Imagine that 10 int values are labeled byposition: 1, 2, 3, etc. Write a program that reads 10integers and tracks how many of them have the same value as theirposition. That is, ifthe first number read is 1, or the third number is 3, that countsas a match, and the output would be the number of matches (from 0to 10). Use a singleif statement and a loop.

Answers

Answer 1

Answer:

#include<iostream>

using namespace std;

//main function

int main(){

   //initialization

   int count_Number=1,a1,match_Numbers=0;

   //loop run 10 times

   do{

       //print

       cout<<"Enter the number: ";

       //read the value enter by user

       cin>>a1;

       //check for match

       if(a1==count_Number){

           match_Numbers++;

       }

       count_Number++;

   }while(count_Number <= 10);

   //display the output

   cout<<"The number of matches is: "<<match_Numbers<<endl;

   return 0;

}

Explanation:

Include the library iostream for using the input/output instruction.

create the main function and declare the variables.

take the do-while loop which has a special property, the statement in the do-while execute first and then check the condition.

In the do-while, print the message by using the cout instruction and then store the value enter by the user into the variable.

then, check the value enter by the user is match the position or not. If the condition true, then count the matches and also update the position count.

this process continues until the position count is less than or equal 10. if condition false the loop terminates and then, display the output on the screen.


Related Questions

Is software piracy really a threatfor IT industry ?

Answers

Answer: yes,software piracy is a threat for the IT industry.

Explanation: Software piracy is the illegal act of copying,stealing and using of the software and leads to the legal consequences too. This creates severe damage for the software and IT industry because they face a huge loss period and thus they do not gain the expected profit. Piracy of software is also harmful towards the user as well because their stored data is not safe and risky. Therefore, software piracy is a threat for the IT industry.

if x is -1, what is the value of (!(x == 0))?

false

true

unable to determine

invalid syntax

Answers

Answer:

true

Explanation:

The operator '!' used in the question is called NOT operator which invert the value of Boolean.

if the value is TRUE, output will be FALSE.

if the value is FALSE, output will be TRUE.

The operator '==' is used for comparison, if both values are equal then it gives TRUE otherwise FALSE.

The value of x is -1.

so, (-1 == 0) which is FALSE. -1 and zero are not equal.

then, !(FALSE) which gives TRUE output.

Therefore, the answer is true.

Every call to a recursive function has its own code and its own set of ____ and local variables

A.
headers

B.
parameters

C.
stack

Answers

Answer: Parameters

Explanation:

Whenever a call to a recursive function is made, then the function has its own code and its own set of parameters with local variables. These parameters are within the scope of the recursive function. For example while finding the factorial of a number we are given the function with parameter such as int recursive(int n) where int n is a parameter passed into the function.

Let s be a stack. Consider the following program:

s.push(1);
s.push(2);
s.push(3);
s.pop();
s.push(4);
s.pop();
s.pop();
int x = s.peek();

What is the value of x after the assignment statement?

Answers

Answer:

Hi

In the first scenario we have

S = []

then:

S=[1],

S=[2,1]

S=[3,2,1]

S=[2,1]

S=[4,2,1]

S=[2,1]

S=[1]

So when it's call the method peek to S, X will be assigned 1

Explanation:

Stack is a linear data structure which follows a particular order in which the operations are performed. The order may be LIFO(Last In First Out). There are many real-life examples of a stack. Consider an example of plates stacked over one another in the canteen. (Taken from wikipedia)

- The method push is to put the element on the top of the stack

- The method pop is take out the top element of the stack

- The method peek is to see what is the top element of the stack

Output a brief description of the game of hangman and how to play.

Answers

Answer:

Hangman is game which can be played with a pencil or pen and a paper. It is a multiplayer game which requires minimum two players. It is a guessing game, in which a player thinks of a word or a phrase and other player or players tries to guess it correctly, letter by letter or whole word or phrase at once, in a certain number of guesses.

In this game, the word to be guessed is represented by dashes. If the guessed word or letter is correct, the player fills the blank spaces. But if the guessed word or letter is wrong, the player draws an element of a hanged man stick figure one by one as a tally mark.

This game ends if the player who is guessing guesses the word or the phrase correctly and the guesser wins; or if the player guesses enough wrong letters of phrases that the other player finishes the drawing of the hangman and the guesser loses.

To use a stored address, C provides us with an indirection operator, ____.
A) %
B) ^
C) &
D) *

Answers

In C programming language indirection operator & is used to access pointer variable value.

The answer is therefore C.

Hope this helps.

r3t40

In Java the ______________are not objects. All of the rest areobjects, or any ___________ is called as object.
generic type , reference type
primitive types , generic type
Reference type , generic type
Reference type , primitive types

Answers

Answer:

Reference type,generic type

Explanation:

Reference types are used by a reference that maintains a reference (address) to the object but not the object itself. Because reference kinds reflect the variable's address rather than the data itself, assigning a reference object to another does not copy the information. Instead, it produces a second duplicate of the reference, which relates to the same heap place as the initial value.

Examples of reference types are Classes, Arrays,, Interfaces etc.

A generic type is a generic class or interface that is parameterized over kinds. Essentially, generic types enable you to write a particular, generic class (or method) that operates with distinct kinds, enabling code to be reused.

The class Object  describes the conduct of all Java objects. However, it does not describe the conduct of all Java data structures. That's because not all Java data structures are objects. Some of them are primitive values that can be stored in object variables, but they are not objects themselves.

Unlike object types, primitive types are not sub types or super types.

What information is stored in the file system?

Answers

Answer:

The file system store all the related files of the operating system and also their information such as  file name,location, directory hierarchy etc.

Explanation:

Basically a file system FAT(file allocation table) which contains all sorts of file present in the operating system, it can viewed s a database with index present or accessing different files from the FAT. File systems contains information from various devices such as DVDs, flashdrives.

Example Windows contain file system such as FAT,NTFS and exFAT

An 8x16 font isstored in _________________ bytes.
? 8
? 16
? 4
? 20

Answers

Answer:

The answer to this question is 16 bytes.

Explanation:

8x16 font means it contains 16 rows by 8 columns of 1-bit pixel ( picture element ).

rows=16.

columns=8.

8 bit = 1 byte.

8x1 = 1 byte.

8x16 = 16 bytes.

So 8x16 font size requires 16 bytes of data to store a character.Hence we conclude that the answer is 16 bytes.

Which of the following is NOT a valid name for a function?

A. Poker

B. Black Jack

C. Solitare

D. 52CardPickup

Answers

Answer:

B and D

Explanation:

We must follow naming conventions while naming a function. The following are the rules:

Function names can start with a letter followed by letters and digits

Function names can start with a underscore followed by letters  and digits

Function names cannot start with a number.

Function names cannot have space between words.

Based on above rules, options B and D violate the rules. So they are invalid function names

Describe FIVE significant advantages of web-based applications for an organisation.

Answers

Answer

There are a lot of advantages of web based applications.

Explanation:

Below are the advantages:

Web based applications can be accessed from device that is connected to the device. No physical software required to download, install, update or manage which saves a lot of administration work for large companies. Web based software is compatible with any device or platform. The software is delivered through a browser of the users' choice.Mobile device applications allow for access to the software when out of the office. Direct access to latest information for Employees where every they are located.

Apart from these, there are lot more benefits, like quick and easy updates, centralized data where data is secure and easy to backup.  We can reach anybody, anywhere in the world.

Business costs are drastically reduced by spending less time talking to customers over the phone.

Online training can be finished at user's own time and risk.

It's available 24 hours a day, 7 days a week

The software is always up-to-date

This must be done using the latest version of Java Software Development Kit. Write a program that reads integers representing a time duration in hours, minutes, and seconds, and then prints the equivalent total number of seconds. [10 points] Output 1: Enter hours: 1 Enter minutes: 28 Enter seconds: 42 The total seconds is 5322

Answers

Answer:

Output

Enter hours:  

1

Enter minutes:  

28

Enter seconds:  

42

The total seconds is 5322

Explanation:

Below is the java program that reads integers representing a time duration in hours, minutes, and seconds, and then prints the equivalent total number of seconds.

import java.util.Scanner;

public class TimeConverter {

public static void main(String[] args){

 int hour=0,min=0,sec=0;

 Scanner input=new Scanner(System.in);

 System.out.println("Enter hours: ");

 hour=input.nextInt();

 System.out.println("Enter minutes: ");

 min=input.nextInt();

 System.out.println("Enter seconds: ");

 sec=input.nextInt();

 int hourToSec=hour*60*60; //convert hours to seconds

 int minToSec=min*60; //convert minutes to seconds

 int totalSeconds=hourToSec+minToSec+sec; //calculate total seconds

 System.out.println("The total seconds is "+totalSeconds);

}

}

The true or false questions.
The command: egrep -l 'cis' * will show the name of all files in the current directory where the name contains the word 'cis'

Answers

Answer:

True

Explanation:

egrep command is basically used for text filtering and is an modified version of grep. using -l with egrep implies it returns the names of the matching files but does not return the line number. Following this we have the keyword here in the question it is 'cis' and * stands for the entire directory search. Therefore, the command egrep -l 'cis' * will show the names of all files in the directory with the word 'cis'.

Entering the search criteria "B?" would yield which of the following results?

A. Bentonville
B. Be
C. Bedford
D. Birmingham

Answers

Answer:

D. Birmingham

Explanation:

Entering the search criteria "B", would yield Birmingham.

Answer:

THE CORRECT ANSWER IS Be

Explanation:

What is the importance of Mathematical Modeling in the field of bioinformatics.

Answers

Answer: mathematical modelling helps to look into the uncertainties in the calculations based on the observational data.

Explanation:

In bioinformatics for example in gene data expression there can millions of data obtained through various observatory experiments. however most of the data is inadequate to arrive at at a conclusion. So in order to solve this issue we have to apply mathematical modelling to consider those data which would help us to understand the models behavior and access its performance.

Final answer:

Mathematical Modeling is critical in bioinformatics, enabling the analysis of large datasets and the development of new frameworks necessary for understanding complex biological systems. It aids in sequence comparison, hypothesis testing, and simulation of biological systems, often in conjunction with experimental validation.

Explanation:

The importance of Mathematical Modeling in the field of bioinformatics cannot be overstated. Bioinformatics, a field that marries biology with computer science, relies heavily on Mathematical Modeling to sift through and make sense of the vast datasets generated by modern biological research, such as genome sequencing and gene expression profiling. Computational power and Mathematical Modeling enable biologists to perform sequence comparisons, test hypotheses, and create in silico research that might predict biological phenomena. It is especially necessary for managing the complexities brought about by Next-Generation Sequencing technologies, requiring the development of new statistical and theoretical frameworks.

Mathematical models in bioinformatics are crucial for describing scientific phenomena and evaluating costs, requiring the application of various mathematical skills and concepts like algebra, calculus, and statistics. They support the engineering design process within bioinformatics by enabling the construction of comprehensive simulation models. These models are instrumental in understanding the structure and behavior of biological systems, sometimes even without direct experiments. However, it is critical to validate these models with observations to ensure their accuracy and efficacy.

In summary, Mathematical Modeling serves as a fundamental tool for bioinformatics specialists, assisting them in processing and interpreting large datasets to advance our understanding of biological systems and processes. It is a bridge between theoretical biology and practical computer-based analysis that is essential for data-driven discoveries in bioinformatics.

Why is image compression an important part of vidoetechnology?

Answers

Answer: Image compression is the technique which is responsible for the reduction in the size of the image according to the need of the video technology. Image compression is done because of the following reasons:-

Makes more space for the storage and creates space.It also reduces the time that is used up for the uploading of the video through internet.Text, labels etc might also be needed to inserted along with the image .

Explain Software licensing

Answers

Answer:

Software Licensing is pretty much allowing another company to use your own product.

Explanation:

For Example:

Company A is working on a face swap application which requires a facial recognition software in order to work. They can either build one from scratch (which can take months) or they can pay someone who already has one in order to be able to use it.

Company B owns a facial recognition software and are asked by Company A to license their software to them. Company A pays Company B, they then draft up a contract for Company A allowing them to use the facial recognition app.

Software licenses are either proprietary, free, or open source. Proprietary is the one used in the example above.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Final answer:

Software licensing is the legal instrument defining how software can be used and distributed. Proprietary software typically restricts access to source code, whereas open source licenses, such as GPL and BSD, facilitate sharing and collaboration, even allowing users to modify and redistribute software under certain conditions.

Explanation:

Software licensing refers to the legal framework through which end users are allowed to use and distribute software. Modern software is developed in a human-readable format known as source code and then compiled into machine-readable software. However, converting compiled software back into original source code is not as straightforward. This is why terms set out in software licenses, like the GNU Public License (GPL) or the Berkeley Software Distribution (BSD) license, are crucial for defining how software can be shared and used.

The GNU project's GPL stipulates that anyone can use, modify, and distribute software, so long as the modified source code is also made available under the same GPL terms. This concept is at the core of the 'open source' ethos and encourages the growth and evolution of the software community. In comparison, traditional proprietary software models, like those commonly seen with Windows executables, restrict access to the source code, limiting customization and redistribution.

Many modern software projects, including the Python and R projects, operate under open source licenses, fostering collaboration and innovation. Similarly, Creative Commons licenses permit the use, sharing, and remixing of creative works while maintaining the legal framework to protect such commons.

It is important to note that open source software might not always be free; users can modify and distribute the software, but there can be restrictions on the commercialization of those modified versions.

24. If you shine a beam of red light and a beam of green light on the same area of a screen, what color will you see on the screen? A. Red B. Green C. White D. Yellow E. Cyan F. Magenta

Answers

Answer:

D. Yellow

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

When two colors are mixed together they create another color. In this case a red and green color will combine and reflect a yellow color back into your eyes.

The tone of the yellow can depend on the object on which both the red and green laser are hitting at the same time. Some of which can give it a darker yellow pushing towards brown, while others can return a really vibrant yellow.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Answer:

The answer is D Yellow

Explanation:

See if you mix 2 different colors together they make a different color

Describe the role of the IETE.

Answers

Answer: For the growth and foster of electronics and telecommunication technology

Explanation:

IETE(The Institution of Electronics and Telecommunication Engineers) is one of the established and leading society with members all across the globe. Its primary objective is to train people and professionals in the fields of information technology, electronics and communication technology. It published standard journals, does R&D and also holds seminars for spreading and education people on the lines of latest technologies.

Thus, IETE is primarily  focused on spread and growth of electronics, IT and communication development across every continent.

The IETE focuses on advancing electronics, telecommunications, and information technology, supporting educational initiatives, and ensuring broadband access in schools. It collaborates with organizations like ISTE for educator training and technology integration. Its mission includes fostering sustainable educational transformation worldwide.

Role of the IETE

The Institute of Electronics and Telecommunication Engineers (IETE) is a prominent professional society dedicated to the advancement of electronics, telecommunications, and information technology. The primary goals of the IETE include promoting the efficient application and integration of IT in education, driving policy initiatives in educator preparation and professional development, and ensuring the availability of broadband internet for learning environments.

The International Society for Technology in Education (ISTE) works closely with organizations like IETE to set standards for PK-12 instructor training and support a transformative approach to integrating technology in educational settings. Given its strategic role within UNESCO, particularly through the UNESCO Institute for IT in Education (IITE), the IETE seeks to create sustainable changes and foster inclusive educational transformation worldwide.

The broader mission of IETE aligns with efforts in developing robust infrastructures in schools, equipping educators with necessary technological tools and strategies, and providing resources for ongoing professional growth.

Explain the following terms in a sentence or two in C++context.a)Orthogonalityb) Expresibilityc) Language domain andparadigmd)Portability

Answers

Answer:

a)Orthogonality

IBM C++ implements compatibility characteristics at the C 99 language stage and with GNU C language extensions to maintain compatibility as a super-set of C. IBM C++ also promotes a subset of C++ GNU extensions. Like the IBM C language extensions, the orthogonal and non-orthogonal language functions of the C++ extensions.

b) Expresibility

Expresibility relates to what can be said in the language of regular expression, most lex generators enable sets of letters, Kleene star(Vˣ) and plus, and alternation. Consider what happens if you have C++ with embedded assembly code: the C++ code is likely to belexer under one set of rules, and the management of lexical mode indicates how control can be transferred from one mode to another.

c) Language domain and paradigm

C++ is a programming language that promotes multiple paradigms, including classes, overloaded features, templates, modules, and more.

Using C++ wealthy collection of over-loadable operators as a domain-specific language, a category representing a matrix could overload multiplication(*) and other arithmetic operators, enabling implementation codes to be handled similarly to the numerical sort.

d) Portability

C++ includes the entire variety from low-level to high-level programming, making it ideal for composing portable software, but in embedded systems engineering code portability is often overlooked. With software becoming increasingly complicated, and hardware becoming increasingly interchangeable, this supervision becomes a issue when software has to be transported to a new platform.

Write a C++ program which finds the reverse of a number.

Answers

Answer:

C++ Program to reverse number

#include <iostream>

using namespace std;

int main()

{

int n, reverse=0, rem;

cout<<"Enter a number: ";

cin>>n;

while(n!=0)

Explanation:

1. What is theoutput of the following code fragment if the input values are 1 and2?
int x;
int y;
cin>>x;
cin>>y;
cout< cout< A. 1
2
B. 1 2
C. 12
D. xy

Answers

Answer:

Hi,  in the last one a correct way of the code will be:

cout<<x<<y;

or

cout<<x;

cout<<y;

In the first case you get 12, the C.

In the second case you also get the C.

Explanation:

If you want to make a jump line you have to use endl

e.g.

cout<<x<<endl;

cout<<y<<endl;

And after this you get:

1

2

In the other ways, you get the previously result in the output.

I hope it's help you.

What is meant by Program Memory is paged?

Answers

Answer:

Program memory is paged, this statement is defined as in a computer system paged memory is the process of allocation of memory and storing a portion of a process of execution. Page is a unit of logical memory in a program. It follows the process of paging, as it is a method of writing an information and reading the output from the storage drive. The main advantage of this process is that it become easy to swap because everything is the same size.

What are the most common MIS (management information systems) used in a business place.

Answers

Answer:

  MIS (management information systems) is a computer system consist of hardware and a software that together serves as the backbone of operations for an organisation. It is an important tool for any business irrespective of its scale of operation and its size and frequency and usage may be vary with business. As, MIS tools help in move data and manage the information.

The technologies and tools are used in MIS have evolved over the time such as minicomputers, mainframe and server networks.

The Scanner.nextInt method throws an unchecked ____ if a user enters an input that is not an integer.

A) InputMismatchException

B) NumberFormatException

C) IllegalArgumentException

D) IOException

Answers

Answer:

A) Input Mismatch Exception

Explanation:

The Scanner.nextInt method throws an unchecked Input Mismatch Exception if a user enters an input that is not an integer.

The Scanner.nextInt method throws an unchecked ____ if a user enters an input that is not an integer.

A) InputMismatchException

B) NumberFormatException

C) IllegalArgumentException

D) IOException

The searching algorithm of ordered array is faster than regular array, but the insertion time is slower than regular array. True or False?

Answers

Answer:

True

Explanation:

In an ordered array or sorted array, we can implement binary search which uses branch prediction to search for values within the array. In binary search the array is divided into two halves. With the help of branch prediction we can easily find out in which part of the array the value may reside. Thus it drastically reduces the searching time. Whereas in a linear array, the array elements needs to be searched sequentially one after the other to match with the search element. Thus searching algorithm of ordered array is faster than regular array.

In a regular array, the insertion operation is faster than an ordered array because there we don’t have to decide the position at which the element needs to be inserted.  In a regular array we can simply insert the new element to be added at the end of the array.

Thus the insertion time of an ordered array is slower than regular array.

You use ____ operators to perform calculations with values in your programs.

a.
arithmetic

b.
calculation

c.
integer

d.
precedence

Answers

Answer:

arithmetic

Explanation:

Arithmetic operator like + , - , * , / are used to perform calculations with values in programs. For example:

1 + 2 will add 1 and 2 and return the value 3.

1 * 2 will multiply 1 and 2 and return the value 2.

3 - 2 will subtract 2 from 3 and return the value 1.

The values which undergo the operation can be integral or floating point.

Answer:

Option a is the correct answer for the above question.

Explanation:

For any programming language, An arithmetic operator is used to perform the calculation for any set of values. It takes two or more value to perform the calculation. This operation performed by the help of the Arithmetic logic unit which is also called ALU. It lies on the CPU and works for the instruction of the control unit.

The above question scenario states that if there are two or more value then which operator is used to perform calculation then the answer is an arithmetic operator as described above. Hence option a is the right answer. while the other is not because--

Option b states about calculation operator but it is not the defined operator for any programming language. Option c states about integer operator but it is not the defined operator for any programming language. Option d states about precedence operator but it is not the defined operator for any programming language. It tells that which operator is executed first if two or more operators are used for any statement.

What is difference between rand() and srand() ?

Answers

Answer:

rand() function generate the random number within the range.

srand() function decide the starting point for random function or set the seed for rand() function.

Explanation:

rand() function which is used to generate the random number within the range.

srand() function is used to decide the starting point for random function.

In sort meaning, it set the seed for rand() function.

if srand() function not used, the random function generate the same output again and again because the starting point is fixed for generating the random number.

if srand() function used it change the starting point every time and random function generate the output different in every time.

If you want a user to enter exactly 20 values, which loop would be the best to use?



1. do-while

2. while

3. for

4. infinite

5. None of these

Answers

Answer: For loop

Explanation:

Using the for loop we can get the exact number of values/outcomes we require.

For example:    printf(enter 20 numbers");

                               for(int i=0; i<20;i++)

                               {

                                       scanf("%d", &number);

                                }

So, this is an implementation of for loop in C. Using it we can enter exact 20 numbers not less or more than that.

Therefore, for loop is the answer.

Final answer:

The for loop is the best choice when you want to run a loop a known amount of times. In this specific example, you can use the for loop to gather 20 pieces of user input.

Explanation:

If you want a user to enter exactly 20 values, the best loop to use would be the for loop. The for loop is specifically designed for situations where we know in advance how many times the loop needs to execute. In this case, we know the loop needs to execute exactly 20 times to accept 20 input values from the user, so using a for loop would be the most appropriate choice.

Here's an example of how you can structure a for loop in this situation:

for(int i = 0; i < 20; i++) {
 // User input code here }

This loop will run 20 times, allowing you to gather 20 pieces of user input.

Learn more about For Loop here:

https://brainly.com/question/32789432

#SPJ6

Because an AVL tree is a binary search tree, the search algorithm for an AVL tree is the same as the search algorithm for a binary search tree.

True

False

Answers

Answer:

True, Yes the search algorithm for AVL tree and the binary search tree are same.

Because in both trees, of a certain a node, the smaller elements reside in the left sub-tree and the larger elements reside in the right sub-tree.

Explanation:

So while searching an element in the AVL tree we start the search from the root node.

We compare the element to be searched with the root node.

if (element < root node), then move in left and compare with it's left child.

else move in right and compare with it's right child.

Similarly in next phase move accordingly as in the binary search tree.

Other Questions
If a project's discounted payback period is less than its useful life, _____. a.the terminal value of its future cash inflows is less than the future value of its initial cost b.the present value of its future cash inflows is greater that the future value of its initial cost c.the present value of its future cash flows exceeds its initial cost d.its future cash inflows are less than its initial cost e.its cost-recovery time should exceed the maximum cost-recovery time established by the firm Label the steps for protein synthesis in order, beginning with the first step give six sentences of using assonance The equilibrium constant, Kc, for the following reaction is 9.5210-2 at 350 K. CH4 (g) + CCl4 (g) 2 CH2Cl2 (g) Calculate the equilibrium concentrations of reactants and product when 0.377 moles of CH4 and 0.377 moles of CCl4 are introduced into a 1.00 L vessel at 350 K. a watch is getting slow by 2 minutes for each hour in a day . if it shows 10 am now. what shall be the time after 12hours How long is the second hand to the nearest tenth if it moves 2cm in 15 seconds? 2. What personality trait describes a person that seeks out others?the ability to listeno openness to new experiencesextroversionagreeableness Draw directed graphs representing relations of the following types.(a) Reflexive, transitive, and antisymmetric.(b) Reflexive, transitive, and neither symmetric nor antisymmetric. Simplify cos[arccsc((2/3)/3)].A)no solutionB)sqrt3/2C)1/2 A batter hits a 0.140-kg baseball that was approaching him at 50.0 m/s and, as a result, the ball leaves the bat at 35.0 m/s in the direction of the pitcher. What is the magnitude of the impulse delivered to the baseball? Los pases centroamericanos crearon "La Ruta Colonial y de los volcanes" para atraer turismo cultural y ecolgico a esta regin. El recorrido (tour) de los volcanes es el itinerario favorito de los visitantes ya que stos pueden escuchar los (1) volcnicos y sentir el (2) vibrando cuando caminan cerca. Es posible caminar por las (3) de los volcanes que no estn activos y observar la lava (4) en antiguas erupciones. Centroamrica es un (5) de la naturaleza! Which one of the following numbers is an irrational number? A. 8.234234 B. 123455 C. 3.131131113 D. 5.364 what are three global issues geographers can study using remote technology ? Where does your tap water come from? If you are in the city, you are likely on city water rather than well water. How often do you drink commercially bottled water? When at home are you more likely to drink bottled water or water from the tap? Why do you make that choice? How can you tell whether a counting problem is a permutation or combination problem? Give examples to support your answer What is the equation of the following line? Be sure to scroll down first to seeall answer options. (X-2)(3x-4) simplify Describe the nature of Earth's axial tilt and orbit around the Sun. To be considered a living thing, an organism must be ableproduce oxygen.increase in size.C. adapt to change.D. move independently. which number is a constant in the algebraic experssion