4.2 Code Practice: Question 1

Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the count of how many numbers were entered.

Sample Run

Enter a number: 1
Enter a number: 41
Enter a number: 36
Enter a number: 25

Sum: 103
Numbers Entered: 4

Hint: If you get an EOF error while running the code you've written, this error likely means you're asking for too many inputs from the user.

Answers

Answer 1

In python:

total = 0

i = 0

while total <= 100:

   number = int(input("Enter a number: "))

   i += 1

   total += number

print("Sum: {}".format(total))

print("Numbers Entered: {}".format(i))

I hope this helps!


Related Questions

discuss why ergonomics is important?​

Answers

Answer: Ergonomics are important because when you're doing a job and your body is stressed by an awkward posture, extreme temperature, or repeated movement your musculoskeletal system is affected.

what is the main purpose of the circulatory system

Answers

The network of blood vessels and the heart that carries blood throughout the body. This system helps tissues get the right amount of nutrients, oxygen, and waste disposal.

The most important component of the circulatory system?

The primary function of the circulatory system is to carry oxygen, nutrients, and hormones to the muscles, tissues, and organs throughout the body. Another role of the circulatory system is to remove waste from cells and organs so that your body can eliminate it.

What is the primary goal of this quiz about the circulatory system?

The circulatory system's job is to provide nutrients and oxygen to body cells while returning carbon dioxide and oxygen-poor blood to the heart and lungs.

To know more about circulatory system visit:-

https://brainly.com/question/29259710

#SPJ4

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

Name two sensors which would be used in a burglar alarm system

Answers

kind of sensors used in a burglar alarm system:-Passive Infrared SensorsTomographic Motion Detector.Microwave Detectors.Ultrasonic Detectors.Photoelectric Beams.Glass Break Detectors.

1. Passive Infrared Sensor

This sensors type is passive in a way that it doesn't radiate its own energy. Instead, it detects the infrared light radiating from objects. This way, it can detect whenever there's a human or another living being in its field of view.

2. Photoelectric Beams

This is also another type of motion detector, but it doesn't work similarly to the others. For one, it doesn't have a coverage area. It only forms a fence, which triggers the alarm if broken.

It consists of two separate parts that form a sort of a fence made of IR beams. When someone steps into the beams, between the two parts, they trigger the alarm.

TRUE OR FALSE. data refers to the symbols that represent people, events, things, and ideas.

Answers

TRUE. Data refers to the symbols that represent people, events, things, and ideas.

Data can be any facts, figures, statistics, or other types of information that are collected, stored, and analyzed for various purposes. These can include numerical values, words, images, and other types of symbols that convey meaning and can be used to make decisions or gain insights. Data is often collected and stored for the purpose of analysis, decision-making, and knowledge generation. Overall, data serves as the foundation for information, knowledge, and ultimately, progress in our increasingly data-driven world.

Know more about Data, here:

https://brainly.com/question/31937345

#SPJ11

what is the minimum number of stations required to pinpoint the epicenter of an earthquake?

Answers

The correct answer is Seismographs from at least three separate locations are required in order to pinpoint the epicentre of an earthquake.

But, certain groups, like the Quake-Catcher Network, can use household size detectors built into computers to detect earthquakes as well. These seismometers are frequently used as part of a big scale governmental or scientific effort. Computers, stereos, TVs, and other small gadgets that are frequently placed on desks, tables, and worktops are easily moved by the shocks that even tiny earthquakes create. If they stumble, they can sustain irreparable injury. By turning seismic wave vibrations into electrical signals that may be shown as seismograms on a computer screen, seismometers enable the detection and measurement of earthquakes. Seismologists do research on earthquakes and can utilise this information to pinpoint the location and magnitude of a specific earthquake.

To learn more about earthquake click on the link below:

brainly.com/question/29500066

#SPJ4

This is an analytical paper, so minimum theory.
1. Introduction – one paragraph – define and shortly describe the topic.
2. Provide analysis of whether a computer is innovation – apply criteria from the class materials or presentations.
3. Write a conclusion where provide your vision of the perspective for further development of computer technology.
Format:
1. One or two pages.
2. Font: 12 Times New Roman or similar.
3. Can be partly text and bullet points

Answers

This analytical paper aims to evaluate whether a computer can be considered an innovation, using criteria from class materials or presentations. The analysis will explore the characteristics and impact of computers to determine their innovative nature.

The introduction should provide a brief definition of the topic, highlighting that the paper will assess whether a computer qualifies as an innovation. It should also mention the criteria or frameworks from class materials that will be used to evaluate the innovative nature of computers.

The analysis section will delve into the criteria or frameworks discussed in class to assess whether a computer can be considered an innovation. It should examine the key features and advancements of computers, such as their ability to process information, automate tasks, facilitate communication, and enable unprecedented access to information. The analysis can incorporate bullet points to highlight specific aspects of innovation, such as novelty, usefulness, impact, and adoption.

In conclusion, the paper should present the author's vision of the future development of computer technology based on the analysis conducted. It can discuss the potential for further innovation in areas like artificial intelligence, quantum computing, and human-computer interaction. The conclusion should summarize the main points discussed and provide a forward-looking perspective on the continued evolution and impact of computers.

Overall, the paper should be concise and well-structured, providing an analytical assessment of computers as an innovation and offering insights into their future prospects.

Learn more about  innovation here :

https://brainly.com/question/17516732

#SPJ11

This analytical paper aims to evaluate whether a computer can be considered an innovation, using criteria from class materials or presentations.

The analysis will explore the characteristics and impact of computers to determine their innovative nature.

The introduction should provide a brief definition of the topic, highlighting that the paper will assess whether a computer qualifies as an innovation. It should also mention the criteria or frameworks from class materials that will be used to evaluate the innovative nature of computers.

The analysis section will delve into the criteria or frameworks discussed in class to assess whether a computer can be considered an innovation. It should examine the key features and advancements of computers, such as their ability to process information, automate tasks, facilitate communication, and enable unprecedented access to information. The analysis can incorporate bullet points to highlight specific aspects of innovation, such as novelty, usefulness, impact, and adoption.

In conclusion, the paper should present the author's vision of the future development of computer technology based on the analysis conducted. It can discuss the potential for further innovation in areas like artificial intelligence, quantum computing, and human-computer interaction. The conclusion should summarize the main points discussed and provide a forward-looking perspective on the continued evolution and impact of computers.

Overall, the paper should be concise and well-structured, providing an analytical assessment of computers as an innovation and offering insights into their future prospects.

Learn more about  innovation here :

https://brainly.com/question/17516732

#SPJ11

All of the following can be used to design and plan a program EXCEPT: IPO chart search engine flow chart storyboard

Answers

Answer:

yes ipo chart and flow chart

Please help me out with my essay

Please help me out with my essay

Answers

Answer:

While you are online you should not share personal information like your address, phone number, age ,full name. you could share little things like your favorite tv show and things like that, but never things that are too personal and things that could pettiontally put you in danger.

Steps to know if a site is fake Step #1: Pay attention to the address bar.

Step #2: Check the domain name.

Step #3: Look up the domain age.

Step #4: Watch for poor grammar and spelling.

Step #5: Look for reliable contact information.

Step #6: Use only secure payment options.

Step #7: Walk away from deals that are too good to be true.

When someone is being cyberbullied you should tell a trusted adult or teacher and leave the internet alone. some types of bullying are being called names, being joked on, being harrased , inapropiate sayings about others, things like that. Different types of people are followers which are people who play a role in the bullying but not intetianally, or a reinforcer which is someone who supports the bullying,or a bystander which is some one who watches it and doesnt do anything to stop it.

you can use tables for layout work. However, in XHTML, each form control should have its own ______ element

a. method
b. textarea
c. label
d. fieldset

Answers

Answer:

c. label

Explanation:

How to fix microsoft has blocked macros from running because the source of this file is untrusted

Answers

Removing Mark of something like the Web is the quickest way to unlock macros. To delete, perform an appropriate on the file, select Properties, and then click the General tab's Unblock checkbox.

Who currently owns Microsoft?

250 million Microsoft shares, or 103 million shareholder votes, are owned by Bill Gates. As of December 2021, the selling price of Bill Gates' ownership in Windows was $35 billion. William H. "Bill" Gates

How can I contact Microsoft customer support?

To get support phone numbers. If a post was useful to you, kindly advise it as such and give it a rating. This will make it easier for other people to discover solutions to similar queries.

To know more about Microsoft visit :

https://brainly.com/question/26695071

#SPJ4

Some number of teams are participating in a race. You are not told how many teams are participating but you do know that:

a. Each team has a name, which is one of the uppercase letters A-Z.

b. No two teams have the same name, so there are a maximum number of 26 teams.

c. Each team has the same number of members.

d. No two runners cross the finish line at the same time – i. E. There are no ties

Answers

Given the information, we can infer the following

a. Each team has a name, which is one of the uppercase letters A-Z:

What does this mean?

This means that there are a maximum of 26 teams, since there are only 26 letters in the English alphabet. Each team name is unique and represented by a single uppercase letter.

b. No two teams have the same name, so there are a maximum number of 26 teams:

As mentioned above, since each team name is unique and represented by a single uppercase letter, there can be a maximum of 26 teams.

c. Each team has the same number of members:

This means that the number of runners in each team is equal. However, we don't know the exact number of runners per team.

d. No two runners cross the finish line at the same time – i.e. there are no ties:

This means that each runner finishes at a different time. There are no ties, so each runner is assigned a unique rank based on their finishing time.

Given these conditions, we can conclude that there are between 1 and 26 teams, each with the same number of runners. The number of runners is unknown but must be a multiple of the total number of teams.

For example, if there are 3 teams, each team could have 1, 2, or 3 runners. If there are 5 teams, each team could have 1, 5, 10, 15, or 20 runners. Finally, we know that each runner finishes at a different time, so there are no ties and each runner is assigned a unique rank.

Read more about races here:

https://brainly.com/question/30791066

#SPJ1

which type of fiber optic cable supports 10 gigabit ethernet with a maximum segment length of up to 40 km?

Answers

A segment length of up to 40 kilometers can be supported by 10GBasER single-mode fiber optic cable for 10 gigabit ethernet.

What is the 10Gb Ethernet standard?

10 Gigabit Ethernet, which adheres to IEEE 802 standard, is an electronic data transmission system that allows data to be transferred at a rate of 10 billion bits per second. Additionally, it is referred to as 10GbE, 10GE, and 10GigE.

What kind of cable is utilized for high bandwidth and broadband 10 Gbps Ethernet?

Cat6 cable offers more bandwidth and data transfer rates of up to 1 Gbps over 100 m, the same as Cat5e, as compared to Cat5e.However, Cat6 is able to achieve 10 Gbps speeds over shorter distances of up to 37 m because of its improved shielding and larger capacity (121 ft).

To know more about ethernet visit:-

https://brainly.com/question/13441312

#SPJ4

cual es la diferencia entre tala y poda

Answers

Answer:

talar es talar árboles

y podar podar sesped

state two reasons why you would upload and download information​

Answers

Answer:

get a better understanding of the problem

Explanation:

to be able to understand what it means and to be able to remember it in the future

use a slicer to filter the data in this table to show only rows where the category value is coffee

Answers

Slicers are simply used for filtering data stored in tables. They are very efficient when used on data in pivot tables. The process involves ; Design > Tools > Insert Slicer > Category checkbox > Coffee

From the Design tab, Navigate to Tools which is where the option to insert a slicer would be found.

Select insert slicer, which then sets the different columns as categories.

Check coffee in the category list, and only rows where the category value is coffee will be displayed.

Learn more :https://brainly.com/question/25647517

Which of the following statement is correct ? A . potential difference is measured by ammeter . B . The unit of potential difference is ampere C . Battery is a source of potential difference in a circuit D . potential difference cause charges to remain stationary​

Answers

Answer:

C.Battery is a source of potential difference in a circuit.

Explanation:

A battery is a source of electrons and positive ions which sets one of it's terminal (cathode) at negative potential and the other (anode) at positive potential. Hence a battery is a source of electricity(electrons) which sets a potential difference across the battery terminals.

Which national database contains information on outstanding warrants and criminal histories?

Answers

The national database contains information on outstanding warrants and criminal histories is NCIC. The main system for gaining access to national Hot file records is NCIC.

What national database contains information on outstanding warrants?

The National Criminal Information Center is the primary transactional data system for monitoring warrants across the nation (NCIC). To check if a given person has any outstanding warrants, any law enforcement agency can enter their warrants into the system.

The Federal Bureau of Investigation (FBI) is in charge of maintaining the recognized national criminal history database through the National Crime Information Center (NCIC). The NCIC keeps track of arrests, outstanding arrest warrants, lost or stolen property, unaccounted-for persons, and felony and misdemeanor dispositions.

NCIC is the primary platform for gaining access to national Hot file records. These data include files on people who are sought, missing, unknown, have their status updated, and have property.

To learn more about the national database refer to:

https://brainly.com/question/13174746

#SPJ4

PLEASE HELP ME !!!!!!!!

PLEASE HELP ME !!!!!!!!

Answers

Answer:

This is way to long

Explanation:

According to which virtue do you need to secure information by limiting computer access to authorized personnel only?

Answers

Answer:

Confidentiality is a virtue which states that you need to secure information by limiting computer access to authorized personnel only.

The National Archives is part of the federal government, which means that its content:

-belongs to everyone.

-is off limits to the public.

-comes with extreme licensing fees.

-is outdated and useless.

Answers

Answer:

its A

Explanation:

the national archives is open to anyone who visits

what file extension is automatically added to documents in word 2019?

Answers

The file extension that is automatically added to documents in word 2019 is .docx.

What is a file extension?

File extension is the ending of a file that helps identify the type of file in operating systems, such as pdf files. For example the files extension of PDF is .pdf.

In a simpler terms, a file extension, or filename extension, is a suffix at the end of a computer file.

The file extension indicates the kind of file that is saved.

Therefore, the file extension that is automatically added to documents in word 2019 is .docx.

learn more on file extension here: https://brainly.com/question/14576685

#SPJ2

text found in an email to indicate an attached file is called __

Answers

The text found in an email to indicate an attached file is typically referred to as an "attachment indicator" or "attachment notation." This text serves as a visual cue or description within the email message, informing the recipient that there is a file attached to the email.

It is commonly represented by phrases such as "Please find attached," "Attached is," or "See attached." This indication helps the recipient identify and locate the attached file easily.

It is important to include a clear and concise attachment indicator to ensure that the recipient recognizes the presence of the attached file and can access it accordingly.

To learn more about Access - brainly.com/question/29910451

#SPJ11

what are the parts of a file?​

Answers

Answer:

A computer file is made up of three elements: characters, fields and records.

Explanation:

Hope this helps! :D

Which of the following is an example of computer hardware
A. App
B. PowerPoint
C. Web browser
D. Microchip
What are examples of computer hardware? a. mouse, keyboard, motherboard, BIOS
b. mouse, keyboard, motherboard, CPU
c. mouse, monitor, CPU, BIOS
d. mouse, monitor, operating system, motherboard

Answers

The correct answer to the given question "example of computer hardware" are option D) Microchip and option B) Mouse, Keyboard, Motherboard, CPU

A microchip is a radio-frequency identification transponder, about the size of a grain of rice, that carries a specific identifying number. The ID number is transmitted when the microchip is scanned by a veterinarian or animal shelter. There are no moving parts, no battery, or power requirements.

It is a collection of electronic circuits on a tiny flat piece of silicon, also known as a chip, computer chip, integrated circuit, or IC. Transistors function as tiny electrical switches on the chip that can turn a current on or off.

To enable authentication, data integrity, and secrecy in a range of applications, including disposables, accessories, and nodes, Microchip Technology offers crypto element devices. The hardware-based cryptographic countermeasures used by the crypto element devices are extremely secure and include tamper detection.

To learn more about Microchip click here:

brainly.com/question/12737616

#SPJ4

suppose a memory system has 2mb of memory. if the page size has been defined to be 1kb, then what is the maximum number of page frames that can be allocated?

Answers

If the page size has been defined to be 1kb, then there will be 2,048 page frames in a 2mb memory system. This is because there are 2,048 kilobytes in 2mb, and each page frame is 1kb in size. Therefore, the maximum number of page frames that can be allocated in this memory system is 2,048.


In a memory system with 2MB of memory and a page size of 1KB, the maximum number of page frames that can be allocated can be calculated as follows:
Memory size (in KB) / Page size (in KB) = Number of page frames
2MB = 2048KB (since 1MB = 1024KB)
2048KB / 1KB = 2048
So, the maximum number of page frames that can be allocated is 2048.

A memory system is a complex cognitive function that involves the processes of encoding, storing, and retrieving information in the human brain. It allows individuals to acquire, retain, and recall information, experiences, and skills over time.

Short-term memory (STM): Also known as working memory, this system temporarily holds information for a short period of time (ranging from seconds to minutes) while it is being actively processed and manipulated. STM has limited capacity and can be easily disrupted or overwritten by new information.

To learn more about Memory system Here:

https://brainly.com/question/30064001

#SPJ11

The maximum number of page frames that can be allocated in a 2MB memory system with a 1KB page size is 2,048.

To determine the maximum number of page frames that can be allocated in a 2MB memory system with a 1KB page size, you simply divide the total memory by the page size:

Total Memory = 2MB

Total Memory = 2,048KB (since 1MB = 1024KB)
Page Size = 1KB

Number of Page Frames = Total Memory / Page Size

Number of Page Frames = 2,048KB / 1KB

Number of Page Frames = 2,048

So, the maximum number of page frames that can be allocated in this memory system is 2,048.

To learn more about page frames visit : https://brainly.com/question/29997612

#SPJ11

When heating a substance a phrase change will start to occur when the kinetic energy of the particles is blink the attractive forces between the particles

Answers

Answer:

great enough to overcome.

Explanation:

Kinetic energy can be defined as an energy possessed by an object or body due to its motion.

Mathematically, kinetic energy is given by the formula;

Where, K.E represents kinetic energy measured in Joules.

M represents mass measured in kilograms.

V represents velocity measured in metres per seconds square.

A conductor can be defined as any material or object that allows the free flow of current or electrons (charge) in one or more directions in an electrical circuit. Some examples of a conductor are metals, copper, aluminum, graphite, etc.

When heating a substance, a phase change will start to occur when the kinetic energy of the particles is great enough to overcome the attractive forces between the particles.

Basically, the phase change includes solid, liquid and gas.

Homework \& Answered The demand for potato chips will increase in response to all of the following EXCEPT: Select an answer and submit. For keyboard navigation, use the up/down arrow keys to salect an answer. a 2 decrease in consumer income, If potato chips are inferior goods. b a decrease in the price of chip dip, a complement for potato chips. c a decrease in the price of potato chips. d an increase in the price of com chips, a substitute for potato chips.

Answers

The correct answer to the question is: (c) a decrease in the price of potato chips. The demand for potato chips will increase in response to a decrease in consumer income if potato chips are considered inferior goods.

When people's income decreases, they tend to shift their consumption towards lower-priced goods, including inferior goods like potato chips. Therefore, a decrease in consumer income would likely lead to an increase in the demand for potato chips.

A decrease in the price of chip dip, which is a complement for potato chips, would also lead to an increase in the demand for potato chips. Chip dip and potato chips are commonly consumed together, so when the price of chip dip decreases, people are more likely to purchase and consume potato chips as well.

Similarly, an increase in the price of corn chips, a substitute for potato chips, would also result in an increase in the demand for potato chips. As the price of corn chips rises, consumers may switch to purchasing potato chips instead, driving up the demand for potato chips.

However, a decrease in the price of potato chips (option c) would not cause an increase in demand since it represents a decrease in the price of the product itself, rather than any external factors that affect demand. When the price of a product decreases, it generally leads to an increase in quantity demanded, but it does not impact the overall demand for the product.

Learn more about consumer here

https://brainly.com/question/29847125

#SPJ11

Can someone help me making a recursive code. There can't be any loops or global variables. These aren't allowed list.sort(), list.reverse(), list.insert(),
list.remove(), list.index(), list.count(), list.pop(), list.clear(), list.copy(). No LOOPS ALLOWED
CODE SHOULD BE RECURSIVE. Language should be Python.

Can someone help me making a recursive code. There can't be any loops or global variables. These aren't

Answers

lst = ([])

lst1 = ([])

def count_multiples(num1, num2, N):

   if num1 > num2 and len(lst1) != 1:

       lst1.append(1)

       w = num2

       num2 = num1

       num1 = w

   if num1 % N == 0:

       lst.append(1)

   if num1 >= num2:

       return len(lst)

   return count_multiples(num1 + 1, num2, N)

print(count_multiples(-10,-5,-3))

I only use lst.append so this should work. Best of luck.

I have no errors in the code but for some reason it doesn't work... what i'm missing?

I have no errors in the code but for some reason it doesn't work... what i'm missing?

Answers

The JavaScript code that you have written is one that tends to retrieves data from a table that is called "Busiest Airports" . The corrected code is given below.

What is the getColumn code about?

In regards to the given code that was corrected, the user input is one that can be obtained from the text input element with the use of the ID "yearInputBox" via the act of getText function as well as been saved in a variable named inputYear.

Therefore, when there is a match that is found, the output is said to be made by the use of the corresponding elements that is obtained from the year, as well as country, and that of airport arrays, and later on set to the "outputBox" element via the use of the setText function.

Learn more about code from

https://brainly.com/question/26134656

#SPJ1

See text below



1

var year getColumn("Busiest Airports", "Year");

var country = getColumn ("Busiest Airports", "Country");

var airport = getColumn("Busiest Airports", "Airport");

onEvent("goButton", "click", function() {

/*call the "calculateOutput" function here,

*passing in the user input as a paremeter 10 */

calculateOutput (getText("year InputBox"));

function calculateOutput (years){

var output="";

for (var i = 0; i < year.length; i++) { /*write the list element being accessed*/ if (years[i] == "inputYear"){ output "In "

=

+ year + "the busiest airport was

11

+ country + "

in "airport[i];

21

}

}

setText("outputBox", output );

}

I have no errors in the code but for some reason it doesn't work... what i'm missing?
Other Questions
over 10 seconds, a train accelerates constantly from rest at a rate 3 m/s2. how far does the train travel during this time period. You are providing security consultancy to assist a company with improving incident response procedures. The business manager wants to know why an out-of-band contact mechanism for responders is necessary. What do you say? medication x is given to increase the effects of medication y, which provides more relief than if medication y were given alone. this is an example of: how long did the ""how to read a textbook"" article say that your brain could spend in concentrated effort before it wants to take a break? _______, a dystonic reaction that results in muscle spasms in the neck, can be very painful for the client. What are the lasting lessons that we can learn from studying this event? Support your response with evidence from the text. helppp quick taking math test rn help SOMEONE PLSS HELP WITH MY ZEARN ITS 5TH GRADE MATH BTW! can be decimal or mixed number!! Roberto and Kayleigh are neighbors living in Clermont County, Ohio. Roberto builds a fence on what he believes is the boundary of his property yet failed to have the property surveyed first. Kayleigh believes the fence is on her property, and subsequently sues Roberto, asking the court to require him to remove the fence. An earlier Ohio case held that in all boundary disputes, no fence may be built until a property survey occurs or the fence is subject to removal. The judge in Roberto and Kayleigh's case orders that the fence be removed because a survey was not done. In this case, the prior case upon which the judge relies is a. stare decisis. b. precedent. c. unethical. d. common law. Two generators, G1 and G2, have no-load frequencies of 61.5 Hz and 61.0 Hz, respectively. They are connected in parallel and supply a load of 2.5 MW at a 0.8 lagging power factor. If the power slope of Gi and G2 are 1.1 MW per Hz and 1.2 MW per Hz, respectively, a. b. Determine the system frequency (6) Determine the power contribution of each generator. (4) If the load is increased to 3.5 MW, determine the new system frequency and the power contribution of each generator. cost allocation of an intangible asset is referred to as select one: a. depreciation. b. capitalization. c. amortization. d. accretion. suppose the trophic efficiency between producers and herbivores is 0.1, the tropic efficiency between herbivores and carnivores is 0.15, and primary production is 1,200 units per day. what is the secondary production of carnivores? Arthur has completed four times as many jigsaw puzzles as Conan. Doyle has completed three times as many jigsaw puzzles as Conan. Doyle has completed 12 fewer jigsaw puzzles than Arthur has. How many jigsaw puzzles has Conan completed? When does the plc counter instruction increment or decrement its current count? valerie wants to examine the properties of a thick liquid but is finding it difficult to pour the liquid into a beaker. she needs to finish her investigation before the end of class. which method will allow her to pour the liquid easily?a. boiling the liquid vigorouslyb. applying heat to the liquidc. placing the liquid in the refrigerator d. mixing the liquid with another solution What is the slope of the line passing through the points ( 1, 5/7) and (2,2/7) Can someone not using a translater translate this into SpanishOne happy experience I remember is a day three years ago when me and my family went to the park.When we first arrived we laid a blanket out in the field to keep the bugs out of our food a basket of sandwiches in which we brought to the park.After we had eaten we went to the river's edge and we caught some crayfish and we had a good old time.After catching and releasing several crayfish we return to the picnic spot cleaned it all up and got in the car me and my siblings played slug bug and other various card games including I spy.Later we got home and put on a movie and ate popcorn I enjoyed this day because it gave me new memories I can share about to my friends and family. Can somebody help me out I will give you points if you get it right Match the vocabulary word to its definition.neutronthe central part of the atom containingprotons and neutronsprotona negatively charged particle that orbitsthe nucleus of an atomnucleusa neutral particle located in the nucleusof an atomelectron clouda positively charged particle located inthe nucleus of an atomelectronthe area of the atom surrounding thenucleus where electrons can be foundIntroDone 13. Why did farmers oppose the gold standard?OThey claimed it would cause high inflation.They claimed it would lower crop prices.They claimed it would undermine the national economy.They claimed it would make the currency unstable.