What is wrong with the following code? How should it be fixed?

1 public class H2ClassH {

2 final int x;

3

4. int H2ClassH () {

5 if (x == 7) return 1;

6 return 2; 7 } // end 8 } // end class H2ClassH

Answers

Answer 1

Answer:

Final variable x is not initialized.

Explanation:

In this JAVA code we have a final variable named x.The thing with final variable is that they act like constants in C++.Once initialized cannot be changed after that and we have to initialize them at the time of declaration.

In JAVA if we do not initialize the final variable the compiler will throw compile time error.Final variables are only initialized once.


Related Questions

. What is meant by the term three tier architecture.?

Answers

Answer:

  The three tier architecture is based on the client and server architecture. It is basically maintain the independent module on the individual platform.

In the three tier architecture, it include various functional process, data computer storage and the user interface are basically developed in this architecture.

The three tier architecture are:

Presentation layerApplication layerData layer

Broker Ray is closely acquainted with the Subdivision Heights neighborhood of his town. Over the year, Ray has made it a practice to contact homeowners in person and also to send them quarterly mailings. This method of finding listings is known as:

Answers

No multiple choice?

Which of the following is NOT a MySQL table storage engine?
(a) Blackhole
(b) SuperNova
(c) MyISAM
(d) MRG_MyISAM
(e) InnoDB

Answers

Answer:

(b)Supernova.

Explanation:

MYSQL storage engines are software modules that are used by the database management systems to read,update,create from a database.

There are basically two types of storage engines Transactional and Non-Transactional.

Among the names engines provided all of them are MYSQL storage engines except supenova.

The technology which is not a MySQL table storage engine is: B. SuperNova

What is MySQL?

MySQL can be defined as open-source relational database management system (RDBMS) that was designed and developed by Oracle Corporation in 1995. Also, MySQL was developed based on structured query language (SQL).

In Computer technology, there are various storage engine that are designed and developed for use in MySQL table and these include the following:

BlackholeMyISAMMRG_MyISAMInnoDB

However, SuperNova is not a MySQL table storage engine.

Read more on MySQL here: https://brainly.com/question/24443096

Explain the ‘PDCA’ for quality assurance.

Answers

Answer: PDCA is the known as plan-do-check-act is the cyclic technique in which the methods of planning , doing ,checking and acting upon it is carried out in the business management field.This approach is used for achieving solution to any particular problem.

It measures the improvement, updating methods of working and process of the business management. PDCA also eliminates the mistakes and error that reoccur.These factors evaluates about the quality of the business management process and hence quality is assured.

When using _____, developers are required to comply with the rules defined in a framework. (Points : 2) inheritance
base classes
object-oriented constructs
contracts
None of the above

Answers

Answer: Contracts

Explanation:

The contract is the mechanism which is basically used by the developers to follow the set of rules that is defined in the framework with the proper specification in the API ( Application programming interface).

The contract is the proper agreement between the two and more developers so that they must follow the rules that is mentioned in the agreement contract.  

The contract is widely used in the software development process in which all the possible design requirement are mentioned according to the needs of the client.

Therefore, Contract is the correct option.

If the code in a method can potentially throw a checked exception, then that method must:

a.)handle the exception

b.)have a throws clause listed in the method header

c.)neither handle the exception nor have a throws clause listed in the method header

d.)either handle the exception or have a throws clause listed in the method header

Answers

Answer:

d.)either handle the exception or have a throws clause listed in the method header

Explanation:

A checked exception that can be thrown in a method , necessarily needs to be handled in the method in one of the two ways:

Handle the exception in codeHave a throws clause in method header

For example, let us see both:

a)

public void mymethod(){

// Exception handling using try/catch block

  try{

  }

  catch ( IOException e){

  }

}

b)

public void mymethod() throws IOException{

   // Exception in the throws clause

}

Name three "Hints" for computer systems design.

Answers

Answer:

The three hints for the computer system design is that:

Implementation is the important key feature while designing the computer system design. It also implement new application of the software and also help in the structure analysis and data modeling in the organization. Planning is efficient way for computer system design as it help the organization to understand the proper software architecture and modules. Performance should be good, efficient and useful for the computer system design and it increase the capability of fault tolerance in the computer system.

The jackpot of a lottery is paid in 20 annual installments. There is also a cash option, which pays the winner 65% of the jackpot instantly. In either case 30% of the winnings will be withheld for tax. Design a program to do the following. Ask the user to enter the jackpot amount. Calculate and display how much money the winner will receive annually before tax and after tax if annual installments is chosen. Also calculate and display how much money the winner will receive instantly before and after tax if cash option is chosen.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

int main()

{

// variables

   double jack_amount;

   int choice;

   double before_tax, after_tax;

   cout<<"Please enter the jackpot amount:";

// read the amount

   cin>>jack_amount;

   cout<<"enter Payment choice (1 for cash, 2 for installments): ";

// read the choice

   cin>>choice;

// if choice is cash then find the instant amount before and after tax

   if(choice==1)

   {

       before_tax=jack_amount*.65;

       after_tax=(jack_amount*.70)*.65;

       cout<<"instantly received amount before tax : "<<before_tax<<endl;

       cout<<"instantly received amount after tax : "<<after_tax<<endl;

   }

// if choice is installments then find the each installment before and after tax

   else if(choice==2)

   {

       before_tax=jack_amount/20;

       after_tax=(jack_amount*.70)/20;

       cout<<"installment amount before tax : "<<before_tax<<endl;

       cout<<"installment amount after tax : "<<after_tax<<endl;

   }

return 0;

}

Explanation:

Read the jackpot amount from user.Next read the choice of Payment from user.If user's choice is cash then calculate 65% instantly amount received by user before and after the 30% tax.Print both the amount.Similarly if user's choice is installments then find 20 installments before and after 30% tax.Print the amount before and after the tax.

Output:

Please enter the jackpot amount:120

enter Payment choice (1 for cash, 2 for installments): 1

instantly received amount before tax : 78

instantly received amount after tax : 54.6

When passing data values between different machines with different operating systems what problems have to be solved?

Answers

Final answer:

When passing data values between different machines with different operating systems, several problems need to be solved, including file compatibility, encoding and character sets, and network connectivity.

Explanation:

When passing data values between different machines with different operating systems, there are several problems that need to be solved:

File Compatibility: Different operating systems may have different file formats and structures, making it difficult to open and read files created on one system on another system. For example, a file saved in a specific format on a Windows machine may not be compatible with a Mac machine.

Encoding and Character Sets: Different operating systems may use different encoding and character sets, which can lead to garbled or incorrect data when transferring files. For example, a file containing special characters in one encoding system may not be correctly interpreted by another system.

Network Connectivity: Transferring data between machines with different operating systems may require establishing compatible network connections and protocols. This can involve configuring firewalls, setting up appropriate network protocols, and ensuring both machines can communicate effectively.

To address these problems, various software and tools are available that enable file conversion, encoding conversion, and network compatibility. Additionally, establishing good communication channels and protocols between machines is essential for successful data transfer.

Add a single line comment same as before that states you are doing calculations.

Answers

Answer:

//  you are doing calculations.

Explanation:

Here we add the single line comment i.e you are doing calculations by // forward slash. If you are making a comment more then the single line its better to use /* comments statements */.

For example:  

/* print welcome on screen  

print in nextline */

Following are the program in c++ language.

#include<iostream> // header file

using namespace std; // namespace

int main() // main method

{

int a=9,b=89; // variable declaration

//  you are doing calculations.

 int c=a+b;  

  cout<<c; // display c

   return 0;

}

Output:98

In rolling a die four times, what is the odds that at least one 5 would appear?

Answers

Answer:

The probability that at least one 5 will appear in 4 rolls of die equals [tex]\frac{671}{1296}[/tex]

Explanation:

The given question can be solved by Bernoulli's trails which states that

If probablity of success of an event is 'p' then the probability that the event occurs at least once in 'n' successive trails equals

[tex]P(E)=1-(1-p)^{n}[/tex]

Since in our case the probability of getting 5 on roll of a die equals 1/6 thus we have p = 1/6

Applying the values in the given equation the probability of success in 4 rolls of die is thus given by

[tex]P(E)=1-(1-1/6)^{4}=\frac{671}{1296}[/tex]

Companies discourage their suppliers from joining their extranets.

True

False

Answers

Answer:

False

Explanation:

A controlled private network that can be used for information exchange by using internet technology and the telecom system of the public.

It allows the outside user with authentication to partially access the network for business information exchange securely.

Thus companies encourage the suppliers to use extranets to share information or operations related to a business so as not to lag behind in the technologically competitive era.

Companies actually encourage their suppliers to join their extranets as it can streamline communication, enhance collaboration, and improve efficiency in the supply chain. The statement is false.

Extranets are secure networks that extend internal company resources to external parties like suppliers, enabling shared access to information and data.

However, many companies may not actively encourage suppliers to join their extranets due to concerns over data security, privacy, and the complexity of managing external access.

Analyze the impact of economic factors on the development of IT strategy decisions at the enterprise level of the organization.

Answers

Answer:

 The unstable economical factor affect on the development of the IT strategies. The economical condition also vary with the results which is basically depend upon the company product and services.

Due to weak economical factor, it become risky to the business in terms of economical growth, inflation rate and interest rate as these all are very important during the decision making process.

The economical factor are basically interlink with the political factor also. Interest rate also play an important role in the economical factor as it help in the growth and development of the company.

 

Answer and explanation:

Economic factors are those who influence the fluctuations of the economy. Among those factors we can identify interest rates, tax rates, law, policies, wages, and governmental activities. At the corporate level, in the Information Technology industry as in any other, those factors determine what decision entrepreneurs will take to conduct their businesses. Indirectly what investment managers will decide to choose, what the salary of the employees will be, what the size of production could be, and to what market the product could be offered.

[What is an ‘inspection’?

Answers

Answer:

 The inspection is the process where the trained people inspect or check the important documents and design thoroughly. The main function of the inspection is to check the proper quality of the document and design by the process analyzing, testing and examining.

Inspection basically provide various benefits as it increase the quality of the system by examine properly so that the document must be error free.

Inspection is required in all the workplace so it help to increase the productivity and efficiency of the organization.

Java uses a right brace to mark the end of all compound statements. What are the arguments for and against this design?

Answers

Explanation:

The argument is for the right braces.The right braces are used for simplicity.The right brace always terminates a block of code or a function.

The argument against right brace is that when we see a right brace in a program,we are not obvious about the location of the corresponding left brace because all or multiple  statement end with a right brace.

Final answer:

Java's use of right braces to end compound statements ensures clear visual demarcation and structured code. However, it can also introduce syntax errors if not used correctly and limits coding style flexibility. The strict syntax provided by braces can be beneficial in preventing logic errors, especially when used with consistent indentation and statement-ending semicolons.

Explanation:

Using a right brace { } in Java to mark the end of compound statements is a design choice with its own set of pros and cons. One of the arguments in favor of this approach is the visual clarity it provides. With braces, it is immediately evident where a block of code begins and ends, which can be especially helpful with nesting multiple layers of logic and scopes within each other. Proper use of braces in conjunction with consistent indentation practices can greatly enhance the readability of the code.

On the other hand, there are some arguments against the obligatory use of braces, primarily focused on the potential for errors and the rigidity it imposes on coding style. For instance, if a programmer forgets to include a closing brace or places it incorrectly, it can lead to a syntax error. Furthermore, this requirement enforces a certain structure which might reduce the flexibility that programmers have in laying out their code, as seen in languages like Python which uses indentation rather than braces to denote blocks of code.

Additionally, in languages like JavaScript, omitting braces for single-line control structures is permissible, which can lead to more concise code but also introduces the potential for inconsistently coded programs and harder to detect logical errors. Therefore, while using braces imposes a strict syntax, it can prevent some types of logic errors that might occur when they are optional. The use of semicolons (;) at the end of each statement is another syntactic rule that complements the use of braces, indicating the end of one statement and the start of another.

Which component in a desktop PC converts electricity from AC to DC?
-SSD
-CPU
-PCIe Slot
-Power Supply

Answers

Answer:

Power Supply

Explanation:

A power supply unit in a Desktop PC converts AC power from the mains to low-voltage DC power needed by the computer. The power supply, commonly referred to as the PSU, is the metal box usually found in the corner of the case connected to the power through a cord. The PSU uses the switcher technology to convert AC input to DC. The typical voltages used are 3.3, 5, and 12 volts.

Answer: power supply

Write an if-else statement with multiple branches. If givenYear is 2101 or greater, print "Distant future" (without quotes). Else, if givenYear is 2001 or greater (2001-2100), print "21st century". Else, if givenYear is 1901 or greater (1901-2000), print "20th century". Else (1900 or earlier), print "Long ago". Do NOT end with newline.

Answers

Answer:

// here is code in c.

#include <stdio.h>

// main function

int main()

{

// variable to store year

int year;

printf("enter year:");

// read the year

scanf("%d",&year);

// if year>=2101

if(year>=2101)

{

printf("Distant future");

}

//if year in 2001-2100

else if(year>=2001&&year<=2100)

{

   printf("21st century");

}

//if year in 19011-2000

else if(year>=1901&&year<=2000)

{

  printf("20th century");

}

// if year<=1900

else if(year<=1900)

{

  printf("Long ago");  

}

return 0;

}

Explanation:

Read the year from user.After this, check if year is greater or equal to 2101 then print "Distant future".If year is in between 2001-2100 then print "21st century".If year is in between 1901-2000 then print "20th century".Else if year is less or equal to 1900 then print "Long ago".

Output:

enter year:2018                                                                                                            

21st century

Answer:

if ( givenYear >= 2101 ) {

        System.out.print("Distant future");

     }

     else if (givenYear >= 2001 ){

        System.out.print("21st century");

     }

     else if ( givenYear >= 1901 ) {

        System.out.print("20th century");

     }

     else {

        System.out.print("Long ago");

     }

Explanation:

If you are looking at the OSI model Protocol Stack, what layer is the only layer with both a header and trailer?

Answers

Answer: Data-link layer

Explanation:Data link layer is the second layer of the OSI(Open system interconnection) that functions by managing the movement of the data/information into physical link. This layer encapsulates both header and trailer.

Header is  the part of data link layer that has the purpose of having control  data and its activities which are added at the start of PDU(protocol data unit)  like addressing .Trailer is the part that serves as containing the information of control which gets attached at the bottom part of the PDU

Given the following data definition
Array: .word 3, 5, 7, 23, 12, 56, 21, 9, 55

The address of the last element in the array can be determined by:

Array

Array + 36

36 + Array

Array + 32

40 + Array

Answers

Answer:

Array + 36.

Explanation:

The array contains the address of the first element or the starting address.So to find the address of an element we to add the size*position to the starting address of the array.Which is stored in the variable or word in this case.

There are 9 elements in the array and the size of integer is 4 bytes.So to access the last element we have to write

array + 4*9

array+36

What year was MCTC founded ? right answer 1996

Answers

Answer:

Minneapolis Community and Technical College was formed in February 1996

Explanation:

MCTC

Minneapolis Community and Technical College was formed in February 1996

this was Minneapolis Community and Technical College following by  july 1955 latter it was merger and become MCTC in 1966

and  

Chancellor of MCTC is Devinder Malhotra

and President is Sharon Pierce

it is situated at Minneapolis, Minnesota in  United States of America

Minneapolis Community and Technical College (MCTC) was founded in 1996. It was established to provide educational services to the community.

Founding Year of MCTC

MCTC, short for Minneapolis Community and Technical College, was founded in 1996. This college was established to serve the educational needs of the community, offering a wide range of associate degrees and certification programs. Since its inception, MCTC has grown significantly and continues to play a crucial role in higher education.

What is the purpose of a filename extension? How can you restore a file that you deleted from the hard disk?

Answers

Answer:

The main purpose of the file name extension is that in the operating system it basically helpful for knowing the actual name of the file which we want to open in the system. The file name extension is also known as file suffix and file extension.

The file name extension are the character and gathering of the given characters after some time period that making the whole name of the record in the file system.

It basically enables a working framework, such as Windows and mac operating system (OS), figure out which programming on our PC the document is related with the particular file.

We can easily restore our file from hard disk system by two main ways as follows:

We can easily recover our file from the computer backup. Checked your deleted file in the recycle bin and then restore it.

What types of tools are used in the process of a digital or network investigation?

Answers

Answer and Explanation:

The tools that are used in the network investigation process by the forensic departments in order to get better results while dealing with cyber crimes:

Some of the analysis tools are:

Tools for file analysisTools for Internet AnalysisEmail and Registry Analysis toolsDatabase and Network Forensic toolstools for analysis of mobile devices.File viewersTools  for mac Operating system analysis.Tools to capture datafirewallsEncryption of network

Like in encryption of the data is encoded by cryptographic codes at the transmitting end and then decoded at the receiving end securely.

What is the purpose of the "def" keyword in Python?

a) It is slang that means "the following code is really cool"

b) It indicates the start of a function

c) It indicates that the following indented section of code is to be stored for later

d) b and c are both true

e) None of the above

Answers

Answer:

d) b and c are both true.

Explanation:

The purpose of def keyword in python is to indicate start the function and it also indicates that the piece of code following the def keyword is to stored so that it can later be used in the program.

For ex:

def check(n):

   if n==10:

       return True

   return False

   

n=int(input("Enter an integer\n"))

if check(n):

   print("n is 10")

else:

   print("n is not 10")

In the above written code the function check is defined by using the keyword def.It also tells the interpreter to store the code because we will need it in future.

The correct option is (d) b and c are both true.

When The main purpose of the def keyword in python is to indicate the start of the function and also it indicates that the piece of code following the def keyword is to be stored so that it can later be used in the program.

Python

For ex:

After that def check(n):

Then if n==10:

Now the return True

return False

After that n=int(input("Enter an integer\n"))

Then if check(n):

Now, print("n is 10")

else:

print("n is not 10")

In the above-written code that is the function of the check is defined by using the keyword def. It also tells the interpreter to store the code because we will need it in the future.

Find out more information about Python here:

https://brainly.com/question/14492046

What is the fundamental difference between a fat-client and a thin-client approach to client server systems architectures?

Answers

Client server architecture

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

Examples

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

The clients interact with the server through the internet.

Clients can be either thin client or thick (fat) client.

The differences in them are described below.

1. Thin client, as per the name, performs minimal processing. Thick or fat client has the computational ability necessary for the client.

2. The thin client possesses basic software and peripherals and solely relies on the sever for its functionalities. Fat client has the resources needed to do the processing.

3. The user interface provided by the thin client is simpler and not rich in multimedia. The user interface provided by the fat client is much better and advanced.

4. Thin client relies heavily on the server. Fat client has low dependency on the server.

5. In the thin client set up, servers are present in more number. In this set up, servers are present in less number.

6. Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

Extended ACLs can filter traffic based on _____. (Points : 3) protocol type
source IPv4 address
source TCP or UDP ports
All of the above

Answers

Answer: All of the above

Explanation: Extended Access Control Lists(ACL) is the system that works between the Source IP address and the destination IP address for the granting or denying the permission for the traffic flow. This has very certain functioning and allow the traffic on the basis of the protocols such as TCP(transmission control protocol),UDP(user datagram protocol) etc.

All the given option are correct because IPv4(internet protocol version 4), TCP pots and UDP ports are the protocol types for source and can be filtered through extended ACL. Thus the correct option is all of the above.

Dеclarе and allocatе mеmory (on thе hеap) for a two-dimеnsional array of strings namеd carMakеs with 20 rows, еach with 6 columns

Answers

Answer:

string ** carMakes=new string*[20];  

   for(int i=0;i<20;i++)

   {

       carMakes[i]=new string[6];

   }

Explanation:

The above written piece of code is in C++ and it will declare and allocate memory on the heap for a 2-D array of strings with the number of rows 20 and number of columns 6 with name of the array carMakes.

To declare a 2-D array in C++ we use new keyword.

By defeaut, Excel cells are top aligned

a. True

b. False

Answers

Answer: True

Explanation:

Yes, the given statement is true that the by default the excel cells are basically aligned at the top. We can easily change the alignment horizontally and vertically in the cell.

In the excel we can change the alignment by selecting the particular cell and then, click on the options to select the particular tab to change the alignment of the cell. By default, the excel cell are aligned at the top and and the text are align at the left by default.  

Sammy's Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrellas to tourists. Write a program that prompts the user for the number of minutes he rented a piece of sports equipment. Compute the rental cost as $40 per hour plus $1 per additional minute. (You might have surmised already that this rate has a logical flaw, but for now, calculate rates as described here. You can fix the problem after you read the chapter on decision making.) Display Sammy's motto with the border that you created in the SammysMotto2 class in Chapter 1. Then display the hours, minutes, and total price. Save the file as SammysRentalPrice.java.

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

class SammysRentalPrice

{

// main method of the class

public static void main(String[] args) {

    // scanner object to read input from user

    Scanner s=new Scanner(System.in);

      // ask user to enter year

       System.out.print("Enter the rented minutes:");

       // read minutes

      int min=s.nextInt();

      // find hpurs

      int hours=min/60;

      // rest  of minutes after the hours

      min=min%60;

      // total cost

      int tot_cost=(hours*40)+(min*1);

      // print hours,minute and total cost

      System.out.println("total hours is: "+hours);

      System.out.println("total minutes is: "+min);

      System.out.println("total cost is: "+tot_cost);

     

}

}

Explanation:

Read the rented minutes of an equipment from user with the help of scanner object. Calculate the hours and then minutes from the given minutes.Calculate the cost by multiply 40 with hours and minute with 1.Add both of them, this will be the total  cost.

Output:

Enter the rented minutes:140

total hours is: 2

total minutes is: 20

total cost is: 100

Final answer:

To write a program that calculates the rental cost for Sammy's Seashore Supplies, you can follow these steps: Prompt the user for the number of minutes the equipment was rented. Convert the minutes to hours by dividing by 60. Calculate the rental cost using the formula: total cost = (hours * $40) + (additional minutes * $1). Display Sammy's motto with the border. Display the hours, minutes, and total price using appropriate formatting.

Explanation:

To write a program that calculates the rental cost for Sammy's Seashore Supplies, you can follow these steps:

Prompt the user for the number of minutes the equipment was rented.Convert the minutes to hours by dividing by 60.Calculate the rental cost using the formula: total cost = (hours * $40) + (additional minutes * $1).Display Sammy's motto with the border.Display the hours, minutes, and total price using appropriate formatting.

Here is an example code snippet in Java:

import java.util.Scanner;

class SammysRentalPrice {
  public static void main(String[] args) {
      Scanner scanner = new Scanner(System.in);
      System.out.print("Enter the number of minutes rented: ");
      int minutes = scanner.nextInt();

      int hours = minutes / 60;
      int additionalMinutes = minutes % 60;
      double rentalCost = (hours * 40) + (additionalMinutes * 1);

      System.out.println("Sammy's motto with border");
      System.out.printf("Hours: %d%n", hours);
      System.out.printf("Minutes: %d%n", additionalMinutes);
      System.out.printf("Total price: $%.2f%n", rentalCost);
  }
}

Remember to replace the motto and the border with the actual display. Also, make sure to add error handling and input validation as needed.

What is an independent data mart?

Answers

Answer: Independent data mart is the subset of data that is obtained from the data warehouse in independent form. Various traits are used for the display of the independent data marts.They are built in the independent manner from each other .

It is utilized by the organization for the analysis of the certain unit of data in compact form. Independent data mart does not persist the central data warehouse. The operational sources gets distributed in the independent section known as data marts. It is usually preferred by small organizations.

The data field in an ethernet frame contains between 46 and _______ bytes of information.

Answers

Answer: 1500 bytes

Explanation:

 In the ethernet frame, the data field basically contain 46 to 1500 bytes of information.  

The ethernet frame begins with the header, that basically contains MAC addresses source and its destination in the network, along with some other information. The center part of the given frame contain genuine information. The edge of the frame closes with the field known as Frame Check Sequence (FCS).

The tag information or data is also being added for creating the particular data field of the MAC client.  

Other Questions
Which observation can BEST be explained by the scattering of light Choose the adjective clause in the following sentence: The jeans that I want to buy are very expensive.to buyare very expensivethe jeans thatthat I want to buyI want In a sample of 1,600 registered voters, 912, or 57%, approve of the way the President is doing his job. A political pollster states: "Fifty-seven percent of all voters approve of the President." This statement is an example of a) A Sample b) Descriptive Statistics c) Statistical Inference d) A Population Cameron is the sales director for his Northeast companys region. This is an example of What is the slope of the line on the graph? A permeation membrane separates an inlet air stream, F, (79 mol% N2, 21 mol% O2), into a permeate stream, M, and a reject stream, J. The inlet stream conditions are 293 K, 0.5 MPa, and 2 mol/min; the conditions for both outlet streams are 293 K and 0.1 MPa. If the permeate stream is 50 mol% O2, and the reject stream is 13 mol% O2, what are the volu- metric flowrates (L/min) of the two outlet streams? How can you discover the audience,purpose, and topic of a reading assignment?of a writing assignment? Simplify each expression. Justify each step. 4(x + 9) + 5x a rectangle has a length of 15x and a width of 2x^3+4-2x^2. Find the perimeter of the rectangle when the length is 5 feet If two automobiles collide, they usually do not stick together.Doesthis mean the collision is elastic? Explain why a head-oncollisionis likely to be more dangerous than other types ofcollisions. from "The Story of an Hour"Read the excerpt."When she abandoned herself a little whispered word escaped her slightly parted lips. She said it over and over under her breath: 'free, free, free!' The vacant stare and the look of terror that had followed it went from her eyes. They stayed keen and bright. Her pulses beat fast, and the courses blood warmed and relaxed every inch of her body."What does this excerpt reveal about Mrs. Mallard? Rewrite using necessary or sufficient condition, as appropriate: "if the oven is hot then you may put the cake in." Figure ABCDE was reflected across the line y = x tocreate figure A'B'C'D'E'. What are the coordinates ofthe pre-image of E? Find all values of m so that the function y = xm is a solution of the given differential equation. (Enter your answers as a comma-separated list.)x^2y'' 14xy' + 54y = 0m = Why did women have little influence on national politics in the 1920's? A. Women did not have the right to vote. B. Few women went to polls. C. Women's votes were not counted. Determine whether p (p q) and p q are logically equivalent. If (6^2)^x equals 1, what is the value of x What was the Soviet Union's major concern during the Cold War?A. That the United States would declare war to obtain all SovietUnion weaponsB. That the United States would destroy the Soviet way of lifeC. That the United Nations would impose capitalism on the worldD. That United Nations forces would invade Eastern Europeannations Please label the statements as true or false regarding economic booms and busts. With enough careful planning, fiscal and monetary policy can prevent recessions. Had the U.S. government used fiscal and monetary policy more effectively, many economists believe that the Great Depression would not have been as severe. At the time of the Great Depression, fiscal and monetary policy were not well understood. Booms and busts are natural responses to everchanging economic conditions. 1. De estos, cul es un idioma que NO se habla en Espaa?A. el espaolB. el vascoC. el alemnD. el cataln2. Este deporte se practica normalmente cuando hace buen tiempo o cuando nieva?EsquiarA. en el veranoB. en el invierno3. Este deporte se practica en el verano o en el invierno?Deslizarse en la nieveA. en el veranoB. en el invierno4. Este deporte se practica cuando hace calor o cuando hace fro?El buceoA. cuando hace calorB. cuando hace fro5. Escribe la forma correcta del verbo en el pretrito.Ellos ESTN en la escuela_____________6. Escribe la forma correcta del verbo en el pretrito.Yo VENGO a la escuela cada da a las ocho menos cuarto_____________