4.2 lesson practice help plzs

4.2 Lesson Practice Help Plzs

Answers

Answer 1

The output is 21 because c is incremented by 3 until it surpasses 10 and the value of c is added to sum each time the loop runs.

I hope this helps!


Related Questions

list the steps to identify address or link window on a phone​

Answers

Answer: this is how

Explanation: if you are on your phone and a link pops up if it is blue then it is able to be clicked but if it is not blue you can simply copy and paste the link into your web browser.

Introduction To Micro-Technology
Computer Science Assignment/Project
Course Title: Micro-Soft Excel
AD
BG
LE
Sal
Ady
175
30
59
88
117
146
175
204
233
262
291
320
ID
001
002
003
004
005
006
007
008
009
010
Namc
Sanita Cully
Saah Kpakar
Rudolph Gayflor
Francis Yoryor
Adolphus Naigar
Moses Gay gay
Philip Kuoper
Simon Momno
David Brown
John Yankar
CJ
Hr.
Work
178
180
145
160
185
150
182
186
190
120
DM
IIr.
Rate
8
6
S
4
7
9
10
12
14
15
EP
Reg.
Pay
300
350
325
250
275
340
345
FS GV
Over Gross
Time Pay
115 450
100 500
75 475
50 485
40 425
30 430
35 435
20 375
25 490
80 585
HY JC
Inc. SS
Tax Tax
10.20 20.04
11.75 21.00
12.30 21.06
15.05 22.00
22.08
10.00 23.00
15.75 23.10
17.22 24.00
20.05 24.12
20.00 26.00
17.05
181
141
161
186
151
183
187
191
121
200
TI
380
400
1. Direction: List the Relative, Absolute and Mixed Cell References of the following figures
in the above table:
i. 180
ii. 25
ili 175
iv. 183
V 6
2. State the meanings of the three types of cell references.
3. Assume that you were asked to find Average, Total Number of Students, Maximum,
Minimum and Product. What are the terms used in finding the above within the database?
4. Looking at the cell reference of Status will respect to commission; build a cell reference
stating that if sales which is B7, Less than 800, the rate is 2% below is 1% and state if it
is true or false.
5. Slate the steps of Deleting and Inserting Row.​

Answers

Answer:

i need more

Explanation:

i need more

Freya has queued up some transactions to email to customers and others to print. What steps should she take to select all the sales transactions to email

Answers

Considering the situation described above, the steps Freya should take to select all the sales transactions to email is "Filter the sales transaction list using Delivery Method set to Email, and then click the checkbox to the left of the table header row."

The Process of Filter to batch print or email

This process follows the steps below:

From the Delivery method dropdown menu, select Send later or Print later, then Apply.

Select the checkboxes for the transactions to email or print.

Select the checkbox at the top of the list to mark all.

Hence, in this case, it is concluded that there is a process to follow QuickBooks to carry out Filter to batch print or email.

Learn more about QuickBooks use here: https://brainly.com/question/25592743

Since Ethernet and IP are both unreliable protocols how do we establish a reliable connection between two host computers using these two protocols?

Answers

To establish a reliable connection, we rely on additional protocols such as TCP (Transmission Control Protocol) over IP. TCP provides error-checking, retransmission of lost packets, and flow control mechanisms to ensure reliable data transmission between host computers over Ethernet and IP.

The sender's application data is divided into segments by the TCP layer.Each segment is encapsulated into an IP packet, which includes the sender and receiver IP addresses.The IP packet is then encapsulated into an Ethernet frame, which includes the sender and receiver MAC addresses.The Ethernet frame is sent over the physical network.The receiver's Ethernet interface receives the frame and extracts the IP packet.The IP packet is then passed to the TCP layer, which performs error-checking and ensures in-order delivery of segments.TCP acknowledges the received segments and requests retransmission of any missing or corrupted segments.The TCP layer reassembles the received segments into the original application data.The receiver's application receives the reliable data from TCP.

By incorporating TCP over IP, we add reliability features such as error detection, retransmission, and flow control to overcome the inherent unreliability of Ethernet and IP protocols, ensuring a reliable connection between the two host computers.

For more such question on TCP

https://brainly.com/question/14280351

#SPJ8





Kyla has composed a draft of her term paper using Microsoft Word. She now wants to revise the paper. Which tool can she use to store the
document with a different name and makes changes in the new document?
O A. Download
OB. Save As
O C. Save
OD. Export

Answers

A tool which Kyla can use to store the document with a different name and makes changes in the new document is: B. Save As.

What is a document?

A document simply refers to a computer resource that is designed and developed to enable end users to easily store data as a single unit on a computer storage device.

Generally speaking, all computer documents can be identified by a title (name), date modified, size, and type such as the following;

SystemTextAudioImageVideoWhat is the Save as command?

A Save as command can be defined as a type of command associated with the file menu of a software application or document and it causes a copy of the current file to be created and stored to a different location, file name, and/or file type.

In this context, we can reasonably infer and logically deduce that Kyla  should save the document by using the "Save as" command.

Read more on Save as command here: https://brainly.com/question/16852455

#SPJ1

What is the difference between packaged and tailored software ​

Answers

Answer:

Packaged software is a collection of programs that perform similar functions or have similar features to meet various goals and objectives. e.g Microsoft Office While tailored software is software specially developed for some specific organisation or other user. e.g Amazon, Netflix.

which of the following digital communicatio media does not require a connection to the internet

Answers

Answer:

SMS

Explanation:

9. They are normally made of huge steel towers.
a. Transmission Lines
c. Distribution Substation
b. Transmission Substation
d. Distribution Lines

10. Voltage reduction is done through a attached through pole,
a. Transmission Transformer c. Distribution Substation . . b.DistributionTransfont
d. Disttid tihines​

Answers

Answer:

9. a (Transmission Lines )

10.a (Transmission Transformer)

The thing that are normally made of huge steel towers is a. Transmission Lines, option A is correct.

Voltage reduction is done through a attached through pole, a. Transmission Transformer, option A is correct.

What is Voltage reduction?

Voltage reduction has emerged as another tool utilities can use to lower demand, usually without the customer's knowledge. Yet, only the load's resistive part reacts to the drop in voltage by lowering aggregate demand.

Several electric utilities regularly use voltage reduction as a tool for energy conservation and as a way to lower system peak demand during emergency situations or, in some cases, during daily peak load periods.

Learn more about Voltage reduction at;

https://brainly.com/question/28164474

#SPJ3

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.

Answers

Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.

Writting the code:

Assume the variable s is a String

and index is an int

an if-else statement that assigns 100 to index

if the value of s would come between "mortgage" and "mortuary" in the dictionary

Otherwise, assign 0 to index

is

if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)

{

   index = 100;

}

else

{

   index = 0;

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to

a. Draw the hierarchy chart and then plan the logic for a program needed by Hometown Bank. The program determines a monthly checking account fee. Input includes an account balance and the number of times the account was overdrawn. The output is the fee, which is 1 percent of the balance minus 5 dollars for each time the account was overdrawn. Use three modules. The main program declares global variables and calls housekeeping, detail, and end-of-job modules. The housekeeping module prompts for and accepts a balances. The detail module prompts for and accepts the number of overdrafts, computes the fee, and displays the result. The end-of-job module displays the message Thanks for using this program.


b. Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.


Hierarchy chart and pseudocode required

Answers

The Hierarchy Chart for the program needed by Hometown Bank is given below:

                Main Program

                   |

               -------------

              |             |

      Housekeeping module  Detail module

              |             |

     Prompts for balance   Computes fee

         and accepts input  and displays result

              |

        -----------------

       |                 |

   End-of-job module    Detail loop (while balance >= 0)

       |

   Displays message "Thanks for using this program"

Pseudocode for Main Program:

Declare global variables

Call Housekeeping module

Call Detail module

Call End-of-job module

Pseudocode for Housekeeping Module:

Prompt for balance

Accept input for balance

Pseudocode for Detail Module:

Detail loop:

  while (balance >= 0)

     Prompt for number of overdrafts

     Accept input for number of overdrafts

     Compute fee: 1 percent of balance - 5 dollars * number of overdrafts

     Display result

     Prompt for balance

     Accept input for balance

Pseudocode for End-of-job Module:

Display message "Thanks for using this program"

Read more about pseudocode here:

https://brainly.com/question/24953880

#SPJ1

Write a method largestDivisor that takes an integer argument and returns the largest positive integer which is less than the argument that divides the argument. (For example, 10 is the largest divisor of 20.) You may assume that the argument is positive. If the argument is 1, return 0 to indicate that there is no such divisor.

Answers

Answer:

import java.io.*;  

public class Main {

   public static void main(String[] args) {

       int target = 20;

       System.out.println(largestDivisor(target));

   }

   public static int largestDivisor(int value) {

       int max = Integer.MIN_VALUE;

       for (int i = 1; i < value; i++) {

           if (value % i == 0) {

               if (i > max) {

                   max = i;

               }

           }

       }

       if (max != Integer.MIN_VALUE) {

           return max;

       } else {

           return 0;

       }

   }

}

Explanation:

Initialize a variable with the number for which you want to find the largest divisor.

In my case, I used target to denote the value.

I then created a method called largestDivisor that takes that value and evaluates it.

Since we want to find the largest divisor and not the smallest divisor, I created a variable called "max". Remember, if you want to find the maximum of an evaluation, use the minimum. If you want to find the minimum use the maximum.

We are using integers, so I used the Integer.MIN_VALUE constant which initializes the max variable as -2^31 (for the case of the minimum, it would be 2^31).

I then iterated over the length of the value (i < value), where it checks two conditions:

First: checks if the value is divisible by the value in i.

Secondly: checks if the value in i (which by then denotes the value that the number is divisible by) is greater than the maximum.

If so, assign the max variable to i.

Then, I check if we were able to find if the value was divisible by our verification, by adding a conditional statement that checks if the max is different from the minimum. If it is, that means it was able to find a value that was able to divide the target number.

If not, return 0, as the problem states.

1. Why is data the most important asset an organization possesses? What other assets in the organization require protection?

2. What are the various types of malware? How do worms differ from viruses? Do Trojan horses carry viruses or worms?

Answers

Here are the key points:

Why data is important:

- Data contains the intellectual capital and knowledge of an organization. It includes information about customers, business processes, operations, finances, etc. This data drives decision making and performance.

- Loss of data can significantly impact an organization's ability to operate effectively and achieve its goals. It can also damage reputation and trust.

Other assets to protect:

- Intellectual property like patents, trademarks, copyrights

- Physical assets like facilities, equipment, inventory

- Human capital like employees and their knowledge/skills

Types of malware:

- Viruses - Self-replicating programs that attach to other programs and spread when those programs are executed. They can corrupt or delete data.

- Worms - Self-replicating programs that spread over networks and consume network bandwidth. They do not require host programs to replicate.

- Trojan horses - Malware that masquerades as legitimate programs. They do not replicate like viruses/worms but once activated, can give an attacker access and control of the infected system.

Relationship between worms, viruses and Trojans:

- Worms and viruses differ in their replication techniques. Worms spread on their own while viruses need host programs.

- Trojan horses do not replicate like viruses or worms. They simply provide unauthorized access to a system. However, they are sometimes used to deliver viruses or worms upon execution.

mpressed files have the
A. .exe
C. .sit
Save Answer
file extension.
B. .arc
D. .zip

Answers

Answer:  D. .zip

Explanation:

How is a cryptocurrency exchange different from a cryptocurrency
wallet?

A There is no difference since all wallets are hosted on exchanges.

B Exchanges are only used to make transactions, not to store cryptocurrency.

C Exchanges are offline whereas wallets are always connected to the internet.

D An exchange controls your keys but you control your cryptocurrency.

Answers

Exchanges are only used to make transactions, not to store cryptocurrency. Option B

What is Cryptocurrency exchanges versus cryptocurrency wallets?

Cryptocurrency exchanges are platforms that allow users to trade various cryptocurrencies for other digital assets or fiat currency. While some exchanges may offer temporary storage solutions, their primary function is to facilitate transactions between users.

On the other hand, cryptocurrency wallets are designed to store, send, and receive cryptocurrencies securely. Wallets can be hardware-based, software-based, or even paper-based, and they help users manage their private keys, which are essential for accessing and controlling their cryptocurrency holdings.

Find more exercises related to Cryptocurrency exchanges;

https://brainly.com/question/30071191

#SPJ1

Assume the declarations of Exercises 10 and 13. Write C++ statements that do the following. (2, 3, 6, 7, 8) Submit your answer to dropbox.

a. Store the following information in newEmployee:



b. In the array employees, initialize each performanceRating to 0.

c. Copy the information of the 20th component of the array employees into newEmployee.

d. Update the salary of the 50th employee in the array employees by adding 5735.87 to its previous value.

Assume the declarations of Exercises 10 and 13. Write C++ statements that do the following. (2, 3, 6,

Answers

a. newEmployee.name = "Jane Doe";

newEmployee.title = "Accountant";

newEmployee.salary = 4500.75;

b. for (int i = 0; i < maxEmployees; i++)

   employees[i].performanceRating = 0;

c. newEmployee = employees[19];

d. employees[49].salary += 5735.87;

What is array ?

An array is a data structure that stores a collection of items of the same type. Each item in an array is identified by an index number. Arrays are commonly used in programming for storing lists of related items, such as the contents of a shopping cart or the results of a database query. Arrays in Python are powerful data structures that can store and manipulate large amounts of data with relative ease.

To know more about array
https://brainly.com/question/13107940
#SPJ1

Which of the following sorting algorithms could be implemented on a doubly-linked list WITHOUT making the asymptotic worst-case complexity even worse? You must perform the sorting in-place, you CANNOT just copy to an array and then use the normal algorithm

I. Bubble sort
Il. Selection sort
IlI. Insertion sort
IV. Quicksort
V. Heapsort

A. I, II, and IlIl only
B. IV and V only
C. I and II only
D. Iand Il only
E. All except V

Answers

Answer:

C. I and II only

Explanation:

Doubly-linked list is used for sorting algorithms. To sort doubly-linked lists first sort the nodes current and nodes index then compare the data of current and index node. Bubble sort and Selection sort can be used for algorithm sorting without asymptotic complexity. Bubble sort can be created when adjacent nodes are in ascending order.

The use of World Wide Web technology and web design that aims to facilitate creativity, information sharing, and, most notably, collaboration among users. These concepts have led to the development and evolution of web-based communities and _____________ services, such as social-networking sites, wikis, blogs and _________.

Answers

Answer:

1. Hosted services

2. Folksonomies

Explanation:

Prior to the invention of Web 2.0, Web 1.0 was in existence. Web 2.0 is a new age technology and system of communication that allows its users to create content on their own and interact more freely with each other.  Before this time, user participation in topics posted online was limited. But today web 2.0 enables such participation with the invention of blogs, and social media sites.  

Creativity is seen in the fact that people are more prone to express themselves through writing, animations, videos, and other forms of communication. Information on new and trending stories are shared through these channels.  Ideas are also exchanged by participants.

daily spamton day 1: small spamton

daily spamton day 1: small spamton

Answers

Answer:

small spamton

Explanation:

small spamton

Answer:

Small Spamton very precious

Explanation:

Is it possible to compare 2 pre-packaged versions in cpi?

Answers

Yes, it is possible to compare two pre-packaged versions in the Consumer Price Index (CPI), but it can be challenging due to certain limitations of the index.

The CPI is designed to measure changes in the overall price level of a basket of goods and services consumed by households.

It focuses on broad categories and representative items within those categories, rather than specific versions of products.

When it comes to pre-packaged versions of products, there can be variations in size, quality, branding, and other attributes that may affect their prices differently.

These variations make direct comparisons complex within the framework of the CPI.

To compare two specific pre-packaged versions within the CPI, it would require detailed data on their specific characteristics and how they align with the representative item in the CPI basket.

This level of granularity may not be readily available in the public domain or within the CPI methodology.

For more questions on Consumer Price Index

https://brainly.com/question/8416975

#SPJ8

: "I have a customer who is very taciturn."

: "I have a customer who is very taciturn."

Answers

The client typically communicates in a reserved or silent manner

B. He won't speak with you.

Why are some customers taciturn?

People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.

The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.

Learn more about taciturn people here:

https://brainly.com/question/30094511

#SPJ1

states that processing power for computers would double every two years

Answers

Answer:

Moore's Law

Explanation:

Rectangular box formed when each column meet​

Answers

Answer:

If this is a true or false I guess my answer is true?

Explanation:

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

All of the following is true about MS Online/OneDrive apps,
EXCEPT (NOT):
Select one:
O a. Cloud-based apps
Ob.
c.
C.
d.
Watered down version of MS Word, MS Excel, and
MS PowerPoint
Cost the end user money to use
Allows user to keep files on OneDrive or download
to local drive

Answers

All of the following is true about MS Online/OneDrive apps except (not): C. cost the end user money to use.

What is OneDrive?

OneDrive can be defined as a cloud-based storage service and software application synchronization service that is designed and developed by Microsoft, and it was launched by Microsoft on the 7th of August, 2007.

Additionally, OneDrive typically offers to all of its registered customers (Microsoft users) a free amount of storage space (at least 5 gigabytes) that can be used to store various types of documents, share files, and synchronize files across different mobile platforms and other computer-based platforms such as:

WindowsMacOSX-box 360

In conclusion, both MS Online and OneDrive applications are largely free and as such, they do not cost an end user money to use them.

Read more on OneDrive here: https://brainly.com/question/16033855

#SPJ1

Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables

.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.

Answers

The following is a description of the entities and relationships in the ERD  -

CustomersProductOrdersOrder Details

 How is  this so?

Customers is a standard entity that stores information about customers, such as their   name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection   entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an   intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.

The relationships between the entities are as follows  -

A Customer   can place Orders.An Order can contain Products.A Product can be included inOrders.

The primary keys and foreign keys are as follows  -

The primary key for   Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for   Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product ID

Learn more about ERD at:

https://brainly.com/question/30391958

#SPJ1

Please help its due on May 7th and the code has to be in python.

Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.
Please help its due on May 7th and the code has to be in python.

Answers

We can use a list to store the sensor objects, and we can sort the list by room number, room description, or sensor number. However, accessing a sensor by its room number would require iterating through the entire list.

How to explain the information

A tuple is similar to a list, but it is immutable, meaning that it cannot be modified once created. We could use a tuple to store each sensor object, but sorting the tuple would require creating a new sorted tuple. Accessing a sensor by its room number would also require iterating through the entire tuple.

A set is an unordered collection of unique items, and it can be modified. We could use a set to store the sensor objects, but sorting the set is not possible. Accessing a sensor by its room number would also require iterating through the entire set.

Learn more about sensor on

https://brainly.com/question/29569820

#SPJ1

MULTI-SELECT

Which of the following is a current development in networking?

need for thicker cables

FDDI

need for better data storage

Ethernet

Answers

Answer:

Need for better data storage

Explanation:

Just got is right on edg

Answer:

C. needs better data storage

Explanation:

explain why it is important for you to understand and explain the basic internal and external parts of a computer in the work place setting

Answers

Answer:

Having a good understanding of the terminology and jargon used with computers helps you be more efficient with other technology. 

Explanation:

Anyone connected to the Internet has a better understanding of using the Internet and connecting other devices.

Consider the following method:

public void doSomething(int n) {
if (n > 0) {
doSomething(n/2);
StdOut.print(n);
doSomething(n/2); }
}

How many recursive calls are made by doSomething(n)?

Answers

Answer:

two recursive calls are made

Explanation:

In this piece of code two recursive calls are made by doSomething(n). This is assuming that the input (n) is greater than 0. Otherwise the function will simply end because it will completely skip over the IF statement which holds the entirety of the functions code. A recursive call is represented as the name of the function/method itself within itself. Therefore, everytime the code states doSomething(n) or in this case doSomething(n/2) it is calling itself.

Your friend Alicia says to you, “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I don’t think I’m going to do that.” How would you respond to Alicia? Explain.

Answers

Since my friend said  “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I will respond to Alicia that it is very easy that it does not have to be hard and there are a lot of resume template that are online that can help her to create a task free resume.

What is a resume builder?

A resume builder is seen as a form of online app or kind of software that helps to provides a lot of people with interactive forms as well as templates for creating a resume quickly and very easily.

There is the use of Zety Resume Maker as an example that helps to offers tips as well as suggestions to help you make each resume section fast.

Note that the Resume Builder often helps to formats your documents in an automatic way  every time you make any change.

Learn more about resume template from

https://brainly.com/question/14218463
#SPJ1

Other Questions
Using Trig To Find a Side Solve for x. Round to the nearest tenth, if necessary. QUESTION 3 Manchester United football club have an EPS of $32, and a net income of $50 million. Based on this how many shares outstanding do they have?O a. 607,000 sharesO b. 18,503,000 sharesO c. 16,800,000,000 sharesO d. 1,562,000 shares 1 paink Peter and Poul plan to buy one play station for $300. Games cost $45.99 each. Part A: Write an algebraic expression to describe how much they will spend before sales tax, based on purchasing the play station and the number of games. Lets g=number of games. Part B: If they purchase one play station and seven games, how much do they spend before sales tax? Who is the enemy in Animal Farm? 4. The theory of asset pricing (not covered in this course), asserts that the price of an asset depends on its average return (also called expected return), and its risk. Using this idea, compare the Order the data from lest to greatest 35, 24,25,38,31,20,27 please help me answer these questions1. Voltage-gated sodium channels make a cell excitable, voltage-gated potassium channels do not. Explain why and discuss the relevance of both types of channels to neural functioning. 2. Discuss the p The end of the Yakama Wars resulted in a treaty that forced the Yakamas toretreat to the reservation,leave Washington forever.pay reparations to the United States,assimilate with the United States. 2013 flores reanimation of elbow extension with medial pectoral nerve transfer in partial injuries to the brachial plexus.pdf an employee paid a company back for amounts the company lent 3 months earlier. the company would record the collection from the employee by . A study was done about people that watch the Superbowl and World Series.Did not watch the World Series Did watch the World series TotalsMale 57 64 121Female 43 36 79Totals 100 100 200Are gender and watching the World Series Independent? A survey showed that 30% of the students bring their lunch to school. The survey polled 300 students. How many of the students do not bring their lunch to school? answer as soon as possible, please! !algebra! 2 x 8 x 2 x 8 a. 2 x 8 b. 4 x 64 c. 2 x 8 d. 4 x 16 and the x's are multiplication not variables you invest $ 2400 into an account over 7 years. the account draws 3% interest. how much interest would the account gain over the 7 years sensors such as power meters, voltage sensors, and fault detectors that gather data, along with digital communication capabilities that send the data to an operations center or other location, are examples of which type of technology? Use the texts Designed to Detain and In Their Own Words to answer the question.Designed to DetainIn Their Own WordsWhich conclusion can be reached from the two texts?(1 point)O Traveling by ship is quick and easy.O People chose to go to Angel Island over Ellis Island.O Life in America is easier than in other countries.O Immigration was challenging for many. Which of the following products CANNOT be sold BOTH the consumer and industrial markets?O PensO X-Ray MachineO MicrowaveO Water A television set costs $350 cash. When bought on hire purchase, a deposit of $35 is required, followed by 12 monthly payments of $30 each. How much is saved by paying cash? (A) $10(B) $25(C) $40(D) $45 What process is occurring at point "X"? The year is 2020. What was the date 1,000 years ago