());

    cout<<"The string is : "<<name<<endl;

   

}

int main()

{

   funct();

 

  return 0;

}

Explanation:

create the function funct() with return type void and declare the variable type string and print a message for asking to used enter the string.  

The string enter by user is store in the variable using cin instruction.

after that, we use a inbuilt function reverse() which takes two argument.

firs argument tell the starting point and second index tell the ending point. then, the reverse function reverse the string.

name.begin() it is a function which return the pointer of first character of string.

name.end()  it is a function which return the pointer of last character of the string.

finally, print the reverse string.

for calling the function, we have to create the main function and then call the function.

Find the second largest and second smallest element in a given array. You can hardcode/declare the array in your program.

Answers

Answer:

Program for Second largest in an array:-

#include <bits/stdc++.h>

using namespace std;

int main()

{

    int f,s,n; //declaring 3 variables f for first largest s for second largest n is size.

    cin>>n;//taking input size of the array.

    if(n<2)//n should be greater than 2..

    cout<<"n should be greater than 2"<<endl;

    int a[n];// array of size n.

    for(int i=0;i<n;i++)

    {

        cin>>a[i];

    }

   f = s = INT_MIN;//initialising f and  s with minimum value possible.

   for (int i =0; i <n;i ++)  

   {  

       if (a[i] > f)  

       {  

           s = f;  

           f = a[i];  

       }  

       else if (a[i] > s && a[i] != f)  

           s = a[i];  

   }  

   if (s == INT_MIN)  

       cout<<"No second largest exists"<<endl;

   else

       cout<<"Second largest element is :"<<s;

       return 0;

}

Program for second smallest element is:-

#include <bits/stdc++.h>  

using namespace std;  

int main()  

{  

int f,s,n; //declaring 3 variables f for first smallest s for second smallest n is size.  

cin>>n;//taking input size of the array.  

if(n<2)//n should be greater than 2..  

cout<<"n should be greater than 2"<<endl;  

int a[n];// array of size n.  

for(int i=0;i<n;i++)  

{  

cin>>a[i];  

}  

f = s = INT_MAX;//initializing f and s with maximum value possible.  

for (int i =0; i <n;i ++)  

{  

if (a[i]<f)  

{  

s = f;  

f = a[i];  

}  

else if (a[i] < s && a[i] != f)  

s = a[i];  

}  

if (s == INT_MAX)  

cout<<"No second smallest exists"<<endl;  

else  

cout<<s;//it is the second smallest element...  

return 0;  

}

Explanation:

For Second largest:-

1. Declare 3 variables f, s and n. where n is size the array f is first largest and s is second largest.

2. Initialize f and s with minimum value possible.

3. Iterate over the array a and do the following steps:-

   1.If element at ith position is greater than f. Then update f and s.

   s=f and f=a[i].

   2.If the element is between s and f then update s as.

   s=a[i].

4. Print s because it is the second largest in the array.

For Second smallest:-

1. Declare 3 variables f, s and n. where n is size the array f is first smallest and s is second smallest.

2. Initialize f and s with minimum value possible.

3. Iterate over the array a and do the following steps:-

   1.If element at ith position is smaller than f. Then update f and s.

   s=f and f=a[i].

   2.If the element is between s and f then update s as.  

   s=a[i].  

4. Print s because it is the second smallest in the array.

A is the smallest unit of application data recognized bysystem software.

1 Row

2 Field

3 Record

4 Table

Answers

Answer:

A FIELD is recognized as the smallest unit of application data by system software.

Explanation:

Field is recognized as the smallest unit of application data by any system software. The data in relational data base management system ( RDBMS ) is stored as rows also called as database records or simply records. Each record is a row in database and each record contains fields. Columns in data base are nothing but the fields of all the records. They types of fields are fixed length and variable length.

Other Questions
What happens during the S phase of the cell cycle? A. The cell copies its organelles B. The cell makes daughter cells. C. The cell doubles in size. D. The cell copies its DNA Which statements can be concluded from the diagram and used to prove that the triangles are similar by the SAS similarity theorem?PLEASE HELP ME!!!!!1 Value of X- intercept he following information applies to the questions displayed below:Wendell's Donut Shoppe is investigating the purchase of a new $18,600 donut-making machine. The new machine would permit the company to reduce the amount of part-time help needed, at a cost savings of $3,800 per year. In addition, the new machine would allow the company to produce one new style of donut, resulting in the sale of 1,000 dozen more donuts each year. The company realizes a contribution margin of $1.20 per dozen donuts sold. The new machine would have a six-year useful life. (Ignore income taxes.)Requirements:1. What would be the total annual cash inflows associated with the new machine for capital budgeting purposes?Total annual cash inflows$ 2. Find the internal rate of return promised by the new machine. (Round your answer to two decimal places.)Internal rate of return %3. In addition to the data given previously, assume that the machine will have a $4,125 salvage value at the end of six years. Under these conditions, compute the internal rate of return. (Round your answer to two decimal places.)Internal rate of return % what is the perimeter of a polygon abcd vertex a(5,12) b(9,9) c(12,5) d(0,0)a.28 unitsb.32 unitsc.36 unitsd.44 units Which Response core capability includes delivering essential commodities, equipment, and services in support of impacted communities and survivors, to include emergency power and fuel support, as well as the coordination of access to community staples? A. Logistics and Supply Chain Management B. Mass-Care Services C. Infrastructure Systems D. Environmental Response/Health and Safety Which of the following is considered venison? A. Rabbit B. Elk C. Lamb D. Squab Use the substitution method to solve the system of equations. Choose thecorrect ordered pair.x + 2y = 12- x= -y-6O A. (6.0)O B. (8,2)C. (9,3)(7.1) Rewrite the sentences replacing the subjects with the ones in parentheses. Follow the model Modelo Ayer Mara sirvi una rica cena. (t) Ayer t serviste una rica cena. 1 Anoche nos sentimos alegres. (mis primos) 2. Melinda y Juan siguieron a Camelia por la ciudad en el auto. (yo) 3. Alejandro prefiri quedarse en casa. (ustedes) 4. Ped un plato de langosta con salsa de mantequilla. (ellas) 5. Los camareros les sirvieron una ensalada con atn y esprragos. (tu esposo) what are some applications of fission reactions? as a zero-waste energy source What percent of the surface of the earth is covered with water ?A. 100 %B. 0 %C. 70 % In plants, carbon dioxide and water combine to form glucose and oxygen. This process is known as photosynthesis.Which of the following is the balanced equation for this process?A.B.C.D. Scott had an average of 83 on his first three exams. He later scored an average of 92 on the next six exams. What is his average for all nine exams. Round to the nearest tenth if necessary. If the mass of an object is 8 kg and its momentum is -80 kgm/s, what is its velocity?A. 10 m/s B. 12 m/s C. 8 m/s D. -10 m/s A scientist realizes there was a significant increase in the number of deaths related to skin cancer last year. Which part of the engineering process is she most likely engaged in?A) Knowing the backgroundB) Evaluating the resultsC) Making a planD) Identifying a need ANSWER ASAP 20 POINTS AND GIVE EXPLANATION Assume that the red blood cell counts of women are normally distributed with a mean of 4.577 million cells per microliter and a standard deviation of 0.382 million cells per microliter. Approximately what percentage of women have red blood cell counts in the normal range from 4.2 to 5.4 million cells per microliter? Round to two decimal places. A. 16.11% B. 17.69% C. 82.26% D. 4.09% Suppose a wheel with a tire mounted on it is rotating at the constant rate of 2.032.03 times a second. A tack is stuck in the tire at a distance of 0.357 m0.357 m from the rotation axis. Noting that for every rotation the tack travels one circumference, find the tack's tangential speed. Explain why chemical equations have to be balanced. which is equivalent to..... algebra II engenuity