Which of the following is NOT areserved word in Java?intpublicstaticnum

Answers

Answer 1

Answer:

num

Explanation:

In java reserved words are also known as keywords, keywords are reserve words for a language that can't be used as an identifier(name of a class, name of a variable, name of an array etc.) int, public static, are reserve words.

In given question num is not a reserved word.


Related Questions

What Is the measurement value?

Answers

Answer:

The measurement value is the value given by a measuring instrument and the true value is the actual value of the property being measured.

Explanation:

if (quotaAmt > 100 || sales > 100 && productCode == "C")
bonusAmt = 50;

When the above code is executed, which operator is evaluated first?

a.
||

b.
==

c.
=

d.
&&

Answers

Answer:

==

Explanation:

Operator precedence, it tells about the flow of operator execution o which operator execute first and which execute last.

'==' > '&&' > '||' > '='

According to precedence table,

the equal equal operator '==' comes first. so, it execute first and then NOT operator, then OR operator and finally equal operator.

How Extreme Programming addresses Software Testing andevolution ?

Answers

Answer:

Extreme programming is a software development technique which is used to enhance software quality and it's response to ever changing customer requirements.

Testing

Testing is main focus in extreme programming.Extreme programming addresses testing in a way that if a minute testing can eliminate a bit of flaws, extensive testing can terminate a lot of flaws.

Evolution in Extreme programming is like this:-

Coding:-First programmers will code the problem.

Testing :- Testing is done to remove flaws.

Listening:- Programmers must listen to the customers to what they need.

Designing:-Then design according to the customer needs.

In order to be considered as an e-commerce web site the site must sell some tangible good. (true or false)

Answers

Answer:

False

Explanation:

The site can also exclusively buy items from people. Websites are not limited to selling items for they can also buy from users.

The following statement is false.

What symbol is used for an assignment statement in a flowchart?
Answer
a) processing
b) I/O
c) parallelogram
d) diamond

Answers

Answer:

processing

Explanation:

The flow chart is a diagram that shows the activity of the program, peoples or things.

Flowchart symbol and meaning in the options:

1. Processing: it is a rectangular shape block which is used for variable declaration or assignment.

2. I/0: it is a parallelogram in shape which is used for input or output.

3. Parallelogram: it is used for input or output.

4. diamond: it is used for decisions or conditions.

Therefore, the correct option is a. Processing is the one that is used for the assignment statement.

Final answer:

In a flowchart, the symbol used for an assignment statement is a parallelogram, which is different from symbols used for processes (rectangles) or decisions (diamonds).

Explanation:

The symbol used for an assignment statement in a flowchart is a (c) parallelogram. This shape is typically used to represent input or output operations, which includes assigning values to variables. In a flowchart, various symbols are utilized to represent different types of actions or steps in a process.

For example, a rectangle is often used for process or operation symbols, and a diamond shape is used to denote decision points. However, when it comes to depicting the action of assigning a value to a variable, which is a fundamental step in many algorithms and programs, the parallelogram serves this purpose.

What are the key technological trends that heighten ethicalconcerns?

Answers

Answer:

Key technological trends that heighten ethical concerns are as following :-

1. Declining Storage Costs.

2. Data Analysis Techniques.

3. Doubling of computer power.

4. Networking advances and the internet.

Explanation:

Declining Storage costs-It means that data storage capacity has increased over the years and costs is reduced accordingly.Massive data storage systems are cheap and easily available so local retailers also can have the customers details stored in their systems.

Data Analysis Techniques:-Due to advances in data analysis the companies are able to find much detailed personal information of a person.

Doubling of computer power:-Computer power is doubled every 18 months.We are much more dependent upon the systems and are vulnerable to system errors.

Networking advances and the internet:-People are addicted to internet now a days and there are that they can provide their personal information to any phishing website or mails.

In _______ view, you're unable to make changes to your report.

Answers

Answer:

In print view, you're unable to make changes to your report.

The answer is - Read Only

Why must you be careful not to touch the gold contacts at the bottom of each adapter?

Answers

Answer: You must be careful to not touch the gold contacts at the bottom of the adapter because it might damage the device

Explanation: It is advised not touch the gold contacts of the adapter because that might damage the adapter by the oils present on the fingertips of a person which leads to corrosion at times and also there are chances of damage of the electronic component by the electrostatic discharge and that leads to the failure of the device .

Final answer:

To maintain electrical conductivity and prevent damage, avoid touching the gold contacts on adapters. Safety precautions and cleanliness are vital to protect the contacts from harmful materials. Preserving the integrity of the electrical connection is key to the proper functioning of the adapter.

Explanation:

It is crucial to be careful not to touch the gold contacts at the bottom of each adapter to prevent interference with electrical conductivity and avoid damaging the contacts. Gold is an excellent conductor of electricity, and touching the contacts with bare hands can introduce oils and dirt that may hinder the electrical connection.

Safety precautions such as wearing protective gear and ensuring clean hands are essential to prevent harmful materials from affecting the contacts and maintain the adapter's functionality.

Write assignment statements that perform thefollowing operations with the variables a, b, and c.
a) Adds 2 to a and stores theresult in b.
b) Multiples b times 4 andstores the result in a.
c) Divides a by 3.14 and storesthe result in b.
d) Subtracts 8 from b andstores the result in a.

Answers

Answer:

An assignment statement's overall syntax is-

                   variable = expression ;

Where the variable must be declared; the variable may be a simple name, or an indexed location in an array, or an object's field (instance variable) or a class static field; and the expression must result in a value that is compatible with the variable type. In other words, it must be feasible to cast the expression to the variable type.

Examples: int i =4;

a) b=(a+2);

(a+2) is the expression for adding 2 to a, whereas b equal to the result of (a+2).

b) a=b*4;

(b*4) is the expression for multiples b times 4,whereas a equal to the result of (b*4)

c) b=(a/3.14)

(a/3.14) is the expression for divides a by 3.14,whereas b equal to the result of (a/3.14)

d )a=(b-8)

(b-8) is the expression for Subtracts 8 from b,whereas a equal to the result of (b-8)

Write a program which promptsuser to enter an integer value. Using while loop print the valuesfrom

zero up to the number enteredby the user.

• Enlist the odd numbers out of them

• Enlist the prime numbers out of odd number list and printtheir sum (add all the prime numbers)

Answers

Answer:Following is the c++ code for the problem:

#include <iostream>

using namespace std;

int main() {

   int number;

   cout<<"Enter the number"<<endl;

   cin>>number;

   int i=0,c=0,odd[500];

   while(i<=number)//loop for printing the numbers form 0 to number.

   {

       cout<<i<<" ";

       if(i%2!=0)// storing in the odd array if the number is odd.

       {

           odd[c++]=i;//storing odd numbers..

       }

       i++;

   }

   cout<<endl;

   i=0;

   cout<<"The odd numbers are "<<endl;

   while(i<c)//loop to print the odd numbers.

   {

       cout<<odd[i]<<" ";

       i++;

   }

   cout<<endl<<"The prime numbers are "<<endl;

   i=0;

   int sum=0;

   

   while(i<c)//loop to print the prime numbers..

   {

       int div=2;

       while(div<odd[i])

       {

           if(odd[i]%div==0)

           break;

           div++;

       }

       if(div==odd[i])

      {

           cout<<odd[i]<<" ";

           sum+=odd[i];//updating the sum..

      }

       i++;

   }

   cout<<endl<<"The sum of odd prime numbers is "<<sum<<endl;//printing the sum..

return 0;

}

Output :

Enter the number

49

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49  

The odd numbers are  

1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 49  

The prime numbers are  

3 5 7 11 13 17 19 23 29 31 37 41 43 47  

The sum of odd prime numbers is 326 .

Explanation:

First I have printed the values from 0 to n and i have taken an array to store odd numbers.After that i have printed the odd values.And after that i have printed prime numbers among the odd numbers and their sum. These all operations are done using while loop.

Describe in one or more complete sentences how someone starting a computer repair business in a town night gain a competitive advantage in that town?

Answers

Answer:

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Someone starting a computer repair business can gain a competitive edge in the town by offering both software and hardware repair. Some business offer either one or the other. While other big companies only offer repair for products that they own (Intel, AMD, dell, etc). Another way of getting an edge on competition is to offer computer related products such as graphic cards and motherboards. Most computer repair businesses do not do this.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

The way someone starting a computer repair business in a town night gain a competitive advantage is by selling related products.

What is competitive advantage?

Competitive advantage simply means the factors that allow a company have edge over its rivals.

In this case, the way someone starting a computer repair business in a town night gain a competitive advantage is by selling related products and quality products.

Learn more about competitive advantage on:

https://brainly.com/question/14030554

Where there is a collision we try to find some otherplace in our array. This approach is calld.

a) open addressing

b) closed hashing

c) open addressing and closed hasing

d) none of the aboe.

Answers

Answer:

a) open addressing

Explanation:

Where there is a collision we try to find some other place in our array. This approach is called, open addressing.

Open addressing is where you talk about a problem or situation freely.

Where there is a collision we try to find some otherplace in our array. This approach is calld.

a) open addressing

b) closed hashing

c) open addressing and closed hasing

d) none of the aboe.

Draw a full binary tree of height 2. How many nodes does it have?

Answers

Answer:

The number of nodes in a full binary tree of height 2 = 7

Explanation:

At each level k, of the full binary tree there are usually [tex]2^{k} \\[/tex] nodes.

So the full binary tree of height 2 has nodes= [tex]2^{0} \\[/tex] + [tex]2^{1} \\[/tex] + [tex]2^{2} \\[/tex].

which is 7.

Final answer:

A full binary tree of height 2 consists of 7 nodes, including the root and two additional levels of nodes, with each level doubling the number of nodes from the previous level.

Explanation:

A full binary tree of height 2 has a total of 7 nodes. The definition of a full binary tree means that every node has 0 or 2 children. Given that the height (the longest path from the root to a leaf) is 2, this means there are 2 levels below the root. On level 1 (just below the root), there would be 2 nodes (since a full tree must have either 2 or 0 children). On level 2, each of those two nodes from level 1 would themselves have two children, adding 4 more nodes for a total of 6 nodes beneath the root. Including the root itself, which is level 0, brings the total number of nodes to 7.A full binary tree of height 2 has a root node connected to two child nodes, and each child node is connected to two more child nodes. So, the tree has a total of 7 nodes.

Whatis meant by Translation Lookaside Buffer?

Answers

Answer:

A translation lookaside buffer (TLB) is a memory stash that decreases the time it takes to access a user memory location. TLB includes the most lately used page table entries.

TLB is used to overcome the issue of sizes at the time of paging. PTE is used for framing the memory ,but it uses two references one for finding  the frame number and the other for the address specified by frame number.

PTE-page table entry

write a pseudocode statement that generates a random number inthe range of 1 through 100 and assigns it to a variable namesrand.

Answers

Answer:

srand(time(NULL));

int namesrand = rand() % 100 +1;

Explanation:

srand() is the function which is used for seeding the rand() function.

it defines the starting point different in whenever rand() function executes. Therefore, rand() generate the output different in every execution.

rand() is the function that generates the random number within the range.

for example;

rand() % 20

it generates the random number within the range [0,20).

NOTE: 20 not included in the range and zero is included.

similarly, generate the number between 0 to 99.

rand() % 100.

so, if we add the generated number by one then it ranges become 1 to 100 both included.

 

A batch file is a text file that used to enter a command or series of commands normally typed at the command prompt True False

Answers

Answer:

True

Explanation:

A batch file is a text file which either contains a single command or a series of commands normally typed at the command prompt for a computer operating system. It is known as a batch file because it bundles a set of commands into a single file which could have been presented to the operating system interactively using the keyboard one at a time. A batch file is generally created when a user needs to execute several commands together at a time. We can initiate the sequence of batch commands within the batch file simply by providing the name of the batch file on a command line tool.

An analog signal maintains a constant signal level for a period of time, then abruptly changes to a different constant level.

a) True b) False

Answers

Answer:

b) False

Explanation:

An analog signal does not maintain a constant signal level for a period of time, then abruptly changes to a different constant level.

Write a recursive function that returns true if the digits of a positive integer are in increasing order; otherwise, the function returns false. Also, write a program to test your function.

Answers

Answer:

C code implementing the function:

#include<stdio.h>

int isIncreasing(int m);

void main()

{

int y, t;

 

printf("Enter any positive integer: ");  

scanf("%d", &y);

 

t= isIncreasing(y); //call the functoion isIncreasing(int m)  

 

if(t==1) //if isIncreasing(int m) returns 1, then the digits are in //increasing order

 printf("True:  The digits are in increasing order");

else

 printf("False:  The digits are not in increasing order");

}

int isIncreasing(int m)

{

int d1,d2;

if(m/10==0) //if we reach till the left of left most digit, then all before  //digits were in order. else it won't go upto that.

{

 return 1;

}

d1 = m%10; //d1 holds the right most digit of current m.

if(m%10 !=0)

{

 m = m/10; //m is updated to find the rest digits and compare //them.

 d2 = m%10;//d2 holds the digit just left of the right most digit of //m.

 if(d2 <= d1) // if the right most and it's left digits are in order then //we proceed to left.

 {

  isIncreasing(m);

 }

 else   //else we stop there itself, no need to move further.

  return 0;

}

}

output is given as image.

How canwe measure the refresh rate of the CRT, Stereo Devices and LCD? Ifrefresh rate measurement of anyone is not possible then explainwhy?

Answers

Answer:

Refresh rate means how many times the image on the screen is redrawn in a second.It is measured in hertz.

We can measure refresh rate of all of the devices listed in the question.

CRT Refresh rate measurement:-

The refresh rate can be measured by dividing the scanning rate by count of horizontal lines multiplied by 1.05.

Stereo Devices Refresh Rate measurement:-

When LCD's are used for stereo 3 D displays, the refresh rate is divided by 2, because we have two eyes and each one needs a distinct picture. For this reason,it is suggested to use a display of at least 120 Hz refresh rate, because on divided by 2 this rate is 60 Hz.For example 70 Hz non-stereo is 140 Hz stereo, and 80 Hz non-stereo is 160 Hz stereo.

LCD Refresh rate measurement:-

Refresh rate of a LCD is the number of times per second in which the data it is being redrawn by the display.

The _______ controls the action of the algorithm. a. user b. plain text c. cipher text d. key

Answers

The _______ controls the action of the algorithm.

d. key

Which of the following are valid calls to Math.max? 1. Math.max(1,4) 2. Math.max(2.3, 5) 3. Math.max(1, 3, 5, 7) 4. Math.max(-1.5, -2.8f) A. 1, 2 and 4 B. 2, 3 and 4 C. 1, 2 and 3 D. 3 and 4

Answers

Answer:

1, 2 and 4

Explanation:

the Math.max() is the function in java which is used to compare the two values and it gives the maximum of two values.

it take only two argument and the data type can be int, float etc.

Math.max(1,4): it takes two int values and give the output 4. it is valid call.

Math.max(2.3, 5): it takes two values and give the output 5.0. it is valid call.

Math.max(1, 3, 5, 7): it takes 4 values which is wrong because function takes only two variables. it is not valid call.

Math.max(-1.5, -2.8f): it takes two values and give the output -1.5. it is valid call.

Final answer:

All provided calls to the Math.max function in Java are valid. The function can handle two or more numbers of various types by implicitly converting them to the appropriate type for comparison.

Explanation:

The Math.max function in Java is used to find the highest value among its arguments. The method accepts either two int, long, float, or double arguments or a variable number of arguments of one of those types. Therefore, all the calls to Math.max provided in the question are valid:

Math.max(1,4) - Compares two integers.Math.max(2.3, 5) - Compares a double and an implicitly converted integer to double.Math.max(1, 3, 5, 7) - Uses varargs to compare multiple integers.Math.max(-1.5, -2.8f) - Compares a double and a float (the float is converted to double).

Based on this information, the correct answer is C. 1, 2, and 3 are valid calls to Math.max.

what is the largest possible number of internal nodes in a redblack tree with black height k? what is the smallest possiblenumber?

Answers

Answer:

A Red Black Tree is a type of self-balancing(BST) in this tree ,each node is red or black colored. The red black tree meets all the properties of the binary search tree, but some additional properties have been added to a Red Black Tree.

A Red-Black tree's height is O(Logn) where (n is the tree's amount of nodes).

In a red-black tree with black height k

The maximum number of internal nodes is [tex]2^{2k}[/tex] [tex]-1[/tex].

The smallest possible number is [tex]2^{k}[/tex] [tex]-1[/tex].

Final answer:

The largest possible number of internal nodes in a red-black tree with black height k is 2^(k+1) - 1, which assumes a completely filled tree. The smallest number of internal nodes is 2^k - 1, which represents a perfect black-height-balanced binary tree with no additional red nodes.

Explanation:

The largest possible number of internal nodes in a red-black tree with black height k is when each black node has the maximum number of children, which would be when both children are red. In this case, the maximum number of internal nodes is when we have a completely filled tree with alternating levels of red and black nodes, leading to a total of 2^(k+1) - 1 internal nodes, which includes both red and black nodes.

In contrast, the smallest possible number of internal nodes occurs when each black node has the minimum number of children, which is when it has two black child nodes or is a leaf node itself. In this scenario, the minimum number of internal nodes for a red-black tree with black height k is equal to the number of black nodes, which is 2^k - 1. This is because the tree would essentially be a perfect black-height-balanced binary tree without any additional red nodes.

What is a trap instruction? Explain its use in operating systems.

Answers

Answer:In operating system,trap instruction is synchronous interrupt which arises due to occurrence of exceptional conditions.

Explanation:Trap instructions are the synchronous interrupt or exception . It may arise due to reasons like invalid memory access ,term division by zero etc. Trap instruction is a software invoked interrupt and it is type of a call which transfers the control synchronously. It is also a way of switching into the Kernel mode in which the operating system take some steps before returning the control to the main process  .

What according to you a good software design?

Answers

Answer:  As software design is the part of Software development cycle (SDLC) it requires many factors to be become good and helpful such as:-

As it is a designing process it requires a update in the pattern and design so it should be able to deal with every change or update in the software that is being made.Software design should be able to support any modification in the design whenever it is required.By supporting the modification and updates in the design it makes it easy to save the time as well . So, it is also required that is should be a time saving process.

An entrepreneur mayfinance fixed assets by:

a. Inventoryloans

b. Installmentloans

c. Short-termdebt

d. Long-termdebt

Answers

Answer:

C - Short-term debt

Explanation:

Asset financing refers to using the company's fixed assets as leverage/collateral to borrow money through a loan. It is always used to address short-term capital requirements and would therefore be best done through short-term debt.

You can use______ in order to allow the user to browse and find a file at run time.
a. the OpenFileDialog common dialog control
b. the StreamReader object
c. the OpenDialog control
d. a hard-coded path name

Answers

Answer:  the OpenFileDialog common dialog control

Explanation:

To browse and select a file on a computer during run time we use OpenFileDialog control. For this we have an OpenFileDialog class and we can create an instance of this class.

The OpenFileDialog common dialog control is used to browse and find a file at run time

A database is a collection of ________ data.

A. reported
B. queried
C. object
D. related

Answers

Answer:

D. related

Explanation:

A database is a collection of related data.

What is the magnitude of the largest positive value you can place in a bool? a char? an int? a float?

Answers

Answer:

A bool can hold only true or false values.

A char can hold maximum 65535 characters.

An int can hold maximum positive value of 2,147,483,647.

A float can hold maximum positive value of 3.4 x 10^{38}.

Explanation:

Primitive data types in Java language can be categorized into boolean and numeric data types.

Numeric can be divided further into floating point and integral type. Floating data type includes float and double values while and integral data type which consists of char, int, short, long and byte data types.

Every data type has a range of values it can hold, i.e., every data type has a minimum and maximum predefined value which it is allowed to hold. The intermediate values fall in the range of that particular data type.

Any value outside the range of that particular data type will not compile and an error message will be displayed.

The data types commonly used in programming are boolean, char, int and float.

A boolean variable can have only two values, true or false.

A char variable can hold from 0 to 65535 characters. Maximum, 65535 characters are allowed in a character variable. At the minimum, a char variable will have no characters or it will be a null char variable, having no value.

An int variable has the range from minimum -2^{31} to maximum 2^{31} – 1. Hence, the maximum positive value an int variable can hold is (2^{31}) – 1.

A float variable can hold minimum value of 1.4 x 10^{-45} and maximum positive value of 3.4 x 10^{38}.

The above description relates to the data types and their respective range of values in Java language.

The values for boolean variable remain the same across all programming languages.

The range of values for char, int and float data types are different in other languages.

The instruction set is of _____________ importance ingoverning the structure and function of the pipeline.
a Least
b Primary

c Secondary

d No

Answers

Answer: a) Least

Explanation: Pipelining is the process where multiple instruction are to be processed in a parallel way . The most important steps in this process include step like fetching the instruction, decoding it, executing ,reading the instruction and writing it to the memory. So,instruction set is not a very important in the structure of the pipeline.

Define the primary IT roles along with their associated responsibilities.

Answers

Answer:

some of the IT roles are network maintenance, network administration, researchers, scientist, technical supports, application development.

Their roles are maintaining IT infrastructure, develop applications recruit staffs, management.

 

Explanation:

They should be proficient in establishing IT services and security policies, should be able to recruit staff members, know the project management rules and budget management and customer relationships and establishing establishing.

Other Questions
Protons are found in theof the atom.O A. nucleusBmembraneo C. electron cloudsOD. outside Which principle states that laws apply to all people equally A man tied a rope to the top of a tree, which is 'x' m tall. The other end of the rope was tied tothe ground, 20 m away from the base of the tree. Given that the length of the rope is 16 mlonger than the height of the tree, find the height of the tree.(by using pythagoras' theorem) The assumptions made are: The gas molecules from Caesar's last breath are now evenly dispersed in the atmosphere. The atmosphere is 50 km thick, has an average temperature of 15 C , and an average pressure of 0.20 atm . The radius of the Earth is about 6400 km . The volume of a single human breath is roughly 500 mL . Perform the calculations, reporting all answers to two significant figures. Calculate the total volume of the atmosphere. Explain why the jet stream looks so different in picture one and picture two. Please refer to the tutorial to answer this question. Please answer using complete sentences. Drag the tiles to the correct boxes to complete the pairs.Match each expression to its equivalent form. Which of the following statements is FALSE? Individuals produced by asexual reproduction are clones of the parent. Mitosis is the basis of asexual reproduction in many eukaryotes. Mitosis occurs in somatic cells whereas meiosis occurs in germ cells. Individuals produced by asexual reproduction are haploid because fertilization does not occur to restore the diploid chromosome number. None of the answer options is false Why is it relatively unusual to see old people in Sub-Sahara Africa, especially in rural areas? While on a camping trip, a man would like to carry water from the lake to his campsite. He fills two, nonidentical buckets with water and attaches them to a 1.43 m long rod. Since the buckets are not identical, he finds that the rod balances about a point located at a 5.59 cm from its midpoint. Which bucket holds more water? Whose death did the commander of the confederate forces say was like losing my right arm? A basketball team sells tickets that cost $10, $20, or, for VIP seats, $30. The team has sold 3142 tickets overall. It has sold 207 more $20 tickets than $10 tickets. The total sales are $59,670. How many tickets of each kind have been sold? There was another major extinction event at about 65 mya when the dinosaurs died out and mammals began to flourish. What were some of the stategies used that allowed mammals to survive when dinosaurs could not? Imagine you work for a fictional company called GopherMe (read about it here) as a Gopher Support agent. Theres been a subway outage affecting many Gophers ability to get to their assignments. The GopherMe support team uses the GPS tracking function of the app to determine which Gophers were most likely affected by the outage. If a Gopher who was en route to their task had been stuck in one spot for over 15 minutes or could not be located through GPS for over 15 minutes, they were sent this text from GopherMe:Hey Gopher, stuck because of the subway? Dont worry, weve got your back! If you think you can make it to your assignment on time by taking a cab, Go-Pher it! Send us a text in the next 10 minutes letting us know thats your plan, and GopherMe will reimburse the cost of your cab, given you provide a receipt. If theres no way youll make it, check in with us in the next 2 hours to be reimbursed for a half hour of your time. In any case, if we dont hear from you in the next 10 minutes, we will reassign your task.2.5 hours after receiving the text, Chuck sends this email to Gopher Support:Hi, I was stuck on the train when I got the text that said I can take a cab to my assignment and be reimbursed. Google Maps said I could take a cab and get to my assignment on time, so thats what I did. But when I got in the cab, I realized that my phone died, so I wasnt able to check in. I decided to continue to my assignment and figured that the customer using the GopherMe app to confirm I completed the task could serve as my check in. But when I got there, the customer wasnt home. I know I didnt check in about the cab, but my cab receipt has a timestamp that shows I was on my way within the 10 minute time frame. I did my best to fulfill my assignment and spent money and a lot of time trying to do it, so I was wondering, is there's any way I can be reimbursed for my cab and/or a half hour of my time?Thanks,Chuck WoodAs a member of the Gopher Support team, you receive Chucks email. Before responding, you look into why the customer wasn't home and find out that they had canceled the request after it was reassigned. Considering the policies and assuming everything Chuck wrote in his email is true, write him an email response. Be as thorough as possible. what is the equation of the graphed line in point slope form? What is Potential flow? Find the value of x round to the nearest tenth PLEASE HELP 1. Choose one male family member or friend and write one complete sentence in French describing a personality trait. Make sure you use at least two different adjectives in your description.2. Choose one female family member or friend and write one complete sentence in French describing a personality trait. Make sure you use at least two different adjectives in your description.3. Choose a group of two family members or two friends who have the same personality trait and write one complete sentence in French describing the personality trait they have in common. Make sure you use at least two different adjectives in your description.You may copy and paste the accented characters from this list if needed: what polynomial has roots of -6, 1, and 4 Differentiate between the DFS and BFS algorithms for graphtraversal. winged seed is present ina.moringab.hiptagec.calotropisd.shorea