The true or false questions.

1.egrep can accept multiple filenames as input arguments.

Answers

Answer 1

Answer: True  

Explanation: yes, it is true that egrep can accept multiple filenames as input arguments for example egrep -r "text1/text2", so this will search in all the sub directories . E grep is also known as 'grep -E' which belongs to the group of grep function and we used egrep to separate multiple patterns for OR conditions. This is also very less time consuming if you are going to search multiple input arguments in multiple different logs at the same time.


Related Questions

Which of the following syntax of the functions in SQL is used toadd column values? COUNT(*)

COUNT(expression)
SUM(expression)
MAX(expression)

Answers

Answer:

SUM(expression)

Explanation:

The SUM function is used to calculate the SUM of entries in a numeric column.

The syntax is as follows:

SELECT SUM(<column_name>)

FROM <table_name >

[WHERE <condition>];

For example:

Select SUM(age)

FROM employees;

COUNT is used to find the number of rows in the resultset.

MAX returns the maximum valued entry in the selected column.

The syntax of the functions in SQL that is used to add column values is: B. SUM(expression).

What is SQL?

SQL is an acronym for structured query language and it can be defined as a domain-specific programming language that is designed and developed for the management of various data that are saved in a relational or structured database.

This ultimately implies that, a structured query language (SQL) function can be used to communicate with a database in accordance with the American National Standards Institute (ANSI) standards such as:

COUNT(expression)SUM(expression)MAX(expression)

Generally, the SUM(expression) is a structured query language (SQL) function that is used to add column values.

Read more on SQL here: https://brainly.com/question/25266787

OSI model is more popular thanTCP/IP. True/false

Answers

Answer:

False

Explanation:

Hi, the OSI model is not that it is more popular than TCP/IP, but the OSI model was originally created as an academic contribution where it helped to build TCP/IP where a more simplified and tailored way was found of being able to implement the Internet. In summary, the OSI model served as an inspiration to execute a more versatile model such as TCP/IP in its implementation.

I hope it's help you.

Under what circumstances would a user bebetter off using a time-sharing system rather than a PC or asingle-user workstation?

Answers

Answer:

Time and Money

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

A time-shared system has its benefits compared to a PC or single-user workstation. Firstly, if more than one person is working on the same project it can save time instead of finishing a part on a single-user workstation and having to move, upload and download constant information.

Secondly, and most importantly is probably the amount of money or investment needed for for more than one workstation. Having a time-shared system saves a huge amount of money for a company especially if the company is tight on a budget.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

what is the command to disable any Processes in linix??

Answers

Answer: killall[process_name]  or kill[PID]

Explanation:

Killall is a tool for disabling running processes on the system. It will disable all programs that matches the name mentioned.

kill disables processes based on process id numbers. it does not disable the process directly. The process recieves a signal where the process will follow instructions which it has to follow if it receives the signal.

Define an I/O port. Which functions are performed by it?

Answers

Answer:

I/O port is an input output port of a computer which is capable of receiving (input) and sending (output) data. The main function of a I/O port is to send and receive data. As it is used to transfer data. Device such as keyboards is an input device and printer is an output device.  

For example - Modem is an input output port and device where we can connect it with the computer is called I/O port.

Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?

a- Downplay any negative points.

b- Be positiveand brief.

c- Makeaction easy.

d- Showbenefits to receiver.

Answers

Answer: d)- Show benefits to receiver

Explanation: Indirect plan is the approaching a person in a indirect manner and just giving the hint about the main idea rather than presenting the main idea. For creating interest section the idea of attracting the receiver by showing the benefits of the plan is the major option. Because just by sharing the benefit and hint of plan,receiver tends to be attracted towards the plan .

An “evil twin” in the context of computer security is: a) A virus-laden attachment that looks just like a sincere attachment b) A counterfeit Wifi connection in a coffee shop that appears to be genuine c) A duplicate badge that allows a nasty person entry into a data center d) Someone who looks just like the Chief Information Officer, but steals data

Answers

Answer:

A

Explanation:

An “evil twin” in the context of computer security is a virus-laden attachment that looks just like a sincere attachment. Hence option a is correct.

What is computer security?

Computer security is defined as the defense of computer systems and data against damage, theft, and improper use. The same techniques used to safeguard other valuable or sensitive equipment, such as serial numbers, doors and locks, and alarms, are often employed to protect computer hardware.

A rogue Wi-Fi access point (AP) that poses as a genuine one and provides access to sensitive data without the end user's knowledge is known as a "evil twin assault." With a smartphone or other internet-capable gadget, some readily available software, and an attacker, it is simple to construct an evil twin.

Thus, an “evil twin” in the context of computer security is a virus-laden attachment that looks just like a sincere attachment. Hence option a is correct.  

To learn more about computer security, refer to the link below:

https://brainly.com/question/5042768

#SPJ5


The bandwidth of the medium is measured as ____.

bits per second (bps)

amps per second (bps)

characters per second (cps)

words per second (bps)




Answers

Answer:

bits per second (bps)

Explanation:

The definition of the bandwidth is capacity of the medium to transfer maximum amount of data transfer from one point to the another point in a specific time usually one second.

It generally measured as bits per second (bps).

For advance or high capacity medium is measure as gigabits per second (Gbps).

In a sell or process further decision, which of the following costs is relevant?

I. A variable production cost incurred after split-off.
II. A fixed production cost incurred prior to split-off.

Neither I nor II

Only II

Only I

Both I and II

Answers

Answer:

The correct option is C) a variable production cost incurred after split off.

Explanation:

First of all it is important to understand what sell or process further decision is , this is a situation where a company has to decide whether they should sell their product right now or they should make some further changes in to it , which can help them earn more revenue.

Company's make such decisions by doing an incremental analysis where they see whether the additional revenues they think product will generate when it would be further processed will be more than the additional cost they would have to incurred in further processing the product.

So at this point only variable production cost which they would have to incurred would matter not the fixed cost because of the incremental revenue and cost are the only significant factors here for decision making.

Name and discuss theprogramming languages suitable for the following fields:
i) Science and Engineering field
ii) Education
iii) InformationSystem
iv) System andNetworks

Answers

Answer:

For Science and Engineering Field :- FORTRAN.

Eduction purpose:- GWBASIC .

Information System :- COBOL

System and Network :- C, C++

Explanation:

FORTAN (formula translation) is best fit for the Science and Engineering Field.

GWBASIC is a basic programming language developed by Microsoft is best fit for educational purpose.

COBOL(Common Business Oriented Language) is best fit for the Information System

C and C++ are the best languages for Networking purposes.

In 1736, Euler represented the Knigsberg bridge problem as a graph, marking (as recorded) the birth of graph theory.

True

False

Answers

Answer:

True

Explanation:

It is was in 1736 that Euler gave the answer to the knigsberg bridge problem. This problem revolves around the use of 7 bridges and covering all the 7 bridges at once and then again moving to the start. So in 1736 Euler used graphs to solve the problem which answered in negative. This also lead to the birth of graph theory which carried out be used in many applications.

Final answer:

It is true that Euler represented the Königsberg bridge problem as a graph in 1736, which is considered the birth of graph theory, a key field in mathematics.

Explanation:

The statement is true. In 1736, Leonhard Euler indeed tackled the problem of the Seven Bridges of Königsberg and laid the foundations for graph theory. Euler's approach consisted of representing the landmasses and bridges of Königsberg as a graph, where the landmasses were nodes and the bridges were edges connecting these nodes.

Euler's work showed that the problem of finding a path that crossed every bridge exactly once had no solution and this analytical approach essentially marked the birth of graph theory, a fundamental field in discrete mathematics, computer science, and other disciplines.

suppose we have a dictionary called grades as shown below:

grades = {“John”: [87,90,86.8], “Mary”: [78, 81.5, 88.6], …}

The keys are names of students (assume that the names are unique) and the value associated with each is a list of three exam scores. Write a program that prints a report card in the following format:

John 87.93 B

Mary 82.70 B

Assume that an average of 90 and above is an “A”, 80 to 89.999 is a “B”, 70 to 79.9999 is a “C” and so on. Anything below 60 is an “F”

Answers

Answer:

import statistics as st # importing statistics package to calculate mean as st.

grades = {"John": [87,90,86.8], "Mary": [78, 81.5, 88.6],"Susan":[45,67,76]}

for key,value in grades.items():#iterating over the dictionary

   average_score=st.mean(value)#calculating the mean of every student

   gr="" empty string to store the grades

   if average_score>=90: # nested if else if and statements for the grades in gr

       gr="A"

   elif average_score>=80.0 and average_score<90.0:

       gr="B"

   elif average_score>=70.0 and average_score<80.0:

       gr="C"

   elif average_score>=60.0 and average_score<70.0:

       gr="D"

   else :

       gr="F"

       

   print(str(key)+" "+str(average_score)+" "+str(gr)) #printing grades of every student.

Output:-Mary 82.7 B

John 87.93333333333334 B

Susan 62.666666666666664 D

Explanation:

1.In this program we are iterating over the dictionary grades.

2.Storing and calculating the mean of the scores of every student us statistics package.

3.Storing the grade in string gr and updating the gr according to the mean score

4.After that printing the grade of the student with their name and mean score.

The goal of quality assurance is toprovide management with the data needed to determine whichsoftware engineers are producingthe most defects.
i. True

ii. False

Answers

The answer to your question is true

You just purchased a new router from Cisco and now are in the process of installing it. Upon boot up the router enters the setup mode. You are prompted to enter the enable password and the enable secret password. What is the difference between the two passwords?

Answers

Answer:

1.Enable secret encrypts the password while enable does not

2.The enable password can be seen with a command while the enable secret password cannot

3.The enable secret password can still be cracked with the right tools

Explanation:

On Cisco devices, there are a number of ways that you can protect resources with the use of passwords. Two common ways to achieve this is via the enable password command and enable secret password command. The main difference between enable and enable secret is encryption. With enable, the password that you give is stored in a plain text format and is not encrypted. With enable secret password, the password is actually encrypted with MD5. In the simplest sense, enable secret is the more secure way.

With Cisco, it is possible to view the stored passwords as they are a part of the configuration file. When you view them, you will see the actual password that you need to enter with enable password. The same will also reveal the password made by enable secret. But, it will be in its encrypted form and cannot be entered as the password in its current state.

Although using enable secret is relatively safer than using enable password, it is not uncrackable. Actually, it is relatively easy to crack the encrypted password of enable secret by searching for tutorials and tools online. It’s just a matter of knowing what you are doing and having the right resources to execute it. So, for a capable person, both enable and enable secret cannot block access, but just add a small amount of delay.

There are cases where enable and enable secret are good enough in limiting access to your devices. But in cases where you really do not want to block access, it is best to use another command ‘service password-encryption’ as it provides better security. It still encrypts the password that you enter, but with a more complex algorithm that is virtually impossible to crack with tools and computing power that is commonly available nowadays.

Summary:

1.Enable secret encrypts the password while enable does not

2.The enable password can be seen with a command while the enable secret password cannot

3.The enable secret password can still be cracked with the right tools

The enable password on a Cisco router is less secure as it is stored in plain text, whereas the enable secret password is encrypted, offering better protection. The enable secret takes precedence if both are set, and it is important for network security to keep the router and security patches up-to-date.

When configuring a new Cisco router, you might be required to set both an enable password and an enable secret password. The main difference between the two lies in their level of security. The enable password is the older, less secure option, as it stores passwords in plain text in the router's configuration file, making it susceptible to anyone with access to the router's files. Conversely, the enable secret password is encrypted using MD5 hash by default, providing a higher level of security against potential attackers. It's important to note that if both passwords are set, the enable secret password will take precedence when trying to enter privileged EXEC mode.

Creating secure passwords and regularly updating them are critical practices for maintaining network security. In addition, ensure the router's firmware is up-to-date and all necessary security patches are applied. Remember that when entering passwords on Cisco devices, the characters will not be displayed on the screen, adding an extra layer of security.

- Truncate command response time is ______ as comparedto Delete command.

a. Poor

b. Same

c. Better

d. Worst

Answers

Answer:

c. Better

Explanation:

Truncate command response time is better as compared to Delete command.

Final answer:

The truncate command response time is better than the delete command because it quickly deallocates data pages without logging each row's deletion, making it faster for large tables.

Explanation:

The truncate command response time is typically better as compared to the delete command. When using the delete command, each row is deleted individually and the action is logged, which can be time-consuming for large tables.

In contrast, the truncate command deletes all rows in a table by deallocating the data pages used by the table, which is much faster as it does not log the deletion of each row individually.

Furthermore, because truncate is a DDL (Data Definition Language) operation, it also resets any identity columns to the initial seed value, which can be beneficial in certain circumstances.

Given the following code fragment, how many times does the loop body execute? int laps = 50; int myNum = 1; do { myNum = myNum + 2; laps = laps + 1; } while(laps <= 1);

Answers

Answer:

one

Explanation:

The loop is used to execute the part of code or statement again and again until the condition is not FALSE.

There are three types of loop in programming.

1. for loop

2.while loop

3. do-while loop

Do-while has one special property which makes it different from other loops.

The loop statement executes once if the condition of the loop is failed in the starting.

In do-while, the statement executes first and then while checking the condition.

let discuss the code:

initially, laps=50, myNum=1

then, the program executes the statement in the loop.

so, myNum = 1 + 2=3.

A value 3 is assign to the variable myNum.

laps = 50 + 1=51.

A value 3 is assigned to the laps variable.

then while checking the condition (51 <= 1) which is FALSE.

The program terminates the loop.

Therefore, the answer is one.

What is the function of a clock for a CPU?

Answers

Answer: Clock in CPU(central processing unit) is the indication device that describes about the processing of the instruction in a computer.

Explanation: Clock rate in the CPU gives the knowledge about the instruction processing in the computer is fast , slow or moderate.The higher rate of clock cycle , the better execution of instruction in the CPU. The rate or cycle of clock is measured in terms of megahertz(MHz) or   gigahertz(GHz). The range of the clock speed ranges from 3.5 GHz to GHz, which is considered as normal speed for the execution of instruction.  

T F If other functions are defined before main, the program still starts executing

at function main .

Answers

Answer:

True.

Explanation:

If other functions are defined before main, the program still starts executing at function main.

Why must you be careful when handling a hard drive?

Answers

You must be careful while handling a hard drive because If you’re not careful with it the hard drive may corrupt or crash.

Enterprise Resource Planning (ERP) is an example of a single user database.

A.

True

B.

False

Answers

Answer:

false

Explanation:

The keyword ____ indicates that a field value is unalterable.

a.
end

b.
final

c.
static

d.
permanent

Answers

C.. static I think is the answer

The keyword final indicates that a field value is unalterable. The correct option is b.

What is a keyword?

A word or collection of words that a user of the Internet enters into a search engine or search bar is referred to as a keyword in digital marketing.

A keyword is a term or phrase that is connected to a specific document or that characterizes its contents, such as in internet searches.

So, users can do searches using the title, author, subject, and frequently, keywords.

The predetermined group of reserved words with specific significance for the compiler are known as keywords in visual basic.

Therefore, in our applications, the keywords in visual basic cannot be utilized as identifiers like variable names, class names, etc.

When a field value is marked as final, it cannot be changed.

Thus, the correct option is b.

For more details regarding keyword, visit:

https://brainly.com/question/16559884

#SPJ6

For java

Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards, then backwards. End each loop with a newline. Ex: If courseGrades = {7, 9, 11, 10}, print:

7 9 11 10 10 11 9 7

Hint: Use two for loops. Second loop starts with i = NUM_VALS - 1.

Answers

Answer:

public class array{

    public static void main(String []args){

       int[] array = {2,4,7,1,9};

       int num_vals = array.length;

       for(int i=0;i<num_vals;i++){

           

           System.out.println(array[i] + " ");

       }

       for(int i=num_vals-1;i>=0;i--){

           

           System.out.println(array[i] + " ");

       }

    }

}

Explanation:

First create the class in the java programming.

Then create the main function and declare the array with values.

Store the size of array in num_vals variable by using the function array.length.

create a for loop to iterate the each element in the array and then print on the screen with spaces and newline.

it traverse the loop from first to last.

Then, again create the for loop to iterate the each element in the array and then print on the screen with spaces and newline but the traversing start from last to first.

A graph of an organization'snet income over the past 10 years is an example of an analogmodel.
True
False

Answers

Answer:

True

Explanation:

Analog model

It is a representation of target model,it include charts,models of electric and mechanical system and graphs also.The size of this model is not fixed it may vary according to the requirements,so it may be small or big.

As per question,the graph is representing net income of an organization, it also representing a model(target) for the company that's why we can call it an Analog model.

The ArrayList class ____ method returns the current ArrayList size.

a.
length

b.
size

c.
rows

d.
capacity

Answers

Answer:

b. size

Explanation:

We can use the size() method of java.util.ArrayList to determine the size of an  ArrayList in Java. The size() method of the ArrayList class returns an integer which is equal to the number of elements present in the ArrayList.

Below is an example code to illustrate the use of the size() method of the ArrayList:-

     ArrayList<Integer> aList = new ArrayList<Integer>(5);

      aList.add(25);

     aList.add(2);

     aList.add(5);

     aList.add(22);

     System.out.println("Size of the array list: " + aList.size());

This will print the size of the array list as 4 since we've added four numbers into the array list.

Which of the following documents should beprepared before the commencement of a softwareproject?

o Quality plan

o Design specification

o Validation (Test) Plan

o Software requirement specification

Answers

Answer:

Software requirement specification

Explanation:

requirement specification is the first step before proceeding with any project.

we should validate our output at all phases with software requirement specification

what are the differences betweenCONS, LIST, and APPEND?

Answers

Answer:

These all are constructors.

CONS

(CONS A B)

makes a pair like this:   (A . B)  

In other words, A is the CAR of the pair; B is the CDR of the pair.

For  example:

(CONS 4 5) ==> (4 . 5)

(CONS 4 '(5 6)) ==> (4 5 6)

[The pair (4 . (5 6)) is the same thing as (4 5 6)].

APPEND  

(APPEND A B)

makes a new list by replacing the final nil in A with the list B. A and  

B must be proper lists.

For example:

(APPEND '(4) '(5 6)) ==> (4 5 6)

This takes any amount of number and put in this order

LIST  

In this ,it will return a list whose elements are value of arguments in the order as it appeared in the LIST.It can take any amount of parameters

For example,

(LIST 4) ==> (4)

(LIST 4 5) ==> (4 5)

(LIST 4 5 '(6 7)) ==> (4 5 (6 7))

(LIST (+ 5 6)(* 5 6)) ==> (8 9)

Write pseudocode instruction to carry out each of thefollowing computational operations.
A. Determine the area of a triangle given value the base b andthe height h.
B. Compute the interest earned in 1 year given the startingaccount balance B and annual interest rate I and assuming simpleinterest, that s, no compunding. Also determine the final balanceat the end of the year.
C. Determine the flying time between two cities given themileage M between them and average speed of the airplane.

Answers

Explanation:

A. Pseudocode to determine the area of a triangle given value the base b andthe height h:-

START

INPUT b

INPUT h

COMPUTE Area = 0.5*b*h

DISPLAY Area

STOP

B. Pseudocode to compute the simple interest earned in 1 year given the starting account balance B and annual interest rate I :-

START

INPUT B

INPUT I

COMPUTE Interest = (B*I*1)/100

DISPLAY Interest

STOP

C. Pseudocode to determine the flying time between two cities given the mileage M between them and average speed of the airplane :-

START

INPUT M

INPUT S

COMPUTE Time = M/S

DISPLAY Time

STOP

T F Functions should be given names that reflect their purpose.

Answers

Answer:

true

Explanation:

FUNCTION: functions are the collection of statements which are used in C programming any program that can not be run without a function, anyone can divide their code in different functions. A function declare  the compiler about the name of the function , a function definition provides the actual body of the function so from above discussion it is clear that the function should be given names that reflects their purpose

Give CFG for the following languages,
a. anbm where m = n-1 and n = 1,2,3…
Some words belonging to this language are, a , aab , aaabb , aaaabbb , ….
b. anb2n where n = 1,2,3…
Some words belonging to this language are, abb , aabbbb , aaabbbbbb , ….

Answers

Answer:

a.  

CFG for {[tex]a^{n}[/tex][tex]b^{m}[/tex], m=n-1 and n=1,2,3… …}

Here we can have a string containing only a single a and no b.

For that the production rule is S → aT, T → ε

Now  to get the strings with at least one b, the production rule is to be

T → ATB/ ε

A → a

B → b

Now merging two set of production rules:

S → aT

T → ATB/ε    [As T → ε is in both set, so one occurrence is taken]

A → a

B → b

Now let us generate “aaabb”

S → aT → a ATB → aAATBB → aaATBB → aaaTBB → aaaεBB → aaaεbB →aaaεbb → aaabb

b.  

CFG for {[tex]a^{n}[/tex][tex]b^{2n}[/tex], n=1,2,3… …}

Here for every single a, we have to generate two b’s.

So the production rule is to be:

                          S → aSbb/ε

Each time S will generate two b’s for one a.

The INC and Dec instruction do not effect the__________ flag

Answers

Answer:

Carry flag

Explanation:

INC instruction

This Instruction is used to increment the destination operand(register or a memory location) by 1,while maintaining the state of the carry flag CF.

DEC instruction

This instruction is used to decrement the destination operand(register or a memory location) by 1,while maintaining the state of the carry flag CF.

Initially we use Inc and Dec instructions for the loop,many loops include multi precision arithmetic doing.For controlling the loops we use inc and dec instructions by setting the zero flag,but not effecting the carry flag.For multi precision arithmetic operations we use the carry state because it helps in a way that it reduces the complexity of code( without writing tons of code),so it is necessary to preserve carry flag.  

       

Other Questions
HELPPP!!!Drag the tiles to the boxes to form correct pairs. Not all tiles will be used.Match the equations of hyperbolas to their corresponding pairs of vertices. A cloned mammal is made by removing the DNA from the unfertilized egg of an egg donor, replacing it with DNA from a cell of a mature animal, and then implanting that cell into the uterus of a surrogate mother. The cell then divides and behaves as if it were a regular embryo Gilles finds it difficult to consider two points of view when presented with the Heinz dilemma. Instead, he focuses on fear of authority as a reason for behaving morally. Gilles is at which of Kohlbergs stages of moral development? When the particle with charge q reaches the center of the original square, it is, as stated in the problem, momentarily at rest. Is the particle at equilibrium at that moment? An electric device, which heats water by immersing a resistance wire in the water, generates 50 cal of heat per second when an electric potential difference of 12 V is placed across its leads. What is the resistance of the heater wire? Select the correct answer from each drop-down menu.Ashley has 500 songs in his music player. Every week he adds 10 songs to his collection. How many songs will he have in his music player after20 weeks?The output of the function (f(n)=500+10n) or (f(n)=10+20n).the output of the function is (700/600)when the input is 20 Find the midpoint of the line segment with the given endpoints (10,2) and (8,4) A 100-W light bulb generates 95W of heat, which is dissipated through a glass bulb that has a radius of 3.0 cm and is 0.50 mm thick. What is the temperature difference between the inner and outer surfaces of the glass? Use 'deg C' as your units. How can being more empathetic help strengthen a relationship? Check all that apply.Empathetic people recognize how the other person feels in a given situation.Being empathetic eliminates the need to apologize for poor behavior.Understanding others' viewpoints can help individuals modify their behaviors.Empathy can help individuals feel more dependent upon someone else.Empathy can help individuals get past their differences. How much work does a supermarket checkout attendant do on a can of soup he pushes 0.600 m horizontally with a force of 5.00 N? Express your answer in joules and kilocalories. As you look down the street, you see an apartment building partially overlapping an office building. based on the depth cue of _____, you know that the apartment building is closer to you. Describe how mutations lead to genetic variations.Which appears to be more dangerous: the BRC1 or BRC2 mutation?Analyze a womans risk of dying of cancer if she carries a mutated BRC1 gene.How do heredity and inheritance relate to the data presented in these charts?What data would you need to see in order to draw conclusions about the effectiveness of preventive surgeries?What does the age at diagnosis tell you about the mutation?Explain how breast-cancer genes are still present in the population, despite cancer-related surgeries and deaths.a simple answer would be nice An ancient artifact was recently discovered, but due to rust and corrosion, only 75 grams of the original item remained. Based on historical dates, scientists believe that this artifact was decaying at a rate of 2% each year. Although the artifact will now be preserved at a museum, scientists wonder: how much of the original artifact would there be if they had not discovered it for another 10 years?Write an exponential function rule and solve. Round your answer to the nearest whole number (the ones place). Enter both the number and the associated units The percent markup on a pickup truck is known to be 252% based on cost to the seller. If the seller paid $15,800 for one, then what would be the corresponding percent markup based on selling price? (round to the nearest tenth of a percent) Which functions have an additive rate of change of 3? Select TWO options What is the volume of the composite figure?A. 140 cubic inchesB. 147 cubic inchesC. 168 cubic inchesD. 196 cubic inches How did the renaissance affect independent monarchs? Find the equation of quadratic function determined from the graph below? If a 2-kg block compresses a spring 800mm from its relaxed state, how much potential energy does the block have due to the spring? Assume the spring constant, k = 25 N/m. As longitudinal wave travel particles in the medium are pushed together and then pulled apart. we call this