Write a program that use a switch statement whose controlling expression is the variable area code. If the value of area_code is in the table, the switch statement will print the corresponding city's name to the screen. Otherwise, the switch statement will print the message "Area code not found." to the screen. Use case "fall throughs" in order to simplify the switch block as much as possible.

Answers

Answer 1

Answer:

Table for Area codes are not missing;

See Attachment for area codes and major city I used

This program will be implemented using c++ programming language.

// Comments are used for explanatory purposes

// Program starts here

#include <iostream>

using namespace std;

int main( )

{

// Declare Variable area_code

int area_code;

// Prompt response from user

cout<<Enter your area code: ";

cin<<"area_code;

// Start switch statement

switch (area_code) {

// Major city Albany has 1 area code: 229...

case 229:

cout<<"Albany\n";

break;

// Major city Atlanta has 4 area codes: 404, 470 678 and 770

case 404:

case 470:

case 678:

case 770:

cout<<"Atlanta\n";

break;

//Major city Columbus has 2 area code:706 and 762...

case 706:

case 762:

cout<<"Columbus\n";

break;

//Major city Macon has 1 area code: 478...

case 478:

cout<<"Macon\n";

break;

//Major city Savannah has 1 area code: 912..

case 912:

cout<<"Savannah\n";

break;

default:

cout<<"Area code not recognized\n";

}

return 0;

}

// End of Program

The syntax used for the above program is; om

Write A Program That Use A Switch Statement Whose Controlling Expression Is The Variable Area Code. If

Related Questions

There are four ages which drove the advancement of Information Technology: Premechanical; Mechanical; Electromechanical; and "BLANK"
A. Electronic
B. NASA space shuttles

Answers

Answer:

A. Electronics

Explanation:

Because im smart like that

When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at CERN chose to make the underlying code publicly available on a royalty-free basis so that anyone who ever wanted to use it or build upon it could do so without having to pay any licensing fees to CERN or ask for CERN's permission.
Which of the following best describes the reasons for this decision?

a. CERN did not recognize the full potential of the World Wide Web and did not think it was worth investing any more of its own resources into its further development.
b. By offering the Word Wide Web as a freely available alternative, CERN hoped to discourage people from using America Online, CERN's biggest competitor for online communication services.
c. Had the technology been proprietary (i.e., closed and privately licensed), it would likely not have become as popular as it has or have been adopted by so many users and institutions across the globe.
d. Because Tim Berners-Lee did not ask his employers for permission before using CERN resources to develop the World Wide Web, as punishment, he was required to give the technology away for free and sacrifice the millions of dollars he could have personally made by selling his idea for a profit.

Answers

Answer:

c.

Explanation:

People trust open-source software - if they can see how it works and understand it, they can help improve it and build applications using it. If these protocols were not publicly available - then nobody would have implemented services using them - so nobody would be adopting it.

After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready to save her presentation again. How can she accomplish this task? Check all that apply.
She can press the keys Ctrl+S.
She can press the function key F12.
She can open the File tab and click Save.
She can go to the Backstage view and click Save As.
She can click the Save option in the Quick Access tool bar.

Answers

Answer:

a, c, & e

Explanation:

Answer:

1st, 3rd, and 5th

Explanation:

What is syntax?

rules for using tags correctly in HTML
text containing hyperlinks that can go to other hypertext pages
information about how an element should be used by a web browser
text used to mark text or images on a web page

Answers

Answer: Rules for using tags correctly in HTML.

Explanation:

The syntax is a set of rules for using the tags correctly on the HTML page. Thus option A is correct.

What is the syntax?

The syntax is an arrangement of the words that in phases are sued to create well-formed sentences. The system is an analysis of the language. It shows how the words come with larger units.

In computer the Syntex refers to the programming language and is the set of rule that defines the combination of those symbols that are correctly structured.

Find out more information about the syntax.

brainly.com/question/831003

Get two positive integers from the user. Write code to multiply the two numbers together using only addition or subtraction. You should not use the '*' operator. Remember that x*y is simply x+x+x+...+x, y times. You may use eitnher a for loop or a while loop

Answers

Answer:

number1 = int(input("Enter the first number: "))

number2 = int(input("Enter the second number: "))

result = 0

for i in range(number1):

   result += number2

print(str(result))

Explanation:

Ask the user for two numbers

Initialize result as 0 to hold the multiplication of the numbers

Create a for loop that iterates "number1" times. In each iteration, add number2 to the result.

When the loop is done, print the result

Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.
A. True
B. False

Answers

Answer:

True

Explanation:

In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.

Here's another question!

What is some iterative programming structure uses?

Answers

Answer

Often in an algorithm, a group of statements needs to be executed again and again until a certain condition is met, this is where we find the need for iteration.

The repeated execution of some groups of code statements in a program is called iteration.

In iteration control structures, a statement or block is executed until the program reaches a certain state, or operations have been applied to every element of a collection. This is usually expressed with keywords such as while, repeat, for, or do..until.

The basic attribute of an iteration control structure is to be able to repeat some lines of code. The visual display of iteration creates a circular loop pattern when flowcharted, thus the word “loop” is associated with iteration control structures. Iteration can be accomplished with test before loops, test after loops, and counting loops. A question using Boolean concepts usually controls how often the loop will execute.

Applications of Iteration

Iteration methodology has various applications in the programming world

Problem-solving in arrays, vectors, lists, strings, etc. Problem-solving using Stack, Queue and Priority Queue Bottom-up implementation of Dynamic Programming Implementation of greedy algorithms BFS traversal of tree and graph Problem-solving using Hash Table and BST Iterative Implementation of recursive code using stack

Iteration (Repetition) Control Structures

pseudocode: While

count assigned zero

While count < 5

   Display "I love computers!"

   Increment count

End

pseudocode: Do While

count assigned five

Do

   Display "Blast off is soon!"

   Decrement count

While count > zero

pseudocode: Repeat Until

count assigned five

Repeat

   Display "Blast off is soon!"

   Decrement count

Until count < one

pseudocode: For

For x starts at 0, x < 5, increment x

   Display "Are we having fun?"

End

16:9 and 4:3 are numbers that refer to an image’s...

Answers

These refer to an aspect ratio of an image.

Mary wants to run a text ad on the Google Search Network. She's new to text ads and needs to start with the basics. What are the three components of a text ad on the Google Search Network that Mary will need to know?

Answers

Answer:

1. Headline

2. URL

3. Description

Explanation:

The three components of a text ad on the Google Search Network that Mary will need to know are;

1. Headline

2. URL

3. Description

The headline component on Search Network Text Ad provides up to three fields of 30 characters each.

The Uniform Resource Locator (URL) has the domain name and the web resource for addressing documents accessible over the internet.

One of the graphics Emily wants to include in her mailings is an illustration, a line drawing whose size she can increase as much as she wants without affecting its overall quality. Which of the following is the most likely format for this illustration?
A) .gif
B) " · png "
C) .wmf
D) .tiff

Answers

Answer:

C) .wmf

Explanation:

Based on the scenario being described within the question it can be said that the most likely format for this illustration would be a .wmf file. This file extension refers to a Windows MetaFile, which is a file format that usually holds vector images to be used in different microsoft software, and is known for being able to resize the image without affecting it's overall quality.

Technician A says that if the coefficient of friction is too low, the brakes will grab.


Technician B says that the coefficient of friction is influenced by the materials in contact.


Who is right?

Answers

Answer:

Only Technician B is right

Explanation:

Technician A is wrong because the brakes will grab and cause the wheel to lock up and slide only if the coefficient of friction is too high. If the coefficient of friction is too low, excessive pressure on the brake pedal will be required to stop the vehicle.

Technician B is right the materials in contact is a factor that influences the coefficient of friction. For example, when ice slides on steel, the two materials slide past each other easily, this means that icehas a low coefficient of friction. On the other hand, rubber on pavement has a high coefficient of friction as the materials do not slide past each other easily.

Therefore, only Technician B is right.

(Exhibit: Production Possibilities Curves 2) Assume that a nation is operating on production possibilities curve CD. Economic growth is best illustrated by a Select one:
a. shift from curve CD to curve AB.
b. shift from curve CD to curve EF.
c. movement from point Q to point O on the frontier CD.
d. movement from point R inside the frontier CD to point P on the frontier CD.

Answers

Answer:

b. shift from curve CD to curve EF.

Required Details of the Question:

The image of the curve required to answer the question has been attached.

Explanation:

A production possibilities curve shows various combinations of the amounts of two goods( in this case capital and consumer goods) which can be produced within the given resources and a graphical representation showing all the possible options of output for the two products that can be produced using all factors of production.

Now the growth of an economy is best illustrated in the image by the shift from curve CD to curve EF, this means that as the nation's production capacity increases, its production possibilities curve shift outward showing an increase in production of both goods.

Which of the following are true?
a. Local variables are created by adding a positive value to the stack pointer
b. A subroutine's stack frame always contains the caller's return address ad the subroutine's local variables
c. A subroutine's prologue code always pushes
d. EBP on the stack Arrays are passed by value to avoid copying them onto the stack

Answers

Answer: False

Explanation:

In Language C please.When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.For this program, adjust the values by subtracting the smallest value from all the values. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain less than 20 integers.Ex: If the input is:5 30 50 10 70 65the output is:20 40 0 60 55The 5 indicates that there are five values in the list, namely 30, 50, 10, 70, and 65. 10 is the smallest value in the list, so is subtracted from each value in the list.For coding simplicity, follow every output value by a space, including the last one.

Answers

Answer:

THE ANSWER IS EASY

Explanation:

The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowing users to search by key term in order to quickly locate links to websites about that particular topic. In order to do this, these search engines use what tool in order to help index and find these results?a. Spiderbotsb. Query Robotsc. Antcrawlersd. Index Finders

Answers

Answer: Query

Explanation:

The Search Criteria is entered and any when a related Query is logged, it speedily bring out the linked details for exploration.

a student writes a prgroma to find the factorial of a number. the factorial for a number n is defined as the product of all whole numbers between 1 and n, inclusive. while attempting to find the factorial for 120, the program's output is not what the student expectec. assuming that the program has been corectly written, what is a possible explanation for the incorrect output?

Answers

Answer:

B. Integers may be constrained in the maximum and minimum values that can be represented in a program because of storage limitations.

Explanation:

Since the program has been written correctly by the student and yet the output of the program is not what was expected, then the next possibility is that because of the limitations in storage, the integers may be constrained in the minimum and maximum values capable of being represented when writing a program.

Jonas is an experienced information security professional with a specialized focus on evaluating computers for evidence of criminal or malicious activity and recovering data. Which GIAC certification would be most appropriate for Jonas to demonstrate his abilities?

Answers

Answer:

The answer is "GIAC Certified Forensic Examiner (GCFE)".

Explanation:

The GIAC Accredited Professional Analyst qualification confirms to the expertise of a professional security analysis, via a focus on smaller skills required to obtain and interpret data from computer systems. The GCFE offers a way for experts, which shows the skills, information, and ability to conduct typical event operations like e-discovery, forensics evaluation, and documentation, and web forensic science, and Platforms application monitoring and client behavior.

A typical broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content. G
a. Webcasts
b. Blogs
c. Microblogs
d. Twitter

Answers

Answer:

Webcasts

Explanation:

The rest of the options don't need to be streamed as there isn't a continuous flow of information.

A multistep protocol used to identify and control potential threats to food-safety is the

Answers

Answer:

The correct answer to the following question will be "Hazard Analysis Critical Control Point system".

Explanation:

HACCP seems to be a monitoring system or tool that addresses food security via the study or monitoring of chemical and functional dangers from either the processing, acquisition as well as storing of raw materials, to the manufacture, sale of the final item.

Sensitive control points or rewards at the same stage where threats could be avoided, removed, or increasing to appropriate levels.It is indeed a multi-stage protocol or method used only to recognize as well as monitor possible food-safety risks.

The correct answer is Hazard Analysis Critical Control Points (HACCP). It's a systematic approach to identifying, evaluating, and controlling food safety hazards that could potentially cause harm to consumers.

To calculate HACCP, follow these steps:

1. Hazard Identification: Identify potential hazards in the food production process. These can include biological hazards (such as bacteria or viruses), chemical hazards (like pesticides or cleaning agents), and physical hazards (such as glass or metal fragments).

2. Determine Critical Control Points (CCPs): CCPs are specific points in the production process where control can be applied to prevent, eliminate, or reduce identified hazards to safe levels. For example, CCPs could be cooking temperatures, cooling times, or storage conditions.

3. Establish Critical Limits: Define the maximum and minimum values for each CCP that must be met to ensure food safety. These limits are often based on regulatory standards or scientific research.

4. Monitor CCPs: Implement monitoring procedures to regularly check CCPs and ensure they are operating within critical limits. Monitoring can involve physical measurements, visual inspections, or testing methods.

5. Establish Corrective Actions: Develop procedures to take corrective action when a CCP deviates from its critical limit. This may involve adjusting processes, disposing of contaminated food, or conducting additional testing.

6. Establish Verification Procedures: Set up verification procedures to confirm that the HACCP system is working effectively. This can include reviewing records, conducting audits, or testing samples.

7. Establish Record-Keeping and Documentation: Maintain detailed records of the HACCP plan, including hazard analyses, CCPs, monitoring results, corrective actions, and verification activities. Documentation is essential for demonstrating compliance with food safety regulations.

By following these steps, food manufacturers can systematically identify and control potential hazards, ensuring the safety of their products for consumers.

Complete Question:

A multistep protocol used to identify and control potential threats to food-safety is the_______

Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text. He turned the brightness all the way up, but that did not correct the issue. Dylan also checked to make sure the Power Options brightness was not turned down, causing the screen to go dim. He connected a different monitor, and the screen was fine. What caused the screen to be very dim

Answers

Answer:

Monitor backlighting

Explanation:

Dylan haven done some troubleshooting on his computer to find out what the problem was but couldn't restore its brightness.

It then means that the Monitor backlighting caused the screen to be very dim.

The Monitor backlighting is bad or faulty.

Answer:

The Liquid Crystal Display lighting of the monitor is most likely faulty.

Explanation:

By connecting his computer to an external monitor and observing that the brightness of the external monitor was fine, we can deduce that the dimness of his computer was not a software issue but that of hardware. That is the computer monitor itself.  

The most probable reason for the dimness of his computer monitor would e an hardware issue occasioned by a faulty LCD - Liquid Crystal Display or LED, the back light powering the LCD of his computer computer monitor would have to be replaced by a qualified technician.

While a vector graphic can be scaled larger or smaller with no change in quality, bitmap graphics display optimally only at their original, or ____, length and width. a. native b. natural c. intended d. final

Answers

Answer:

a. native

Explanation:

While a vector graphic can be scaled larger or smaller with no change in quality, bitmap graphics display optimally only at their original, or native, length and width.

You work for a company that does network cable installations. Your company has been contracted to pull out the existing CAT 3 wiring to install CAT 6. You notice the plug on the end of the CAT 3 is an RJ-45. What is the other connector type that can be used with CAT 3 installations?

Answers

Answer:

RJ-11 connector.

Explanation:

RJ-11 (Registered Jack-11) also known as the phone line or modem port is a network cable having twisted wire pairs and a modular jack with two, four or six contacts. It is generally used with telephones and modem.

Hence, the other connector type that can be used with CAT 3 installations is the RJ-11 connector.

Using the merge method of the Map interface, which statement correctly updates the salesTotalByDept map of type Map to update the sales total for a dept by an integer sales value? Question 3 options: salesTotalByDept.merge(dept, sales,(d,s) -> s + 1); sales.merge(salesTotalByDept, dept, (d,s) -> s + sales); dept.merge(salesTotalByDept, sales, (d,s) -> s + sales); salesTotalByDept.merge(dept, sales, (d,s) -> s + sales);

Answers

Answer:

salesTotalByDept.merge(dept, sales, (d,s) -> s + sales);

Explanation:

In the above statement merge() method is being used which updates the salesTotalByDept map of type Map to update the sales total for a dept by an integer sales value.

Here dept and sales both are used and passed as a parameter to merge() method because salesTotalByDept can be update if both the information about sales and department are provided.

Map.merge() method is used to place new value under the given key if the key does not correspond to any value, or is used to update existing key with a given value.

What is the purpose of the Excel Function Reference?

Answers

Answer:

Step-by-step explanation:

Answer:

To look up functions and their purposes

Explanation:

Edg

A user brings in a smartphone for repair. The device is unable to send/receive calls or connect to WiFi. All applications on the device are working unless they require connectivity. Which of the following is MOST likely causing the problem?
a. Airplane mode
b. Tethering
c. Disabled hotspot
d. VPN

Answers

Answer:

I believe it would be airplane mode:)

Explanation:

A VPN connects you to wifi in a another part of the country or world, hotspot connects others to your celluar when on, tethering is when internet connects to your phone. usually costs $ to do. airplane mode is the only thing left.

Have a great day (or night!)

The issue with the smartphone likely stems from airplane mode being enabled, which turns off all wireless communications. The user should check and disable airplane mode if necessary, and if the problem persists, further troubleshooting steps like restarting the phone and checking VPN settings are recommended.

If a smartphone is unable to send/receive calls or connect to WiFi but operates normally otherwise, the most likely cause is airplane mode. When airplane mode is enabled, all wireless communications, including mobile network, WiFi, and Bluetooth, are turned off to prevent interference with aircraft systems or during certain medical procedures. This would prevent the phone from performing any functions that require connectivity like making calls or connecting to the internet. The user should check to ensure that airplane mode is not activated. If airplane mode is not the culprit, the issue might be more complex, potentially involving hardware or deeper software issues, and further troubleshooting steps would include things like restarting the phone, turning off WiFi, and checking for any active VPN connections which could also cause connectivity problems.

The Fibonacci sequence starts 1, 1, 2, 3, 5, 8, .. . . Each number in the se-quence (after the first two) is the sum of the previous two. Write a pro-gram that computes and outputs the nth Fibonacci number, where n is avalue entered by the user.

Answers

Answer:

value=int(input("Enter the number up-to the user wants the Fibonacci series: "))

a=0

b=1

c=1

for x in range(value):

   print(c,end=" ")

   c=a+b

   a=b

   b=c

Output :

If the user input 5, then the output is "1 1 2 3 5".If the user input 10, then the output is "1 1 2 3 5 8 13 21 34 55".

Explanation:

The above defined a python program which is used for the Fibonacci series.The first line of the program is used to instruct the user and take the input from the user. Then the for loop executes up-to that range value.Then in the for-loop, the two variable needs to store the current value and previous value which is used to give the series after addition.

The stack pop operation

removes from the stack the number of elements specified by its integer parameter

removes all items currently on the stack

extracts one element from the stack and returns it

does not exist: There is no such stack operation

Answers

Answer:

extracts one element from the stack and returns it

Explanation:

Basically,  a stack is an abstract data type that serves as a collection of elements. It has two principal operations:

push, which adds an element to the collection, and

pop, removes an element from the Stack and returns the removed element  This operation is often found in c and java programming.

Therefore, the correct option in our case is that the stack pop operation extracts one element from the stack and returns it.

A(n) ____is a network of organizations and activities needed to obtain materials and other resources, produce final products, and get those products to their final users. a. business triage b. organizational trail c. supply chain d. vendor-managed inventory

Answers

Answer:

c. supply chain

Explanation:

A supply chain in commerce, is a network of organizations and activities needed to obtain materials and other resources, produce final products, and get those products to their final users.

A family preservation program director helps design a study that evaluates the effectiveness of her program to keep children living with their abusive parents by providing the families with daily home visits by social workers. She expects the evaluation to show a dramatic reduction in reported child abuse incidents. Instead, the results show an increase in reported child abuse incidents. The director then concludes that the program was undoubtedly effective, reasoning that there really could not possibly have been an increase in actual abuse due to her program, just an increase in reportage of abuse due to closer monitoring in the daily home visits. The director is committing the error of Group of answer choices illogical reasoning ex post facto hypothesizing selective observation. premature closure of inquiry.

Answers

Answer:

Ex post facto hypothesizing

Explanation:

ex post facto hypothesizing Is invalid in science. It involves making hypothesis after noticing some form of relationship which has been noticed.

The director concluded that the program was undoubtedly effective, and noticed that there really could not possibly have been an increase in actual abuse due to her program. He noticed it was due to an increase in reportage of abuse due to closer monitoring in the daily home visits. This hypothesis validates ex post facto hypothesizing.

What are the advantages of using charts or graphs in spreadsheet software?

Answers

Answer: Can sort out large amount of information into a form that can be easily read.

Explanation:

Answer:

a,c,d

Explanation:

Other Questions
what are the three most important things to know about china The process of dna replicaton occurs just before the specification for a plastic handle calls for a length of 6.0 inches +- .2 inches. The standard deviation of the process is estimated to be 0.05 Inches. what are the upper and lower specification limits for this product. Suppose that preferences over private consumption C and public goods G are such that these two goods are perfect substitutes, that is, the marginal rate of substitution of public goods for private goods is a constant b > 0. Determine the optimal quantity of public goods that the government should provide, and interpret your results. Make sure you show all of the relevant cases. What happens when b changes, or when q changes?Repeat part (a), except with perfect complements preferences, that is, for the case where the representative consumer always wishes to consume private consumption goods and public goods in fixed proportions, or C = aG, with a > 0. If half of the pie below is eaten, what fraction remains? PLZZZZZZZZZ HELPPPPPPPPPRead the excerpt from "Pirate Story" by Robert Louis Stevenson.Three of us afloat in the meadow by the swing,Three of us aboard in the basket on the lea.Winds are in the air, they are blowing in the spring,And waves are on the meadow like the waves there are at sea.Adventure and imagination are exciting for children. This is a theme found in these lines.How does repetition strengthen the theme of adventure and imagination?The repeated words discourage action and play.The repeated words express movement and travel.The repeated words are numbers and scientific terms.The repeated words warn of danger and harm. g write a program which will take a list of integer number from the user as input and find the maximum and minimum number from the list. first, ask the user for the size of the array and then populate the array. create two user define functions for finding the minimum and maximum numbers from the array. finally, you need to print the entire list along with the max and min numbers. you have to use arrays and user-define functions for the problem. Which popular style has the simplest melodies and harmonies?rock and rollexpressionismjazzscat Josephines father is 5 times as old as Josephine. In 6 years, he will be only three times as old. How old is Josephine now? Brandon bought four packs of dog treats he gave for treats to his neighbor's dog now Brandon has 24 treats left for his dog how many dog treats were in each pack explain how you know Lindsay is 555 years younger than Mark. Seven years ago, the sum of their ages was 313131. Let lll be Lindsay's age and let mmm be Mark's age. Which system of equations represents this situation? The manufacturer of an airport baggage scanning machine claims it can handle an average of 530 bags per hour. (a-1) At = .05 in a left-tailed test, would a sample of 16 randomly chosen hours with a mean of 510 and a standard deviation of 50 indicate that the manufacturers claim is overstated? Choose the appropriate hypothesis. a. H1: < 530. Reject H1 if tcalc > 1.753 b. H0: < 530. Reject H0 if tcalc > 1.753 c. H1: 530. Reject H1 if tcalc < 1.753 d. H0: 530. Reject H0 if tcalc < 1.753 a b c d (a-2) State the conclusion. a. tcalc = 1.6. There is not enough evidence to reject the manufacturers claim. b. tcalc = 1.6. There is significant evidence to reject the manufacturers claim. a b Can you plz answer it!!On the electromagnetic spectrum, visible light is positioned betweenA. radio and infraredB. infrared and ultravioletC. microwaves and ultravioletD. x- rays and gamma rays To transfer into a particular technical department, a company requires an employee to pass a screening test. A maximum of 3 attempts are allowed at 6-month intervals between trials. From past records it is found that 40% pass on the first trial; of those that fail the first trial and take the test a second time, 60% pass; and of those that fail on the second trial and take the test a third time, 20% pass. For an employee wishing to transfer:(A) What is the probability of passing the test on the first or second try?(B) What is the probability of failing on the first 2 trials and passing on the third?(C) What is the probability of failing on all 3 attempts? Where are the asymptotes for the following function located? f (x) = StartFraction 7 Over x squared minus 2 x minus 24 EndFraction x = 4 and x = 6 x = 4 and x = 7 x = 4 and x = 6 x = 6 and x = 7 Rachel has bought 24 pounds of dog food. She feeds her dog 3/4 pounds for each meal. For how many meals will the food last? The manager of a paint supply store wants to determine whether the mean amount of paint contained in 1-gallon cans purchased form a nationally known manufacture is actually 1 gallon. You know from the manufacturers specifications that the standard deviation of the amount of pant is 0.02 gallon. You select a random sample of 50 cans, and the mean amount of paint per 1-gallon cans is 0.995 gallon.a. Is there evidence that the mean amount is different from 1.0 gallon (use = 0.01)?b. Compute the p-value and interpret the meaningc. Construct a 99% confidence interval estimate of the population mean amount of paint.d. Compare the results of (a) and (c). What conclusions do you reach? Which statement best summarizes the connection between Jacksons life and her music? What happened to Ottoman territory in the Middle East after World War I?OA. The Republic of Turkey took control of the region after winning itsindependence.OB. Local populations were granted their own nations through thepolicy of self-determination.OC. Troops from Bolshevik Russia occupied the territory after winninga war against Britain and France.OD. It was divided between Britain and France through the mandatesystem.SIIRMAT Calculate H rxn for the reaction: 5 C ( s ) + 6 H 2 ( g ) C 5 H 12 ( l ) Use the following reactions and given Hs: C 5 H 12 ( l ) + 8 O 2 ( g ) 5 CO 2 ( g ) + 6 H 2 O ( g ) H = 3244.8 kJ C ( s ) + O 2 ( g ) CO 2 ( g ) H = 393.5 kJ 2 H 2 ( g ) + O 2 ( g ) 2 H 2 O ( g ) H = 483.5 kJ