What is the largest decimal value you can represent, using a 86-bit signed
integer?

Answers

Answer 1

Answer:

[tex]2^{85}-1[/tex]

Explanation:

Considering the number are stored using binary notations.

If there are total 86 bits and 1 bit is used as sign bit. Then in total one can have [tex]2^{85}[/tex] bit combinations since a bit can be either stored as 0 or as 1.

Therefore,  the largest number that can be stored will be [tex]2^{85}-1[/tex].

To understand it in better way let's scale down the problem to 3 bits representation. The largest number that can be stored using 3 bits is 111 which in decimal form is 7 and is equal to [tex]2^{3}-1[/tex].


Related Questions

What does adding AND to a search query do

Answers

Answer:

Adding AND to a search query provides the search results based on conditions imposed on both side of AND.

Explanation:

AND is often used in search queries to filter the search results based on multiple conditions.

Let's illustrate the working of AND using following example.

Consider the student table shown below.

Now consider the following query is run on student table.

Select *

From Student

Where Marks > 50 AND Age >15;

Since here AND condition is used in Where clause. Therefore,  search result will include all those tuples in which the marks value is more than 50 and along with that the age value is more than 15.

Thus the result of above query will be as follows:

Answer:

Widens the search

Keith has to carry out a photo shoot to capture images of the ocean during the monsoons. What is a recommended practice when shooting in these conditions? A. place absorbent chemical packets in the camera cover B. keep the camera in direct sunlight C. place the camera next to the vent of an air conditioner D. avoid placing the camera in its case

Answers

Answer:

Answer is A: place absorbent chemical packets in the camera cover

Explanation:

Keith is required to carry adequate gear while going for a shoot. And in this case, he should carry anything that will protect his camera from the ocean and rainwater. By anything, I mean anything that Keith will use to stay dry. Using an air conditioner would be the worst idea. An air conditioner might blow the air towards your camera. Placing the camera in its case will ensure that it is dry and Keith will keep on shooting. Placing absorbent chemical packets in the camera cover will ensure that any water droplets that might fall on the cover of the camera will be absorbed. The point here is to keep dry.

Choose the correctly written sentence.
Being naturally shy, the prom was an occasion for Melissa to avoid.
Since Melissa was naturally shy, the prom was an occasion to avoid.
The prom was an occasion to avoid, being naturally shy.
None of the above

Answers

Answer:

i would say the first one

Explanation:

Answer:

Being naturally shy, the prom was an occasion for Melissa to avoid

Explanation:

Describing a person or thing before relating him/her to the reason for his or her action that is to be taken or will be taken in future is the best way to start a sentence that involves Action and reasons behind an action.

The first sentence is complete because it describes Esther talks about the occasion and talks about the action she should take. it is also a correctly written sentence. unlike other sentences that either lack completeness or is wrongly constructed.

what does a equal3/2 a - 13 =5​

Answers

Answer:

(3/2)a =18

3a = 36

a = 12 is the solution

how to find determinant of ​

Answers

Some proteins must be altered before they become functional.

To find the determinant of a 2x2 matrix [[a, b], [c, d]], you can use the following formula:

det = ad - bc

Simply multiply the elements on the main diagonal (top-left to bottom-right) and subtract the product of the elements on the other diagonal (top-right to bottom-left).

This straightforward formula applies specifically to 2x2 matrices and provides a quick method for determining their determinant.

The Complete Question

Explain how to find the determinant of a 2x2 matrix.

the part of the computer that provides acess to the internet is called?

Answers

Answer:

Modem is an hybrid device, which is responsible for modulating and demodulating information. It is a transmission medium and also it is a hardware tool used for connecting to internet.

Explanation:

What is modulation?, let us understand. The process of converting analog to digital signal is called modulation and demodulation is vice-versa. The computer connects internet classically using telephone wire.

The telephone wire understands only analog signal and a computer understands only digital signal. So Modem’s role is to take care of this aspect while connecting to the internet.

HELP PLZ !!
In JavaScript, which operator returns the data type of the data it acts upon?
In JavaScript, the
operator returns the data type of the data it acts upon. If the operand is numeric, this operator returns 'Number.'

Answers

Answer:

typeof  operator returns the data type of the data it acts upon

Explanation:

“typeof” is a operator in javascript which “returns” the “data type” of the given data.

For eg:

<script>

document.write(typeof  “John” )

document.writeln(typeof new Date();

document.writeln(typeof 10+20);

document.writeln(typeof 20.4);

document.writeln(typeof function(){});

</script>

The above code is a sample javascript code to explain “typeof” operator. As per the program the first line returns “String”, second returns “date”, third line returns integer”, the next line returns “float” and the last line returns “function”. So, from this we can “conclude” that the “typeof” operator returns data type.

Answer:

typeof

Explanation:

trust me

Please Help ASAP!!
Which ways can you access the controls for headers and footers? Check all that apply.
-in the Print menu
-in the Review tab
-in the Page Layout view
-in the Design contextual tab
-right-clicking on any cell

Answers

While a report is open, File > Page Setup gives you access to the document that manages all of your report headers and footers. Click Customize for the Header/Footer document located on the General menu after selecting File > Page Setup. Thus, option A, C, D is correct.

What ways you access the controls for headers and footers?

Typically, headers and footers include information about the document, such as the file name, author, creation date, page numbering, and so forth.

You can include photos, page numbers, dates, times, sheet names, file names and paths, and more when you modify your header or footer. See Headers and footers in Word for further information on headers and footers.

Therefore, The reader can quickly explore the document because this information is repeated on each page.

Learn more about headers here:

https://brainly.com/question/4637255

#SPJ3

question 14. (3.04 MC) how does the project manager evaluate the scope of a project

Answers

Scope of a project:

A project manager should always be clear with all the managerial and technical requirements of a project.

The project manager should set the goals and objective of a project. The project manager should use SMART guidelines to confirm the objective and goals of a project. The project manager should know the whole description of the project. The project manager must know the expectation of the end users. The project manager must recognize the limitations in achieving the goals of the project.The project manager should keep on get the feedback and do the required changes to make the project successful.

The project manager evaluates the project scope through a detailed plan that includes the required work, regular review of project value, and comprehensive communication with stakeholders. Evaluating the project scope is about managing expectations, aligning with organizational goals, and adjusting plans as needed.

The project manager evaluates the scope of a project through meticulous planning and continuous monitoring. An essential element of this evaluation is developing a comprehensive scope plan, which is shared with all team members. This plan not only details the required work to complete the project but also identifies work that is outside the project's boundaries. A key part of scope management is to manage stakeholder expectations clearly from the very beginning. This includes being transparent about the project aims and the methods of achieving them.

Throughout the project lifecycle, there is an emphasis on reviewing the project value and viability at regular intervals. Regular updates and communication with stakeholders, including sponsor/client and team members, are crucial to evaluate whether the project aligns with business goals and strategies. Adjustments are made as needed in response to these evaluations, with a focus on staying within the constraints of time, budget, and quality as determined during the planning process group. Risk management is a continuous concern, and a variety of approaches may be employed to address potential issues before and during project execution.

In summary, evaluating the scope of a project is a dynamic process involving defining the scope, managing expectations, communicating effectively, and continually reassessing project alignment with broader organizational goals. It requires the project manager to apply their skills and knowledge flexibly to the unique context of each project.

analyzing computer systems to gather legal evidence is known as the field of?

Answers

Answer:

Analyzing computer systems to gather legal evidence is known as the field of Computer forensics.

Explanation:

Computer forensics is that the application of investigation and analysis techniques to assemble and preserve proof from a selected machine in an exceedingly means that's appropriate for presentation in a court of law. Computer forensics is a branch of forensic science (forensics for short). Forensics is the scientific analysis of individuals, places, and things to gather proof throughout crime investigations, that helps to prove innocence or guilt in court.

Computer forensics generally referred to as digital forensics, features a similar purpose. However, it focuses on the scientific analysis of pc communications and therefore, the knowledge on memory board devices, like disks and CD-ROMs.

Which of the following is required when operating a cutting or grinding machine?

Answers

Answer:

?

Explanation:

we need the options.

there is no following so i am confused lol

Explanation:

what does raster graphic mean

Answers

Raster graphics are digital images created or captured (for example, by scanning in a photo) as a set of samples of a given space. A raster is a grid of x and y coordinates on a display space. (And for three-dimensional images, a z coordinate.)

In addition to using comments and track changes, you can also use the comparison feature for reviewing documents. In this activity, assume that you are reviewing an edited document with its original version. Research the steps for comparing the documents and write down the steps.

Answers

Answer:

Click on Review Tab=>Compare  is the right answer.

Explanation:

Select document 1 that is original document (from the Original document drop down menu). Alternatively you can use “Compare document” dialog box and browse to select the desired document.

Select the “Revised document” menu to select the revised document. Alternatively you can use “compare document” dialog box to browse and select the document.

Click on more button to see all the features / options in the “compare dialog box”

When everything is done click on OK button.

Compared document appear in the middle, original and compare documents appear on the right, revision appears on the left side.

Answer:Open the edited document.

Select the Edit menu and then select Compare Document.

In the Insert dialog box, browse to the original document.

Select Insert.

The program shows all the differences in the Accept or Reject Changes dialog box.

To accept a change, select the Accept button.

To ignore a change, select the Reject button.

To accept all changes in the document, select the Accept All button.

To ignore all changes in the document, select the Reject All button.

Explanation:Its the sample answer

Invention I chose was radio.

1. What’s the made out of?

2. Describe it. (Details about the invention)

3. Has the need for this invention changed over the years?

4. Why was this invention so important and necessary?

5. Is there anything else that’s interesting about your invention?

Answers

Answer:

1. Today's radio consists of an antenna, printed circuit board, resistors, capacitors, coils and transformers, transistors, integrated circuits, and a speaker. All of these parts are housed in a plastic case. An internal antenna consists of small-diameter insulated copper wire wound around a ferrite core.

4 + 2. Whether it's hearing familiar songs, jamming out to today's latest hits, getting critical information during a disaster, the latest news, or learning about important events in the community, consumers trust their favorite radio stations and personalities to get them the information they need when they need it.

3. The Changes to Radios over the last 100 years. Radios have been one of the more important technological devices for more than a century. ... For this era, the radio technology was limited to communications with ships in case of an emergency. In 1907, the first commercial transatlantic radio service was created.

5. Guiglielmo Marconi sent the first ever radio transmission in 1896, so he's considered "the father of radio."

AM stands for Amplitude Modulation and FM stands for Frequency Modulation.

KDKA in Pittsburgh, Pennsylvania was the world's first commercial radio station.

Explanation:



What conclusion can you draw from the scenario below?
You are working on a long, detailed report for your company. Before you go to lunch, you save the report to a network
drive. While you are at lunch, there is a power outage in the office. When power is restored, you find your report is the
same as it was when you saved it.
The network drive cannot have its data deleted.
The network drive has a tiered cache system.
The network drive is connected to its own power source
The network drive is a nonvolatile storage device.

Answers

Answer:

d) The network drive is a nonvolatile storage device.

Explanation:

You are working on a long, detailed report for your company. Before you go to lunch, you save the report to a network  drive. While you are at lunch, there is a power outage in the office. When power is restored, you find your report is the  same as it was when you saved it. To draw any conclusion, we have to look at each option specifically.

a) The network drive cannot have its data deleted.

It can be one of the the conclusions. However, generally when you store data on network drive. It has the option to edit or delete the data from the drive. Therefore, this statement is not exactly true. False

b) The network drive has a tiered cache system.

Cache is generally used to hold data or copy of a data to serve the next request faster. However, it generally get removed with the power outage. Therefore, this option is also false.

c) The network drive is connected to its own power source

Maybe this could be true. However, this option focus on the network drive can only store data when it is connected to power source. That statement is false in network drive scenario.

d) The network drive is a nonvolatile storage device.

The simple definition of a nonvolatile storage is a storage that has the capacity to store/save the data even in the presence of power outage. The same case is followed here like you have stored the data and now it is present there even in case of outage. Therefore, this option is true.

DRIVER ED
Motorcyclists are easily hidden in large blind spots and the exposed rider is in constant danger.

A.true
B.false

Answers

This is true. Motorcycles are much smaller than cars and therefore more easily can slip into a blind spot. Motorcyclists also have less protection than other drivers and would likely suffer more injury in a collision.

Answer: True because motorcyclists can be not seen by a car that the bike is traveling up against unless the person is a GOOD driver and knows how to pay attention to their surroundings!

So its like a 50/50 True and False but most likely True

1. How do channels differ from layers?

Answers

Answer:

There are 5 channels

Explanation:

Which graphic design tool allows you to lay images on top of one another? A. Layers B. Selection C. Drawing D. Color

Answers

Answer:

A. Layers

Explanation:

Answer:

The Layers tool

Explanation:

I had photography class and we did all this


How is the development of SaaS related to cloud computing?

Answers

Final answer:

SaaS is a model where software is hosted by a third-party provider and accessed over the internet as part of cloud computing services. Cloud computing has fostered the growth of SaaS by providing scalable, accessible, and cost-effective software solutions with security measures such as in-transit encryption.

Explanation:

The development of SaaS, or Software as a Service, is intricately related to cloud computing. SaaS is a software distribution model in which applications are hosted by a third-party provider and made available to customers over the internet. This is a core aspect of cloud computing which encapsulates the delivery of services over the web, enabling users to access and use software without having to worry about installation, updates, or maintenance. With the evolution of cloud computing, SaaS has become a preferred method for businesses and individuals to use applications, as it offers scalability, accessibility, and cost savings. The cloud provides a centralized location for data storage, and with the right security measures such as in-transit encryption, it ensures that data is protected from unauthorized access or compromise.

Final answer:

The development of SaaS is related to cloud computing as it involves delivering software applications over the Internet and leveraging the infrastructure and platform provided by the cloud.

Explanation:

The development of SaaS (Software as a Service) is closely related to cloud computing. SaaS delivers software applications over the Internet, allowing users to access and use the software remotely without needing installation or maintenance on their own devices. This cloud-based approach to software delivery aligns with the concept of cloud computing, which involves storing, managing, and accessing data and resources over the Internet through remote servers.

Cloud computing provides the infrastructure and platform for SaaS providers to offer their software applications to users. With cloud computing, SaaS companies can utilize the cloud's scalability, flexibility, and cost-effectiveness to deliver their applications to a wide range of users. The cloud provides the necessary resources, such as servers, storage, and network infrastructure, to host and run SaaS applications, ensuring reliable and secure access for users.

to create a formula in______, you would first click in one of the cells​

Answers

Answer:excel

Explanation:

Answer:

To create a formula in Excel  you would first click in one of the cells​

Explanation

Excel is basically calculator with advanced features. It allows the user to enter data in the form of rows and columns and enable to user to perform different kinds of calculation. It has built-in formulas and also certain conditional operation which makes the software to get the best out of it.

The user can also use the macro feature to write macro programs. Some of the common formula used are “Sum(Range), all the other basic operations like addition, multiplication, subtraction, etc.

According to many experts, how often should files be backed up?
Once a month
Once a year
Once a week
Daily

Answers

Answer:

If I am an expert (which I'm not) I would say once a month.

Explanation:

Well... I backup my computer once a year but that's cause I am lazy. I would recommend that people backup there computers once a month. It also seems to be reasonable.

Answer:

Daily

Explanation:

Find the error in the following pseudocode. Module main () Call raiseToPower (2, 1.5) End Module Module raiseToPower (Real value, Integer power) Declare Real result Set result=value^power Display result End Module

Answers

Answer:

Call raiseToPower (2, 1.5) '

or

raiseToPower (Real value, Integer power)

Explanation:

To solve this, first organize the pseudo code,

1) main ()

2) Call raiseToPower (2, 1.5)

3) End Module

4) Module

5) raiseToPower (Real value, Integer power)

6) Declare Real result

7) Set result=value^power

8) Display result

9) End Module

The first three lines in pseudo code are representing the main module. While lines 4-9 shows the definition of module that is being called in main function.  

If we look at the raiseToPower definition at line5, we can see that it is requiring any real value for the base number. However, for power, it defines only integers.

But, in the main function, 1.5 is placed as a power that is not an integer. Therefore, this is the error in pseudo code. It should be changed to any integer.

Alternatively, change the integer power to real power to avoid this error.

Final answer:

The error is that the 'raiseToPower' Module expects an Integer for the second parameter but receives a Real number (1.5) instead.

Explanation:

The error in the provided pseudocode lies in the datatype mismatch between the parameters accepted by the raiseToPower Module and the arguments passed to it from the main Module. The raiseToPower Module expects an Integer as the second parameter, but it is being called with a Real number (1.5) in the main Module. To fix this issue, the raiseToPower Module should be modified to accept a Real datatype for the power parameter, aligning with the type of the argument being passed.

A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Which operating system should the corporation choose?

Answers

The corporation have variety of choices based on requirement and the financial affordability to use the operating system.  

1. Microsoft windows: It is user-friendly and one of the widely used Operating system. This is GUI (Graphical user Interface) Operating System. But the corporation needs to pay for licence to the Microsoft company.  

2. Unix / Linux: This is once again GUI based and one of the widely used Operating System. This is a free ware. This is also an Open Source where the programmers keep updating the feature.  

3. MS-DOS: This is one of classical operating system which has Character User Interface. User needs to remember so many commands to work with it and it will not suit for the given situation

Answer:

gui

Explanation:

Who assesses the work quality produced by web, UI, and UX designers?
art director
design director
project manager
system administrator

Answers

Answer:

Hi, that would be the design director.

Explanation:

Final answer:

Assessment of work quality for web, UI, and UX designers is carried out by leadership roles within a company such as art directors, design directors, or project managers, who ensure the design aligns with user needs and project objectives.

Explanation:

The work quality produced by web, UI, and UX designers is often assessed by professionals holding leadership or managerial positions within the development team or the organization. Depending on the company structure and project complexity, this task can fall to various roles, including the art director, design director, or project manager. These individuals are responsible for evaluating the effectiveness of the design in fulfilling user needs, ensuring that the visual and interactive aspects adhere to the project's goals and standards, and align with the overall strategy.

Art directors are generally in charge of the overall visual style and how it communicates the brand's goals. Design directors specifically oversee the design team, focusing on strategy, process improvements and ensuring design quality meets company standards. Meanwhile, the project manager is typically responsible for the project's successful execution, including time management, budget, and quality, making sure the design aligns with the project's objectives.

It is essential for web and design projects to not only be visually appealing but to also perform their function efficiently, engaging users with thoughtful interaction design and an intuitive user experience. Tools and techniques such as site maps, wireframes, storyboarding, and UML can greatly assist in developing these effective designs.

which evaluation factor will be most important when choosing technology for the company

Answers

Answer:  They are a lot of them

Explanation:

Getting to know the people not to personally

Be a Listener and Know when to shout

Use Wisdom before speaking and Knowledge

Encourage people some times in a month or week  

Which statement below is not true of EFS

Answers

Statements that do not apply to EFS are statements that EFS cannot store files encrypted.

Further Explanation

Encrypting File System or EFS is a core technology (in Windows 2000, XP Professional, and Windows Server 2003) that allows encrypted file storage in a volume formatted using the NTFS file system.

Version of Windows that supports EFS

Windows 2000 Family: Windows 2000 Professional, Windows 2000 Server, Windows 2000 Datacenter Server, and Windows 2000 Advanced Server Windows XP Family: Windows XP Professional, Windows XP Professional 64-bit Edition, Windows XP Professional x64 Edition Windows Server 2003 Family: Windows Server 2003 Standard Edition, Windows Server 2003 Enterprise Edition, Windows Server 2003 Datacenter Edition Windows Vista Family: Windows Vista Business Edition, Windows Vista Enterprise Edition, Windows Vista Ultimate Editon Codenamed Longhorn Windows Server family: Longhorn (all beta versions, as of April 2007, reaching Beta 3 version)

EFS uses several cryptographic algorithms, which are as follows:

Data Encryption Standard eXtended (DESX) Triple Data Encryption Standard (3DES) Advanced Encryption Standard (AES) Rivest, Shamir, Adleman (RSA)

Learn More

About Software brainly.com/question/11950006 Type of Data brainly.com/question/10762715

Details:

Grade: Middle School

Subject: Computers and Technology

Keyword: Software, Windows, Encryption, EFS

Which statement below is not true of EFS is EFS cannot store files encrypted.

Explanation:

The Encrypting File System (EFS) is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. EFS is useful for mobile computer users, whose computer are subject to physical theft, and for storing highly sensitive data. Encryption itself is the method where the information is converted into secret code that hides the information's true meaning

Encrypting File System (EFS) is used to encrypt files and folders. EFS is easy to use, with nothing more than a check box in a file’s properties. It is not fully supported on Windows 7 Starter, Windows 7 Home Basic, and Windows 7 Home Premium.

EFS uses several cryptographic algorithms as follows:

Data Encryption Standard eXtended (DESX)Triple Data Encryption Standard (3DES)Advanced Encryption Standard (AES)Rivest, Shamir, Adleman (RSA)

A cryptographic algorithm is a set of well-defined but complex mathematical instructions used to encrypt or decrypt data. There are three main types of cryptographic algorithms:

(1) secret key(2) public key(3) hash functions

There are two basic types of cryptographic systems such as symmetric (private key) and asymmetric (public key).

Hope it helps!

Learn more about encrypting   brainly.com/question/12742104

#LearnWithBrainly

Which of the following is not an advantage to using a web hosting provider?

Answers

Answer: D. It delivers more information about key terms to search engines to increase website marketability.

Explanation: In order for a website to be on a search engine your website has to be online and up and running for the Web Crawlers to find it. In addition if you host your own website on your own server you can put in the same keywords as you would do usually and get around the same result.

It delivers more information about key terms to search engines to increase website marketability. Option B

Who is a web hosting provider?

A web hosting provider is a company or service that offers the necessary infrastructure and resources to make websites accessible on the internet. They provide the technology and server space required to store website files and make them available to users worldwide.

The web hosting provider does not deliver more information about key terms to search engines to increase website marketability.

Learn more about web hosting provider:https://brainly.com/question/34238289

#SPJ2

There are many different types of hardware devices, different manufacturers, and countless configuration possibilities. Explain why all these combinations of devices, manufacturers, and configurations are able to work together without requiring additional work on the part of technicians.

Answers

Because, they are all required to configure to it to be recognized by an operating system.

Explanation:

It is the Operating System Software that instructs the hardware and puts them together to work well. When the manufacturer does not configure the device to be recognized by an operating system, then it will not work with other components.

Example.

If an Apple machine's sound card is being put in an HP machine which uses Microsoft designed operating system, won't work due to the operating system that the sound card has been designed for.

Select the correct answer.
What is the economic term used for sustained increase in the price of goods and services?
A
inflation
B. depression
C.
recession
D.
deflation

Answers

Answer: A) Inflation

Explanation:

Answer:

The economic term used to describe a period of sustained increase in the prices of goods and services is called inflation.

Explanation:

Inflation is characterised mainly by a general increase in the prices of goods and services and a reduction in the currency's purchasing power.

hope this helps

What color model is used by computer monitors

Answers

Answer:

rgb

Explanation:

i mean red, green, blue

Other Questions
The sum of a number and its additive inverse is equal to ? please help.Alain et Chantal ont beaucoup aim leur sjour la Martinique et ils disent une amie qu'ils ont dj vu ces endroits et qu'ils les reverraient volontiers.example: la montagne Pele (nous)Nous avons vu la montagne Pele et nous la reverrions volontiers. 1. d'normes poissons (tu)2.la fort tropicale (je)3.le march (Alain)4.les plages (vous) Fill in the table so it represents a linear function. PLZ HURRY IT'S URGENT!!The product of a number and 3 is 6 more than the number.Which equation models this sentence?n 3 = n + 6n 3 + 6 = nn 3 = n + 6n 3 + n = 6 Which organism is able to cause an infection?(A) bacteria(B) skin cell(C) white blood cell(D) red blood cell Prove that for all x and y in Z, x +3y is a multiple of 7 iff 3x +2y is a multiple of 7. Might be helpful to calculate 2(3x +2y)+(x +3y) and/or 4(x +3y)+(3x +2y). the ordered pairs(1,4), (3,12), and (5, 20)represent the distance y that Jario walks after x seconds. Plot the ordered pairs on the coordinate plane and drawn a line through the points and find the slope of the line and explain what the slope represents. Perform 4.629 + 78.2 - 57 With appropriate number of significant figures Evaluate 6-(5-(32-3)) A set of stairs is being built as shown. The length of each stair is 11 inches. What is the rise, r, for each stair? Round to the nearest inch.2 inches7 inches17 inches24 inches Normal atmospheric pressure is 1.013 105 Pa. The approach of a storm causes the height of a mercury barometer to drop by 27.1 mm from the normal height. What is the atmospheric pressure? (The density of mercury is 13.59 g/cm3.) Water drips from the nozzle of a shower onto the floor 181 cm below. The drops fall at regular (equal) intervals of time, the first drop striking the floor at the instant the fourth drop begins to fall. When the first drop strikes the floor, how far below the nozzle are the (a) second and (b) third drops? "Sales and catering system provides an organized system of maintaining detailed information to help salespersons keep track of whom to contact and when to solicit business as well as a means for organizing daily tasks, including personal sales calls and follow-up visits." Based on the given statement, which function of sales and catering systems is referred to? Write a void function using two type int call-by-reference parameters that swaps the values in the arguments. Be sure to include testable pre and post conditions. . in c++, what happends when i add 1 to the RAND_MAX then take rand() deivded by (RAND_MAX+1)?if my purpose is to take out a random number within 0=< and = A sample of pure water is heated to a temperature of 112 C at a pressure of 20 MPa, where the ionization constant for water is 4.0 x 1012. What is the OH concentration in the pure water at these conditions? As _____ left the Constitutional Convention in 1787, a woman stopped him. "What kind of government have you given us?" she asked. He responded, "A republic, madam: if you can keep it." translate these to Spanish then vice versa. please no google translate you dont have to do the all but number them1. i dont smoke it2. do you smoke it?3. they are smoking it4. she smokes it5. we dont smoke it6. he smokes it----------------------------------------------7. lo aguanto ustedes?8. quien lo paga?9. lo paga ustedes?10. el lo paga11. cuando me llamas?12. el no me llama13. ellos me llaman14. no lo llamo15. no quedo en hacerlo16. queda ustedes en decirlo?17. ella queda en hablar18 quedamos en bailar19. por que no quedas en comer?20. no te contesto21. ella no me contesta 22. cuando me contestas?23. ellos no te contestan no te contestamos The sum of two numbers is 72 and one of them is five times the other What is the Main idea of the speech is it a crime for a citizen of the United States to vote by Susan B.