Write a C++ code that will read a line of text and echo the line with all uppercase letters deleted. Assume the maximum length of the text is 80 characters. Example input/output is shown below.

Input:

Today is a great day!

Output:

oday is a great day!

Answers

Answer 1

Answer:

#include<bits/stdc++.h>

using namespace std;

int main()

{

   string st;

   getline(cin,st);

   int i=0;

   while(i<st.length())

   {

       if(isupper(st[i]))

       {

           st.erase(st.begin()+i);

           continue;

       }

       i++;

   }

   cout<<st<<endl;

   return 0;

}

Explanation:

I have included the file bits/stdc++.h which include almost most of the header files necessary.

For taking the input as a string line getline is used.

For checking the upper case isupper() function is used. cctype header file contains this function.

For deleting the character erase function is used.


Related Questions

Why Java Script uses the prefix Java in itsname?

Answers

Answer:

Java in JavaScript does not correspond to any relationship with Java programming language.

Explanation:

The prefix Java in Javascript is there for historical reasons.

The original internal name of Javascript when it was created by Brendan Eich at Netscape was Mocha. This was released to public as Livescript in 1995. The name Livescript was eventually changed to Javascript in Netscape Navigator 2.0 beta 3 release in December 1995 after Netscape entered into an agreement with Sun Microsystem. The primary purpose of change of name seemed to be as a marketing aid to benefit from the growing popularity of Java programming language at that time.

Please explain external hashing, B-trees, and traversals. 3-5 sentences per

Answers

Answer: In external hashing the hash table is in disk where each slot of the page table holds multiple entries which refers to pages on the disk organised in the form of buckets.

B-trees are self balancing trees which contains sorted data and allows insertion, deletion, traversals

Traversal is the process of visiting the nodes of the tree data structure.

Explanation:

External hashing is different from internal hashing and it refers to concepts in database management systems. Internal hashing stores only single record maintained in page table format, whereas external hashing holds multiple entries.

B-trees are generalisation of binary trees where it can have more than 2 children.

Traversal of trees helps in insertion, deletion, modification of nodes in tree data structure

True / False
Generally, a floating-point add instruction takes more clock cycles then a corresponding integer add instruction.

Answers

Answer:

True

Explanation:

A typical contemporary CPU knows two primary information classes: integer and floating point.

Floating point arithmetic instructions take more clock cycles than integer instructions.

Integer point generally takes 1 or 2 clock cycles for executing add instruction whereas floating point takes 3 or 4 instructions for executing add instruction.

Which of the following is not anadvantage of simulation?
Ability to treatcomplex situations
Ability to deriveoptimal solutions
Ability to askwhat-if questions
Ability toexperiment with different scenarios
Ability tocompress time

Answers

Answer: Ability to derive optimal solutions

Explanation:

One of the main disadvantages of simulation is ability to derive optimal solutions. As, the solution does not required to have a closed form and  procedure does not require any weighting and the hard constraint.  Stimulation outcome are not optimal to induced specific response because of the lack of quantitative models.

Indicate which of the following substances contain an atom that does or does not follow the octet rule.

A. AlCl3

B. PCl3

C. PCl5

D. SiCl4

Answers

AlCl3 does not follow the octet rule because it has only six electrons in its valence shell after bonding. PCl5 also doesn't follow the octet rule as phosphorus extends beyond the octet by forming five covalent bonds using the d-orbitals.

To determine which substances contain an atom that does not follow the octet rule, we can evaluate the compounds listed: AlCl3, PCl3, PCl5, and SiCl4.

AlCl3 (Aluminum chloride): Aluminum has three valence electrons and forms three covalent bonds with chlorine atoms. However, it does not follow the octet rule because it only has six electrons in its valence shell after bonding.PCl3 (Phosphorus trichloride): Phosphorus has five valence electrons and forms three covalent bonds with chlorine atoms, leaving it with a full octet.PCl5 (Phosphorus pentachloride): Phosphorus can expand its valence shell beyond the octet rule, using the d-orbitals, to form five covalent bonds with chlorine atoms.SiCl4 (Silicon tetrachloride): Silicon has four valence electrons and forms four bonds with chlorine atoms, achieving a full octet.

Based on this information, AlCl3 and PCl5 are examples where the central atom does not follow the octet rule. In the case of AlCl3, aluminum is electron-deficient with three bonds, whereas in PCl5, phosphorus exceeds the octet rule by forming five bonds.

Explain the security mechanisms available for a database and how the data will be protected.

Answers

Answer: Views, unauthorized access, encryption are some of the security mechanisms.

Explanation:

The database of any application or software contains all the important data, therefore it is utmost necessary to protect the data from falling into dangerous hands. Most databases use authentication measures in form of passwords or bio metrics to avail access. Besides these users can use views to see the data but cannot change anything into the database. Some databases also use encryption systems to encrypt the passwords for better safety. There are some databases which grants user with two types of privileges such as system and  object privileges, whereby with system privileges one can change the system environment variables.

"What is the running time of HEAPSORT on an array A of length n thatis already sorted in increasing order?

Answers

Answer:

The answer to this question is O(NlogN).

Explanation:

The time complexity of Heap Sort on an array A is O(NLogN) even if the array  is already sorted in increasing order.Since the Heap Sort is implemented by creating the heap from the array and then heapifying and then repeatedly swapping first and last element and deleting the last element.The process will be done for the whole array.So the running time complexity is O(NLogN).

Define a graph. Draw a directed and undirected graph with 8 vertices and explain all the terminologies associated with that graph Note: Terminologies are cycles, path, directed and undirected graph, circuit, loop, adjacency, degrees, Euler circuit, Hamiltonian circuit

Answers

Answer:

A graph is a collection of set of edges E and vertices V, where each edge joins pair of vertices.

A graph is undirected when the edges has no direction.

A graph is directed when the edges has confined direction.

An edge is directed if it is defined to come out from one vertex and goes to another fixed vertex.

A loop is an edge from a vertex to itself.

A path from a vertex x to another vertex y is a sequence of distinct edges that joins sequence of distinct vertices:

                   (x,[tex]x_{1}[/tex])→([tex]x_{1}[/tex], [tex]x_{2}[/tex])→([tex]x_{2}[/tex], [tex]x_{i}[/tex])→ .... → ([tex]x_{j}[/tex],y)

A cycle is path that starts and ends at same vertex.

A circuit is a path that starts and ends at same vertex, but not necessarily contain distinct vertices.

An Euler circuit is circuit that traverse each edge of the graph exactly once and covers all vertices.

An Hamiltonian circuit is a simple circuit that traverse each vertex of the graph exactly once and covers all edges.

Degree of a vertex is the number of edges incident on it.

In case of undirected graph the number of edges incident on the vertex is it's degree.but in case of directed graph the number of edges coming out of the vertex is it's out-degree and the number of edges going to the vertex is it's in-degree.

Explanation:

In a circular linked list the last node points to the____ node.

a. first

b. last

c. middle

d. new

Answers

Answer: option A) First

In a circular linked list the last node points to the first node.

Explanation: As in a circular linked list, the node will point to its next node. Since the node next to last node is the first node hence last node will point to first node in a circular way. The elements points to each other in a circular path which forms a circular chain.

To speed up item insertion and deletion in a data set, use ____.

A.
arrays

B.
linked lists

C.
classes

Answers

To speed up item insertion and deletion in a data set, use B. linked lists.

Hope this helps!

Final answer:

To enhance the speed of insertion and deletion in a data set, linked lists are superior to arrays as they allow for quick updates of references without needing to shift elements. Thus, option B is correct.

Explanation:

To speed up item insertion and deletion in a data set, the best choice would be B. linked lists. Unlike arrays, which require shifting elements when inserting or deleting an item particularly if it's not at the end, linked lists can efficiently add or remove items because they only need to update the references (or pointers) to the neighboring elements.

When working with a sorted linked list, the structure will maintain items in a sorted order. When inserting a new item, it determines the correct location within the order to insert, based on comparison operators like <. In Python, this can be implemented using special methods such as __lt__() and __eq__(). This comparison flexibility allows for the linked list to handle various data types including integers, floats, and strings, facilitating the sorted order efficiently.

When you instantiate an object from a class, ____ is reserved for each instance field in the class.

a.
a field name

b.
a constructor

c.
a signature

d.
memory

Answers

Answer:

The correct answer is d.Memory

Explanation:

The meaning of instantiating an object is to be able to create an instance of the object by using an object-oriented programming (OOP) language. In Java to instantiate an object from a class is to create a specific class and Memory is reserved for each instance field in the class.

What is the most consistent item regardless of the software used in BI?

Answers

Answer Explanation:

Business intelligence is defined as the strategies and technologies used by companies for the data analysis of business information it tell us also about predictive views of business operation.

THE MOST CONSISTENT ITEMS REGARDLESS OF SOFTWARE USED IN BI ARE :

data analyst has the most responsibility of BI he is the most important part of BIIt is the interconnected process of inspection changing and modelingdata analysis is hugely aided by data mining

An array can store integers and doubles together.true or false

Answers

Answer:

False

Explanation:

An array stores a sequence of values that are all of the same type

The n modifier after the tilde forces the index variable to expand only to the ______

Answers

Answer: filename and extension.

Explanation:

Suppose we have %~nxa, where we have two modifiers n and x, and a single variable a.

So, the n modifier after the tilde forces the index variable to expand only to the  filename(by the n modifier) and the extension(by the x modifier).

It produces the filename and extension instead of the full path.

write an algorithm that gets the price for item A plus the quantity purchased. The algorithm prints the total cost, including a 6% sales tax.

Answers

Answer:

Algorithm()

1. p = Enter the price of item A.

2. c = Enter the number of A’s purchased.

3. Now the price per item with tax is:

              t= p+(p*6/100)

4. The total cost of c items:  

             ct= t * c.

5. Print ct.

In this algorithm, we are taking the price per item and counting it’s cost including tax. Then we are multiplying the price per item with tax with the number of items we purchase, to find the overall cost with tax.

You may calculate the overall cost without tax as (p*c). Then you can find the overall cost with tax as ((p*c)+(p*c*6/100)), as in both way, we will get the same result.

Final answer:

To calculate the total cost of an item including a 6% sales tax, multiply the price of item A by the quantity purchased to get the total price before tax. Then calculate the sales tax by multiplying the total price by 0.06 and add this to the total price to get the total cost.

Explanation:

To write an algorithm that calculates the total cost of an item including sales tax, you need to first find the price of the item A and the quantity purchased. Then, to calculate the sales tax, you will convert the percent to a decimal and multiply it by the total price (price multiplied by quantity). Lastly, you will add this sales tax to the total price to get the total cost.

Algorithm:

Get the price of item A.Get the quantity of item A purchased.Calculate total price without tax: total_price = price_of_item_A * quantity_purchased.Calculate sales tax: sales_tax = total_price * 0.06.Calculate total cost including sales tax: total_cost = total_price + sales_tax.Print the total_cost.

For example, if the price of item A is $50 and the quantity purchased is 2, then the total cost before tax is $100. The sales tax at 6% would be $6. Therefore, the total cost including sales tax would be $106.

Give a recursive (or non-recursive) algorithm to compute the product of two positive integers, m and n, using only addition and subtraction ?

Answers

Answer:

Multiply(m,n)

1. Initialize product=0.

2. for i=1 to n

3.      product = product +m.

4. Output product.

Explanation:

Here we take the variable "product" to store the result m×n. And in this algorithm we find m×n by adding m, n times.

Where does the data go for the following instructions?

LDX #$2000
STAA $60,X

Answers

Answer: LDX copies the instruction pointed by the memory location into the accumulator. STAA stores the content of the accumulator in the memory location $

Explanation:

Here in LDA #$2000, copies the instruction pointed by the memory location $2000 into the Accumulator A, and it uses indirect addressing.

STA $60,X stores the content of A into the memory location assigned by $60 and assigns it to X.

For a set of integers stored in an array,calculate the sum of the positive numbers and the sum of the negative numbers. The program should store these numbers in memory variables: positiveSum and negativeSum. Numbers should be read from the array one at a time with a zero value (0) being used to signal the end of data (the zero value is acting as a "sentinel" value).

Answers

Answer: The c++ program to implement the given conditions is shown below.

#include <iostream>

using namespace std;

int main()

{

// used as index of array in the loop for calculating the sum

   int i=0;

// array contains both negative and positive integers

// 0 is used as the sentinel value

   int arr[12]={-9,-8,-3,-12,-78,-10,23,45,67,1,0};

   int positiveSum=0, negativeSum=0;

   do

   {

       if(arr[i]<0)

           negativeSum = negativeSum + arr[i];

       if(arr[i]>0)

           positiveSum = positiveSum  + arr[i];

// after every element is added, index of array represented by i is incremented

       i++;

   }while(arr[i]!=0);

// loop continues till end of array is reached

   cout<<"Sum of positive integers "<<positiveSum<<" and sum of negative integers "<<negativeSum<<endl;

   return 0;

}

OUTPUT

Sum of positive integers 136 and sum of negative integers -120

Explanation: This program declares and initializes an integer array without user input. As mentioned in the question, 0 is taken as the sentinel value which shows the end of data in the array.

   int arr[12]={-9,-8,-3,-12,-78,-10,23,45,67,1,0};

All the variables are declared with data type int, not float. Since, integers can yield integer result only.

The do-while loop is used to calculate the sum of both positive and negative integers using int variable i. The variable i is initialized to 0.

This loop will run till it encounters the sentinel value 0 as shown.

while(arr[i]!=0);

Hence, all the integers in the array are read one at a time and sum is calculated irrespective of the element is positive or negative.

       if(arr[i]<0)

           negativeSum = negativeSum + arr[i];

       if(arr[i]>0)

           positiveSum = positiveSum  + arr[i];

After the element is added, variable i is incremented and loop is continued.

The do-while loop tests positive and negative integers based on the fact whether their value is greater than or less than 0.

The program can be tested using different size and different values of positive and negative integers in the array.

what are the forms of Hornclause?

Answers

Answer:

Hornclause is defines as, it is a logical formula for particular rule which gives a useful parameters for a logical programming. Hornclause is a clause with one positive literals.

Different form of hornclause are:  

Null clause:  Null clause is that with 0 negative and 0 positive literals which appears at the end of a resolution proof. A fact or unit clause: Unit clause is defined as literals, which contain 1 positive literals and 0 negative literals. A negated goal: It is defined as negated goal is the negation of the statements to be proved with at least 1 negative and one positive literals.

Describeat least three applications where re-writeable optical laser diskwould be preferred over hard disks for storage

Answers

Answer:

 Applications where re-writeable optical laser disk would be preferred over hard disks for storage are:

While storing the data in large amount, the optical disk are more preferred as, for storing the videos, photographs and various types of the images.This optical laser disk are used for transferring the information or data from one computer to another so we can easily modify or re-write the data at any time as, this disk are more convenient than hard disk.The optical laser disk are also helpful for distributing the software to the customers or users by using its large storing capacity features, as compared to hard disks.

 

Answer:

The following are listed applications or requirements where the re-writable (optical) laser drive is preferred over storage hard drives.

Explanation:

A laser disk is often used to transmit data between one device to the next such that at any moment we could conveniently edit or re-write the details even though this drive is much more versatile than that of the disk.When processing the details in vast numbers, the optical disk is used to store certain photos, snapshots, and different file formats.As compared to hard disks, the optic disk has always been useful in delivering the applications to consumers or clients with its broad storage space functionality.

How is ( a || b ) && c || ( a || b ) && ( ! c ) equal to ( a || b ) without simplification?

Answers

Answer: You can see the truth table in the image.

Explanation:We can do this question by using truth table.

As we can see in the truth table that there is no effect on the output of the expression by c if a and b both are false then the output is false and if any of them is True or both of them are True then the result is True.

Which of these are valid declarations for the main method?

?? public void main();

?? public static void main(String args[]);

?? static public void main(String);

?? public static int main(String args[]);

Answers

Answer:

The answer is option 2. public static void main(String args[]);

Explanation:

The answer is public static void main(String args[]); let's understand this line:-

public:-It is an access specifier that means whichever entity is public it will be accessible everywhere.static:-It means that there is only one copy of the method.void:-Void means that the method does not have any returning any value.main:-It is the name of the method.String args[]:-It is an array of strings which and it stores java command line arguments.User can use another name if the user want to.

Given the IP address and subnet mask 192.168.10.0 and255.255.255.224

a) What is the maximum number of subnets in the network?

b) What is the number of hosts?

c) What are the valid subnets?
It is requested pls.give details how u have calculated?

Answers

Answer:

a) Maximum subnets=8

b) if there is no subnet , no. of hosts will be 32-2 = 30. If there are 8 subnets as above, then no. of hosts will b 4-2=2.

c)  Valid subnets are  6

                         192.168.10.32          

                         192.168.10.64                    

                         192.168.10.96

                         192.168.10.128

                         192.168.10.160

                         192.168.10.192

Explanation:

a) Maximum number of sub nets in the network

    For number of sub nets in a network , which class this ip address belongs to

         IP address  192.168.10.0

         subnet mask 255.255.255.224

192 in ip address means it is a class C address.

In class C address -

Network address-24 bits

Host address-8bits

For number of subnets we check last block of subnet mask.

224 -covert this into binary

                11100000

From binary form ,we can conclude that 3 bits are used for sub network as only 3 are 1.

  =2^n

  = 2^3 =8  

b)  Number of hosts

In a network,

     Number of hosts is (2^host no -2)

We have subtracted 2 because out of these hosts two are used in broadcasting and other purposes.  

Host number is equal to the 0's in the Subnet mask

                     255.255.255.224

convert this into binary number i.e

   11111111.11111111.11111111.11100000

So,5 0's are there

           Number of valid hosts= 2^5 -2

                                                = 32-2

                                                =  30

c) The Valid subnets are

For valid we have to perform Logical AND with IP Address and subnet    mask.

       IP address  192.168.10.0

       subnet mask 255.255.255.224

    Convert these in binary -

IP address  11000000.10101000.00001010.00000000

Subnet mask  11111111.11111111.11111111.11100000

after performing And operation- 11000000.10101000.00001010.00000000

                192.168.10.0

           this is the host address

                 192.168.10.224 this is the broadcast address

    These are the valid sub nets

                         192.168.10.32          

                         192.168.10.64                    

                         192.168.10.96

                         192.168.10.128

                         192.168.10.160

                         192.168.10.192

Imagine that 10 int values are labeled byposition: 1, 2, 3, etc. Write a program that reads 10integers and tracks how many of them have the same value as theirposition. That is, ifthe first number read is 1, or the third number is 3, that countsas a match, and the output would be the number of matches (from 0to 10). Use a singleif statement and a loop.

Answers

Answer:

#include<iostream>

using namespace std;

//main function

int main(){

   //initialization

   int count_Number=1,a1,match_Numbers=0;

   //loop run 10 times

   do{

       //print

       cout<<"Enter the number: ";

       //read the value enter by user

       cin>>a1;

       //check for match

       if(a1==count_Number){

           match_Numbers++;

       }

       count_Number++;

   }while(count_Number <= 10);

   //display the output

   cout<<"The number of matches is: "<<match_Numbers<<endl;

   return 0;

}

Explanation:

Include the library iostream for using the input/output instruction.

create the main function and declare the variables.

take the do-while loop which has a special property, the statement in the do-while execute first and then check the condition.

In the do-while, print the message by using the cout instruction and then store the value enter by the user into the variable.

then, check the value enter by the user is match the position or not. If the condition true, then count the matches and also update the position count.

this process continues until the position count is less than or equal 10. if condition false the loop terminates and then, display the output on the screen.

how the email system work??(

Answers

Answer:

Email is the electronic mail, basically it is in form of computer-based communication that consists of messages, which are sent and received using the Internet.

Email system works as:

The sender composed a message on their computer using the email client.When the user send the message, the email text and attachment are uploaded in Simple Mail Transfer Protocol(SMTP) server as the outgoing mail. All the messages wait in the outgoing email, while the SMTP server communicate with the Domain Name Server. If the SMTP server search the recipient’s email server, then it will transfer the attachments and the messages . When the next time recipient clicks on send and receive, then the client email download new message from their email server and then you got the mail.

What are the different types of firewalls? Which one is best?

Answers

Types of firewalls: 5 types.
1. Packet Filtering — Blocks selected network packets.
2. Circuit Level Relay (gateways) — SOCKS is an example of this type of firewall. This type of proxy is not aware of applications but just cross links your connects to another outside connection. It can log activity, but not as detailed as an application proxy. It only works with TCP connections, and doesn’t provide for user authentication.
3. Application-level gateways (Proxy firewall) — The users connect to the outside using the proxy. The proxy gets the information and returns it to the user. The proxy can record everything that’s done. This type of proxy may require a user login to use it. Rules may be set to allow some functions of an application to be done and other functions denied.
4. Stateful inspection firewalls.
5. Next-gen firewalls.
And I think the best of firewalls is Packet Filtering.

Which ofthe following calls on human feelings, basing the argument onaudience needs or sympathies?

a- Emotional appeals

b- Logicalappeals

c- Irrational appeals

d- Unreasonableappeals

Answers

Answer: a) Emotional appeal

Explanation: Calls on feeling of human is referred as the emotion of the humans ,thus it is said to be an emotional appeal. Other appeals in the options are for the call on technical,logical or unexpected error reason and does not relate to the human audience needs or sympathies .But emotional appeal deals with these need on being called.  So, option (a) is the correct option .

What will the following code display?

int number = 6
int x = 0;
x = --number;
cout << x << endl;




1. 7

2. 6

3. 5

4. 0

Answers

Answer:

5

Explanation:

The operator '--number', it is a pre decrement operator which decrement first and then assign. It decrement the value by 1.

initially the number is 6.

x is 0.

then, x = --number;

it decrement the number by 1 first and then assign to x.

so, x assign the value 5.

finally, print the value.

Therefore, the answer is 5.  

The expressionvecCont.empty() empties the vector container of allelements.

a. True

b. False

Answers

Answer:

False

Explanation:

vector is like a dynamic array that has a special ability to resize automatically when it required.

vector has several functions:

like, insert() to insert the element in the vector.

delete() for delete the one element at a time.

empty() is also the function used in the vector. It is used for checking the vector is empty or not.

it gives the Boolean value (TRUE or FALSE), if the vector is empty it gives the output TRUE if the vector is not empty it gives the output FALSE.

It is not used for empty or deletes all elements of the vector.

Therefore, the answer is False.

Incomplete Configuration identification documents may resultin:

a) Defective Product

b) Higher Maintenance Costs

c) Schedule Product

d) Meet Software Quality

e) A,B,C

f) B,C,D

Answers

Answer: e) A,B,C

Explanation:

 Incomplete configuration identification documents may result in defective product, higher maintenance costs and schedule product as, inaccurate document decreased the quality of the product and cause damage. If the configuration documentation are not properly identified, then it is impossible to control the changes in the configuration items, to established accurate reports and records or validate the configuration.

Other Questions
Which of the following sets of ordered pairs does not define a function? {(1,4),(0,4),(1,4),(2,4),(3,4)} { ( 1 , 4 ) , ( 0 , 4 ) , ( 1 , 4 ) , ( 2 , 4 ) , ( 3 , 4 ) } {(1,2),(5,6),(6,7),(10,11),(13,14)} { ( 1 , 2 ) , ( 5 , 6 ) , ( 6 , 7 ) , ( 10 , 11 ) , ( 13 , 14 ) } {(1,1),(2,2),(3,3),(4,4),(5,5)} { ( 1 , 1 ) , ( 2 , 2 ) , ( 3 , 3 ) , ( 4 , 4 ) , ( 5 , 5 ) } {(1,3),(5,2),(6,9),(1,12),(10,2)} Find the equation for the line below Magnesium and nitrogen react in a combination reaction to produce magnesium nitride: 3 Mg N2 Mg3N2 In a particular experiment, a 8.33-g sample of N2 reacts completely. The mass of Mg consumed is ________ g. What was the main point of Enlightenment thinking?A. A belief in current religious authorities and teachingsB. Trusting that the leaders of the world's nations were wiseC. Using reason and logic to explain how the world worksD. That people should keep to themselves and not try to changethings The patient has an order for oxytocin (Pitocin) to infuse at 7 mu/minute. Available is oxytocin 10 units/1000 mL 0.9% NaCl. At what rate will the nurse set the infusion? ___ mL/hr (If needed, round to the nearest whole number.) Ecologist Mark is trying to identify the type of pollution that caused excessive algae growth on a river and killed fishes and plants. Which type of pollutioncaused this situation?A.thermal pollutionB.light pollutionC.nutrient pollutionD.noise pollution An exothermic reaction has a positive enthalpy (heat) of reaction.(T/F) Yo (escuchar) discos compactos. What is the point-slope form of a line that has a slope of 5 and passes through point (-7, 2)?1.)02-1-27-x)2.)o 7-y= (2-0)3.)9-7= (x-2)4.)y-2= 2(x+(+7) Find the simple interest rate needed in order for an investment of $2000 to grow to an account of $5000 in 3 years In 1886 a generation of Indian warfare came to a end with the capture of Liliana y Patricia prepararon una fiesta de (1) para sus amigos Victoria y David. Ellas (2) a todos los amigos de la pareja y, para ellas, lo mejor es que todos (3) asistir. Liliana (4) la reservacin en un restaurante muy elegante del centro. Patricia (5) de la casa de Victoria y David al restaurante y lleg con ellos a la mesa donde estaban (were) todos esperando. Liliana pidi (6) . Victoria (7) agradecer (thank) a sus amigos, pero no pudo porque empez a llorar (to cry) de alegra. Todos (8) por la pareja y compartieron los postres y los dulces que el camarero (9) a la mesa. Best fits the definition Sly dealing skill in deceiving Benign Obstinate Frugal Agility Guile the weight of a bucket is 33/2 kg. if 1/4 of the bucket contains water weighing 21/4 kg , determine the weight of empty bucket Solve the second equation.2x - y = 8First, solve for (-y).--y = Write a C++ program that stores information (name, gender, birthday, phone number, civil status, religion, college course, nationality) of a student in a structure and displays it on the screen. Barrys BarBQue incurred the following costs: $1,400 for ribs, 45 hours of labor to cook the ribs at $10 per hour, $50 for seasoning and sauce, $300 for signs to advertise the ribs, $150 to clean the grill after cooking the ribs, and $100 of administrative costs. How much are total product costs? $2,050 $1,850 $2,150 $2,350 What is Johns profession in The Yellow Wallpaper? From letters A to E which is correctly described? A) nasopharynx: usually receives only air, helps equalize pressure in inner ear B) oropharynx: receives food and air, contains palatine and lingual tonsils C) laryngopharynx: receives only food, lined with ciliated pseudostratified columnar epithelium D) A and B are correct E) A, B and C are correct Write a value-returning function isVowel that returns the value true if a given character is a vowel and otherwisereturns false.