In a ____ queue, customers or jobs with higher priorities are pushed to the front of the queue.

A.
structured

B.
divided

C.
priority

Answers

Answer 1

Answer: In a priority queue, customers or jobs with higher priorities are pushed to the front of the queue.

Explanation:

A queue is an abstract data type which is an ordered set of elements. The elements are served in the order in which they join the queue. The first element which was put in the queue is processed first.  

The operations performed on queue data type are dequeue and enqueue.

Dequeue refers to removal of the first element from the queue after it has been serviced.

Enqueue refers to the arrival of new element when the element is added at the end of the queue.

A priority queue is another implementation of a queue. All the elements in a priority queue are assigned a priority. The element with the higher priority is served before the element with a lower priority. In situations of elements having same priority, the element is served based on the order in which the element joined the queue.

In programming, a priority queue can be implemented using heaps or an unordered array. Unordered array is used based on the mandatory operations which are performed on the priority queue.

The mandatory operations supported by a priority queue are is_empty, insert_with_priority and pull_highest_priority_element. These operations are implemented as functions in programming.

The is_empty confirms if the queue is empty and has no elements.

The insert_with_priority puts the new element at the appropriate position in the queue based on its priority. If the priority of the element is similar to the priority of other element, the position of the new element is decided based on the order of joining the queue.

The pull_highest_priority_element pulls the element having the highest priority so that it can be served before other elements. The element having the highest priority is typically the first element in the priority queue.

In operating system, priority queue is implemented to carry out the jobs and/or tasks based on their priority.


Related Questions

What does it mean to catch an exception?

Answers

Answer:

An exception is an event, which occurs during the execution of a program, that disrupts the normal flow of the program's instructions. When an error occurs within a method, the method creates an object and hands it off to the runtime system. ... This block of code is called an exception handler.

Solve the following system of algebraic equations: Y = 1-x^2 and y = 1+x

Answers

Answer:

x=0;   x=1

Explanation:

The system presents a quadratic equation and a linear equation. Therefore, the result will have two solutions.

The first step is to match the two equations:

[tex]1+x=1-x^{2}[/tex]

Then we clear the equation by zeroing.

[tex]0=x^{2} +x+1-1[/tex]

Now we perform indicated operations

[tex]x^{2} +x=0[/tex]

We factor with the common factor method

x(x+1)=0

We equal each factor to zero and get the results

x=0

(x+1)=0

x=-1

The two values ​​that satisfy both equations are 0 and -1

A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate the other’s certificate c. A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection d. A scenario in which the certificate’s issuer and subject fields hold the same information

Answers

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

Answer:

A construct of systems, personnel, applications, protocols, technologies and policies that work together to provide a certain level of protection

Explanation:

A trust domain is a certificate that entities or users gain and is granted by a trusted domain this is that when you enter another software or other systems you will be recognized as a trusted character or user and gives protection between systems and softwares and provides protection for the users.

write a program for TIC TAC TOE in PYTHON

Answers

Answer: much too long to write here: see attached

Explanation:

Answer:hehe, sorry im a year late

board = ["-", "-", "-",

        "-", "-", "-",

        "-", "-", "-"]

current_player = 'X'

running = True

WINNER = None

def display_board():

   print(board[0] + ' | ' + board[1] + ' | ' + board[2])

   print(board[3] + ' | ' + board[4] + ' | ' + board[5])

   print(board[6] + ' | ' + board[7] + ' | ' + board[8])

def play():

   display_board()

   while running:

       handle_turns(current_player)

       switch_turns()

       check_if_game_over()

   if WINNER == 'X':

       print("The Play X won!")

   elif WINNER == 'O':

       print("The play O won!")

def handle_turns(player):

   position = int(input('Choose a location from 1-9: ')) - 1

   board[position] = player

   display_board()

def switch_turns():

   global current_player

   if current_player == 'X':

       current_player = 'O'

   else:

       current_player = 'X'

# Check to see if the game should be over

def check_if_game_over():

 check_for_winner()

 check_for_tie()

# Check if there is a tie on the board

def check_for_tie():

 # figure out the conditions for a tie

 global running

 if '-' not in board:

   running = False

# Check to see if somebody has won

def check_for_winner():

 global WINNER

 row_winner = check_rows()

 column_winner = check_columns()

 diagonal_winner = check_diagonals()

 if row_winner:

   WINNER = row_winner

 elif column_winner:

   WINNER = column_winner

 elif diagonal_winner:

   WINNER = diagonal_winner

 else:

   WINNER = None

# Check the rows for a win

def check_rows():

 global running

 if board[0] == board[1] == board[2] != '-':

   running = False

   return board[0]

 elif board[3] == board[4] == board[5] != '-':

   running = False

   return board[3]

 elif board[6] == board[7] == board[8] != '-':

   running = False

   return board[6]

 else:

   return None

# Check the columns for a win

def check_columns():

 global running

 if board[0] == board[3] == board[6] != '-':

   running = False

   return board[0]

 elif board[1] == board[4] == board[7] != '-':

   running = False

   return board[1]

 elif board[2] == board[5] == board[8] != '-':

   running = False

   return board[2]

 else:

   return None

# Check the diagonals for a win

def check_diagonals():

 global running

 if board[0] == board[4] == board[8] != '-':

   running = False

   return board[0]

 elif board[6] == board[4] == board[2] != '-':

   running = False

   return board[6]

 else:

   return None

play()

How are information technology services delivered in anorganization?

Answers

Answer:

The information technology services are delivered in many ways in an organisation as:

The information technology services are referred the plans and the process of the organisation which are used for design and manages the service delivery in the organisation and its services are basically depend upon the client needs.  IT can significantly improved the profitability by shortening the material search and the delivery time, it is used for improving the decision making and accelerating the schedules. IT management are the vision into the some valuable reality.

Which logical relationship does the PDM usemost often?

Start to finish
Start to start
Finish to finish
Finish to start

Answers

Answer:

Finish to Start.

Explanation:

Finish to Start dependency also known as FS is most commonly used dependency type used between activities in PDM(Precedence Diagramming Method).For example :- in a software you cannot test a screen before it is developed,in construction you cannot paint a building before it is constructed. So we conclude that Finish to start is most commonly used.

Answer:

Finish to start

Explanation:

I looked it :) hoped it helped

A final class can't be extended.TrueFalse

Answers

Answer:

True

Explanation:

A final class is something like sealed one and no one can inherit that further.

it is useful to lock our code or functionality from others

Write a value-returning function isVowel that returns the value true if a given character is a vowel and otherwisereturns false.

Answers

Answer: Following is the function isVowel written in python:-

def isVowel(check):#defining isVowel function with parameter check

#following are the nested if else if for checking that check is a vowel or not if yes returning True if not returning False.

   if check == "A" or check =="a":

       return True

   elif check == "E" or check =="e":

       return True

   elif check == "I" or check =="i":

       return True

   elif check == "O" or check =="o":

       return True

   elif check == "U" or check =="u":

       return True

   else:

       return False

Explanation:

In the function we are checking in each if or elif statement that check is a vowel or not if it is a vowel then returning True if not returning False.

Write a program that will compare two names. The program prompts the user to enter two names for a comparison. If the names are same, the program states that. If the names are different, the program converts both names to UPPERCASE, and compares then again. If they are equal, the programs displays a message stating that names are equal if CASE is ignored. Otherwise, the program prints names with a message that names are not equal.

Answers

Answer:

We can use comparison operator 'Equals to' (==) to compare two strings.

Explanation:

We can use conditional statement 'if else' to put conditions. If statement contains boolean expression.If statement is followed by else block. If the boolean expression evaluates to true, then the if block of code is executed, otherwise else block of code is executed.

If we want to compare two strings with uppercase, then we can convert the input strings given by users using ToUpper() string function.

For example,

 string abc;

string uppercase= abc.ToUpper(); // gives ABC as result

I have written a program using c# as a  programming language in a word document and attached the same. Please find. Thank you!

A pointer is the memory address of a variable. FALSE TRUE

Answers

Answer:

False

Explanation:

Because pointer itself is a variable that holds the memory address of  a variable as it's content.

When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dynamic e-commerce environment.
Answer
smaller initial investment and provides more flexibility
smaller initial investment but provides less flexibility
greater initial investment but provides more flexibility
greater initial investment and provides less flexibility

Answers

Answer:

greater initial investment but provides more flexibility

Explanation:

When security issues are a special concern, companies want to take extra steps to make sure that transmissions can’t be intercepted or compromised. In these situations they will use a network that encrypts the packets before they are transferred over the network. This solution is called a(n) ___________________.

Answers

Answer:

VPN(virtual private network)

Explanation:

A VPN or Virtual Private Network enables you to establish a safe Internet connection to another network. You can use VPNs to access regional websites, shield your browsing activity from government Wi-Fi prying eyes, and more.

For security purposes organization uses different methodologies to secure their data. VPN encrypts the packets before they are transferred over network.

Implement RandMultipByVal function, which gets one integervariable as its argument
and multiply it by a random number between 1 to10 (use call-by-value approach).

Answers

Answer:

#include <iostream>

#include <stdlib.h>

#include <time.h>

using namespace std;

void RandMultipByVal(int number){

   srand(time(NULL));

   int random = rand()%10+1;

   cout<<random*number;

}

int main()

{

 

  RandMultipByVal(4);

  return 0;

}

Explanation:

Include the three libraries, iostream for input/output, stdlib.h for rand() function and time.h for srand() function.

Create the function with one integer parameter.

Then, use srand() function. It is used to seed the rand() function or locate the starting point different in different time.

rand(): it is used to generate the random number between the range.

for example:

rand()%10  it gives the random number from 0 to 9.

if we add 1, then it gives from 1 to 10.

After that, multiply with parameter value and then print the result.

For calling the function create the main function and call the function with pass by value.

Decision variables reflectthe level of effectiveness of a system.
True
False

Answers

Answer: False

Explanation:

Decision variables does not reflect the level of effectiveness of a system as, decision variable are directly controlled by decision controller, and there are components that there value can be undetermined for the decision controller. All the mathematical equations defined the accurate relationship between the variable of the system and the measurement of the system effectiveness. Decision variables are basically referred as the basic objective and the constraints list.

The factorial of a number n, written in math as n!, is the product of all the numbers from 1 to n or 1*2*3* … *n. Write a C++ program that requests a number from the user and then displays the factorial of that number. The program should only accept positive integers greater than 0.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   int factorial=1;

   int num;    

   

   cout<<"Enter any Number: ";    

   cin>>num;  

   

   for(int i=1;i<=num;i++){    

     factorial=factorial * i;    

   }    

   

   cout<<"The factorial of the number is "<<factorial<<endl;  

 

  return 0;

}

Explanation:

Create the main function and declare the variable.

then, print the message by using the cout instruction.

store the value enter by user in the variable.

After that, take a for loop from 1 to user value both are included.

and multiply the value with previous value and it happen until the condition in the loop true.

for example:

i=1

fact = 1*1=1

i=2

fact =  1*2=2

i=3

fact= 2*3=6  and so on....

finally print the result.

Final answer:

A C++ program to calculate the factorial of a positive integer uses a loop to successively multiply the numbers from 1 up to the input number. The program checks that the user input is a positive integer since the factorial is only defined for non-negative integers.

Explanation:C++ Program to Calculate Factorial

To calculate the factorial of a number in C++, we can ask the user to input a positive integer and then calculate the factorial by multiplying all the integers from 1 up to the number provided. The factorial of a number n, written as n!, is the product of all positive integers less than or equal to n. Below is a simple C++ program that calculates the factorial:

#include
using namespace std;

int main() {
  unsigned int number;
  unsigned long long factorial = 1;

  cout << "Enter a positive integer: ";
  cin >> number;

  if (number < 0) {
      cout << "Factorial of a negative number doesn't exist.";
  } else {
      for(int i = 1; i <= number; ++i) {
          factorial *= i;
      }
      cout << number << "! = " << factorial << endl;
  }
  return 0;
}

The program uses a loop to repeatedly multiply the factorial variable by each number up to the input number. We use an unsigned long long for the factorial variable to handle potentially large numbers, although there is still a limit to how large a number this data type can store. The program also includes a basic check to ensure that a negative number is not input, as factorials are only defined for non-negative integers.

Write a C++ program that stores information (name, gender, birthday, phone number, civil status, religion, college course, nationality) of a student in a structure and displays it on the screen.

Answers

#include
class Student
{
public:
Student(std::string name, std::string gender, std::string phonenumber, std::string civilstatus, std::string religion, std::string course, std::string nationality)
{
Student::name = name;
Student::gender = gender;
Student::phoneNumber = phonenumber;
Student::civilStatus = civilstatus;
Student::religion = religion;
Student::collegeCourse = course;
Student::nationality = nationality;
}
void displayOnScreen()
{
std::cout << "Name: " << name << std::endl
<< std::cout << "Gender: " << gender << std::endl
<< std::cout << "Phone Number: " << phoneNumber << std::endl
<< std::cout << "Civil Status: " << civilStatus << std::endl
<< std::cout << "Religion: " << religion << std::endl
<< std::cout << "College Course: " << collegeCourse << std::endl
<< std::cout << "Nationality: " << nationality << std::endl;
}
std::string name, gender, phoneNumber, civilStatus, religion, collegeCourse, nationality;
};

Motivational appeals refer to

a- Values

b- Psychological needs

c- Emotions

d- All of thegiven options

Answers

Answer: D) All of the given options

Explanation:

Motivational appeals refers to the an emotional nature developed to increase individual values. It is a tool of emotions which target the psychological needs. It is a visualization of someone's desire and values and method of satisfying the emotions. Motivational appeals are divided into many categories like motivation and emotions.

Which Numpy function do you use to create an array? (Points : 1) np
np.array
np.numpy
numpy

Answers

Answer:

The correct option is np.array

Explanation:

Numpy is a library to perform numerical calculation in python. It allows us to create and modify vectors, and make operations on them easily. Numpy arrays are an excellent alternative to python lists. Some of the key advantages of numpy arrays are that they are fast, easy to work with, and offer users the opportunity to perform calculations through full arrays.

To start using numpy, the library must be imported:

import numpy as np

The most common way to create a vector or matrix already initialized is with the np.array function, which takes a list (or list of lists) as a parameter and returns a numpy matrix. The numpy arrays are static and homogeneous typing. They are more efficient in the use of memory.

Example:

list = [25,12,15,66,12.5]

v = np.array (list)

print (v)

Analytical processing uses multi-levelaggregates, instead of record level access.? True? False

Answers

Answer:

True.

Explanation:

Analytical processing uses multi-levelaggregates, instead of record level access.

True of False - use T or F An abstract class can have instances created using the constructor of the class.

Answers

Answer:

False

Explanation:

An instance of an abstract class cannot be created through the constructor of the class, because it does not have a complete implementation. Though, it is possible to have references of an abstract type class. Abstract classes are incomplete structures and you would have to build onto it before you are able to use it.

What is the data rate of a DS0 signal?

Answers

Answer: 64 Kbps

Explanation:

The true or false questions.

Given the command: find /home -name 'f*' If there are matched files, then all the printed paths of the matched files will start with /home

Answers

Answer:

true

Explanation:

The command:

find /home -name 'f*'

will match all the files starting with the character 'f' which are present in the /home directory.

Hence, all the printed paths of the matched files will start with /home.

For example:

/home/funny.txt

/home/function.log

/home/free.py

Unlike the climate of the other islands of Hawaii, ________Kona contains 54 different temperate zones.
that of
this is
these are
those that

Answers

Answer:

None

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Unfortunately, none of these answers would be factually nor grammatically correct. For Starters Kona is not an island Kailua-kona is the capital town of the Big Island in Hawaii.

Regardless of that fact, none of the answers given would make the sentence make sense grammatically. The Only way for the sentence to make sense grammatically, the answer either needs to stay blank or be Kailua. Like so...

Unlike the climate of the other islands of Hawaii, Kailua Kona contains 54 different temperate zones.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

The sentence should be completed with 'that of,' making it read 'Unlike the climate of the other islands of Hawaii, that of Kona contains 54 different temperate zones.' Hawaii's diverse climates are heavily influenced by altitudinal variations and topographical features, leading to a range of climatic zones across its islands.

The correct completion for the sentence provided is that of. Hence, the complete sentence reads: Unlike the climate of the other islands of Hawaii, that of Kona contains 54 different temperate zones.

Hawaii is known for its diverse climate conditions. While most islands in the Pacific have a tropical type A climate, Hawaii has a variety of climatic zones due to its topography and altitudinal variation. For instance, Kauai, one of the Hawaiian Islands, is one of the wettest places on Earth, receiving more than 460 inches of rain per year. This high level of precipitation is due to the rain shadow effect caused by Mt. Wai'ale'ale. The windward side of this mountain receives substantial rainfall while the leeward side remains semi-desert due to the rain shadow.

Japan, another island group, also presents diverse climates. One of its islands, Hokkaido, features a type D climate and is known for snowfall that supports activities like downhill skiing. Japan's diverse climate is a result of its mountainous terrain, with active volcanoes like Mount Fuji influencing the regional climate conditions.

The governor of New York that he has directed the state's Division of Criminal Justice Services to gather DNA from the broadest range of convicted criminals permitted under current law. This will result in the collection of as many as 40,000 DNA profiles. The additional DNA profiles may be obtained as a condition of release on parole or probation, as a condition of participation in the Department of Correctional Services' temporary release programs, and as a condition of a plea bargain. This _____ will be used for solving crimes.

database
network
mainframe
combination
conglomerate

Answers

Answer:

Database

Explanation:

Database.

The State’s DNA database is a database of DNA profiles that can be made public or private and can be used in the analysis of genetic fingerprinting for criminology. There are certain laws that come with how DNA databases are supposed to be handled.

Final answer:

The correct answer is "database". The additional DNA profiles directed by the New York governor will be added to a database and used for crime solving. This database, part of CODIS, facilitates forensic DNA analysis to match suspects with evidence, exonerate the innocent, and help solve crimes. The expansion of DNA collection in criminal justice raises important discussions regarding legal and privacy concerns.

Explanation:

The governor of New York has initiated an expansion of DNA collection to include the broadest range of convicted criminals allowed under current law, potentially adding up to 40,000 DNA profiles to the database. Such a database is crucial for the enhancement of law enforcement capabilities, allowing for the solving of crimes through forensic DNA analysis. This database is part of a larger system known as CODIS (Combined DNA Index System), which is maintained by the Federal Bureau of Investigation (FBI) and plays a vital role in criminal justice by matching DNA from crime scenes with potential suspects, exonerating the innocent, and providing leads in cold cases. The unique nature of DNA makes it an incredibly powerful tool, as the statistical power of discrimination from DNA analysis is profound, often making the probability of coincidental matches incredibly slim.

The use of DNA evidence in the legal justice system is not without its controversy, as questions around privacy and the extent of DNA collection arise. However, legal precedents such as State v. Franklin and U.S. v. Mitchell support the practice of taking DNA swabs even when individuals are only arrested, not convicted, under certain conditions. Additionally, the technology has proven beneficial, as evidenced by the work of the Innocence Project, which has used DNA fingerprinting to free wrongly accused individuals. DNA profiles in CODIS contribute to this by facilitating the identification of the true perpetrators and preventing miscarriages of justice.

What are the two main functions of user accounts in Active Directory? (Choose all that apply.) Allow users to access resources method for user authentication to the network Provide detailed information about a user Provide auditing details

Answers

Answer:

method for user authentication to the network

Provide detailed information about a user

Explanation:

An in AD, a user account consists of all the information that includes user names, passwords, and groups. All these information defines a domain user in which a user account has membership access to. With the advanced features of Kerbos, mutual authentication in user accounts to a service is achieved.

Answer:

-Allow users to access resources

-Method for user authentication to the network

Explanation:

User accounts in Active Directory give people and programs the access to resources in a windows domain. These accounts are used to allow people to access resources, manage the access users have to resources like files and directories and allow programs to be able to run in a particular context. According to this, the answer is that the two main functions of user accounts in Active Directory are: allow users to access resources and method for user authentication to the network.

Write a function that converts a C-string into an integer. For example, given the string “1234” the function should return the integer 1234. If you do some research, you will find that there is a function named atoi and also the stringstream class that can do this conversion for you. However, in this program, do not use any predefined functions and you should write your own code to do the conversion. Use the function in your C++ program

Answers

#include
using namespace std;

// Our custom atoi function to make your teacher very happy ;)
int myAtoi(char* str)
{
    int result = 0;

    for (int i = 0; str[i] != '\0'; ++i)
        result = result * 10 + str[i] - '0';

    return result;
}

What is the output of the following program segment?

int x = 0;

++x;

x++;

++x;

x++;

++x;

Answers

Answer:

5

Explanation:

The operator 'x++' is called the post increment operator, it is assign first and then increment.

The operator '++x' is called the pre increment operator, it is increment first  and then increment.

So, both are increment operator which increment the value by one.

initially the value of x is zero,

++x increase the value to 1 and than assign to x.

then, x++ it assign to x first then increment by 1 means x=2

and so on.....

Their are five increment operator are used. so, the result is 5.

There is a relationship between the grain and thedimensionso Trueo False

Answers

Answer:

True.

Explanation:

There is a relationship between the grain and the dimensions.

______ is the ability of a system to do more than one thing at a time. A. Multibusing c. online processing b. Multiprocessing d. Batch processing

Answers

Answer:

Multiprocessing.

Explanation:

In multiprocessing the system uses two or more processors to do more tasks simultaneously.

Final answer:

The ability of a system to do more than one thing at a time, known as multiprocessing, allows for the concurrent execution of multiple tasks by using multiple processing units or cores.

Explanation:

The ability of a system to do more than one thing at a time is known as multiprocessing. Multiprocessing systems have multiple processing units, commonly referred to as cores, which can execute tasks simultaneously. Unlike single-core systems, which can only handle one operation at a time, multiprocessing systems can perform multiple tasks concurrently, improving overall system efficiency and performance.

In the context of computers and operating systems, this capability allows a computer to run different processes at the same time, such as running a web browser while also running a spreadsheet application or virus scan. The operating system manages these processes and allocates processor time in such a way that users experience the tasks as though they are happening simultaneously.

By contrast, multibusing refers to a system where multiple buses allow many devices to connect and communicate with the CPU at the same time, while online processing is processing that is active and connected to a network. On the other hand, batch processing is a method of processing data in which transactions are collected and processed all at once at a particular time.

The operation ____ is used to remove the top element from the stack.

A.
pop

B.
push

C.
peek

Answers

Answer:

pop

Explanation:

stack is a data structure perform the operation in specific order. The order stack follow is last in first out (LIFO).

push function is used to insert the element at the top of the stack.

peek is used to retrieve or fetch the element at the top.

pop is used to remove or delete the top element from the stack.

Therefore, the option A is correct.

Other Questions
Red mercury (II) oxide decomposes to form mercury metal and oxygen gas according to the following equation: 2HgO (s) 2Hg (l) + O2 (g). If 4.00 moles of HgO decompose to form 1.50 moles of O2 and 603 g of Hg, what is the percent yield of this reaction? Look at the bar graph. Which would be the best title for this graph? A) Voter Turnout, 2006-2012B) Presidential Winners and Losers C) Presidential Election Years, 2006-2012D) Number of US Voters Yet the men who framed this declaration were great menhigh in literary acquirementshigh in their sense of honor, and incapable of asserting principles inconsistent with those on which they were acting. They perfectly understood the meaning of the language they used, and how it would be understood by others, and they knew that it would not in any part of the civilized world be supposed to embrace the negro race, which, by common consent, had been excluded from civilized Governments and the family of nations, and doomed to slavery. Dred Scott v. Sandford, Supreme Court of the United States What is the best summary of Taneys opinion? The framers who crafted the Constitution were the most honorable men for the job. The men who wrote the Constitution understood that enslaved persons would not be citizens. The men who wrote the Constitution had a great understanding of the language they used. The framers who crafted the Constitution all believed that African Americans should be enslaved. Which examples best demonstrate the benefit of understanding physical properties?Select all that apply.*Scientists can predict how well two substances will react.*Engineers can design better bridges because they know how metal changes shape.*Engineers can design safer structures because they understand the flammability of building materials.*Scientists can easily classify mixtures of unknown substances. The average vehicle has _____parts.A. 1,000B. 5,000C. 7,000D. 30,000 which equation represents a population of 250 animals that decreases at an annual rate of 12% Bicameralism is a constitutional principle that means the division of The simple interest formula is l=prt where l represents simple interest on an amount p for t years at a rate of r where r is expressed as a decimal. What is the amount of money p that will generate $40 in interest at a 10% interest rate over 5 years Why was Japans attack on Hawaii a strategic move? Hawaii was a tourist destination, not an important military post. Hawaii was where a large portion of the Pacific fleet was sheltered. Hawaii was where US naval power was the weakest. Hawaii was where US land troops awaited battle. Pizza delivery times at Pizza Time are normally distributed with a mean time of 27 minutes and a standard deviation of 3 minutes. Using the empirical rule, approximately what percent of pizzas are delivered between 24 and 30 minutes? 32% 68% 95% 99.7% The 1960 sit-in at Greensboro, North Carolina:a.was staged in one of the most notoriously racist cities of the South, where angry residents remained deeply committed to the racial divide.b.sparked similar successful demonstrations throughout the South.c.ended in a riot with ten injured.d.encountered a harsh reaction from Greensboros police force, which jailed the four ringleaders.e.did not end with integration of the Woolworths lunch counter. The following function represents the value of a car, in dollars, after x years:f(x) = 24,000(0.92)power of xWhat does 0.92 represent?A.The present value of the carB.The value of the car after x yearsC.The decrease in the value of the car, which is 92%D.The decrease in the value of the car, which is 8% I need to fill in the blank Nosotros blank la television anoche. ( mirar) Nancy Henderson is a saleswoman for a manufacturer of small kitchen appliances. She does not directly solicit orders. Her primary duties involve promotional activities and introducing new products to her employer's indirect customers. She spends much of her time demonstrating appliances at various retail stores. Nancy would be classified as a(n): Find the cosine of angle Z A silver sphere with radius 1.3611 cm at 23.0C must slip through a brass ring that has an internal radius of 1.3590 cm at the same temperature. To what temperature must the ring be heated so that the sphere, still at 23.0C, can just slip through? Fe2O3 (molar mass = 159.7 g/mol) reacts with CO (molar mass = 28.0 g/mol) according to the equation When 125.6 g of CO reacts with excess Fe2O3, how many moles of Fe (iron) will be produced? 1.) Given P(E or F) = 0.82, P(E) = 0.18, and P(E and F) = 0.09, what is P(F)? Read the following passage:Grandfather taught us the prayers they would say for thecorn harvest each year. As he talked, he rattled a few driedkernels in one of his wrinkled hands. I tried to picture thosehands sowing seeds long ago, when Grandfather and theother Wampanoag people lived in Massachusetts.Which detail most clearly gives this passage a reflective tone? Now that you have reviewed both immunity and the spread of disease, write an investigative question that you would like to answer by doing an experiment. Use the format What is the effect of X on Y?