Specialized vocabularyis known as:

o Equivocal terms

o Jargon

o Trigger words

o Biased language

Answers

Answer 1

Answer:

"Jargon"

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Specialized vocabulary is sometimes also known as "Jargon" . These are sets of words that are used specifically and uniquely for specific sets of groups or organizations.

For example Lawyers Judges and other law enforcement officials have their own Specialized vocabulary that are better understood by other people in Law enforcement, people that are not part of Law Enforcement might have a hard time understanding.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.


Related Questions

Write a program that lets the user guess the coin's head or tail. The program randomly generates an integer 0 or 1, which represents the head or the tail. The program prompts the user to enter a guess and reports whether the guess is correct or incorrect. include step by step commentary.

Answers

Answer:

#include <iostream>

#include <stdlib.h>

#include <time.h>

using namespace std;

int main()

{

   srand (time(NULL));  //initialize random seed

   int guess;

    int number = rand() % 2;  //generate random number 0 or 1

    cout<<"Enter the guess (0 or 1): ";

    cin>>guess;     //store in guess

    if(number == guess){     //check if number equal to guess

       cout<<"Guess is correct."<<endl;   //if true print correct message.

    }else{

        cout<<"Guess is incorrect."<<endl;  //otherwise print correct message.

    }

    return 0;

}

Explanation:

first include the three library iostream for input/output, stdlib,h for using the rand() function and time for using the time() function.

create the main function and initialize the random number generation seed, then generate the random number using the function rand() from 0 to 1.

after that, take input from user and then with the help of conditional statement if else check if random number is equal to guess number or not and print the appropriate message.

If a compiler detects a violation of language rules, it refuses to translate the class to ____.

a.
machine code

b.
a logic error

c.
an application

d.
Java

Answers

Answer:

The correct answer is a. Machine code

Explanation:

The syntax of a language is a set of rules that indicates how to write programs.

A compiler is a system that in most cases has to handle an incorrect entry. Especially in the early stages of creating a program.

Syntactic errors are those that occur at the time of writing the program in the high level programming language and that do not comply with the grammatical rules of said programming language. These errors are generally detected by the compiler itself, since it only translates programs that are ''well written''. Therefore, a program that contains syntactic errors can never be compiled.

In summary, syntax errors are detected in the process of translating source code into binary code. On the contrary that happens with the errors of execution and of logic, that can only be detected when the program in being executed.

Answer:

a. machine code

Explanation:

When we code a program, be it in C, C++, Java, etc,..., the role of the compiler is to translate our code to machine code, so it can be executed.

This only happens if we do not violate any of the language rules. Otherwise, there are going to be compilation errors and we will have to fix our code before it is compiled, that is, translated to machine code.

So the correct answer is:

a. machine code

A major advantage of a method is that it is easily reusable. What does it mean to reuse a method and what are the advantages of doing so?

Answers

Answer: To reuse a method means to use a code which has been done or prepared already and just we need to change some of the functionalities.

This helps a great deal of saving time as well as helps in making the code manageable.

Explanation:

This has been practiced since long that methods can be reused. for example we need to build a calculator in c. then we can simply reuse the same method  just we need to change the sign of the operator. So in this process we can speed up our operations and work and also can make the code easy to understand and manage it when we have have to deal with large lines of code.

Final answer:

Reusing a method in programming allows for using the same code in multiple places efficiently and consistently, saving time and reducing the potential for errors. It's the easiest and least disruptive way to add functionality to programs and aligns with sustainable practices.

Explanation:

Reusing a method in programming means employing a piece of code that has already been written to perform a function or a task in multiple places throughout your application. This is akin to creating a tool that can be used repeatedly in different contexts without the need to rewrite the code each time.

Advantages of Reusing Methods:

Efficiency: Reusing methods is a quick and easier way to add functionality to your programs without rewriting code, saving time and effort.Consistency: It contributes to a more robust and error-free program as the method has been tested and debugged once, ensuring consistency across its applications.Implementing reusable methods is often the easiest and least disruptive way to enhance a program, aligning with the Process Reaction Method which emphasizes simplicity and minimal interruption.

Well-designed functions and methods enhance the maintainability and scalability of software by allowing the same logic to be utilized in different parts of an application or even in different projects entirely. This reusability can lead to economic and environmental benefits, as it aligns with the principles of reduce, reusable, and recycle.

A binary search can be performed only on ____.

A.
ordered lists

B.
comparable lists

C.
unordered lists

Answers

A binary search can be performed only on a comparable lists

Define a class Complex for complex numbers. A complex number is a number of the form: ???? + ???? ∗???? where a and b are real and imaginary part of a complex number and i is a number that represents the quantity √−1 . Addition of two complex numbers: (???? +???????? )+(???? +????????) = (???? +????) + (???? +????)???? Subtraction of two complex numbers: (???? +????????)−(???? +????????) = (???? −????)+(???? −????)???? Create a class Complex that contains:  Two private variables real and imaginary of type double.  Define accessor and mutator functions of real and imaginary variables.  Overload the following operators "+" and "–" so that they apply correctly to the type Complex. Test your program with inputs (5+4i) and (2+2i).b

Answers

Explanation:

--!#&?&#&#(-$(-$)-"-)"(-'-)';'!'+%

Create a Simple HTML/CSS header:?

Answers

Answer:

We can create headers in  html using <h1> through <h6> tags

Explanation:

We have six types of headings. They are:

<h1>

<h2>

<h3>

<h4>

<h5>

<h6>

If we want the heading to mark it as an important one, we can use <h1>.

So, <h1> heading is used for main headings.

If we want the heading to mark it as a least important one, we can use <h6>.

<h3>, <h4>, <h5> are used for sub headings.

Each HTML heading has a default size. However, you can specify the size for any heading with the style attribute, using the CSS font-size property as shown below:

    <h1 style="font-size:50px;">The Hindu</h1>

We use headings to show the document structure.

Here is a simple html code :

<!DOCTYPE html>

<html>

<body>

<h1 style="font-size:50px;">This is my heading</h1>

<p> some text here</p>

</body>

</html>

Identify three different meanings of the word "interface" in Java Programing language.

Answers

Answer: Interface methods, interface variables and interface markers.

Explanation:

Interface methods are public and abstract by default.

Interface variables can be declared public, static and final

Marker interfaces are simply empty interfaces without any methods.

Which statement about images is correct? A) A virtual image cannot be formed on a screen. B) A virtual image cannot be viewed by the unaided eye. C) A virtual image cannot be photographed. D) Mirrors always produce real images.

Answers

Answer:

A) A virtual image cannot be formed on a screen.

Explanation:

A virtual image cannot be formed on a screen is correct about images.

A virtual image can be viewed by the unaided eye.

A virtual image can be photographed.

Mirrors don't always produce real images.

Final answer:

The correct statement about images is that a virtual image cannot be formed on a screen, as virtual images are created by diverging light rays. However, they can still be seen and photographed because devices like cameras and the human eye can focus these rays.

Explanation:

The correct statement about images is A) A virtual image cannot be formed on a screen. Virtual images are formed when light rays diverge in front of a mirror or behind a lens, creating an image that appears to be located behind the mirror or lens. Unlike real images, which can be projected onto a screen because they are formed by converging light rays, virtual images are not formed at a point in space where a screen can capture them. However, virtual images can be seen by the unaided eye and can also be photographed, contrary to some misconceptions. This is because cameras and eyes can focus diverging rays to form an image.

______________ Gives the Mean time for which systemremained available for use.

a) MTTF

b) MTBF

c) MTTR

d) MTTD

Answers

Answer: d)MTTD

Explanation: MTTD(Mean Time To Detect) is the time for the discovery of the  problem in a system.  It is basically the average time until the problem is noticed by someone. For e.g.- if there is a problem in a computer system at 9:00 am and the problem is noticed at 9:10 am by then user then the MTTD is  10 minutes . So, MTTD gives the mean time for which the system remains available for use.

True / False
The meaning of bit patterns is determined by the way the HW and SW treat them.

Answers

Answer: True

Explanation:

 The meaning of bit pattern are determined by the hardware and software treat them as, different types of computer used different pattern of bit for the instruction because they all are potentially different so the bit pattern are determine accordingly to the function of hardware and the software of particular devices.Instruction are stored in the form of bits in the similar memory as the data. Bit pattern are used to communicate in the memory as the sequence of bits.

What are the requirement analysis for COREBANKING?

Answers

Answer:

Core Banking is the system which is defined as the backbone  of products and service that Bank offers. with the upcoming technology it becomes a value differentiator, and a wrong system selection  that may cost tremendous opportunity losses. Core banking solution are transformed in the way bank used to operate in different manner.

 The requirement analysis for CORE-BANKING is:

FunctionalityService-oriented architectureFlexibilityProgram management

Create a program to determine the largest number out of 15 numbers entered (numbers entered one at a time). This should be done in a function using this prototype:


double larger (double x, double y);

Answers

Answer:

Output:-

Enter number:  

2

Enter number:  

1

Enter number:  

4

Enter number:  

3

Enter number:  

5

Enter number:  

7

Enter number:  

6

Enter number:  

8

Enter number:  

9

Enter number:  

11

Enter number:  

10

Enter number:  

12

Enter number:  

14

Enter number:  

13

Enter number:  

15

Largest number: 15.0

Explanation:

Below is a java program to determine the largest number out of 15 numbers entered: -

import java.util.Scanner;

public class Largest {

double larger(double x,double y){

 if(x>y)

  return x;

 else  

  return y;

}

double findLargest(){

 double y;

 double greatest=0.0;

 Scanner s=new Scanner(System.in);

 for(int i=0;i<15;i++){

  System.out.println("Enter number: ");

  y=s.nextDouble();

  greatest=larger(greatest,y);

 }

 return greatest;

}

public static void main(String[] args){

 Largest l=new Largest();

 System.out.println("Largest number: "+l.findLargest());

}

}

Which of the following are primitive types?

A. Byte

B. String

C. Intege

D. Float

E. Choice (C) & (D)

Answers

Answer:

A. Byte, C. Integer, and D. Float

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

To answer this question we need to know what a primitive type actually is.

Primitive Data Types: are data entries that have a specific simple value of the kind that is entered. Examples of these are Bytes, Integers, Char, and Float.

Non Primitive types hold more than one entries with their own values. Examples of these are String, Array's, and Classes.

Therefore the answer is A. Byte, C. Integer, and D. Float

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

Give Short and to the point answers(Answer the question keeping in view itsmarks)

Why we called COBOL as a professional language and not ataught language

Answers

Answer:

COBOL(Common Business Oriented Language).As the name suggests it is most commonly used to develop business tools and hence it is called a professional language and it is not used in schools or colleges as a teaching tool like FORTAN hence it is not called a taught Language.

COBOL is also used to develop business applications.It is mainly designed for businesses.

Which of these suggestions is an effective way to deal withstress?
a. Meditation
b. Exercise
c. Talking with others
d. All of the given options

Answers

Answer:

d

Explanation:

all of those are good ways to deal with stress

The true or false questions.

The command: find . -type f -mtime +10 will search in the current directory and its subdirectories for all regular files that have not been modified in more than 10 minutes.

Answers

Answer:

False

Explanation:

The command find . -type f -mtime +10  will search for all files in the current directory and its subdirectories which have not been modified in more than 10 days.

-type argument specifies the type of entity to be searched which in this case corresponds to f (or file).

-mtime argument specifies the last modified time check for the files in terms of number of days and not number of minutes.

What is the typical data transfer rate (in bps) over a SS7 transfer link?

Answers

Answer: 55 Kbits/sec - 64 KBits/sec

Explanation:

Signal System 7 (SS7) is used one of the protocols used for communication for mobile operators and it uses circuit switching. As it uses circuit switching it transfers data using a dedicated channel and hence more comparatively faster.  It communicates and sends signals among Service Switching (SSPs), Signal Transfer Points (STPs), and Service Control Points (SCPs) using a different path apart from the data transfer path.

The data transfer rate which is the transfer of data among the various network elements is 55 Kilo bits/sec - 64 kilo bits/sec.

Open addressing can be implemented in several ways.

True

False

Answers

Answer: True

Explanation:

yes, open addressing can be implemented in several ways as it is a method of collision resolution in hash table. Open addressing can be implemented in different ways as linear probing, quadratic probing and double hashing. As open addressing requires more computation. In open addressing as everything is stored in the same table.

what is the online shopping?explian abstract of online shoopimg?

Answers

Answer:

Online shopping is the process where costumers buy online goods and products over the internet from the sellers. The basic concept is that it is a e-commerce which runs partially over the internet.  It has grown in popularity over the years because people find it easy to bargain shop and convenient.

Abstract of online shopping :  

The main objective of the online shopping is that easy to use and make it  interactive. It is a web based application for online retailers and users can  view the each product and its complete specifications. It is a user friendly application which also provides drag and drop features so that user can easily add the product to the shopping cart and user can also go online and make changes in the order.

What are the advantages and disadvantages of UTF-8 compared to ASCII?

Answers

Answer:

UTF-8 and ASCII both are the character encoding.

In a system,every character has some binary representation,these are the method to encode them.Earlier only ASCII was there, for every character it uses 8 bits to represent.In ASCII only 8 bytes were there i.e 2^8 that is 256.We can't represent number beyond than 127 so it generate a need for other encoding to get into,these drawbacks lead to Unicode,UTF-8.

As ASCII codes only uses a single byte,UTF-8 uses upto 6 bytes to represent the characters.So we can save characters which are as long as 2^48 characters. We can read this encoding easily by the help of shift operators and it is also independent of byte order.

As messages on internet were transferred over 7 bit ASCII messages,so many mail servers removed this encoding.    

Final answer:

UTF-8 offers greater language support and compatibility with ASCII, making it ideal for international applications, at the expense of potentially increased file size and complexity in encoding/decoding processes.

Explanation:

Advantages and Disadvantages of UTF-8 Compared to ASCII

The question regarding the advantages and disadvantages of UTF-8 compared to ASCII centers on two dominant character encoding schemes used in computers and digital devices. ASCII, which stands for American Standard Code for Information Interchange, was one of the first encoding standards to be widely used. UTF-8 (8-bit Unicode Transformation Format) is a more modern encoding scheme designed to address some limitations of ASCII.

Advantages of UTF-8

Compatibility with ASCII: UTF-8 is backward compatible with ASCII. This means that any ASCII text is also valid UTF-8 text, facilitating a seamless transition between the two.

Global language support: Unlike ASCII, which only supports English characters, UTF-8 can represent characters from virtually any language in the world, making it ideal for international applications.

Dynamic character size: UTF-8 encodes characters using 1 to 4 bytes, efficiently representing more characters than ASCII without using extra space for simpler characters.

Disadvantages of UTF-8

Potential for increased file size: For languages that predominantly use characters outside the ASCII range, UTF-8 encoded files may be larger than those encoded in a fixed-width format designed for that language.

Complexity: Decoding and encoding UTF-8 can be more complex than ASCII, requiring additional processing power, which might be a consideration for systems with limited resources.

In summary, UTF-8 offers greater flexibility and language support compared to ASCII but may introduce complexity and increased file size for certain languages. Its design balances compatibility with the need for a universal encoding system that accommodates the global nature of the internet and computing.

Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp = {90, 92, 94, 95}, print: 90, 92, 94, 95 Your code's output should end with the last element, without a subsequent comma, space, or newline.

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

   int NUM_VALS;//variable NUM_VALS for the size of the array..

   cout<<"Enter the size of the array"<<endl;

   cin>>NUM_VALS;//taking input the size of the array..

   int hourlyTemp[NUM_VALS]; //declaring array hourlyTemp of size n..

   cout<<"Enter values of the array "<<endl;

   for(int i=0;i<NUM_VALS;i++)

   cin>>hourlyTemp[i];//taking input of hourlyTemp

   for(int i=0;i<NUM_VALS;i++) //for loop for iterating over the array..

   {

       if(i!=NUM_VALS-1)

       cout<<hourlyTemp[i]<<", ";// print statement.

       else

       cout<<hourlyTemp[i];//print statement.

   }

return 0;

}

Explanation:

I have taken NUM_VALS variable for the size of the array hourlyTemp. First i am taking input the size of array form user and after that array elements are also entered by the user.I am iterating over the array using for loop and checking that it is not the last element if it is simply printing it if it is not then printing comma and space also.

Can you comment on the advantages and disadvantages of having ARP responses implemented as broadcasts?

Answers

Answer:

The advantages of ARP implemented as broadcast is that it enables easy and faster transfer of messages in a network. The disadvantage of ARP is that many of the nodes in the network may update their ARP cache locally without forwarding it to other nodes.

Explanation:

Address resolution protocol(ARP) has both advantages and disadvantages when implemented as broadcast. Broadcast technology enables to transmit messges across all the nodes.

The advantages of ARP implemented as broadcast is that it enables easy and faster transfer of messages in a network. The disadvantage of ARP is that many of the nodes in the network may update their ARP cache locally without forwarding it to other nodes.

How to declare a structure of a linked list?

Answers

Answer:

struct Node{

   int data;

   struct Node *next;

};

Explanation:

Linked list is the data structure which is used to store the series data but not in continuous memory location .

Linked list contain node which store the data and pointer which store the address of next node. If their is no next node, then it store the NULL.

so, the structure must declare the data and a pointer variable.

Those firms must make some drastic changes quickly toavoid further demise and

possible liquidation that fall in__________ of grand strategymatrix

a. Qurdant-1

b. Qurdant-2

c. Qurdant-3

d. Qurdant-4

Answers

Answer:

c. Qurdant-3

Explanation:

Those firms must make some drastic changes quickly toavoid further demise and  possible liquidation that fall in Qurdant-3 of grand strategymatrix .

Cite at least three medical technologies that make our lives better?

Answers

Answer:

 Three medical technologies that makes our lives better are:

In today's world technology boots innovation, stethoscope is coming to our smart phones as we can download it in our smartphones and it provide the analog and digital sound and can transmit it to bluetooth to cloud and doctor can store the data into the patient’s health checkup record. It is cost effective.   Artificial organs used for replacement to relieve human being from pain as it makes life easier and improve one's health status. Robotic surgery is also used to helps to aid in flexibility and control various health issues.

Write a function that accepts an argument for a persons name. The method should loop through the number of characters in the name sending each character to the screen each on a separate line.



#include

#include

using namespace std;

int main()

{

Plese fill in.....thanks

Answers

Answer:

#include <iostream>

#include<string.h>

using namespace std;

void printCharacter(string name){

   for(int i=0;name[i]!='\0';i++){

       cout<<name[i]<<endl;

   }

}

int main()

{

   string name;

   cout<<"enter the name: ";

   cin>>name;

   printCharacter(name);

}

Explanation:

first include the two libraries iostream for input/output and string library for using the string.

then, create the main function and declare the variable type string.

cout instruction is used o display the message on the screen.

cin is used to store the value in the name variable.

after that, call the function. The program control move to the the function. In the function for loop is used to print the character one by one until end of the name.

What is infix, prefix and postfixexpressions in data structures?

Answers

Explanation:

Infix notation: A+B

Operators are written in-between their operands. Expression  X * ( Y + Z) / P is means: "First add Y and Z together, then multiply the result by X, then divide by P to give the final answer."

Postfix notation : A B +

Operands are written before their operators. Expression given above is equivalent to X Y Z + * P /  

Operators evaluation is always left-to-right, we will not consider brackets for the order.

Prefix notation : + A B

Operands are written after their operators. Expression given above is equivalent to / * X + Y Z P

Operators evaluation is always right-to-left,we will not consider brackets for the order.

What are the applicationsof Assembly Language where any high level language becomesinsufficient".

Answers

Answer and Explanation:

Assembly language is a low- level code or language used for initialization and system testing. It makes use of an assembler to convert codes and instructions in assembly language to executable machine language code.

It can be used for video processingIt can ease the accessibility of specific processor instructionsCritical Issues with performance can be addressed with the use of assembly languageIt is generally used for direct manipulation of the hardware.it can help in optimization of task and helps to run our program faster if the program is stilted or constrained in memory as it is the most primitive language computer can use.If a program is  platform specific then itis better to use assembly language for better output.It can be used in real time systems, low level embedded systems, etc

You can pin applications to which two areas?

A. Start screen

Control Panel

C. Taskbar’

D. Title bar

Answers

Answer:

A and C.

Explanation:

The taskbar and the Start are both shortcuts to use when opening applications. The taskbar is at the bottom of your computer or pc. And the start can be opened by pressing the windows key or clicking on windows at the bottom right (Windows only.)

Hope that helps!

The algorithm ____ is used to find the elements in one range of elements that do not appear in another range of elements.

A.
set_union

B.
set_difference

C.
set_join

Answers

Answer:

A. set_union

Explanation:

The algorithm set_union is used to find the elements in one range of elements that do not appear in another range of elements.

Other Questions
simplify the trigonometric expression tan(2x)/tan(x) using double-angle identities !!A. 2/1-tan^2(x)B. 2tan(x)/1-tan^2(x)C. 2tan(x)/1-tan^3(x)D. tan(x) A soccer ball is traveling at a velocity of 50 m/s The kinetic energy of the ball is 500 J What is the mass of the secer bort? Paying attention to the correct use of dashes, choose the best written item. Choose one answer. a. From seashells -- the natives made beautiful necklaces, bracelets, and earrings, even entire lines of jewelry. b. From seashells, the natives made beautiful necklaces, bracelets, and earrings -- even entire lines of jewelry. c. From seashells, the natives made beautiful necklaces, bracelets, and earrings -- even entire lines of jewelry. What is the value of the product (3-21) (3 + 21)? Which is the best summary of Emersons view of solitude expressed in Society and Solitude? a.Spending time in solitude is preferable to spending time in society, and it is ultimately more beneficial. b.Though solitude is not necessarily valuable in and of itself, it is important to recognize its significance within a larger community. c.Solitude can be beneficial in that it allows the mind to contemplate necessary and difficult questions. d.Only through spending time in solitude and in deep observation of the natural world can one find happiness within society. What is the value of X? Which of the following objects has the greatest inertia? Select one: a. A 2 kilogram object moving at 5 m/s b. A 5 kilogram object moving at 3 m/s c. A 7 kilogram object at rest d. A 3 kilogram object moving at 4 m/s Identifica la palabra que no est relacionada con cada grupo. 1. champin cebolla propina zanahoria 2. camarones ajo atn salmn 3. aceite leche refresco agua mineral 4. jamn chuleta de cerdo vinagre carne de res 5. cerveza lechuga arvejas frijoles 6. carne pescado mariscos camarero 7. pollo naranja limn melocotn Solve by using the quadratic formula.3psquared+7p+2=0 There are two piles, one containing 9gold coins and the other 11silver coins. The two piles of coins weigh the same. One coin is taken from each pile and put into the other. It is now found that the pile of mainly gold coins weighs 13units less than the pile of mainly silver coins. Let x represent the weight of each gold coin and y the weight of each silver coin. Find the weight of a silver coin and of a gold coin. How do the solutions to an equation relate to the graph of the equation?How do you solve a system of equations approximately using graphs and tables?need it in 2 paragraph I will 100% leave thanks and 5 star 3. Mammals lack the enzymes for the net conversion of acetyl-CoA into oxaloacetate or any other citric acid cycle intermediate, but if oxaloacetate (or some other citric acid cycle intermediate) is drawn off for biosynthesis, it must be replenished. How is oxaloacetate replenished? Under what cellular conditions would this enzymatic step be favored? Is the equation below a sum of cubes125x3 +169 Assume the width of an ice skate is reduced by sharpening to 0.025 cm and the length of the ice skate is 15 cm. Assuming the ice skater weighs 70.0 kg, calculate the pressure that the skater exerts on the ice if they are balanced on a single skate. Assume the acceleration due to gravity is g=9.81m/s^2. What factors would occur if the sea level was to increase, rather than the temperature and the pressure change. This would be doing ancient times. Following glycolysis and the citric acid cycle, but before the electron transport chain and oxidative phosphorylation, the carbon skeleton of glucose has been broken down to CO2 with some net gain of ATP. Most of the energy from the original glucose molecule at that point in the process, however, is stored in the form of which of the following molecules?(A) NADH (B) glucose(C) pyruvate(D) acetyl-CoA An EPSP (excitatory post synaptic potential) greater than threshold, will generate which of the following?A) hyperpolarization of the post synaptic neuron B) a graded potential in the post synaptic neuron C) a muscle contraction at the MEP D) repolarization of the post synaptic neuron E) an action potential in the post synaptic neuron The blue segment below is a diameter of O. What is the the length of the radius of the circle? Whats equivalent to 1/7-3(3/7n-2/7) combine like terms Mars rotates on its axis once every 1.02 days (almost the same as Earth does). (a) Find the distance from Mars at which a satellite would remain in one spot over the Martian surface. (Use 6.42 x 10^23 kg for the mass of Mars).(b) Find the speed of the satellite.