Write a program that takes as input two opposite corners of a rectangle: (x1,y1) and (x2,y2). Finally, the user is prompted for the coordinates of a third point (x,y). The program should print Boolean value True or False based on whether the point (x,y) lies inside the rectangle. If the point lies on the rectangle, the program should print False.

Answers

Answer 1

Answer:

A python3 script is given below

Explanation:

Hi there!

In this program it is assumed that the rectangle will always be parallel to the x and y axis

# First we define three lists where the coordinates will be stored

# The notrect variable will help us if the p1 and p2 coordinates are along the same axis and therefore the will not make a rectangle,in the assumed sense

p1, p2, p3 = [],[],[]

notrect = False

# In this for cycle we ask the user for the coordinates and check if the first two make a rectangle

for i in range(3):

if i<2:

 x = float(input('Please write x'+str(i+1)+': '))

 y = float(input('Please write y'+str(i+1)+': '))

else:

               x = float(input('Please write x: '))

               y = float(input('Please write y: '))

if i==0: p1 = [x,y]

elif i==1: p2 = [x,y]

else: p3 = [x,y]

# If they do not make the rectangle we no longer ask for the third and exit the program

if p1 and p2:

 if p1[0] == p2[0] or p1[1] == p2[1]:

  notrect = True

  print('These ponits does not make a rectangle')

  break

#If notrect = True we say Bye to the user and nothing else happens

if notrect:

print('Bye')

# If they do make the rectangle we save the x and y coordinates of the rectangle separately, and sort them

else:

x = [p1[0],p2[0]]

y = [p1[1],p2[1]]

x.sort()

y.sort()

# If the x and y coordinates of the third point are between the x and y coordinates of the vertices of the rectangle the last point is indeed inside the rectangle, and print a True. Otherwise, we print a False

print((p3[0]>x[0] and p3[0]<x[1]) and p3[1]>y[0] and p3[1]<y[1])

Answer 2

The required codes are attached below:

Boolean value:

In programming, we generally need to implement values that can only have one of two values, either true or false. For this purpose, Java provides a special data type, i.e., boolean, which can take the values true or false.

Learn More information about the topic Boolean value:

https://brainly.com/question/26413022

Write A Program That Takes As Input Two Opposite Corners Of A Rectangle: (x1,y1) And (x2,y2). Finally,
Write A Program That Takes As Input Two Opposite Corners Of A Rectangle: (x1,y1) And (x2,y2). Finally,
Write A Program That Takes As Input Two Opposite Corners Of A Rectangle: (x1,y1) And (x2,y2). Finally,

Related Questions

While the concept of ____ has well served scientists who share scientific text files and application developers who exchange code, the greater use has been in downloading artistic files, such as music and video files.

VPNs

LANs

point-to-point file protocol

peer-to-peer (P2P) file sharing

Answers

Answer: peer-to-peer (P2P) file sharing

Explanation: Peer-to-peer file sharing is the technique in which networking technology is used for the sharing and distribution of the files digitally. The sharing of the files are in the form of movies, games music etc.

Peer are considered as the nodes which are the end-user so, the end-user to end-user file transfer is done through this technology.

Other options are incorrect because VPN(virtual private network) is the connection between network and client over less secure network,LAN (Local area network) is the network that can be established for single infrastructure to connect  and point to point protocol is protocol for the routers for communication.Thus the correct option is P2P file sharing.

What does it mean to 'instantiate' an object?

Answers

Explanation:

Instantiate an object means creating an instance of accessing the property of a class we can create instance or object for that class. The property of class means method and variable with the help of instance we can directly access the method and variable.

For example  

class abc // class abc

{

public:

void sum1() // function definition

{

cout<<" hello "; // display hello

}

};

void main() // main method  

{

abc ob; //  creating an instance  

ob.sum1(); // calling a function sum1  

}

Output:

hello

Here we create a instance of class abc i.e ob which can access the method sum1().

What is the Java source filename extension? What is the Java bytecode filename extension?

Answers

Answer:

The extension of java source filename is .java and the extension of bytecode filename is .class

Explanation:

The java program is saved with the classname along with .java extension. The .java extension indicated that the particular file in java file.

Suppose we have a program  

public class Main1

{

public static void main(String[] args) {

 System.out.println("Hello:");

}

}

This program is saved as :Main1.java

To compile this program in command prompt we use javac Main1.java.

On compiling the java program it will be converted into byte code which has extension .class filename extension. So on compile, this program will be converted into Main1.class

. What is an APT? What are some practical strategies to protect yourself from an APT?

Answers

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

Sound Internal AuditingStrong Password Accessing PoliciesStringent policies for accessing any deviceIntroduction and implementation of multi factor authenticationStrong IDs and sound honeypot solutions

you are engaged in affinity analysis. what does this mean?

a. grouping entities and attributes in logically organized table structures.

b. looking for data that logically attracts interest.

c. capturing all relevant information about a topic in a single interview with subject matter experts

d. searching for pattern matches

Answers

Answer:

The answer is d.seaching for pattern matches.

Explanation:

Affinity analysis is a technique of data analysis and data mining used to discover relationships among activities performed by a group of interest. It's applied to process where the group of interest records information of their activities and that can be identified. In other words, this technique is used to analyze the behavior of people to identify patterns to determine links into potential purchases.

Time and weather Write a program to take as input and 4-digit number from the user. The first two digits represent the day of the month and the last two digits represent the month of the year. The program should then display the following: "It's winter" if the month entered is 12, 1 or2 . "It's Spring" if the month entered is 3, 4, or 5 "It's Summer", if the month entered is 6,7, or 8 "It's Fall", if the month entered is 9, 10, or 11 The program should also display the current week number of the month

Answers

Answer:

#here is program in python

#read 4 digit number

date=int(input("enter the date:"))

#first 2 digit is day

day=int(date/100)

#last 2 digit is month

month=date%100

#find the week of the month

if day<=7:

  week=1

elif day>=8 and day<=14:

  week=2

elif day>=15 and day<=21:

  week=3

elif day>=22 and day<=28:

  week=4

elif day>=29:

  week=5

#check for Winter

if month in [12,1,2]:

  print("week {} of Winter.".format(week))

# check for Spring

elif month in [3,4,5]:

  print("week {} of Spring.".format(week))

#check for Summer

elif month in [6,7,8]:

  print("week {} of Summer.".format(week))

#check for Fall

elif month in [9,10,11]:

  print("week {} of Fall.".format(week))

Explanation:

Read a 4 digit number from user.first 2 digits represents the day and last 2 month.Then find the week of the month.If the month is in [12,1,2] then it will print "Winter" and week of that month.If month is in [3,4,5] then print "Summer" with week.If the month is in [6,7,8] then "Summer" and if the month is in [9,10,11] then "Fall".

Output:

enter the date:1212

week 2 of Winter.

In a typical configuration the total RAM capacity is less than total ROM capacity.

True

False

Answers

Answer:

False

Explanation:

The difference between RAM and RAM is as follows

(1) RAM (random access memory) is meant for temporary storage whereas ROM (read-only memory) is meant for permanent storage.

(2) RAM chip is volatile, means once the power is turned off, it loses the previously holding information, where as ROM is non-volatile it doesn't losses any information even though power is turned off.

(3) RAM chip is used in the normal operations of the computer, whereas the ROM chip is used mainly for the startup process of computer.

(4) Generally, A RAM can store several gigabytes (GB) of data that is up to 16 GB whereas a ROM chip can typically store that much data. It only stores several megabytes (MB) of data that is up to 4 MB.

hence, the given statement about RAM is false.

Many business databases consist of multiple tables with ____ among them.

Relationships

Arrows

Objects

Constraints

Answers

Answer: Relationship

Explanation:

 Many organization and business consist multiple tables with the relationship when the multiple data in the table are basically associate with the multiple data in the another table.

When we create a database, then foe each entities we use separate table for every particular entities. The relationship between the multiple table is basically used to represent multiple data in the database.

There are basically different type of the relationship in the database that are:

One to one relationshipOne to many relationshipMany to many relationship  

 

.In Linux what command sequence do we enter to stop a program?

Answers

Answer:

exit command is used to stop the program.

Explanation:

exit command is used to exit the shell when it is currently running.It can take one or more arguments exit[n] and exits the shell and returns the status of n.

exit with parameters

exit [n] exits the shell and returns the status of n.

exit without parameters

exit exits the shell and returns the status of last command that is executed.

Is spread spectrum transmission done for security reasons in commercial WLANs?

Answers

Answer: No

Explanation: Spread spectrum transmission is the wireless transmission technique for the wide channel that helps in decrement of the potential interference.The transmission of signal is based on the varying the frequency knowingly to achieve larger bandwidth.

The use of spread spectrum transmission in the WLAN(wireless local area network)is used for the regulatory purpose The regulation is the controlling of the area  through policies.Thus,security is not the service that is provided to WLAN by spread spectrum transmission.

What is ‘verification’?

Answers

Answer: Verification in the terms of the computer field is defined as the process which is for testing of the consistency and the accuracy of the information, algorithm, data, etc. Verification is carried out by the approval or disapproval method after the checking process.

This techniques helps in verifying whether the function,algorithm ,data that has been accessed in the system is complete and precise or not so that it can properly function in the operating system.

A use case model describes what a system does without describing how the system does it. (Points : 1.5) True
False

Answers

Answer:

The correct answer is true.

Explanation:

By definition, a use case is a list of events that defines the interactions between an actor and a system to achieve a goal. Generally, Use cases are used by functional analysts at a higher level to represent requirements, missions or stakeholder goals.  

"What does the list look like after this code executes?

colors = "red,orange,yellow,green,blue"
s = colors.split(",")

["red", "orange", ""yellow", "green", "blue"]

["red orange yellow green blue"]

[red,orange,yellow,green,blue]

red

Answers

Answer:

The list created by the split method in Python 3 will be ["red", "orange", ""yellow", "green", "blue"]

Explanation:

In Python 3, the split method takes the input string, in this case is colors = "red,orange,yellow,green,blue", and split it into a list and you can indicate the separator that the method will use.

The general syntax for this method is:

string.split(separator,max)

separator indicates the character that will be used as a delimiter of each list member and the max parameter indicates the maximum number of separations to make.  

Since each color in your string is separated by the character "," the code will make a list in which every color is a separated string.

To edit a form, use

datasheet view.
design view.
layout view.
layout view or design view.

Answers

Answer: Design view

Explanation:

 We use design view for editing and modifying the forms. The design view is basically used to create the form and then also edit the form structure. It is also capable for reducing the scope in the particular structure.

In the design view, we can use the property sheet for modifying the properties in the form and also control its features in the particular section of the form structure.

It basically provide the wide variety of comprehensive form structure and it basically helped to organize the proper information in the form.  

Answer: layout view

Explanation; on edge

The default behavior for Connector/Python is to use __________ results.

a

buffered

b

unbuffered

c

uninitialized

d

list-based

Answers

Answer: (C) Uninitialized

Explanation:

 The default behavior is basically used as the uninitialized result for the connector and python. As a matter of course, MySQL Connector/Python doesn't cradle or pre-fetch results. This implies after a question is executed, your program is in charge of bringing the information.

This stays away from unnecessary memory use when inquiries return huge outcome sets. On the off chance that you realize that the outcome set is little enough to deal with at the same time, you can get the outcomes promptly by setting supported as "TRUE".

Write a function called reverse() with this prototype:

void reverse(char dest[], char source[], int size);

Your function should copy all the elementsin the array source into the array dest, except in reverse order. The number of elements in the source array is give in the parameter size. Use a for loop to do the copying. Assume that dest is large enough to hold all of the elements. Please be thorough with commenting.

Answers

Answer:

void reverse(char dest[], char source[], int size)

{

   for(int i=0;i<size;i++)//using for loop.

   {

       dest[i]=source[i];//assigning each element of source array to dest array.

   }

   int s=0,e=size-1;//initializing two elements s with 0 and e with size -1.

   while(s<e){

       char t=des[s];             //SWAPPING

       dest[s]=dest[e];            //SWAPPING

       dest[e]=t;                  //SWAPPING

       s++;

       e--;

   }

}

Explanation:

I have used while loop to reverse the array.I have initialize two integer variables s and e with 0 and size-1.Looping until s becomes greater than e.

It will work as follows:

first s=0 and e=0.

dest[0] will be swapped with dest[size-1]

then s=1 and e=size-2.

then des[1] will be swapped with dest[size-2]

and it will keep on going till s is less than e.

An oral defamatory statement is ____.

Abuse
Slang
Slander
Defamation

Answers

Answer: Slander

Explanation: Slander is the orally spoken statement that has the defamatory meaning.The meaning of the defamatory statement is having the negative, false, hatred, ridicule etc feeling in the hidden form.This statement shows the false intention.

Slander is marked as the untrue defamatory statement .Other options are incorrect because abuse is statement containing abusive language, slang contains the informal language and defamation is the false claim .Thus the correct answer is slander.

What is an operating system? What are the main functions of a modern general purpose operating system?

Answers

Answer:

An operating system is a software that allows a user to run other applications on a computing device. The applications generally are not designed to interface directly with hardware, almost all of the applications are written to run on an operating system, in order to become independent of the hardware design.

The main function of an operating system are:

manage the hardware resources of a computer: central processing unit, memory, disk drives, and printers. establish a user interface to facilitate the interaction human-computer. execute and provide services for software applications.

How many bytes are there in 256 Kbytes?

Answers

Answer:

256000 bytes.

Explanation:

One Kilo byte(KB) consists of 1000 bytes.So the number of bytes in 256 kilo bytes is :-

1 kilobyte = 1000 bytes.    

256 kilo bytes = 256 x 1000 bytes.  

256 kilo bytes = 256000 bytes.  

Also 1 bytes consists of 8 bits.

1 kb = 1000 bytes.

1GB Giga byte = 1024 kilo bytes.

1 TB Tera Byte = 1024 Giga Bytes (GB).  

Hence the answer to this question is  256,000 bytes.

. Use one command to create a /sales directory with the permissions of 770

Answers

Answer:

mkdir -m 770 sales

Explanation:

The command mkdir is used to create a directory and the attribute or flag

-m is used to  assign permissions on create a folder.

Example:

mkdir -m 770 sales

Create a folder with permissions 770 with name sales

From an IT perspective, which of the following best describes BI and BI apps?
a. Stand-alone
b. Support a specific objective
c. A collection of ISs and technologies
d. Web-based systems designed for for-profits

Answers

Answer:a)Stand-alone

Explanation: Stand-alone application is the application that is found on the system of every client.In accordance with the IT section, Business intelligence can be transferred into stand-alone application .This helps in the development of the essence of the system at an independent level.

Other options are incorrect because supporting a certain factor will not make it independent, cannot act as the group of ISs technology or web system for gaining profit.Thus,the correct option is option(a).

In MIPS architecture, the Program Counter is:

A register that stores the next instruction to be executed

A register that stores the address of the next instruction to be executed

A binary counter that counts how many instructions have been executed

A control circuit that steps through a sequence of instructions

A register that stores the current location in memory to read and write from

Answers

Answer: A register that stores the address of the next instruction to be executed

Explanation: Program counter is register of the CPU(central processing unit) .It contains the memory address of the instruction that is to be executed in next turn after the present instruction is executed.This is also known as the instruction pointer .The cycle followed by the counter is fetch ,decode and execute.

Other options are incorrect because it does not store next instruction,does not count number of instruction or stores the memory for reading and writing.It also does not act as a control circuit.

A sequential file stored on a(n) ____________ can be updated in place.

(Points : 2) direct access storage device
paper tape
punch card file
line printer

Answers

Answer: Direct access storage device

Explanation:

 The sequential file is the simple method for organization of different types of files. The files and records are basically stored in the direct access storage device in the sequentially manner so that we can directly access the particular file according to the requirement.

The direct access storage device basically allow the any file and elements to access directly from the given storage device and address. It is less time consuming method so that it increase the overall efficiency of the system.

On the other hand, all the other options are not associated for storing the sequential file. Therefore, Direct access storage device is the correct option.

Writе thе dеclaration of a doublе pointеr namеd avеragе

Answers

Answer:

double *average; //  declaration of a doublе pointеr .

Explanation:

A pointer is a variable that will store the address of another variable of the same datatype. Here average is a pointer type variable that means it will store the address of double datatype variable.  

syntax of declaring double datatype variable  

double *variable_name  ;

double *average;  

For example:

double *average;

//declaration of a doublе pointеr

double r=90.897;

// variable r of double datatype

average=&r;// storing the address of r

Please discuss the differences between the array implementation and the linked list implementation of queues. List the advantages and disadvantages of each implementation.

Answers

Answer:

Arrays and linked list are data structures used to store data but it has some advantages and disadvantages.It Is important keep in mind thath both of them are completely usefull in it own case

Explanation:

Advantages:

Linked list: It doesn't have a size limitationIt is easy insert new elementsit doesn't have memory limitationArray:It is possible access random elementsThe memory requirements are less than linked list

Disadvantages:

Linked list:It is not possible access random element in the listit Require more memory to store the pointer to the next elementArray:It is expensive insert new elementsit is fixed sizeit needs continuos memory (memory limitation)

Write a C++ program that will convert distance measurements from miles to kilometers. Specifically, the program needs to convert 0, 10, 20, 30, 40 , 50, 60, 70, 80, and 90 miles to kilograms displaying both the number of miles and the number of kilograms on the same line.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// loop that will convert 0,10,20.....90 miles to kilometer

   for(int a=0;a<=90;a=a+10)

   {

   // convert miles to kilometer

       double kilo_m=a*1.609;

       // print the result

       cout<<a<<" miles is equal to "<<kilo_m<<" kilometer."<<endl;

   }

return 0;

}

Explanation:

Run a for loop from 0 to 90.First change 0 miles to kilograms by multiply 1.609. Then Increment "a" by 10 until it "a" is less or equal to 90.And change them into kilometer.

Output:

0 miles is equal to 0 kilometer.

10 miles is equal to 16.09 kilometer.

20 miles is equal to 32.18 kilometer.

30 miles is equal to 48.27 kilometer.

40 miles is equal to 64.36 kilometer.

50 miles is equal to 80.45 kilometer.

60 miles is equal to 96.54 kilometer.

70 miles is equal to 112.63 kilometer.

80 miles is equal to 128.72 kilometer.

90 miles is equal to 144.81 kilometer.

The parameters needed for a MySQL database connect string are

a

host name

b

user name

c

password

d

All of the above

Answers

Answer:

d. All of the above.

Explanation:

The parameters required to for a MYSQL database connect string are as following:-

Host Name.User Name.Password.New link.Client flags.

So  among  the  given  options all of them  are  required  and  those are host name,user name,password.

Hence the answer to this question is option d all of the above.

Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it?

Answers

Answer:

The answer to the questions: Does Kennesaw State University have any computing ethical policy for computer usage? If so - what is it? Would be as follows:

1. Yes, Kennesaw State University, a university in Georgia, does have a computing ethical policy that regulates the proper use of the facilities and computing services within the facilities of the university and the use of computing equipment that belongs to the university. This policy is known as the KSU Computer Usage Policy.

2. As said before this policy establishes that the use of computing services are not the right of a person, but rather a privilege afforded to the students, faculty and other people who are present in the university and who may need to use its computing services. The use of the computing services would be whitin this policy as long as it stays inside the delimitations established by federal, state and University policies.

Explanation:

Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if the user entered month 2 and year 2000, the program should display that February 2000 has 29 days. If the user entered month 3 and year 2005, the program should display that March 2005 has 31 days.Here is a sample run of this program:Enter a month in the year (e.g., 1 for Jan): 1Enter a year: 2009January 2009 has 31 daysExercise 3.11Liang, Y. Daniel. Introduction to Java Programming (8th Edition)

Answers

Answer:

Following are the program in JAVA language  

import java.util.Scanner; // import package

import java.util.Calendar; // import package

public class Main // class main  

{  

public static void main(String[] args) // main function  

{  

Scanner input = new Scanner(System.in); // for user input  

Calendar calendar = Calendar.getInstance(); //get calendar instance for methods  

int nYear , nMonth , date =1 , nDays;

String MonthOfName = "";

 System.out.print(" Enter a month in the year :");

 nMonth = input.nextInt(); //input Month

 System.out.print("Enter a year :");

 nYear = input.nextInt(); //Input Year

 switch (nMonth) //Find month name via 1-12

 {

  case 1:

MonthOfName = "January";

nMonth = Calendar.JANUARY;

break;

case 2:

MonthOfName = "February";

nMonth = Calendar.FEBRUARY;

break;

case 3:

 MonthOfName = "March";

nMonth = Calendar.MARCH;

break;

 case 4:

 MonthOfName = "April";

nMonth = Calendar.APRIL;

 break;

 case 5:

MonthOfName = "May";

nMonth = Calendar.MAY;

break;

case 6:

MonthOfName = "June";

nMonth = Calendar.JUNE;

break;

case 7:

 MonthOfName = "July";

nMonth = Calendar.JULY;

break;

 case 8:

MonthOfName = "August";

nMonth = Calendar.AUGUST;

break;

case 9:

MonthOfName = "September";

nMonth = Calendar.SEPTEMBER;

break;

case 10:

MonthOfName = "October";

nMonth = Calendar.OCTOBER;

break;

case 11:

 MonthOfName = "November";

nMonth = Calendar.NOVEMBER;

break;

case 12:

MonthOfName = "December";

nMonth =Calendar. DECEMBER;

         }        

 calendar.set(nYear, nMonth, date); // set date to calender to get days in month

nDays=calendar.getActualMaximum(Calendar.DAY_OF_MONTH); // get no of days in month

System.out.println(MonthOfName + " " + nYear + " has " + nDays + " days."); //print output

}

}

Output:

Enter a month in the year : : 09

Enter a year : 2019

September 2019 has 30 days.

Explanation:

In this program we have take two user input one for the  month and other for the year Also take two variables which are used for storing the month name and no of days in a month. with the help of switch we match  the cases  and store the month value .After that  set the date to calender with help of calendar.set(nYear, nMonth, date) method and  To get the number of days from a month  we use  calendar.getActualMaximum(Calendar.DAY_OF_MONTH);  method and finally print year and days.

 

     

Business competition is no longer limited to a particular country or even a region of the world.
True
False

Answers

Answer:

The best answer to the question: Business competition is no longer limited to a particular country or even a region of the world:___, would be: True.

Explanation:

Globalization has changed the way that all aspects of human life, and human activities develop. Globalization has meant the erasing of limitations that were placed primarily on trade and economic activities, but it also extended to other aspects of life. Because of technology advancements, especially in communications, connectivity, and travelling, the world is now easily connected and limitations are only placed up to a certain level. Thus, and especially economically, business competition has become a global issue too, with now more and more presence of multinational businesses, companies that extend not necessarily to one country, or even one region of the world, but extend to any region that will allow them to enter for business exchanges.

Other Questions
The Stokes-Oseen formula for drag force, F, on a sphere of diameter D in a fluid stream of low velocity, v, density rho and viscosity is [tex]F = 3\pi \mu DV + \frac{9\pi}{16} \rho V^2 D^2[/tex]Is this formula dimensionally consistent? Artists can use color, line and shape to represent emotions and feelings. Image A uses bright colors in the piece. Image B uses dark colors in the piece. How do the dark colors change the emotions portrayed in Image B?A. Image A and B represent similar emotions. B. Image B is more cheerful.C. Image B is more realistic.D. Image B is more somber. Richard is driving home to visit his parents. 135 mi of the trip are on the interstate highway where the speed limit is 65 mph . Normally Richard drives at the speed limit, but today he is running late and decides to take his chances by driving at 73 mph . A moving van travels 10km North, then 4 km east, drops off some furniture and then drives 8 km south. (a) Sketch the path of the moving van. (2) How far is the van from its starting point? (Hint: it is the magnitude of the displacement vector). The travel time for a plane traveling at a rate of r kilometers per hour for 900 kilometers A convenient and cost-effective way to store biogas is to use light-weight, rigid gas containers. The pressure and temperature of biogas stored in a 10 m^3 container are 1.5 bar and 5C, respectively, as measured at an early morning time (state 1). The temperature of the biogas is expected to increase to 40C at noon on the same day, without any significant change in the volume of the container or amount of methane in the container (state 2). The biogas can be approximated as methane (CH4) modelled as an ideal gas with constant specific heat ratio, k = 1.4. The effects of gravity and motion are negligible. The reference environment pressure and temperature are, respectively, po = 100 kPa and To = 0 C. The molecular weight of methane is M = 16.04 gmol-1. The universal gas constant is R= 8.31 J mol-1K-1. (a) Calculate the mass, in kg, and amount of substance, in mol, for the methane in the container. What is the difference between a personal manager and a business manager? (((PICTURE ATTACHED))) please help Which of the following is not a property of water?Group of answer choicesA.ability to adhere to other substancesB.ability to moderate temperaturesC.ability to contract upon freezingD.ability to dissolve a wide variety of substances Consider the following statements about Newton's 2nd law in general. Select all of the statements that are true. Note, there may be more than one. Pay attention to synonyms: velocity and change in position are the same thing.1. A net force causes velocity to change2. If an object has a velocity, then we can conclude that there is a net force on the object3. Accelerations are caused by the presence of a net force A piston-cylinder assembly contains air, initially at 2 bar, 300 K, and a volume of 2 m^3. The air undergoes a process to a state where the pressure is 1 bar, during which the pressure-volume relationship is pV = constant. Assuming ideal gas behavior for the air, determine the mass of the air, in kg, and the work and heat transfer, each in kJ. Find the area of this irregular polygon. In terms of "borrowing and lending," banks __________. eliminate all risk when saving money. charge interest to lenders. enforce penalties for non-repayment. If someone asks you "what is it like to stand on top of that mountain?" that person is asking you a question about ____. 9x+7x=0 Solve quadratic equation by factoring Tour players Harry, Ron, Harmione and Ginny are playing a card game. A deck of 52 cards are dealt out equally. If Harmione and Ginny have a total of 8 spades among them, what is the probability that Harry has 3 of the remaining 5 spades? If it is 5:00 pm in Bloomington, OH, what time is it in St. Louis, MO? Consider the resistances of short and open circuits. Fill in the blanks: The voltage across a short circuit will always be ______________ The voltage across an open circuit will always be ______________ The quotient of a number 2 is 7 You are driving to visit a friend in another state who lives 440 miles away. You are driving 55 miles per hour and have already driven 275 miles. Write and solve an equation to find how much longer in hours you must drive to reach your destination.