Write a program that has a while loop to print out the first five multiples of 15, 43, and 273 between the numbers of 3168 and 376020. Put each of the three sets of multiples on a new line.

Answers

Answer 1

Answer:

#include <iostream>

using namespace std;

void printmultiples(int n) //function to print first five multiples between 3168 and 376020

{

   int a =3168,c=1;

   cout<<"First five multiples of "<<n<<" are : ";

   while(a%n!=0 && a<=376020) //finding first mutiple of n after 3168.

   {

       a++;

   }

   while(c<6)//printing multiples.

   {

       cout<<a<<" ";

       a+=n;

       c++;

   }

   cout<<endl;

}

int main() {

   int t,n;

   cin>>t;//How many times you want to check.

   while(t--)

   {

       cin>>n;

       printmultiples(n);//function call..

   }

return 0;

}

Input:-

3

15

43

273

Output:-

First five multiples of 15 are : 3180 3195 3210 3225 3240  

First five multiples of 43 are : 3182 3225 3268 3311 3354  

First five multiples of 273 are : 3276 3549 3822 4095 4368

Explanation:

I have used a function to find the first five multiples of the of the numbers.The program can find the first five multiples of any integer between 3168 and 376020.In the function I have used while loop.First while loop is to find the first multiple of the integer n passed as an argument in the function.Then the next loop prints the first five multiples by just adding n to the first multiple.

In the main function t is for the number of times you want to print the multiples.In our case it is 3 Then input the integers whose multiples you want to find.


Related Questions

What is wrong with the following code? How should it be fixed?

1 public class H2ClassH {

2 final int x;

3

4. int H2ClassH () {

5 if (x == 7) return 1;

6 return 2; 7 } // end 8 } // end class H2ClassH

Answers

Answer:

Final variable x is not initialized.

Explanation:

In this JAVA code we have a final variable named x.The thing with final variable is that they act like constants in C++.Once initialized cannot be changed after that and we have to initialize them at the time of declaration.

In JAVA if we do not initialize the final variable the compiler will throw compile time error.Final variables are only initialized once.

Should technology managers strategize technology projects? Why? How?

Answers

Answer: Yes, technology projects should be strategized by the manager of technology.

Explanation: It is correct for technology manager to crate technology projects because the manager would be persisting the knowledge about the technology.Without the correct strategy, which is required to accomplish the goal, the technical project cannot be achieved.

The manager can carry out the work with the help of the critical thinking  and the knowledge about the technologies that should be used.By analyzing the need of the project ,he/she can plan the right steps of strategy.

.Name two loaders used in Linux?

Answers

Answer:

LOADLIN(Load linux)    LILO(Linux Loader).

Explanation:

Loader is a computer program that is used in linux to load linux in the memory.In linux we have to install a special loader while in other operating system we do not need to  install the loader it comes in them by default.

The two most common loader in linux are as following:-

LOADLIN(Load Linux).LILO(Linux Loader).

Typically, the first item in defining a function is _____. (Points : 4)

an open curly brace "{"
passing an argument
passing the function
naming the function

Answers

Answer: Naming the function

Explanation:

 The first item for defining the function is the naming of the function. In the function, the first line is known as header and rest of the function is known as body of the function.

The function name is the first step while defining the proper function as we can define the actual function name on which the program are rest based.

We can define a function from which the each value from the set of the components are basically associated with the second component in that particular function.

 

Which of the following class represent an abstract class? (Points : 2) class Automobile {
void drive();
}
class Automobile {
void drive ()=0;
}
class Automobile {
virtual void drive ()=0;
}
class Automobile {
void drive (){}
}

Answers

Answer:

class Automobile {

virtual void drive ()=0;

}

Explanation:

In C++, an abstract class is one which cannot be instantiated. However it can be subclassed. A  class containing a pure virtual function is considered an abstract class. A virtual function is preceded by the virtual keyword. For example:

virtual void drive();

In addition , if a virtual function is pure, it is indicated using ' = 0 ;' syntax.

For example:

virtual void drive() = 0;

Of the given options:

class Automobile {

virtual void drive ()=0;

}

represents an abstract class.

Final answer:

The abstract class in the given options is the one with a pure virtual function, which is 'class Automobile { virtual void drive ()=0; }'.

Explanation:

An abstract class is a class that cannot be instantiated on its own and is typically used as a base class for other classes. In C++ programming language, an abstract class is defined by having at least one pure virtual function. Looking at the given options, the class that represents an abstract class is the one that declares a pure virtual function with the syntax '=0' after the function declaration.

Therefore, the correct option is:

class Automobile {
virtual void drive ()=0;
}

The presence of the keyword virtual followed by '=0' in the function declaration indicates that the drive function is a pure virtual function, making the Automobile class abstract.

____________ is a hardware or software tool for recording keystrokes on a target system.


Keyboard

KeyScanner

Keylogger

RootKit

Answers

Answer: Key-logger

Explanation: Key-logger is the device that is used in the capturing the keystrokes of the user and then recording it .They can be in the form of software or hardware.The recording made by key logger consist the data typed through the keyboard like email, messages, passwords .

Other options are incorrect because keyboard is the hardware device used for inputting data in the system, key-scanner is the input reading device in the form of library and rootkit is malicious collection of software to disturb the function of the computer system.Thus the correct option is key-logger.

A keylogger, which can be software or hardware, records keystrokes on a computer to capture sensitive information like passwords. Rootkits, in contrast, provide backdoor access to systems.

The correct answer to the question is Keylogger. A keylogger is a tool that can be either hardware or software, designed for the purpose of capturing keystrokes on a computer system. Once activated, it records every key pressed and sends this information to an attacker or stores it for retrieval. In contrast, a rootkit is a type of malware that provides unauthorized users with administrative access to a computer system, often without being detected.

Keyloggers are considered a form of spyware because they covertly monitor and record users' keystrokes, which can include sensitive information like passwords and personal data. The information captured by keyloggers can be used for malicious purposes, such as identity theft or unauthorized access to secured systems.

The IP address is a _____ bit number.

Answers

Answer: 32 bit number

Explanation:

 The IP address basically contain 32 bit number as due to the growth of the various internet application and depletion of the IPV4 address. The IP address basically provide two main function is that:

The location addressing The network interface identification  

The IP address are basically available in the human readable format. The IPV6 is the new version of the IP address and its uses 128 bits.  

What is ‘validation’?

Answers

Talking about models, validation is the process by the model is corroborated and its outputs are compared with experimental results. From validation, it can be seen how quantitative and qualitative accurate the model is, and it can be confirmed model fidelity to the real world.

___________ are used when an SQL statement has to be executed multiple times in a Python script.

a

Prepared statements

b

Cursors

c

Connections

d

Queries

Answers

Answer: (A) Prepared statement

Explanation:

 Prepared statement is basically used in the structured query language (SQL) statement which are basically execute multiple times in the python script.

The prepared statement is typically used in the SQL statement for update and queries. It is used to executed for the similar SQL statement and it has high efficiency.

It basically is in the form of template where the database compile and perform various query optimization.

Think about an internet of things that we are using on our daily life and how it can be hack and what consequences this will be on us.

Answers

Answer:

Internet of thing is a generic term given to all the devices that are interconnected via internet. The things are all the devices that we use in out daily lives such as refrigerators, cars, homes ,e.t.c The interconnections of all the things allows better operation and high ease of daily life as the devices are calibrated to our needs hence automatically turn off if we don't use them. As an example the interconnected electric lights in smart homes know weather we are present in home or not and automatically turn off and on depending on our presence.

As an example of Internet of things device consider Smart Homes that use automation to regulate various operations such as lighting, air conditioning and other operations. If an rouge entity gets access to the system and is able to disrupt the operation's we can easily identify the consequences such as no light , no air conditioning among others. Even our access to our own house can be blocked thus making our life miserable.

Answer

responsible I think I wouldn't know

Explanation:

Describe practices that enable software designers to think about using patterns?

Answers

Answer:

 Firstly, the software designer basically understand the pattern of the system by think with broader perspective. By establish the pattern first design the proper context of the system.

The pattern dependency basically focus on manage the relationship between the different types of the modules. It basically provide the actual guidance which increase the reuse-ability of the module.  

We can also extract the given pattern that from the level of the abstraction and lack cohesion modules are basically difficult to maintain.

What is the Documenter?

Answers

Answer:

 In the database, the documenter is basically used to display the properties of the selected object and use the microsoft access to display the particular object.

The database documenter basically created a particular document and report which basically contain proper detailed information and data for the every selected object.

Then, after creating the report we can easily open in the print for previewing the report in the microsoft access.     

A(n) _____ is a harmful program that resides in the active memory of the computer and duplicates itself.

Worm
Virus
Keylogger
Timebomb

Answers

Answer: Worm

Explanation: Worm is the malicious software program which acts as the infection in the computer system. It has the ability to replicate itself and spread in the other systems .It is found in those parts that have automatic operation and non-noticeable.

The effect of the worm is slowing down the operations ,disturb the network etc.Other options are incorrect because virus is the malicious program that infects the host, key-loggers are used for monitoring of system and  time bomb is the program for releasing the virus in computer network. Thus, the correct option is worm.

. Explain the notions of WAN, LAN, MAN and PAN.

Answers

Answer:

Explanation:

WAN (Wide Area Network), is a computer network that joins several local networks, although their members are not all in the same physical location.LAN (Local Area Network) is a network of computers that cover in a small area for example a house, an apartment or a building. One part of the topological definition is the physical topology, which is the actual arrangement of the cables or media.MAN (metropolitan area network) is a network of computers that interconnects users with computer resources in a geographic area or region larger than area covered by a large local area network (LAN)PAN (Personal Area Network.) Is a network used to connect different personal computer devices centered on an individual person workspace.

Final answer:

Networks are categorized into WAN, LAN, MAN, and PAN based on their geographical coverage and usage, ranging from expansive (like the internet) for WAN, to personal space for PAN. Wi-Fi is a common technology used for creating LANs that allow devices to connect wirelessly within a certain area.

Explanation:

Networks come in various sizes and are categorized based on their geographical span and usage. Here we explore four kinds: Wide Area Network (WAN), Local Area Network (LAN), Metropolitan Area Network (MAN), and Personal Area Network (PAN).

WAN is a network that covers a broad area, potentially spanning countries or continents. It can be made up of multiple LANs and connects devices across long distances, such as the internet. LAN, on the other hand, is restricted to a small geographical area, typically a single building or campus, and offers high data transfer rates. It is commonly used in homes, schools, and offices.

MAN encompasses a larger area than LAN but smaller than WAN, often spreading across a city or metropolitan area. It is useful for connecting several LANs within that city to allow networks to communicate with each other. Lastly, PAN is the smallest network, intended for personal use within a range of a few meters. It typically involves devices like smartphones, tablets, and wearables interacting with each other.

Wi-Fi is a widely adopted technology enabling wireless LANs, described by the IEEE 802.11 series of standards. It's a key part of many networks, providing connectivity in homes, offices, and public hotspots. People might pay a monthly fee or get access for free, depending on the business model of the ISP or facility providing the Wi-Fi service.

Using a word processor of your choice, write the pseudocode for an application that allows a user to enter the price of an item and computes 10 percent sales tax on the item and prints out for the user the original price and the tax and the total. Remember to declare the class and the main method.

Answers

Answer:

// here is pseudo-code and implementation in java.

import java.util.*;

// class definition

class Solution

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object to read innput

       Scanner s=new Scanner(System.in);

        // variables

      double item_cost;

      System.out.print("Please enter cost of item:");

   //read the cost of item

      item_cost=s.nextDouble();

   // calculate 10% tax on the item

      double tax=item_cost*0.1;

   // print original cost

      System.out.println("original cost of item is: "+item_cost);

   // print tax on the item

      System.out.println("tax on the item is: "+tax);

   // print total cost of item

      System.out.println("total cost of item is:"+(item_cost+tax));

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read the original cost of item from user and assign it to variable "item_cost". Calculate 10% tax on the cost of item and assign it to variable "tax".Print the  original cost and tax on item.Then add the cost and tax, this will be the total  cost of item and print it.

Output:

Please enter cost of item:125

original cost of item is: 125.0

tax on the item is: 12.5

total cost of item is:137.5

Answer:

#Python

class PriceTax:

   def __init__(self): #Main method

       self.itemPrice = int(input("Price of your item: "))

       self.tax = 0.1

       self.total = round(self.tax*self.itemPrice,2)

       print("\nOriginal price: ", self.itemPrice)

       print("Tax: %d%%" % (self.tax*100))

       print("Total: ", self.total)

   

price = PriceTax()

Explanation:

We define a class called PriceTax with a main method __init__, we asked for the user input and store the int value in an attribute called itemPrice, we define the tax attribute and we calculate the total by multiplying the predefined tax and the item price entered by the user. Finally, we print the original price, the tax, and the total. Note that for this to work we instantiate the class 'PriceTax' first under the variable price.

When a column is added to a table, it is the _____ column in the table. (Points : 2) first
last
second
third

Answers

Answer:

last

Explanation:

When a column is added to a table, it gets appended at the end of the table. For example, suppose we have a table called Student with a column 'Name'. Now suppose we want to add another column called class to the table, then the new column will be added at the end of the table. So the new table structure will consist of <Name,Class>.The same procedure will apply for any other added column.

Answer:

The correct answer for the given question is "last ".

Explanation:

When we add a column into the table so the column will add in the last of the table .We can use alter command in SQL to added the column in the table.

The syntax for adding new column into the table is given below .

ALTER TABLE table_name

ADD column_name datatype;

For example  

Suppose we have to add the address column into the student table.

ALTER  TABLE student  

ADD address varchar (50);

This query will add the column in last  of the table  .

How many bits are necessary for a binary representation (unsigned) of:

a. The states of the U.S.A.?

b. The days in a year?

c. The inhabitants of California (est. 36,457,549)?

Answers

Answer:

Hi!

The answer to:

a. 6 bits.

b. 9 bits.

c. 26 bits.

Explanation:

a. For the states of the U.S.A, you need 50 or more combinations to represents each element.

If you use 6 bits, the possible combinations are 2⁶ = 64.  

b. For days in a year, you need 365 or more combinations to represents each element.

If you use 9 bits, the possible combinations are 2⁹ = 512.

c. For inhabitants of California, you need 36,457,549 or more combinations to represents each element.

If you use 26 bits, the possible combinations are 2²⁶ = 67,108,864. If you use 25 bits instead of 26, then you have 2²⁵ = 33,554,432 combinations. These possible combinations are not enough to represent each inhabitant.

What is percent encoding and why is it used?

Answers

Answer:

 Percent encoding is the mechanism for encoding the information in the URI  (Uniform resource identifier) that basically transmitted the special variable or characters in the URI to the cloud platform.

It is also used in various application for transferring the data by using the HTTP requests.

Percent encoding is also known as uniform resource locator (URL) encoding. The percent encoding basically used to convert the non ASCII characters into URL format which is basically understandable to the all the web server and browsers. In percent encoding the percent sign is known as escape character.

What is ‘Software Quality Assurance’?

Answers

Answer: Software quality assurance is considered as the means under which one monitors the software processes and techniques used in order to ensure quality. The techniques using which this is attained are varied, and thus may also include ensuring accordance to more than one standards. It is referred to as a set of techniques that ensures the quality of projects in software process. These mostly include standards that administrators use in order to review and also audit software activities, i,e, these software meet standards.

Please list the computer data hierarchy from bit to database

Answers

Answer:

 Data hierarchy is basically define to the data which is organized in the systematic manner. The main concept of the data hierarchy is to check the basic structure of the data. It basically involve the fields records and files for the data organization.

The following is the list of the computer data hierarchy from nit to address are:

1) Bit: It is the smallest unit of the data.

2) Field: The collection of all the characters in the data is known as field.

3) Record: The collection of the different fields is known as records.

4) File: The collection of various types of records in the database is known as file.

Perform the following calculations. Make sure the units of the solution are correct.

a.10 Kbps * 3

b.10 Mbps * 3 sec

c.Convert 2400 bits to bytes

Answers

Answer:

30 Kbps

30 Mb

300 bytes

Explanation:

a. 10 Kbps * 3 = (10 * 3) Kbps = 30 Kbps [Note: numbers and units are aggregated and processed separately]

b. 10 Mbps * 3 sec  = (10 * 3) Mbps * sec = 30 Mbps*s = 30 Mb [Note: numbers and units are aggregated and processed separately]b

c. Byte is a unit of storage in a computer. 1 byte is made up of eight bits, while each bit  can be either 0 or 1.

1 byte = 8 bit

=> 1 bit = 1/8 byte

=> 2400 bits = 1/8 * 2400 = 300 bytes

The break statement is required in the default case of a switch selection to the exit structure properly. True/False

Answers

Answer: True

Explanation: Break statements are the statements is for the termination of the loop .It is considered as the statements that control the loop. For the default case ,default method is used in the switch selection statements.

The Switch selection statement,due to the working of the break statement will exit or terminate. Thus, the statement given in the question is correct.

A group of related files is stored in a(n

Answers

Answer: Records

Explanation:

A group of the related file is basically stored in a record as record is the collection of the related field.

A record is the object in the database that basically contain one and more than one value.

In the database, the records are also store in the form of table and in table the data are in the form of rows and columns. There is multiple table in the database and each of the table basically contain multiple records.

What is the purpose of a mutator?

Answers

Answer:

To change the value of private or protected members.

Explanation:

Mutator also known as setters are the member function or method in class that is used to set or change the value of private or protected members. Mutator does not return any values. They are very important in Object Oriented Programming.

What error can you identify? (Points : 4)

A double quotation mark was incorrectly inserted.
You cannot compare apples to oranges.
Assumes indentation has a logical purpose
No error

Answers

Answer:

Assumes indentation has a logical purpose

Explanation:

No period

Residential and business customers are paying different rates for water usage. Residential customers pay $0.005 per gallon for the first 6000 gallons. If the usage is more than 6000 gallons, the rate will be $0.007 per gallon after the first 6000 gallons. Business customers pay $0.006 per gallon for the first 8000 gallons. If the usage is more than 8000 gallons, the rate will be $0.008 per gallon after the first 8000 gallons. For example, a residential customer who has used 9000 gallons will pay $30 for the first 6000 gallons ($0.005 * 6000), plus $21 for the other 3000 gallons ($0.007 * 3000). The total bill will be $51. A business customer who has used 9000 gallons will pay $48 for the first 8000 gallons ($0.006 * 8000), plus $8 for the other 1000 gallons ($0.008 * 1000). The total bill will be $56. Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.

Answers

Answer:

// here is program in Java.

// import package

import java.util.*;

// class definition

class Main

{

   // main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

   // variable

   int gall;

   double cost=0;

       // object to read value from user

    Scanner scr=new Scanner(System.in);

     // ask user to enter type

    System.out.print("Enter customer type  (R for residential or B for business ):");

    // read type of customer

       char t=scr.next().charAt(0);

       if(t=='r'||t=='R')

       {

           System.out.print("enter the number of gallons:");

           //read number of gallons

           gall=scr.nextInt();

           // if number of gallons are less or equal to 6000

           if(gall<=6000)

            {

           // calculate cost

           cost=gall*0.007;

           // print cost

           System.out.println("total cost is: "+cost);

             }

           else

           {

           // calculate cost

            cost=(6000*0.005)+((gall-6000)*0.007);

            // print cost

            System.out.println("total cost is: "+cost);

           }

       }

       else if(t=='b'||t=='B')

       {

           System.out.print("enter the number of gallons:");

           //read number of gallons

           gall=scr.nextInt();

           // if number of gallons are less or equal to 8000

           if(gall<=8000)

            {

           // calculate cost

           cost=gall*0.006;

           // print cost

           System.out.println("total cost is: "+cost);

             }

           else

           {// calculate cost

            cost=(8000*0.006)+((gall-8000)*0.008);

            // print cost

            System.out.println("total cost is: "+cost);

           }

       }

   }catch(Exception ex){

       return;}

}

}

Explanation:

Ask user to enter the type of customer and assign it to variable "t" with scanner object.If the customer type is business then read the number of gallons from user and assign it to variable "gall". Then calculate cost of gallons, if   gallons are less or equal to 8000 then multiply it with 0.006.And if gallons are greater than 8000, cost for  first 8000 will be multiply by 0.006 and   for rest gallons multiply with 0.008.Similarly if customer type is residential then for first 6000 gallons cost will be multiply by 0.005 and for rest it will  multiply by 0.007. Then print the cost.

Output:

Enter customer type  (R for residential or B for business ):r

enter the number of gallons:8000

total cost is: 44.0

Which of the following devices is used to connect multiple devices to a network and sends all traffic to all connected devices? (Please select one of the four options)

Switch

Modem

Hub

Repeater

Answers

Answer: HUB

Explanation:

A Hub is a network device, that acts only in layer 1 (Physical layer) forwarding all traffic that reaches to the input port, to all output ports at once, without processing the received data in any way that could modify them.

It behaves like it were a multiport repeater (which has only one output port).

Suppose we have a String object called myString. Write a single line of Java code

that will output myString in such a way that all of its characters are uppercase.

Answers

Answer:

myString=myString.toUpperCase();

Explanation:

In java to change all characters of a string to upper case we use .toUpperCase() method.It will convert string to upper case.

Implementation in java.

import java.util.*;

class Solution

{

public static void main (String[] args) throws java.lang.Exception

{

   try{

Scanner scr=new Scanner(System.in);

System.out.print("Enter a string:");

String myString=scr.nextLine();

myString=myString.toUpperCase();

System.out.println("string in upper case : "+myString);

         }catch(Exception ex){

       return;}

}

}

Output:

Enter a string:hello

string in upper case : HELLO

Final answer:

To output myString in uppercase, use the code: System.out.println(myString.toUpperCase()); which utilizes Java's .toUpperCase() method.

Explanation:

To convert a String object called myString to uppercase using Java, you would use the .toUpperCase() method. The following line of code will accomplish that and output the uppercase version of myString:

System.out.println(myString.toUpperCase());

This line will print the contents of myString to the console, with all characters in uppercase, fulfilling the task requirements.

The `toUpperCase()` method in Java converts all characters in a string to uppercase. By calling this method on `myString` and then printing the result, the program outputs the uppercase version of `myString`.

Explain the relationship between the binary numbering system and the function provided by the transistor.

Answers

Answer:

The relation is the Voltage levels.

Explanation:

Basically the relation is related with voltages levels, that is, the computer has the main component called mother-board this component is the "brain" of the computing systems made of something called microprocessors, intel has core i7,i9 dual core, etc. The mother-board manage the information and save information in the memories, usually Random Access Memory (RAM) and hard disk, this information is understood by the computer as ones (1) and zeros(0), that means, that the computer process logic levels or binary numbers.

Since the beginning of computer developments was in this way because facilitates the process of computing,  and the transistor was an excellent candidate for doing this because the device is scalable, and consumed less power than vacuum tubes that was used in 70's, more or less. There are configurations of transistor that allow use a binary numeric system, such as NOT,OR and AND gates, these are the base of all computers, the computers are made of millions of this gates made with transistors, for example, the attached picture has a NOT gate, suppose that is wired to VDD volts and is refereed to ground GND or zero ( 0 )volts, if a voltage level close to GND is aplied in the input the output is VDD, and if a voltage close to VDD is applied to the input the output will be GND.

In other words the logic levels are read by the computer as ones and zeros but these are voltage levels that could be measured with voltmeters or specialized equipment and are produced by transistors configurations as presented in this answer.

LOGIC LEVELS WHERE THE VOLTAGE VDD IS 1 AND GND IS 0

INPUT:

             1   ______                         1      ______

        0___|             |_________0____|             |_____

OUTPUT

       1  ___              _______________              _____

       0        |______|                               |______|

Magnetic tapes are a good choice for backups that need to be kept for five or more years.

True

False

Answers

Answer:

True.

Explanation:

Magnetic tape is used to store data.It is one of the oldest technology for data storage.It is suitable for  high volume data and storing it for long duration.It's cost is also very less.

Magnetic Tapes are well suited for storing data for long duration because of it's durability.It's shelf life is 30-years.

Other Questions
Which of the following statements is true? Most nonmetals can be drawn into a wire, while metals would break apart. Most metals can be drawn into a wire, while nonmetals would break apart. Most metals and nonmetals conduct heat well, but nonmetals cannot conduct electricity.Most metals and nonmetals conduct electricity well, but metals cannot conduct heat. Liquid X has a density of 0.834 g/mL. What is the volume, in ml, of 205 g of liquid X? Please report your answer to the nearest whole mL. An organization in _____________ high level executives make most decisions and pass them down to lower levels for implementations. Find an equation of a line passing through the point (8,9) and parallel to the line joining the points (2,7) and (1,5). which of the following made it more difficult for the colonists to trade goods directly with foreign countries ?A. The proclamation of 1763B. The stamp act C. The navigation actsD. The townshend acts If you can read the bottom row of your doctor's eye chart, your eye has a resolving power of one arcminute, equal to 1.6710^2 degrees . If this resolving power is diffraction-limited, to what effective diameter of your eye's optical system does this correspond? Use Rayleigh's criterion and assume that the wavelength of the light is 540 nm . Express your answer in millimeters to three significant figures. This table represents a quadratic function with a vertex at (1,0). What is theaverage rate of change for the interval from x = 5 to x = 6 A rectangle has a perimeter of 84cm and a length of 35cm. what is the width What day did the US invade Iraq? WILL MARK BRAINLIEST!!!!!Read the introduction and first paragraph of an essay about energy sources.(1) The nation's energy use is largely dependent on fossil fuels. (2) These fuels are nonrenewable resources, and they cause pollution. (3) We cannot continue our reliance on a fuel that will eventually run out. (4) Thus, we must find other ways to sustain our energy demands. (5) Pursuing alternative fuel sources is the key to solving our energy crisis.(6) Currently, about 1 percent of energy in the United States is produced by the sun, and solar energy has the potential to become a more widely used energy source. (7) Through different technologies, such as solar cells, scientists have learned to use the suns radiation to create electricity. (8) Solar energy is both inexhaustible and clean. (9) The major limit to this alternative source is that equipment is expensive. (10) Developing a cost-effective way to harness the power of the sun will be a significant development in solving our energy crisis. Which statement introduces a new counterclaim to the authors position?Batteries are being developed to harness the sun's power for use at a later time.The production of solar energy is relatively quiet, reducing noise pollution.Solar panels can be placed in remote areas, which is more cost effective than installing high-voltage wires.The use of solar energy is especially limited in areas that do not get regular sunlight. Air enters an adiabatic turbine at 800 kPa and 870 K with a velocity of 60 m/s, and leaves at 120 kPa and 520 K with a velocity of 100 m / s. The inlet area of the turbine is 90 cm2. What is the power output? DrugDigest is a website that is owned and hosted by a. Food and Drug Administration c. Express Scripts b. National Library of Medicine d. Blue cross/Blue Shield Which concept do businesses use to earn income? Suppose that, while lying on a beach near the equator of a far-off planet watching the sun set over a calm ocean, you start a stopwatch just as the top of the sun disappears. You then stand, elevating your eyes by a height H = 1.43 m, and stop the watch when the top of the sun again disappears. If the elapsed time is it = 11.9 s, what is the radius r of the planet to two significant figures? Notice that duration of a solar day at the far-off planet is the same that is on Earth. An employee comes to work on time every day only because he knows that his pay will be docked if he is caught coming in late. However, when he knows his boss will be gone that day, he's frequently late. What level of moral development does this represent? According to those who envisioned total development of the continent in the nineteenth century, America would eventually become what? a. An arsenal of democracy. b. A highway for transporting goods and culture. c. The last great hope of mankind. d. The leader of the free world. Find the arc length of the given curve on the specified interval.(6 cos(t), 6 sin(t), t), for 0 t 2 Name one enzymatic step of the TCA cycle wherein a universal electron carrier (in its reduced form) is a product of the reaction: ____________ Is it possible for a simple, connected graph that has n vertices all of different degrees? Explain why or why not. Identify the combustion reaction