Select the correct boolean expression for each condition in the function m(x). This function should return "Small" if the value stored in x is divisible by both 3 and 5, "multiple of 5" if divisible only by 5, "multiple of 3" if divisible only by 3, and "Orange" otherwise.

Answers

Answer 1

Answer:

Following are method definition to this question:

def m(x): #defining a method and pass an integer parameter

   if x%3 == 0 and x%5 == 0: #defining  condition that value is divisible by 3 and 5

       return "Small" #return value

   elif x%5 == 0: # defining condition if value is divisible by 5 only

       return "multiple of 5" #return value

   elif x%3 == 0: # defining condition if value is divisible by 3 only

       return "multiple of 3" # return value

   else: # else block

       return "Orange" # return value

z=m(15) #call the method and hold return value in variable x

print(z) #print value of variable x

Output:

Small

Explanation:

In the given method definition a method "m" is defined, that passes the value in its parameter, that is x, inside the method, a conditional statement is used, that check multiple conditions, which are described as follows:

In if block, it will check, that value is divisible by both 3 and 5 then, it will return a string value, which is "Small". If the above condition is not true, it will go to elif block, in this block we check the value individually divisible by 5, and 3, then it will return "multiple of 5" and "multiple of 3". If the above condition is not true, it will go to else block, in this block, it will return "Orange".

Related Questions

Chris is a project manager. He would like to schedule a status meeting for the next week. Several of the group members work at another site. What should Chris do?

Answers

Chris should send out an email with multiple meeting times to accommodate all team members' schedules, engage in personal outreach, and set a meeting agenda. Utilizing group communication tools and setting a clear schedule with assigned tasks and deadlines will promote efficiency within the team's collaboration.

Chris, a project manager, intends to schedule a status meeting for the following week with team members who work at different sites. To facilitate the scheduling, Chris should first send out an email with multiple time options. This accommodates everyone's schedules and underlines the value of starting the project discussions early. Additionally, personal outreach to each team member can help understand their availability and work preferences more effectively.

The project team can utilize tools like GroupMe to provide updates and coordinate on meeting times. Chris should also establish a schedule with key dates, deadlines, and regular meetings, ensuring everyone knows their responsibilities. An agenda with a timed schedule makes meetings more efficient. If meetings are unnecessary, they can be canceled in advance.

Communication is crucial, so deciding on the process for missed meetings, points of contact, and meeting frequency is essential. A work or task schedule should be created, detailing availability, deadlines, and meeting frequencies. After meetings, it is beneficial to distribute post-meeting notes, clarifying each team member's roles and deadlines to maintain project efficiency.

You have had a problem with duplicate medical record numbers in your health care facility's MPI. Now you are joining a health information exchange, so you will need to clean up your database and prevent the duplicates from happening again. If you want to find near matches as well as identical matches in your MPI, you should implement a(n) _________ algorithm.

Answers

Answer:body??

Explanation:i dont know

True or False (type the entire word)

In Excel, when relative cell references are copied across multiple cells, the references change based on the relative position of rows and columns. They are designated in a formula by the addition of a dollar sign ($).

Answers

Answer:

I'd say False

Explanation:

If you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.

Write a recursive function, len, that accepts a parameter that holds a string value, and returns the number of characters in the string. The length of the string is: 0 if the string is empy ("") 1 more than the length of the string beyond the first character

Answers

Answer:

following are the method definition to this question:

def len(x): #defining a method

   if(x==""): #defining condition that checks value store nothing

       return 0# return value  

   else: # else block

       return 1+len(x[1:]) #use recursive function and return value

print(len('The collection of table')) #call method and prints its value  

Output:

23

Explanation:

In the above method definition, a "len" method is declared, in which x variable accepts as its parameter, inside the method a condition block is used, which can be explained as follows:

In if block, we check the value is equal to null if this condition is true, it will return a value, that is 0.  In this condition is false, it will go to else block in this block, the recursive method is used, which calculates value length and return its value.

Nila has created a report, and now she would like to a create table of contents. Nila has reviewed her report and decides to add text that is not formatted as a heading to the table of contents. She must select the text, format it as a ____, and then update the table of contents.

Answers

Answer:

The answer is "heading"

Explanation:

Headings, which appear into your document must be marked simply, objectively and correctly because it shows the final report structure and enable to easy access with specific information.  

It also promotes to read the document. So, its consistency is ensured in the headings. In sort documents, it can't require any heading, but it Nila created a report, in which she requires  heading and then she update the content of the tables, and other choices can't be described in the given scenario, that's why it is correct

When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are considered to be white space are consumed and become part of the word being read b. any characters that are considered to be white space within the word become part of the word c. the program must discard white space characters at the beginning of the input before calling the next method d. any characters at the beginning of the input that are considered to be white space are consumed and do not become part of the word being read

Answers

Answer:

The answer is "Option d"

Explanation:

The scanner method is the full token of the process, that finds and returns. It is token, which is followed by both the inputs meeting and the guideline template. This method can block, even though the former instance of hasNext() is true while waiting for input, and wrong choices can be described as follows:

In option a, It is incorrect because the character at the beginning can't be considered. In option b, It is wrong because the characters are known as the word in which blank space not a part of the word. In option c, It is wrong because in this input before the call is not the method.

Joe, a user, wants his desktop RAID configured to allow the fastest speed and the most storage capacity. His desktop has three hard drives. Which of the following RAID types should a technician configure to achieve this?A. 0B. 1C. 5D. 10

Answers

Answer:

A. 0

Explanation:

The technician should configure the RAID 0 for Joe.

RAID 0 also referred to as the striped volume or stripe set is configured to allow the fastest speed and the most storage capacity by splitting data evenly across multiple (at least two) disks, without redundancy and parity information.

Also, RAID 0 isn't fault tolerant, as failure of one drive will cause the entire array to fail thereby causing total data loss.

Mark works as a Network Administrator for NetTech Inc. The company has a Windows Server 2008 domain-based network. The network consists of ten Windows Server 2008 R2 and 200 Windows 7 client computers. Mark wants to configure an Update-Related Group Policy that allows administrators to assign computers to specific WSUS groups.
Which of the following policies will he use to accomplish the task?

a) Specify Intranet Microsoft Update.
b) Specify Intranet Microsoft Update Service Location.
c) Enable Client-Side Targeting policy.
d) Configure Automatic Updates.

Answers

Hello This Answer Is Not Real This Is All A Simulation

Which item is not part of a college application?

A.Letter of reference from people who have worked with you in the past

B. Financial aid application and FAFSA form

C. Personal essay and high school grades

D. Application form and any fees

Answers

Answer:

A.

Explanation:

The reason for this is because the people who you have worked with in the past will also be students in the same field as you. They could not truly hold to their word on your school activities or how efficient you are compared to say a test or a teachers recommendation. The reason for this is that they lack credibility.

You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss? a) Rogue access pointb) War drivingc) Bluesnarfingd) Hidden node

Answers

Answer:

a) Rogue access point

Explanation:

Rogue access point also known as rogue AP is a wireless access point installed on a secure network infrastructure either by an employee or a malicious hacker but without explicit authorization from the local network administrator.

As a network engineer, if you find an unauthorized AP with a very strong signal near the middle of the 100-acre campus, you will need a Rogue access point kind of threat to report it to your boss.

In a _____ scan, Nmap marks the TCP bit active when sending packets in an attempt to solicit a response from the specified target system. This is another method of sending unexpected packets to a target in an attempt to produce results from a system protected by a firewall.

Answers

Answer:

The answer is "TCP fin"

Explanation:

TCP FIN is used to scan the only closing the linkage on one half or even both sides. It is divided into two parts, that are TCP-RST server and TCP-RST client, both can be described as follows:

In the Server, it occurs to reset the server, which is transmitted by the server. In the client, it transmits a TCP reset to the device. The main purpose of this link is to end by sending a FIN bit set special message.It serves as the termination request for the other unit, which may also convey information like standard line.

Camille prepared excellent PowerPoint slides for her speech about education reform, but the speech didn't go as well as she had hoped. She had trouble finding the Enter key on her computer to advance her slides, and sometimes she skipped a slide because she held the key down too long. According to your textbook, Camille could have presented her slides more effectively if she had

Answers

Answer:

The answer is "she uses the keyboard unless she could quickly progress the slides".

Explanation:

Planning is the single least key aspect of having the performance effectively. It is a critical foundation and which can dedicate much space as possible to it and avoids loopholes.  

It is the proper planning that may also ensure, that you have fully considered.  It is the thing, which we need to convey into your delivery and will also help to boost your trust.

A red bullet in a microflow indicates: a. that the microflow has been completed b. that the microflow contains errors c. that one of the variables in the micro flow has the value FALSE d. an end point of the microflow mendix

Answers

Answer:

d. an end point of the microflow mendix

Explanation:

In Computer programming, Microflows can be defined as a visual representation of textual program codes based on the Business Process Model and Notation (BPMN), it enables users to express the logic of application.

It is capable of performing various actions such as creating and updating objects, showing pages and making choices.

Microflows cannot be used in offline apps as it basically runs in the runtime server.

A red bullet in a microflow indicates an end point of the microflow mendix.

Which of the following are correct? I. Hold the middle mouse button to rotate the model on the screen. II. To pan the model, hold down the Ctrl key and the middle mouse button . III. Use the mouse scroll wheel to zoom in and out of the model.

Answers

Final answer:

According to the provided reference, to manipulate a protein model, rotating is done with the left mouse button, selecting with Ctrl + left mouse button, changing size with the right mouse button, and translating with Ctrl + right mouse button. Panning is not performed with the middle mouse button as stated in the original question.

Explanation:

The instructions given in the question seem to pertain to manipulating a 3D model or structure, commonly a task in software applications for subjects like bioinformatics, molecular modeling, or computer-aided design. Based on the reference provided, the correct actions to manipulate a protein model using a cursor (mouse) are as follows:

Rotate Protein: Use the left mouse button along with moving the cursor.Select Protein: Use Ctrl + left mouse button and move the cursor.Change Size of Protein: Use the right mouse button with cursor movement.Translate Protein: Hold Ctrl + right mouse button and move the cursor.Identify specific amino acids by placing the cursor over the protein.

To address the original question, holding the middle mouse button to rotate the model is not listed in the provided reference, while panning the model is done with Ctrl + right mouse button, not the middle mouse button. Zooming using the mouse scroll is not mentioned here, but it's a common function in many modeling applications. It's important to refer to the specific software documentation for precise controls.

All three statements are correct:

I. Holding the middle mouse button typically allows you to rotate the model on the screen.

II. To pan the model, you usually hold down the Ctrl key along with the middle mouse button.

III. Using the mouse scroll wheel often allows you to zoom in and out of the model.

here's a detailed explanation:

I. Rotating the Model: Holding the middle mouse button allows you to rotate the model on the screen. By clicking and dragging the mouse while holding the middle button, you can change the view angle of the model.

II. Panning the Model: To pan the model, simultaneously hold down the Ctrl key and the middle mouse button. While holding these keys/buttons, you can move the model horizontally or vertically within the viewport by dragging the mouse.

III. Zooming the Model: Use the mouse scroll wheel to zoom in and out of the model. Scrolling the wheel forward zooms in, bringing the model closer, while scrolling backward zooms out, moving the model farther away. This provides a way to adjust the magnification level of the model without changing its orientation or position on the screen.

If Rahul wants to reduce his monthly spending, he should A get a better job. B reduce his fixed expenses. C reduce his variable expenses. D reduce his fixed and variable expenses.

Answers

Answer:

C. reduce his variable expenses.

Explanation:

There are two types of expenses: Variable expenses and Fixed Expenses. Fixed Expenses are the expenses that are fixed for every month and its difficult to reduce these expenses such as house rent, fuel or travel expenses to go for work, utility bills. These are almost fixed for every month and it is difficult to reduce them. On the other hand, variable expense are the expense that vary for every month and can reduce easily. These expenses includes eating outside at restaurants, clothing, enjoying and arranging parties.

Rahul should reduce his variable expense to reduce his spending. This could be the easier way to reduce the expenses and save more. First option is not valid as he want to reduce his spending, this shows that he is satisfied with his current job but worried about extra expenses each month. This is the reason option C is the better choice for him to reduce expense.

Answer:

reduce his fixed and variable expenses.

Explanation:

If rahul wants to reduce how much money he spends, he should try to reduce both of them. For example, you live in an expensive house and your losing money. You have to reduce your variable expenses by trying to lower it down or moving to a new home with less costs of variable expenses. Fixed expenses are things that aren't that important, which is easy to reduce. Therefore the answer is D. Reduce his fixed and variable expenses

Prensentation software allows user to?

Answers

Answer:

package used to show information, normally in the form of a slide show. It mostly includes three major functions: an editor that allows text to be inserted and formatted, a method for inserting and manipulating graphic images and a slide-show system to display the content.

Dynamic routing:a) imposes an overhead cost by increasing network trafficb) decreases performance in networks which have many possible routesc) decreases performance in networks with "bursty" trafficd) does not add to the network traffic and should be used in all network environmentse) is another term for static routing in WANs

Answers

Answer:

a) imposes an overhead cost by increasing network traffic

Explanation:

Dynamic routing also known as adaptive routing a network protocol that allows optimal data routing by selecting paths using complex routing algorithms according to real time routing table changes in a router.

In Computer networking, Dynamic routing imposes an overhead cost by increasing network traffic.

If your program throws an IndexOutOfRangeException, and the only available catch block catches an Exception, ______________________. A. the Exception catch block executes the Exception B. an IndexOutOfRangeException catch block is generated automatically the IndexOutOfRangeC. catch block is bypassedD. Exception is thrown to the operating system

Answers

Answer:

Option A is the correct answer for the above question.

Explanation:

The Index Out Of Range exception is a type of Run exception which is generated on run time. It means when any user executes the software or program, then that program gives some error on the execution time by some coding problem or some value problem.

So this type of exception can be handle by the Catch block which is also stated by the option A. Hence A is the correct answer but the other is not because:-

Option B states that this exception is generated by the catch block which is not correct.Option C states that the catch block passes the exception which is also not the correct.Option D states that the exception is passed for the operating system, but it is passed to the catch block only.

The mutating-table error is raised when a trigger attempts to execute a. an INSERT, UPDATE, or DELETE while another user is updating the same table b. a SELECT statement on the same table that the trigger is based on c. a SELECT statement while another user is updating the same table d. an INSERT, UPDATE, or DELETE on the same table that the trigger is based on

Answers

Answer:

d. an INSERT, UPDATE, or DELETE on the same table that the trigger is based on

Explanation:

In Computer programming, the mutating-table error is raised when a trigger attempts to execute an INSERT, UPDATE, or DELETE on the same table that the trigger is based on.

The mutating-table error occurs when a row-level trigger attempts to read or write on the same table that the trigger is based on.

It should be noted that mutating-table error is raised when a trigger attempts to execute D: an INSERT, UPDATE, or DELETE on the same table that the trigger is based on.

A mutating table error serves as the error that do take place occurs at a level that a row-level trigger is attempting to examine, or trying to make a change to a particular table which undergoing change process already.

We can conclude that mutating table error is notable when there is an attempt for execution of (an INSERT, UPDATE, or DELETE statement).

Learn more about mutating table error at:

https://brainly.com/question/772723

what are the uses of a modem

Answers

Modem provides internet, WiFi, we can connect multiple devices to internet through modem.

Modem provides radiation of short wavelength and the transmitter in your mobile phones and computers convert those radiations into digital signals and vice-versa.

Final answer:

Modems in the 1990s converted digital information into analog signals for transmission over phone lines, enabling users to connect to early online service providers. As internet content grew, broadband connections using cable lines became more prevalent for faster speeds.

Explanation:

The uses of a modem are crucial to understanding how early internet users connected to the burgeoning online world. In the 1990s, modems became faster and more widely utilized with the advent of the internet. These devices worked by converting digital information from a computer into analog signals that could be transmitted over phone lines, and then back into digital form at the destination.

Initially, modems enabled users to connect to online service providers like America Online (AOL) using standard phone lines, functioning in a similar way to Bulletin Board Systems (BBSs). However, with the explosion of internet content, service providers shifted towards broadband connections using cable television lines and dedicated lines for faster data transfer.

HW 1 / C Create a program "Guess My Letter" - All work can be done in the main method - pick a (your) letter and store it in a local variable - Get a char from the user - Compare the char submitted by the user with ‘your’ letter - keep requesting another letter from the user until you have a match (loop..?) - print some message identifying the match & exit on match * compile and run your program via gcc / mingw * submit the source ( .c ) file only

Answers

Answer:

// This program is written in C++ programming language

// Comments are used for explanatory purpose

// Program start here

#include<iostream>

#include<stdlib. h>

using namespace std;

int main ()

{

// Create two char variables; myinput and userguess

char myinput, userguess;

// Accept input for myinput

cout<<"Pick a letter: ";

cin>>myinput;

// Initialize userguess to empty string

userguess = ' ';

system("CLS");

// Clear screen so that user won't see myinput. The content of the variable won't be cleared

// Prompt user to guess the letter correctly;

cout<<"Take a guess: ";

cin>>userguess;

// The iteration below will be repeated until the user guess correcto

while( userguess != myinput)

{

cout<<"You guessed wrongly\n"<<Take another guess: ";

cin>>userguess;

}

cout<<"You guessed right!!!";

return 0;

}

// End of Program

Provide an example of making multiple paragraphs tags using html and at least 3 sentences.

Answers

Answer:

<p> tag:

The <p> tag in HTML defines a paragraph. These have both opening and closing tag. So anything mentioned within <p> and </p> is treated as a paragraph. Most browsers read a line as a paragraph even if we don’t use the closing tag i.e, </p>, but this may raise unexpected results. So, it is both a good convention and we must use the closing tag.

Syntax:

<p> Content </p>  

Example:

<!DOCTYPE html>  

<html>  

<head>  

   <title>Paragraph</title>  

</head>  

<body>  

   <p>A Computer Science portal for geeks.</p>  

   <p>It contains well written, well thought articles.</p>  

</body>  

</html>

Output:

A computer Science Portal for geeks.

It contains well written, well thought articles.

Walter’s health insurance premium increased by 22 percent this year. Now he pays $488 every month for health insurance. What was he paying every month before the premium increase?

Answers

Answer:

$380.64

Explanation:

So he what you do is take $488 multiply it by 22% to get $107.36 you then subtract $488 from $107.36 to get what he was paying before premium increase which is $380.64

The monthly premium that you pay to your health insurer. People might be charged as a source of income again for the insurance business.

Premium calculation:

increased percentage= 22%

new health premium value = $488

old premium value= x

[tex]\to x \ \ of \ \ 22\%= 488\\\\[/tex]

To calculate the old premium value we need to calculate the new  premium percentage value:

[tex]\to 488 \times 22\%\\\\\to 488 \times \frac{22}{100}\\\\\to 4.88 \times 22\\\\\to 107.36\\\\[/tex]

After calculating the percentage value subtract it from the new premium value:

[tex]\to \$ 488- \$ 107.36\\\\\to \$380.64 \\\\[/tex]

Find out more about the premium here:

brainly.com/question/15214520

Write a recursive function sumAll that accepts an integer argument and returns the sum of all the integers from 1 up to the number passed as an argument. For example, if 50 is passed as an argument, the function will turn the sum of 1, 2, 3, 4, ..50.

Answers

Answer:

int sumAll(int n)//function definition.

{

   if(n==1)//if condition.

   return 1;

   else//else condition.

   {

       return n+sumAll(n-1);//return the value and call the function in recursive manner.

   }

}

Explanation:

The above-defined function is a recursive type function that is written in the c language, which holds the if and else condition.When the user passes the largest value from 1, then the else condition will be executed which adds the largest value and pass the value after the decrement of the value as an argument.When the value will become 1, then the function if-block will be executed which returns the value and ends the calling function recursively.

The BasicSet 2 class implements the Set ADT by wrapping an object of the Linked Collection class and:______.
a) "forwarding" all method calls to it.
b) making its variables private.
c) disallowing null elements.
d) "forwarding" all method calls except certain calls to the add method.
e) None of these is correct.

Answers

Answer:

The BasicSet 2 class implements the Set ADT by wrapping an object of the Linked Collection class and forwarding" all method calls except certain calls to the add method.

Complete the crossword puzzle.

Answers

Answer:

There is no picture or anything on the page so we will not be able to answer this.

Explanation:

Answer:

There is no picture

Explanation:

Write a method called makeLine. The method receives an int parameter that is guaranteed not to be negative and a character. The method returns a String whose length equals the parameter and contains no characters other than the character passed. Thus, if the makeLine(5,':') will return ::::: (5 colons). The method must not use a loop of any kind (for, while, do-while) nor use any String methods other than concatenation. Instead, it gets the job done by examining its parameter, and if zero returns an empty string otherwise returns the concatenation of the specified character with the string returned by an appropriately formulated recursive call to itself.

Answers

To create a string of a specified length and character using recursion, define a method that checks if the length is zero and returns an empty string if so. Otherwise, concatenate the character with the result of a recursive call to the method, decrementing the length each time. This approach ensures the string is built as required without using loops.

To address the problem at hand, we need to write a method called makeLine which generates a string of a specified length, filled with a given character. This method should avoid using any loops and rely purely on recursion and concatenation.

Steps to Implement the Method:

Define the method makeLine that accepts an int parameter representing the length and a char parameter representing the character.Check if the integer parameter is zero. If it is, return an empty string.If the integer parameter is greater than zero, concatenate the character with the result of a recursive call to makeLine, decrementing the integer parameter by one.This process will repeat until the base case (integer equals zero) is reached, resulting in the final string.

Here is the code implementation:

public static String makeLine(int length, char c) {
if (length == 0) {
 return "";
} else {
 return c + makeLine(length - 1, c);
}
}

For example, calling makeLine(5, ':') will return ":::::" as it concatenates the character ':' five times recursively.

Because a vector container uses a dynamically allocated array to hold its elements,

A. it is common for the vector class to allocate less memory
B. than it needs more memory
C. than it needs a separate memory location for copies of new elements
D. None of these

Answers

The answer is B than it needs more money

The term platform as a service has generally meant a package of security services offered by a service provider that offloads much of the security responsibility from an enterprise to the security service provider T/F

Answers

Answer:

False

Explanation:

This statement about platform as a service is not true.

Unlike the definition in the question above, platform as a service refers to categories of services provided by cloud computing; These services makes provision for a platform that let users to use, develop, run, and manage their apps without the problem of complexity as a result of building and maintaining the infrastructure typically associated with developing and launching an app.

In addition to all these, users are provided a suite containing readily built tools to develop, customize and test their own built application.

The term platform as a service has generally meant a package of security services offered by a service provider that offloads much of the security responsibility from an enterprise to the security service provider - False

PaaS refers to a platform for systems development over the Internet, which allows enterprises to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. It includes services like databases, middleware, and development tools, and may come with security features, but it is not solely focused on security services.

Cloud services, include PaaS, Software as a Service (SaaS), and Infrastructure as a Service (IaaS), are part of a trend towards the outsourcing of IT resources and functions to achieve cost efficiency, scalability, and flexibility. These services are attractive to businesses of all sizes and industries as they allow for the sharing of resources and automatic updates, often resulting in reduced upfront costs and administrative overhead.

True/False: Audio menus can be useful when one's hands and eyes are busy, or to assist vision-impaired users. With audio menus, instruction prompts and lists of options are spoken. However, aside from being audible instead of visual, audio menus can be constructed using the same guidelines as visual menus

Answers

Answer:

I believe the answer is true

Other Questions
Flasher units are being discussed. Technician A says that only a DOT-approved flasher unit should be used for turn signals. Technician B says that a parallel (variable-load) flasher will function for turn signal usage, although it will not warn the driver if a bulb burns out. Who is right?a. Technician A onlyb. Technician B onlyc. Both Technicians A and Bd. Neither Technician A nor B Which of the following plants would most likely be found in the desert? A. a tree that has smooth bark so that water runs off of it more easily B. a vine that climbs on top of other plants in order to gain access to sunlight C. a plant that has a reduced number of stomata in its leaves D. a plant with a shallow root system to capture the soil's top layer nutrients Eastern Inc. purchases a machine for $15,000. This machine qualifies as a fiveminusyear recovery asset under MACRS with the fixed depreciation percentages as follows: year 1 = 20.00%; year 2 = 32.00%; year 3 = 19.20%; year 4 = 11.52%. Eastern has a tax rate of 20%. If the machine is sold at the end of four years for $4,000, what is the cash flow from disposal? How would you classify the number zero (in the most narrow category)? Thickness measurement ancient prehistoric Native American Pot Shards discovered in Hopi Village are approximately normally distributed with the mean of 5.1 millimeters and standard deviation of 0.9 millimeters. For a randomly found shard, What is the probability that the thickness is: a) Less than 3.0 millimeters b) More than 7.0 millimeters Present your answer in three decimal places. Present your answer: answer for "a",answer for "b" Group of answer choices Write a complete sentence in Spanish telling the location of these people. Susana y yo/ en Estados Unidos Thanks, Coach!Clark BensonJosh helped one of the last guests to arrive to their seat at the banquet. He had taken the lead in organizing the whole event in honor of Coach Wilkins. Josh and the other players on the basketball team wanted to recognize Coach Wilkins for both his athletic achievements and his teaching accomplishments.2Besides being Joshs coach, Coach Wilkins was also his English teacher. Josh thought Coach Wilkins was a great teacher and basketball coach. In class, Coach Wilkins always used different techniques to make class interesting. For instance, Coach once told students to relate the books they read in class to their own lives. Thanks to Coach Wilkins, Josh was enthusiastic about reading; Joshs shelves at home were filled with books.3Coach supported each player and always had advice to give on the basketball court. Although Coach sometimes had to correct a players moves, he was never negative or belittlingCoach made everyone feel at ease.The students and other teachers tried to make the school auditorium look as good as possible for the event. The cafeteria workers made the food for the occasion, and a large group of students worked to help make the banquet even more special.5Josh and the other basketball players, who had just won the state championships, presented Coach with a special plaque. Josh admired the way the gold writing glistened under the lights. As nice as the plaque was, Josh was more eager to present Coach with a special card he had made. Each team member had written a personal message to their coach. Josh felt the card would be more meaningful to Coach because it was coming from his team and was filled with their own words.6Principal Edwards agreed to be the head speaker and to introduce Coach Wilkins. The principal gave a very good speech about how Coach Wilkins had sacrificed his own free time to give more time to the school. He mentioned the sensational after-school tutoring program Coach Wilkins had started to help struggling students.Finally, the big moment came and the principal introduced Coach Wilkins. The guests stood to show their appreciation for the teacher. They applauded as Coach Wilkins went to stage. He smiled and waved back to show how honored he was. Coach gave his thanks and spoke of the things which inspired him to be a teacher and coach. As he listened, Josh thought of what he had written on the card. There werent enough words to truly show how much Coach Wilkins had meant to him as both a teacher and coach. And so on the card, Josh had simply written,Thanks coach! - JoshHow does the author create such a heartwarming feeling in this story?A)by revealing the thoughts and actions of JoshB)by revealing the thoughts and actions of Coach WilkinsC)by revealing the thoughts and actions of Principal EdwardsD)by revealing the thoughts and actions of the cafeteria staff What is the rule of f(0) Bones Brothers & Associates prepare individual tax returns. Over prior years, Bones Brothers have maintained careful records regarding the time to prepare a return. The mean time to prepare a return is 90 minutes, and the population standard deviation of this distribution is 14 minutes. Suppose 49 returns from this year are selected and analyzed regarding the preparation time. What is the standard deviation of the sample mean? Select one: a. 14 minutes b. 2 minutes c. .28 minutes d. 98 minutes The vagina is: A. lined by simple columnar epithelium rich in goblet cells B. similar to the inner lining of the uterus C. a muscular tube extending between the uterus and the external genitalia D. another term for the cervix ____is the only item that exists on earth at standard pressures as a solid, liquid, and gas. Although it brings many benefits to a firm, ___________ also limits a firms ability to realize significant experience curve cost economies and location economies. A. standardization B. customization C. assembly line production D. exporting A box is being created out of a 15 inch by 10 inch sheet of metal. Equal-sized squares are cutout of the corners, then the sides are folded up to create an open-top box. What size squaresshould be cut out so that the box has the largest possible volume? I need help ASAP right now!!!!!!!! S&P Enterprises will pay an annual dividend of $2.08 a share on its common stock next year. The firm just paid a dividend of $2.00 a share and adheres to a constant rate of growth dividend policy. What will one share of S&P common stock be worth ten years from now if the applicable discount rate is 8 percent? Achievement level - Reading:Individual activity 1RobotsWill we have robots at home? There already are many kinds of robots! Big factories use a variety of robots that help put pieces together and do things that are dangerous for people.Some countries have robots that do things for people at home; for example, there is a robot that can cut the grass while you relax with a glass of lemonade! Also, there are robotic vacuum cleaners. They clean the floor by themselves.Now, many cars have GPS (Global Positioning Systems) in them. A car with a GPS system can give you directions on how to get somewhere, tell you where the closest gas station is, and, some day in the future, it will drive itself. You will take a nap orread while the car drives itself to your destination.There are some companies in the world that are going to build robot pets, and many of them will be in homes around the world. The Sony Company built a dog called Aibo that can sit and do lots of tricks. Some people are going to buy one of those dogs so they have a good robotic friend at home. Aibo is also a great guard dog. He can patrol the yard and take pictures of anything suspicious with a built-in camera. As you can see, we will probably have lots of robots around us in the future2Write T for true and F for false. If it is false, correct the statement to make it true.1.There are not robots in homes at this moment.2.It is necessary for a person to control a robotic vacuum cleaner.3.Big factories still have people doing everything.4.There is a robot that can help you to have nice grass.5.Robot pet dogs could help avoid people getting in your house. Which expressions are equivalent to 5 x minus 15? Select three options. 5 (x + 15) 5 (x minus 3) 4 x + 3 y minus 15 minus 3 y + x Negative 7 y minus 6 x minus 8 y + x Negative 20 minus 3 x + 5 + 8 x What type of government is Lincoln describing in his conclusion? A jar contains 6 blue cubes, 7 blue spheres, 3 green cubes, and 4 green spheres. If you select an object at random, what is the probability that the object is green or a cube? A. 4B. 13/20C. 4/5D. 3/20 Suppose the FAA weighed a random sample of 20 airline passengers during the summer and found their weights to have a sample mean of 180 pounds and sample standard deviation of 30 pounds. Assume the weight distribution is approximately normal.a.) Find a one sided 95% confidence interval with an upper bound for the mean weight of all airline passengers during the summer. Show you work.b.) Find a 95% prediction interval for the weight of another random selected airline passenger during the summer. Show you work.