One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input, and outputs the number of laps. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: System.out.printf("%.2f", yourValue); Ex: If the input is:

Answers

Answer 1

Answer:

import java.util.Scanner;

public class Miles {

public static void main(String[] args) {

   //initialization

       double Number_Miles;

       //print the message

       System.out.print("Enter the number of miles: ");

       Scanner scn1 = new Scanner(System.in);

       

       Number_Miles = scn1.nextDouble();  //read the input from user

       //calculate the laps

       double yourValue = Number_Miles/0.25;

       //display the output on the screen

       System.out.printf("%.2f", yourValue);

     

}

}  

Explanation:

First import the library Scanner than create the class and define the main function. In the main function, declare the variables.

print the message on the screen and then store the value enter by the user into the variable.

Scanner is a class that is used for reading the output. So, we make the object of the class Scanner and then object call the function nextDouble() which reads the input and store in the variable.

After that, calculate the number of laps by dividing the number of miles with the given one lap running track value (0.25 miles).

[tex]Number\,of\,laps = \frac{Number\,of\,miles}{0.25}[/tex]

the output is stored in the variable.

After that, print the value on the screen with 2 digits after the decimal point.

we can use "%.2f" in the printing function in java.

like System.out.printf("%.2f", output);

Answer 2

Answer:

def miles_to_laps(miles):

  return miles / 0.25

miles = 5.2

num_of_lap = miles_to_laps(miles)

print("Number of laps for %0.2f miles is %0.2f lap(s)" % (miles, num_of_lap))

Explanation:


Related Questions

What is the typical data transfer rate (in bps) over a SS7 transfer link?

Answers

Answer: 55 Kbits/sec - 64 KBits/sec

Explanation:

Signal System 7 (SS7) is used one of the protocols used for communication for mobile operators and it uses circuit switching. As it uses circuit switching it transfers data using a dedicated channel and hence more comparatively faster.  It communicates and sends signals among Service Switching (SSPs), Signal Transfer Points (STPs), and Service Control Points (SCPs) using a different path apart from the data transfer path.

The data transfer rate which is the transfer of data among the various network elements is 55 Kilo bits/sec - 64 kilo bits/sec.

Which of the following are primitive types?

A. Byte

B. String

C. Intege

D. Float

E. Choice (C) & (D)

Answers

Answer:

A. Byte, C. Integer, and D. Float

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

To answer this question we need to know what a primitive type actually is.

Primitive Data Types: are data entries that have a specific simple value of the kind that is entered. Examples of these are Bytes, Integers, Char, and Float.

Non Primitive types hold more than one entries with their own values. Examples of these are String, Array's, and Classes.

Therefore the answer is A. Byte, C. Integer, and D. Float

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

What are the advantages and disadvantages of UTF-8 compared to ASCII?

Answers

Answer:

UTF-8 and ASCII both are the character encoding.

In a system,every character has some binary representation,these are the method to encode them.Earlier only ASCII was there, for every character it uses 8 bits to represent.In ASCII only 8 bytes were there i.e 2^8 that is 256.We can't represent number beyond than 127 so it generate a need for other encoding to get into,these drawbacks lead to Unicode,UTF-8.

As ASCII codes only uses a single byte,UTF-8 uses upto 6 bytes to represent the characters.So we can save characters which are as long as 2^48 characters. We can read this encoding easily by the help of shift operators and it is also independent of byte order.

As messages on internet were transferred over 7 bit ASCII messages,so many mail servers removed this encoding.    

Final answer:

UTF-8 offers greater language support and compatibility with ASCII, making it ideal for international applications, at the expense of potentially increased file size and complexity in encoding/decoding processes.

Explanation:

Advantages and Disadvantages of UTF-8 Compared to ASCII

The question regarding the advantages and disadvantages of UTF-8 compared to ASCII centers on two dominant character encoding schemes used in computers and digital devices. ASCII, which stands for American Standard Code for Information Interchange, was one of the first encoding standards to be widely used. UTF-8 (8-bit Unicode Transformation Format) is a more modern encoding scheme designed to address some limitations of ASCII.

Advantages of UTF-8

Compatibility with ASCII: UTF-8 is backward compatible with ASCII. This means that any ASCII text is also valid UTF-8 text, facilitating a seamless transition between the two.

Global language support: Unlike ASCII, which only supports English characters, UTF-8 can represent characters from virtually any language in the world, making it ideal for international applications.

Dynamic character size: UTF-8 encodes characters using 1 to 4 bytes, efficiently representing more characters than ASCII without using extra space for simpler characters.

Disadvantages of UTF-8

Potential for increased file size: For languages that predominantly use characters outside the ASCII range, UTF-8 encoded files may be larger than those encoded in a fixed-width format designed for that language.

Complexity: Decoding and encoding UTF-8 can be more complex than ASCII, requiring additional processing power, which might be a consideration for systems with limited resources.

In summary, UTF-8 offers greater flexibility and language support compared to ASCII but may introduce complexity and increased file size for certain languages. Its design balances compatibility with the need for a universal encoding system that accommodates the global nature of the internet and computing.

what is the online shopping?explian abstract of online shoopimg?

Answers

Answer:

Online shopping is the process where costumers buy online goods and products over the internet from the sellers. The basic concept is that it is a e-commerce which runs partially over the internet.  It has grown in popularity over the years because people find it easy to bargain shop and convenient.

Abstract of online shopping :  

The main objective of the online shopping is that easy to use and make it  interactive. It is a web based application for online retailers and users can  view the each product and its complete specifications. It is a user friendly application which also provides drag and drop features so that user can easily add the product to the shopping cart and user can also go online and make changes in the order.

Define a class Complex for complex numbers. A complex number is a number of the form: ???? + ???? ∗???? where a and b are real and imaginary part of a complex number and i is a number that represents the quantity √−1 . Addition of two complex numbers: (???? +???????? )+(???? +????????) = (???? +????) + (???? +????)???? Subtraction of two complex numbers: (???? +????????)−(???? +????????) = (???? −????)+(???? −????)???? Create a class Complex that contains:  Two private variables real and imaginary of type double.  Define accessor and mutator functions of real and imaginary variables.  Overload the following operators "+" and "–" so that they apply correctly to the type Complex. Test your program with inputs (5+4i) and (2+2i).b

Answers

Explanation:

--!#&?&#&#(-$(-$)-"-)"(-'-)';'!'+%

Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by the unaided eye. C) A virtual image cannot be photographed. D) Mirrors always produce real images.

Answers

Answer:

A) A virtual image cannot be formed on a screen.

Explanation:

A virtual image cannot be formed on a screen is correct about images.

A virtual image can be viewed by the unaided eye.

A virtual image can be photographed.

Mirrors don't always produce real images.

Final answer:

The correct statement about images is that a virtual image cannot be formed on a screen, as virtual images are created by diverging light rays. However, they can still be seen and photographed because devices like cameras and the human eye can focus these rays.

Explanation:

The correct statement about images is A) A virtual image cannot be formed on a screen. Virtual images are formed when light rays diverge in front of a mirror or behind a lens, creating an image that appears to be located behind the mirror or lens. Unlike real images, which can be projected onto a screen because they are formed by converging light rays, virtual images are not formed at a point in space where a screen can capture them. However, virtual images can be seen by the unaided eye and can also be photographed, contrary to some misconceptions. This is because cameras and eyes can focus diverging rays to form an image.

The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.

A.
set_union

B.
set_difference

C.
set_join

Answers

Answer:

A. set_union

Explanation:

The algorithm set_union is used to find the elements in one range of elements that do not appear in another range of elements.

True / False
The meaning of bit patterns is determined by the way the HW and SW treat them.

Answers

Answer: True

Explanation:

 The meaning of bit pattern are determined by the hardware and software treat them as, different types of computer used different pattern of bit for the instruction because they all are potentially different so the bit pattern are determine accordingly to the function of hardware and the software of particular devices.Instruction are stored in the form of bits in the similar memory as the data. Bit pattern are used to communicate in the memory as the sequence of bits.

Can you comment on the advantages and disadvantages of having ARP responses implemented as broadcasts?

Answers

Answer:

The advantages of ARP implemented as broadcast is that it enables easy and faster transfer of messages in a network. The disadvantage of ARP is that many of the nodes in the network may update their ARP cache locally without forwarding it to other nodes.

Explanation:

Address resolution protocol(ARP) has both advantages and disadvantages when implemented as broadcast. Broadcast technology enables to transmit messges across all the nodes.

The advantages of ARP implemented as broadcast is that it enables easy and faster transfer of messages in a network. The disadvantage of ARP is that many of the nodes in the network may update their ARP cache locally without forwarding it to other nodes.

How to declare a structure of a linked list?

Answers

Answer:

struct Node{

   int data;

   struct Node *next;

};

Explanation:

Linked list is the data structure which is used to store the series data but not in continuous memory location .

Linked list contain node which store the data and pointer which store the address of next node. If their is no next node, then it store the NULL.

so, the structure must declare the data and a pointer variable.

What are the requirement analysis for COREBANKING?

Answers

Answer:

Core Banking is the system which is defined as the backbone  of products and service that Bank offers. with the upcoming technology it becomes a value differentiator, and a wrong system selection  that may cost tremendous opportunity losses. Core banking solution are transformed in the way bank used to operate in different manner.

 The requirement analysis for CORE-BANKING is:

FunctionalityService-oriented architectureFlexibilityProgram management

A major advantage of a method is that it is easily reusable. What does it mean to reuse a method and what are the advantages of doing so?

Answers

Answer: To reuse a method means to use a code which has been done or prepared already and just we need to change some of the functionalities.

This helps a great deal of saving time as well as helps in making the code manageable.

Explanation:

This has been practiced since long that methods can be reused. for example we need to build a calculator in c. then we can simply reuse the same method  just we need to change the sign of the operator. So in this process we can speed up our operations and work and also can make the code easy to understand and manage it when we have have to deal with large lines of code.

Final answer:

Reusing a method in programming allows for using the same code in multiple places efficiently and consistently, saving time and reducing the potential for errors. It's the easiest and least disruptive way to add functionality to programs and aligns with sustainable practices.

Explanation:

Reusing a method in programming means employing a piece of code that has already been written to perform a function or a task in multiple places throughout your application. This is akin to creating a tool that can be used repeatedly in different contexts without the need to rewrite the code each time.

Advantages of Reusing Methods:

Efficiency: Reusing methods is a quick and easier way to add functionality to your programs without rewriting code, saving time and effort.Consistency: It contributes to a more robust and error-free program as the method has been tested and debugged once, ensuring consistency across its applications.Implementing reusable methods is often the easiest and least disruptive way to enhance a program, aligning with the Process Reaction Method which emphasizes simplicity and minimal interruption.

Well-designed functions and methods enhance the maintainability and scalability of software by allowing the same logic to be utilized in different parts of an application or even in different projects entirely. This reusability can lead to economic and environmental benefits, as it aligns with the principles of reduce, reusable, and recycle.

Those firms must make some drastic changes quickly toavoid further demise and

possible liquidation that fall in__________ of grand strategymatrix

a. Qurdant-1

b. Qurdant-2

c. Qurdant-3

d. Qurdant-4

Answers

Answer:

c. Qurdant-3

Explanation:

Those firms must make some drastic changes quickly toavoid further demise and  possible liquidation that fall in Qurdant-3 of grand strategymatrix .

When you declare a variable of a basic, primitive type, such as int x = 10;, the memory address where x is located holds the ____.

a.
location in memory of 10

b.
memory address of 10

c.
reference to 10

d.
value of 10

Answers

Answer:

Answer is (d) value of 10

Explanation:

Usually when we write "int x=10;", a memory space is allocated for an integer variable with name x, and content 10.

Answer:

Option d is the correct answer for the above question.

Explanation:

In c,c++ or java programming language, when a user declares a variable then that means that a variable is used to take space in memory and When a user assigns the value on that variable then that value is stored on the location of variable in the memory and that variable addressed that value for compiler and memory.

The above question asked that if there are declaration and initialization of a variable then what is held by the variable in the memory. The answer is the value which stated by Option d, hence it is a correct option while other is not because--

Option 'a' states that the address holds the location of value but it holds the value.Option b states that the address holds the memory location of value but it holds the value only.Option c states that the address holds the reference value of a value but it holds the value only.

You can pin applications to which two areas?

A. Start screen

Control Panel

C. Taskbar’

D. Title bar

Answers

Answer:

A and C.

Explanation:

The taskbar and the Start are both shortcuts to use when opening applications. The taskbar is at the bottom of your computer or pc. And the start can be opened by pressing the windows key or clicking on windows at the bottom right (Windows only.)

Hope that helps!

Write a program that reads in the radius and length of a cylinder and computes the area and volume using the following formulas:

1. Bottom area = Radius * Radius * 3.14

2. Cylinder Volume = Bottom Area * Length

3. Cylinder area = (2 * Radius * 3.14 * Length) + (2 * Bottom area)

Answers

Answer:

#include<iostream>

using namespace std;

int main(){

   float radius,length;

   float bottom_area, area, volume;

   cout<<"Enter the value of Radius: ";

   cin>>radius;

   cout<<"\nEnter the value of length: ";

   cin>>length;

   bottom_area = radius * radius * 3.14;

   area = bottom_area * length;

   volume = (2 * radius * 3.14 * length) + (2 * bottom_area);

   cout<<"Area is: "<<area<<endl;

   cout<<"Volume is: "<<volume<<endl;

}

Explanation:

First include the library iostream for input/output.

then, initialize the variable radius and length.

cout is used to print the message or result on the screen

cin is used to store the value in the variable.

after that, by using the formula calculate the area and volume of cylinder.

the result is store in the area and volume variable.

Finally, print the result the output on the screen.

Note:  All variables declare in the code is float type means you can enter the decimal value but you can enter the integer as well.

Final answer:

To calculate the area and volume of a cylinder, you input the radius and length, then use geometric formulas to calculate the bottom area, cylinder volume, and cylinder surface area. A sample Python program was provided to perform these calculations and display the results.

Explanation:

To compute the area and volume of a cylinder, we first need to gather input for the cylinder's radius (r) and length (h), which is often referred to as the height of the cylinder. We then apply the following formulas:

Bottom area (A) = Radius (r) * Radius (r) * 3.14Cylinder volume (V) = Bottom Area (A) * Length (h)Cylinder surface area (SA) = (2 * Radius (r) * 3.14 * Length (h)) + (2 * Bottom area (A))

Here is a program in Python that performs these calculations:

import math
# Reading radius and length from user
radius = float(input('Enter the radius of the cylinder: '))
length = float(input('Enter the length of the cylinder: '))
# Calculating bottom area
bottom_area = radius * radius * math.pi
# Calculating volume
volume = bottom_area * length
# Calculating surface area
surface_area = (2 * math.pi * radius * length) + (2 * bottom_area)
# Displaying results
print(f'The bottom area of the cylinder is: {bottom_area:.2f}')
print(f'The volume of the cylinder is: {volume:.2f}')
print(f'The surface area of the cylinder is: {surface_area:.2f}')

Remember to use consistent units for radius and length, such as meters or centimeters.

Give Short and to the point answers(Answer the question keeping in view itsmarks)

Why we called COBOL as a professional language and not ataught language

Answers

Answer:

COBOL(Common Business Oriented Language).As the name suggests it is most commonly used to develop business tools and hence it is called a professional language and it is not used in schools or colleges as a teaching tool like FORTAN hence it is not called a taught Language.

COBOL is also used to develop business applications.It is mainly designed for businesses.

What is infix, prefix and postfixexpressions in data structures?

Answers

Explanation:

Infix notation: A+B

Operators are written in-between their operands. Expression  X * ( Y + Z) / P is means: "First add Y and Z together, then multiply the result by X, then divide by P to give the final answer."

Postfix notation : A B +

Operands are written before their operators. Expression given above is equivalent to X Y Z + * P /  

Operators evaluation is always left-to-right, we will not consider brackets for the order.

Prefix notation : + A B

Operands are written after their operators. Expression given above is equivalent to / * X + Y Z P

Operators evaluation is always right-to-left,we will not consider brackets for the order.

A binary search can be performed only on ____.

A.
ordered lists

B.
comparable lists

C.
unordered lists

Answers

A binary search can be performed only on a comparable lists

Create a Simple HTML/CSS header:?

Answers

Answer:

We can create headers in  html using <h1> through <h6> tags

Explanation:

We have six types of headings. They are:

<h1>

<h2>

<h3>

<h4>

<h5>

<h6>

If we want the heading to mark it as an important one, we can use <h1>.

So, <h1> heading is used for main headings.

If we want the heading to mark it as a least important one, we can use <h6>.

<h3>, <h4>, <h5> are used for sub headings.

Each HTML heading has a default size. However, you can specify the size for any heading with the style attribute, using the CSS font-size property as shown below:

    <h1 style="font-size:50px;">The Hindu</h1>

We use headings to show the document structure.

Here is a simple html code :

<!DOCTYPE html>

<html>

<body>

<h1 style="font-size:50px;">This is my heading</h1>

<p> some text here</p>

</body>

</html>

If a compiler detects a violation of language rules, it refuses to translate the class to ____.

a.
machine code

b.
a logic error

c.
an application

d.
Java

Answers

Answer:

The correct answer is a. Machine code

Explanation:

The syntax of a language is a set of rules that indicates how to write programs.

A compiler is a system that in most cases has to handle an incorrect entry. Especially in the early stages of creating a program.

Syntactic errors are those that occur at the time of writing the program in the high level programming language and that do not comply with the grammatical rules of said programming language. These errors are generally detected by the compiler itself, since it only translates programs that are ''well written''. Therefore, a program that contains syntactic errors can never be compiled.

In summary, syntax errors are detected in the process of translating source code into binary code. On the contrary that happens with the errors of execution and of logic, that can only be detected when the program in being executed.

Answer:

a. machine code

Explanation:

When we code a program, be it in C, C++, Java, etc,..., the role of the compiler is to translate our code to machine code, so it can be executed.

This only happens if we do not violate any of the language rules. Otherwise, there are going to be compilation errors and we will have to fix our code before it is compiled, that is, translated to machine code.

So the correct answer is:

a. machine code

Which of these suggestions is an effective way to deal withstress?
a. Meditation
b. Exercise
c. Talking with others
d. All of the given options

Answers

Answer:

d

Explanation:

all of those are good ways to deal with stress

Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp = {90, 92, 94, 95}, print: 90, 92, 94, 95 Your code's output should end with the last element, without a subsequent comma, space, or newline.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

   int NUM_VALS;//variable NUM_VALS for the size of the array..

   cout<<"Enter the size of the array"<<endl;

   cin>>NUM_VALS;//taking input the size of the array..

   int hourlyTemp[NUM_VALS]; //declaring array hourlyTemp of size n..

   cout<<"Enter values of the array "<<endl;

   for(int i=0;i<NUM_VALS;i++)

   cin>>hourlyTemp[i];//taking input of hourlyTemp

   for(int i=0;i<NUM_VALS;i++) //for loop for iterating over the array..

   {

       if(i!=NUM_VALS-1)

       cout<<hourlyTemp[i]<<", ";// print statement.

       else

       cout<<hourlyTemp[i];//print statement.

   }

return 0;

}

Explanation:

I have taken NUM_VALS variable for the size of the array hourlyTemp. First i am taking input the size of array form user and after that array elements are also entered by the user.I am iterating over the array using for loop and checking that it is not the last element if it is simply printing it if it is not then printing comma and space also.

The true or false questions.

The command: find . -type f -mtime +10 will search in the current directory and its subdirectories for all regular files that have not been modified in more than 10 minutes.

Answers

Answer:

False

Explanation:

The command find . -type f -mtime +10  will search for all files in the current directory and its subdirectories which have not been modified in more than 10 days.

-type argument specifies the type of entity to be searched which in this case corresponds to f (or file).

-mtime argument specifies the last modified time check for the files in terms of number of days and not number of minutes.

Create a program to determine the largest number out of 15 numbers entered (numbers entered one at a time). This should be done in a function using this prototype:


double larger (double x, double y);

Answers

Answer:

Output:-

Enter number:  

2

Enter number:  

1

Enter number:  

4

Enter number:  

3

Enter number:  

5

Enter number:  

7

Enter number:  

6

Enter number:  

8

Enter number:  

9

Enter number:  

11

Enter number:  

10

Enter number:  

12

Enter number:  

14

Enter number:  

13

Enter number:  

15

Largest number: 15.0

Explanation:

Below is a java program to determine the largest number out of 15 numbers entered: -

import java.util.Scanner;

public class Largest {

double larger(double x,double y){

 if(x>y)

  return x;

 else  

  return y;

}

double findLargest(){

 double y;

 double greatest=0.0;

 Scanner s=new Scanner(System.in);

 for(int i=0;i<15;i++){

  System.out.println("Enter number: ");

  y=s.nextDouble();

  greatest=larger(greatest,y);

 }

 return greatest;

}

public static void main(String[] args){

 Largest l=new Largest();

 System.out.println("Largest number: "+l.findLargest());

}

}

Open addressing can be implemented in several ways.

True

False

Answers

Answer: True

Explanation:

yes, open addressing can be implemented in several ways as it is a method of collision resolution in hash table. Open addressing can be implemented in different ways as linear probing, quadratic probing and double hashing. As open addressing requires more computation. In open addressing as everything is stored in the same table.

Cite at least three medical technologies that make our lives better?

Answers

Answer:

 Three medical technologies that makes our lives better are:

In today's world technology boots innovation, stethoscope is coming to our smart phones as we can download it in our smartphones and it provide the analog and digital sound and can transmit it to bluetooth to cloud and doctor can store the data into the patient’s health checkup record. It is cost effective.   Artificial organs used for replacement to relieve human being from pain as it makes life easier and improve one's health status. Robotic surgery is also used to helps to aid in flexibility and control various health issues.

Write a function that accepts an argument for a persons name. The method should loop through the number of characters in the name sending each character to the screen each on a separate line.



#include

#include

using namespace std;

int main()

{

Plese fill in.....thanks

Answers

Answer:

#include <iostream>

#include<string.h>

using namespace std;

void printCharacter(string name){

   for(int i=0;name[i]!='\0';i++){

       cout<<name[i]<<endl;

   }

}

int main()

{

   string name;

   cout<<"enter the name: ";

   cin>>name;

   printCharacter(name);

}

Explanation:

first include the two libraries iostream for input/output and string library for using the string.

then, create the main function and declare the variable type string.

cout instruction is used o display the message on the screen.

cin is used to store the value in the name variable.

after that, call the function. The program control move to the the function. In the function for loop is used to print the character one by one until end of the name.

Identify three different meanings of the word "interface" in Java Programing language.

Answers

Answer: Interface methods, interface variables and interface markers.

Explanation:

Interface methods are public and abstract by default.

Interface variables can be declared public, static and final

Marker interfaces are simply empty interfaces without any methods.

What are the applicationsof Assembly Language where any high level language becomesinsufficient".

Answers

Answer and Explanation:

Assembly language is a low- level code or language used for initialization and system testing. It makes use of an assembler to convert codes and instructions in assembly language to executable machine language code.

It can be used for video processingIt can ease the accessibility of specific processor instructionsCritical Issues with performance can be addressed with the use of assembly languageIt is generally used for direct manipulation of the hardware.it can help in optimization of task and helps to run our program faster if the program is stilted or constrained in memory as it is the most primitive language computer can use.If a program is  platform specific then itis better to use assembly language for better output.It can be used in real time systems, low level embedded systems, etc

Other Questions
The hypotenuse of a right triangle is three times the length of one of its legs. The length of the other leg is four feet. Find thelengths of the three sides of the triangle. For non-integer answer(s), round your answer(s) to the nearest tenth. This circle is centered at the origin, and the length of its radius is 6. What isthe circle's equation? On April 1, 2018, Austere Corporation issued $370,000 of 11% bonds at 106. Each $1,000 bond was sold with 40 detachable stock warrants, each permitting the investor to purchase one share of common stock for $15. On that date, the market value of the common stock was $11 per share and the market value of each warrant was $4. Austere should record what amount of the proceeds from the bond issue as an increase in liabilities? how is NADPH different from NADP+A) it has gained one protonB) it has lost one protonc) it has gained one electrond) it has lost one electronplease help me!!! i took the test and got this question wrong A practitioner is engaged to prepare a client's federal income tax return for 2017 and 2018. The practitioner files the 2017 return on the client's behalf and provided copies of the 2017 return and all related documents to the client. After the 2018 return is prepared, the client disputes the fees for the 2018 tax engagement, terminates the relationship, and requests all tax returns and related records. The client has not yet paid for preparation of the 2018 return. Under IRS Circular 230, which records must the practitioner return to the client?A.) Notes the practitioner took when meeting with the client about the 2017 and 2018 tax returns.B.) The engagement letter executed by the client for preparation of the 2018 federal income tax return.C.) An appraisal the practitioner prepared in connection with the 2017 federal income tax return.D.) Schedules the practitioner prepared, which the client needs to file in its 2018 federal income tax return. Focal Lengths II If you were handed an unmarked convex lens (no optical track) and asked to estimate its focal length quickly, how would you do it? Explain. The President of the United States and the leader of a bordering foreign nation agreed that each should appoint three members to a special joint commission to deal with a wildlife problem. The President of the United States, acting in concert with the foreign leader, named the joint commission as a permanent enforcement agency for the regulations that were adopted by both nations. Although the President received prior congressional authorization to enter into this agreement, the Senate did not ratify the agreement by a two-thirds vote. The President then entered into an executive agreement with the foreign leader whereby the joint commission was granted adjudicative as well as enforcement powers with respect to a particular issue. Is the executive agreement by the President valid? Which statement best describes the trade relationship between the US and Ghana? The US has a trade surplus with Ghana. The US has a trade deficit with Ghana. The US has greater purchasing power parity (PPP) than Ghana. Ghana has greater purchasing power parity (PPP) than the US. Each plate of an air-filled parallel-plate capacitor has an area of 45.0 cm2, and the separation of the plates is 0.080 mm. A battery with voltage V is attached to the capacitor and an energy density of u- 100 J/m is stored between the plates. Determine the amount of charge that this capacitor has on its positive plate. (Watch the prefixes-they are not all the same) a. 8.8 pC b. 0.75 nC c. 28 nC d. 84 nC e. 190 nC The British gold sovereign coin is an alloy of gold and copper having a total mass of 7.988 g, and is 22-karat gold. (a) Find the mass of gold in the sovereign in kilograms using the fact that the number of carats = 24 (mass of gold)/(total mass). kg (b) Calculate the volumes of gold and copper, respectively, used to manufacture the coin. volume of gold m3 volume of copper m3 (c) Calculate the density of the British sovereign coin. A muscle inserted at the Hyoid bone that originates in styloid process of temporal bone. On what does the medias influence on society depend? A) directors and writers b) reporters and producers c) availability and popularity or d) affordability and profitability WANT FREE 20 POINTS + BRAINLIEST? Help me with the geometry question and I got you Which of the following expressions is this one equivalent to? [tex]( {x}^{4}+ 2 {x}^{3} - x - 2) \div ( {x}^{3} - 1) [/tex]___________________________________________A. [tex] {x}^{2} + x + 1[/tex]B.[tex] {x}^{2} + 3x + 2[/tex]C.[tex]x + 2[/tex]D.[tex]2x - 5 - \frac{3}{ {x}^{3} - 1 } [/tex] A plane flies with an average velocity of -98.5 m/s for 45.0s .What is the displacement? T F In a function prototype, the names of the parameter variables may be left out. I am have trouble with these x-intercepts. Please help me. All of the sentences below should be considered "red flags" exceptOA. "The scholarship is guaranteed or your money back."B. "You can't get this information anywhere else."C. "It takes time to find scholarships, so it is important to know whereto look."D. "I just need your credit card or bank account number to hold thisscholarship." How does the extended metaphor in Paragraph 3of the passage affect its meaning? Complete the three-by-three magic square (that is,the sums of the numbers in each row, in each column and in each of the diagonals are the same) using