11.2 Write a program that converts feet and inches to centimeters. The program asks the user to values in feet and inches and it converts them into centimeters. Use the following functions: - display description to user - one or more for calculation - output Use a constant for conversion factors. Include a loop that lets the user repeat the program until the user says she or he is done. 1 inch = 2.54 centimeters 1 foot = 12 inches -Code lineup -Indentation -meaningful names for variables -name constants for values that do not change -description to user -add comments -add comments for functions Place both java files into a folder. Compress the folder and submit it.

Answers

Answer 1

This Java program converts feet and inches to centimeters using a conversion factor. It prompts the user for input, calculates the conversion, and allows for repeated conversions until the user chooses to stop.

Here's an example of a Java program that converts feet and inches to centimeters:

```java

import java.util.Scanner;

public class FeetToCentimetersConverter {

   public static final double INCHES_TO_CM = 2.54;

   public static final int INCHES_PER_FOOT = 12;

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       String choice;

       do {

           System.out.println("Feet and Inches to Centimeters Converter");

           System.out.print("Enter the number of feet: ");

           int feet = scanner.nextInt();

           System.out.print("Enter the number of inches: ");

           int inches = scanner.nextInt();

           double totalInches = feet * INCHES_PER_FOOT + inches;

           double centimeters = totalInches * INCHES_TO_CM;

           System.out.printf("%d feet %d inches = %.2f centimeters%n", feet, inches, centimeters);

           System.out.print("Convert another measurement? (yes/no): ");

           choice = scanner.next();

       } while (choice.equalsIgnoreCase("yes"));

       System.out.println("Thank you for using the Feet to Centimeters Converter!");

       scanner.close();

   }

}

```

In this program, we use a constant `INCHES_TO_CM` to represent the conversion factor from inches to centimeters (2.54) and `INCHES_PER_FOOT` to represent the number of inches in a foot (12). The program prompts the user for the number of feet and inches, calculates the total inches, and converts it to centimeters using the conversion factor. The result is then displayed to the user.

The program includes a loop that allows the user to repeat the conversion process until they indicate that they are done by entering "no" when prompted. It also provides a description to the user at the beginning and a thank you message at the end.

Please note that the program assumes valid integer inputs from the user. Additional input validation can be added if needed.

Remember to save both the Java file and the program file in a folder and compress the folder before submission.

Learn more about Java here: brainly.com/question/33208576

#SPJ11


Related Questions

web design, pls help me i need this in 40 minutes ​

web design, pls help me i need this in 40 minutes

Answers

<input type="color">: This input type allows the user to select a colour using a colour picker. , This input type, "date," enables users to choose a date from a calendar.

Which seven different text structures are there?

A few examples of text structures are sequence/process, description, time order/chronology, proposition/support, compare/contrast, problem/solution, cause/effect, inductive/deductive, and research.

How should a date be formatted?

Here is a general rule to remember when writing dates with commas: in the month-day-year format (used in the United States), use commas after the day and year. Do not use any commas when using the day-month-year format, which is used in the UK and other nations. In 2007, on May 13, Daniel was born.

To know more about input type visit:-

https://brainly.com/question/14543408

#SPJ1

9. Which of the following statements about polymorphism is correct? a) Polymorphism is only possible through inheritance. b) Polymorphism is only possible through interfaces. c) Polymorphism is only possible through abstract classes. d) Polymorphism is possible through both inheritance and interfaces. e) Polymorphism is always possible.

Answers

Form the given statements, Polymorphism is possible through both inheritance and interfaces is True. Polymorphism refers to the ability of objects to take on different forms or to exhibit different behavior in different situations. So, option D is the correct answer.

Polymorphism in object-oriented programming refers to the ability of an object to take on multiple forms. Polymorphism enables treating objects from different classes as if they belong to a shared superclass or interface.

Inheritance is one way to achieve polymorphism by creating a hierarchy of classes where a subclass can override methods of its superclass.

Interfaces also enable polymorphism by defining a contract that classes can implement, allowing them to be treated uniformly through the interface type. Therefore, polymorphism can be achieved through both inheritance and interfaces. So, the correct option is d.

To learn more about polymorphism: https://brainly.com/question/29887432

#SPJ11


Can Anyone see what's wrong in this
this is not working why ?
you can see in picture its not working why ?
please help me
can u see what the problem

Can Anyone see what's wrong in this this is not working why ?you can see in picture its not working why

Answers

do you mean the highlighted part, "<img scr = "https : // images. app. goo. gl?"

why hand tools are important in repairing personal computer?​

Answers

Answer:

Using the appropriate tools helps ensure that computer components are not damaged during cleaning.

Explanation:

If you don't use the right hand tools, you could easily damage or scratch computer components that are vital to run the computer.

Answer:

Because the parts of the computer are at the micro level, repairing them is a very important job. That's why these tiny tools are used in the repair of computers.

Explanation:

If It was helpful, can you make me brainliest please?

Help


Which of these lines of code will increment a variable?


A.

print(variable)


B.

count(variable)


C.

inc(variable)


D.

variable = variable + 1

Answers

the answer is A :) hope it’s right have a nice day

50 POINTS!!!! What is HpseuHostLauncher, and can I disable it without any major impact on my laptop?

Answers

Answer:

????????

Explanation:

a data analyst completes a project. they move project files to another location to keep them separate from their current work. this is an example of what process? 1 point

Answers

They move project files to another location to keep them separate from their current work. This is an example of archiving file process.

The archive procedure copies data to a destination after selecting data from a source (one or more database tables) (an archive file).

The specifications for the data to be archived, referred to as the access definition, and the processing parameters must be included in an archive request before data may be stored. The archiving request can be executed right away or scheduled to execute periodically at regular intervals. By using overrides for the request's requirements and running the archive request from the command line, processing can also be automated.

Know more about database here:

https://brainly.com/question/29412324

#SPJ4

write F id the following is formatting tags, H for heading tags, S for structural tags, and SC if it belongs to a seperator/container tags.

1. <div>
2. <h1>
3. <head>
4. <strong>
5. <p>
6. <html>
7. <hr>
8. <center>
9. <h3>
10. <em>​

Answers

Answer:

Here!

Hope this helps. Please mark brainliest!

write F id the following is formatting tags, H for heading tags, S for structural tags, and SC if it

How might a company gain followers on Twitter?

Answers

By sending persuasive / informable and interesting posts to gain followers.

¿ Porque la madera presenta mayor resistencia a ser cortada en sentido travesal que en sentido longitudinal

Answers

A medida que crece un árbol, la mayoría de las células de madera se alinean con el eje del tronco, la rama o la raíz. Estas células están compuestas por haces largos y delgados de fibras, aproximadamente 100 veces más largas que anchas. Esto es lo que le da a la madera su dirección de grano.

La madera es más fuerte en la dirección paralela al grano. Debido a esto, las propiedades de resistencia y rigidez de los paneles estructurales de madera son mayores en la dirección paralela al eje de resistencia que perpendicular a él

What is a return statement used for?
o beginning a function
O repeating a value
copying a function
exiting a function
DONE

Answers

Answer:

Exiting a function

Explanation:

Return simply returns a specified value at the end of a def function (if you're in python). It does not print or do anything else. You could set variables equal to a def function that returns or you could put the def function in a print statement to print the returned value.

Although digital cameras today are pretty sturdy, they still require basic care and maintenance. Create a basic list of care and maintenance standards and procedures that any digital camera owner would be smart to follow. Briefly explain each item on your list.

Please help! Thank you!

Answers

Answer:

Avoid dirt and sand. Use care when cleaning dirt particles and sand from your digital camera. Do not use canned or pressurized air to clean the sand, as you might just drive the particles into the camera case. Avoid liquids. Keep all liquids away from the camera unless you own a model with a waterproof case. Avoid touching the lens and LCD. Oils from your skin smudge the lens and LCD, eventually causing permanent damage. Clean the lens and LCD with a microfiber cloth when you see a smudge from your fingertips. The lens and sun don't mix. Sunlight focused through the lens of the camera could damage the image sensor or even start a fire inside the camera. Use cleaning liquids with care. Avoid using an excessive amount of cleaning liquid with your camera. You should be able to clean the camera with a dry microfiber cloth. If a liquid is needed, place a few drops of the liquid on the cloth, rather than directly on the camera. Vacuum the bag. Dirt and sand inside your camera bag could damage your camera, so vacuum the bag regularly to keep it clean and protect your camera. Watch the temperature. Do not leave your camera in a sunny vehicle, where temperatures quickly can exceed 100 degrees Fahrenheit. Avoid leaving the camera in direct sunlight, which can damage the plastic. Finally, avoid extreme cold, too, which could damage the LCD. Use neck straps and wrist loops. If you slip while hiking, or if you lose the grip on your camera near the pool, the straps can save your camera from a potentially disastrous fall.

Explanation:

these are the exact words that I used on my assignment that I just completed I hope this helps! Enjoy your class!

The main 3 ways to care for your digital Camera  is that:

Always bag it when you are not using it. Always use lens caps to cap it.Dust it regularly.

What are the maintenance methods for the digital camera?

Know that there are ways to care for a camera. It is essential therefore to always clean at all times.

Conclusively, do use a dry and clean cloth in the wiping the physical body of the camera and note the type of cleaners or solvents that you use in the clean  up  as it needs to be a  blower, brush, etc.

Learn more about cameras from

https://brainly.com/question/26320121

Which of the following CR cassette sizes will provide the greatest recorded detail?
a. 8 x 10 inch
b. 10 x 12 inch
c. 14 x 17 inch
d. All sizes would have equal recorded detail.

Answers

The 14 x 17 inch CR cassette size will provide the greatest recorded detail.

The recorded detail in a CR (Computed Radiography) image is influenced by the size of the CR cassette. In general, larger cassette sizes tend to provide greater recorded detail. The reason for this is that a larger cassette allows for a larger imaging area, which means more anatomical structures can be captured and displayed with higher precision.

Out of the given options, the 14 x 17 inch CR cassette size is the largest. Therefore, it has the potential to capture the most detailed image. With a larger imaging area, the 14 x 17 inch cassette can accommodate a wider range of anatomical structures, making it suitable for various types of radiographic examinations. This size is commonly used for imaging the chest, abdomen, and extremities.

On the other hand, the smaller cassette sizes, such as 8 x 10 inch and 10 x 12 inch, have more limited imaging areas. While they can still produce detailed images, the smaller size restricts the amount of anatomical information that can be captured in a single exposure. These smaller cassettes are often used for specific applications, such as imaging small body parts like the hand or foot.

In conclusion, the 14 x 17 inch CR cassette size will provide the greatest recorded detail among the given options due to its larger imaging area, which allows for a more comprehensive capture of anatomical structures.

learn more about recorded detail here:

https://brainly.com/question/32446365

#SPJ11

scalability is the capability of a network to handle an increasing number of nodes. given this definition, would the star topology or the mesh topology scale better? explain based on your experiences of creating these networks and the interface details for nodes in each case.

Answers

As the number of nodes rises, mesh topology scales more favourably than star topology. Each node in a mesh architecture is linked to every other node, providing numerous paths for data to transit.

Which topology promotes scalability the most?

Scalable topologies include stars. Computers are easily added to or withdrawn from the primary connection point, which is typically a hub or a switch, as the network expands or changes.

How can network topology be scaled?

By improving the network's bandwidth capacity and facilitating its physical expansion to new development regions, a network's scalability refers to its capacity to handle growing workloads in an economical and sustainable manner.

To know more about topology visit:-

https://brainly.com/question/15066629

#SPJ1

Why is it so important to have a checking account?

Answers

Answer: Having a checking account sets you up for financial success. Get access to your money quicker, complete financial transactions on your phone or tablet, rest assured that your money is protected, and easily track your spending so you can make better money choices.

Explanation: Hopefully this helps you. (pls don't report if wrong)

a checking account is a type of bank account that allows you to easily deposit and withdraw money for daily transactions. so if you want to give someone money or if you want to receive money, you use a checking account. could you give me brainliest? its totally okay if not!

a computer has a memory unit with 32 bits per word and has 215 general-purpose registers. the instruction set consists of 800 different operations. instructions have an opcode part, an address part, and a register part. each instruction is stored in one word of memory. how many bits are needed to specify a memory address?

Answers

To specify a memory address in a computer with a memory unit of 32 bits per word, we would need 5 bits.

The memory unit in the computer has 32 bits per word. This means that each word of memory can store 32 bits of information. In order to specify a memory address, we need to determine the number of unique memory locations that can be addressed. Since each word of memory represents one instruction and the instruction set consists of 800 different operations, we can infer that there are 800 memory locations.

To calculate the number of bits needed to specify a memory address, we can use the formula \(2^{n}\) = number of memory locations, where n is the number of bits. Solving for n, we have \(2^{n}\) = 800. Taking the logarithm base 2 of both sides, we get n = log2(800) ≈ 9.6438. Since the number of bits must be an integer, we round up to the nearest whole number. Therefore, we need 10 bits to specify a memory address.

However, the question asks for the number of bits needed to specify a memory address, so we must take into account that the computer has 215 general-purpose registers. Each register can be used as a memory location, so we need to subtract the number of registers from the total number of memory locations. The updated number of memory locations would be 800 - 215 = 585. Using the same formula as before, \(2^{n}\) = 585, we find that n ≈ 9.1832. Rounding up, we determine that 9 bits are needed to specify a memory address in this computer.

Learn more about bits here:

https://brainly.com/question/29220726

#SPJ11

Based on the characteristics common to successful entrepreneurs, do you think you would make a good one? Discuss at least one of these traits and explain why it is the trait most developed in you now, and discuss another that would require work to develop?

Answers

Answer:

the answer is 24

Explanation:

how to use software for simulation experiments and probability calculations, and how to interpret the results and observe patterns in the data.

Answers

using simulation and probability software can help to streamline the process of running experiments and calculations, and can make it easier to interpret the results. By following these tips, you can ensure that you are getting the most out of your software and making informed decisions based on the data.

Simulations and probability calculations can be performed using software that is designed for this purpose. The following are some tips on how to use such software and interpret the results:

1. Content loading: To use simulation and probability software, you will need to load the appropriate content into the program. This content may include data on variables, constraints, and other factors that will be used in the simulation or calculation. The content can be loaded into the software either manually or automatically.

2. Software usage: Once the content is loaded, the software can be used to perform the simulation or probability calculation. This may involve setting certain parameters, defining variables, and specifying other details of the experiment or calculation.

3. Interpretation of results: Once the simulation or calculation is complete, the results must be interpreted in order to make sense of the data. This may involve analyzing the data to identify patterns, trends, or other relevant factors. The results can then be used to draw conclusions about the experiment or calculation, and to inform future decision-making.

4. Observing patterns in data: Patterns in the data can be observed by looking at the graphs, charts, and other visualizations that are generated by the software. These visualizations can help to highlight trends, correlations, and other important factors that may not be immediately apparent from the raw data.

To know more about software Visit:

https://brainly.com/question/32393976

#SPJ11

Willow wants to find out how much time viewers spend on the website devoted to her indie rock band and how many times they click banner ads. The best tool for finding this information is.

Answers

Harmonix created the Rock Band series of rhythm games, which are primarily for home video game systems.

What is rock band?

The main Rock Band games have players use game controllers modeled after musical instruments and microphones to perform the lead guitar, bass guitar, keyboard, drums, and vocal parts of many licensed songs across a wide range of genres, though primarily focusing on rock music.

This is based on their previous development work from the Guitar Hero series. Some video games permit the use of "Pro" instruments, which call for specialized controllers and more closely resemble playing actual instruments.

These instruments present a greater challenge to players. Players can fail a song if they miss too many notes and lose points for notes they hit correctly.

Therefore, Harmonix created the Rock Band series of rhythm games, which are primarily for home video game systems.

To learn more about Harmonix, refer to the link:

https://brainly.com/question/2516588

#SPJ1

Which wizard is a tool provided by Access that is used to scan the table’s structure for duplicate data?

Query Design Wizard
Table Design Wizard
Table Analyzer Wizard
Performance Analyzer Wizard

Answers

Answer:

Table Analyzer Wizard

Explanation:

Imagine yourself writing computer programs in the future. Which do you think would be generally more important to your programming goals: ease of programming or speed of computation? Why do you think this would be more important? Describe a situation for which the other goal would be more important.

Answers

Answer:

to make sure ur comsters are satified

Explanation:

please write the code for this:

Enter a word: Good
Enter a word: morning
Good morning

Answers

w1 = input("Enter a word: ")

w2 = input("Enter a word: ")

print(w1,w2)

I wrote my code in python 3.8. I hope this helps.

Answer:

G_0o*4 Mrn --ing

Explanation:

G = G

_ = space

o = O

* = space

4 = D (the fourth letter in the alphabet)

Mrn = Abbrev. of Morn (ing)

-- = space

ing = ing (last 3 letters of "morning")

Hope this helps <3

while t >= 1 for i 2:length(t) =
T_ppc (i) (T water T cork (i- = - 1)) (exp (cst_1*t)) + T cork (i-1);
T cork (i) (T_ppc (i) - T pet (i- = 1)) (exp (cst_2*t)) + T_pet (i-1);
T_pet (i) (T cork (i)
=
T_air) (exp (cst_3*t)) + T_air;
end
T final ppc = T_ppc (t);
disp (newline + "The temperature of the water at + num2str(t) + "seconds is:" + newline + T_final_ppc + " Kelvin" + newline + "or" + newline +num2str(T_final_ppc-273) + degrees Celsius" + newline newline);
ansl = input (prompt, 's');
switch ansl case 'Yes', 'yes'} Z = input (IntroText); continue case {'No', 'no'} break otherwise error ('Please type "Yes" or "No"')
end
end

Answers

The given code describes a temperature change model that predicts the final temperature of water based on various input parameters such as the temperatures of cork, pet, and air.

It appears that you are providing a code snippet written in MATLAB or a similar programming language. The code seems to involve a temperature calculation involving variables such as T_ppc, T_water, T_cork, T_pet, and T_air. The calculations involve exponential functions and iterative updates based on previous values.

The model uses a set of equations to calculate the temperature changes for each component.

The equations used in the model are as follows:

T_ppc(i) = (T_water – T_cork(i-1)) * (exp(cst_1 * t)) + T_cork(i-1)T_cork(i) = (T_ppc(i) – T_pet(i-1)) * (exp(cst_2 * t)) + T_pet(i-1)T_pet(i) = (T_cork(i) – T_air) * (exp(cst_3 * t)) + T_air

These equations are implemented within a for loop, where the input variables t, T_water, T_cork, T_pet, cst_1, cst_2, cst_3 are provided, and the output variable T_final_ppc represents the final temperature of the water after the temperature change.

Additionally, the code includes a prompt that allows the user to enter "Yes" or "No." Choosing "Yes" continues the execution of the code, while selecting "No" stops the code.

Overall, the code simulates and predicts the temperature changes of water based on the given inputs and equations, and offers the option to continue or terminate the execution based on user input.

Learn more about MATLAB: https://brainly.com/question/13715760

#SPJ11

TRUE / FALSE.
wireless network traffic can be captured with sniffers.

Answers

True. Sniffers can capture wireless network traffic by intercepting and analyzing packets of data transmitted over the network. This enables network administrators or authorized users to monitor and analyze network activity for troubleshooting, security, and performance optimization purposes.

With sniffers, wireless network communication can be recorded. Sniffers are network monitoring tools that intercept and analyze network traffic. They can capture packets of data transmitted over wireless networks, allowing administrators or authorized users to monitor and analyze the network activity.

Sniffers work by capturing the radio waves carrying the network traffic and decoding the packets to extract information such as source and destination addresses, protocols used, and payload data. This capability is useful for network troubleshooting, security analysis, and performance optimization. It's crucial to remember that intercepting wireless network traffic without the right authority is against the law and immoral.

Learn more about network  here:

https://brainly.com/question/1326000

#SPJ11

How do I fix Java Lang StackOverflowError?

Answers

Answer:

A StackOverflowError in Java is usually caused by a recursive method that calls itself indefinitely or by an excessively deep call stack.

Explanation:

To fix this error, you can try the following:

Check your code for any recursive calls that may be causing the error and modify them to avoid infinite recursion.Increase the stack size of your JVM by adding the "-Xss" option when running your application. For example, you can use the command "java -Xss2m MyClass" to increase the stack size to 2MB.Simplify your code or optimize it to reduce the depth of the call stack.If none of the above solutions work, you may need to consider refactoring your code or using a different approach to solve the problem.

A single computer on a network is called a____________.

Answers

Is it a vpn, I’m just guessing bc I don’t know anything about this stuff lol

Answer: A single computer on a network is called a node. pls brainliest

Which of the following is the biggest issue facing wireless communication today?
O deregulation
O cost of technology
O monopoly of services
O threats to privacy
** if you can help me with this unit pls comment

Which of the following is the biggest issue facing wireless communication today?O deregulationO cost

Answers

Answer:

threats to privacy

Explanation:

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591

How do you create a variable with the numeric value 5?

Answers

Answer:

They are declared simply by writing a whole number. For example, the statement x = 5 will store the integer number 5 in the variable x.

Write a program whose input is two integers, and whose output is the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer C++

Answers

Answer:

#include <iostream>

using namespace std;

int main() {  

 int start, end;

 cout << "Enter start number: ";

 cin >> start;

 cout << "Enter end number: ";

 cin >> end;

 for(int n=start; n<=end; n+=5) {

   cout << n << " ";

 }

}

Explanation:

I output the numbers space separated.

Other Questions
Select the correct text in the passage.Which two phrases in the passage demonstrate what the word boisterous means?Close by, a rock of less enormous heightBreaks the wild waves, and forms dangerous strait;Full on its crown a fig's green branches rise,And shoot a leafy forest to the skies,Beneath, Charybdis holds her boisterous reign'Midst roaring whirlpools, and absorbs the main;Thrice in her gulfs the boiling seas subside,Thrice in dire thunders she refunds the tide. Emil KraepelinA) is considered a pioneer in the diagnosis of mental illness.B) authored an objective personality test that remains widely used among clinical psychologists today.C) created the first Diagnostic and Statistical Manual of Mental Disorders.D) argued for humane treatment of the mentally ill in France. HEY CAN ANYONE ANSWER DIS SPANISH WORK!!!! Which of the following quotes identifies one of the things Chris McCandless learns that he did not understand when he began his odyssey?A.Happiness only real when shared.B.Truth.C.Jack London is King.D.All Hail the Dominant Primordial Beast!E.S.O.S. I need your help. I am injured, near death, and too weak to hike out of here. I am all alone. This is no joke. 01.01 Las Partes del cuerpo assignment Show the coordinates of all points of intersection with the coordinate axes How many observations should a time study analyst plan for in an operation that has a standard deviation of 3.3 minutes per piece? The goal is to estimate the mean time per piece to within 1.4 minutes, with a confidence of 95.5 percent. (Do not round intermediate calculations. Round up your final answer to the next whole number.) The campers asked their counselor to tell them her ag. She replied, "If you add 4 years to my present age, the result will be 2 times my campers. Five years ago my age was 3/4 of what hers will be in eight years. How old is the counslor? Find the measure of angle "b" What is a hectoliter?1,000 liters100 grams1/100 of a liter100 liters Cindy and Richard leave their dorm in Charlestonat the same time. Cindy rides her bicycle north at aspeed of 18 miles per hour. Richard rides his bicyclesouth at a speed of 14 miles per hour. How long will ittake them to be 96 miles apart? Describe the use of budgets in controlling operationsand the principles of performance evaluation. 4. How many joules of heat energy does it take to burn off 500 000 cal of potato chips?(1 cal = 4.184 )) Show your work. help asap please!! A snake species that has migrated from the mainland to a small island eats banana slugs instead of lizards and mice, its usual diet.Which statement best explains this change in behavior? A)The genotype that affects food choice is not isolated to a single phenotype.B)Instinctual food choice by snakes is not related to genotypic flexibility.C)Diet is exclusively controlled by snake genetics, not by nature.D)Gene expression for mainland snakes is rigid and confined to one phenotype. What is the theme of chapter 11 of the Outsiders?No links what happens when harriet tells dr. flint that a free man loves her and she wants to be married to him? look at photo please :) My 10 year old has the following word problem. I am CLUELESS! 75.00 g of compound A (molar mass = 84.72 g/mol) and 13.17 g compound B (molar mass = 74,4 g/mol) react completely to form 14.85 g compound C (molar mass = 41.89 g/mol) and 73.32 g compound D (molar mass - 103.56 g/mol) with nother reactant in excess. What is the coefficient for compound D in the chemical equation for this reaction when balanced in lowest whole-numbers? Answer: Two points on the y axis that are 25 units from (-24,3)