6.29 Unless otherwise specified, entire arrays are passed __________ and individual array elements are passed __________. (a) call-by-value, call-by-reference (b) call-by-reference, call-by-value (c) call-by-value, call-by-value (d) call-by-reference, call-by-reference Group of answer choices a b c d

Answers

Answer 1

Unless otherwise specified, entire arrays are passed call-by-reference and individual array elements are passed call-by-value .

The correct answer is (b) call-by-reference, call-by-value.

When entire arrays are passed, they are typically passed by reference, which means that the function receives a reference to the original array rather than a copy. This allows the function to modify the array directly, and any changes made to the array within the function will be reflected in the original array.

On the other hand, when individual array elements are passed, they are usually passed by value. This means that the function receives a copy of the specific array element, rather than a reference to it. Any modifications made to the individual element within the function will not affect the original array.

Passing entire arrays by reference can be beneficial when working with large arrays, as it avoids the need to create a copy of the entire array, which can be memory-intensive. Additionally, passing arrays by reference allows for efficient manipulation of array elements within the function, as no copying is involved.

However, passing individual array elements by value ensures that the original array remains unchanged, which can be desirable in certain situations where preserving the original data is important.

Learn more about arrays

brainly.com/question/30726504

#SPJ11


Related Questions

Karen wants to create a program that will allow the user to input their age. Which of these lines of code should be used?
print("What is your age?")
age = ("What is your age?")
age = input("What is your age?")
age = ask("What is your age?")

Answers

Answer: age = input("What is your age?")

Explanation: Since this is the syntax for inputing a variable and storing it as age

Answer:

Answer is age=input(what is your age)

Explanation: Its right because age=input your inputting your age and what is asking you hopefully it helped have a good day :)

a computer is connected to a switch, which is connected to a router, which is connected to a modem. under what circumstances does the computer get its ip address dynamically assigned by the router?

Answers

The computer gets its IP address dynamically assigned by the router when it is configured to use DHCP (Dynamic Host Configuration Protocol).

DHCP is a network protocol that allows devices to automatically obtain an IP address and other network configuration settings from a DHCP server, which in this case is the router. When the computer is connected to the switch, which is connected to the router, it sends a DHCP request to the router. The router then assigns an available IP address from its pool of addresses to the computer. This dynamic assignment is done to ensure efficient utilization of IP addresses within the network.

The router periodically renews the lease for the IP address, which means the computer may get a different IP address if the lease expires and is not renewed. This dynamic allocation of IP addresses simplifies network management and allows for easy addition or removal of devices without the need for manual configuration.

Dynamic Host Design Convention (DHCP) is a client/server convention that naturally gives a Web Convention (IP) have with its IP address and other related setup data, for example, the subnet cover and default door.

Know more about DHCP, here:

https://brainly.com/question/8458316

#SPJ11

An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack

Answers

The one probable purpose of the attack is searching and obtaining trade secrets.

What do you mean by trade secrets?

Trade secrets is made up of any business information that is said to be composed of commercial value that is known to be gotten from its secrecy.

Note that Trade secrets can be one that is seen to be valuable to a person, even if have developed new technology, designed original products, and others and as such, attackers do wants them at any cost.

Hence, The one probable purpose of the attack is searching and obtaining trade secrets.

Learn more about trade secrets from

https://brainly.com/question/27034334

#SPJ1

See full question below

An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack?

searching and obtaining trade secrets

cracking the administrator password for a critical server

probing open ports on the firewall on the border network

denying external access to a web server that is open to the public

How do people get in your computer

Answers

Answer:

????

Explanation:

This is absurd, you cannot enter your computer. it is to tiny for you to fit in.

Answer:

Explanation:

I don’t know

Which table code is correct?

Which table code is correct?

Answers

Answer:  3rd one down

Explanation:

13. Place where names, addresses and email information
is stored

Answers

Answer in ur email

Explanation:

What are the different types of Network Connectivity Devices?

Answers

Explanation:

Types of network devices

Hub.

Switch.

Router.

Bridge.

Gateway.

Modem.

Repeater.

Access Point.

HOPE THIS HELPS YOU THANK YOU.

Justice wrote a program and forgot to put the steps in the correct order. Which step does she need to review?

Planning
Filtering
Ordering
Sequencing

Answers

Answer: Sequencing

Explanation: I did test!

Sequencing step does she need to review.

What is Sequencing?

Sequencing is the act of placing a process's phases in order from start to finish. It is a crucial ability that is employed in math, physics, and other subject areas in addition to reading comprehension.

Look at a few sequence structures that can be used to structure instructions in a passage.

Students simply arrange a series of stages in a process or method in the proper order as part of sequencing activities. They might include topics like how to assemble equipment, set up and name a word processing file, or install an electrical switch.

Therefore, Sequencing step does she need to review.

To learn more about Sequencing, refer to the link:

https://brainly.com/question/30586864

#SPJ3

A Glam Event Company has hired you to create a database to store information about the parks of their event. Based on the following requirements, you need to design an ER/EER Diagram.
The park has a number of locations throughout the city. Each location has a location ID, and Address, a description and a maximum capacity.
Each location has different areas, for example, picnic areas, football fields, etc. Each area has an area ID, a type, a description and a size. Each Area is managed by one location.
Events are held at the park, and the park tracks the Event ID, the event name, description where the event is being held. One event can be held across multiple areas and each area able to accept many events.
There are three different types of events, Sporting Events, which have the name of the team competing, Performances, which have the name of the performer, and the duration. Each performance can have multiple performers, and Conferences, which have a sponsoring organization.
The park also wishes to track information about visitors to the park. They assign each visitor a visitor ID, and store their name, date of birth and registration date. A visitor can visit many locations and each location can be visited by many visitors. They also record information about the locations visited by each visitor, and the date/time of each visit.

Answers

We can deduce here that based on the requirements provided, we can design an ER/EER Diagram for the database of the park's event. Here's an example of how the entities and their relationships can be represented:

                   |     Location    |

                   +-----------------+

                   | LocationID (PK) |

                   | Address         |

                   | Description     |

                   | MaxCapacity     |

                   +-----------------+

What the diagram is all about?

This diagram illustrates the relationships between the entities:

A Location can have multiple Areas, while an Area is managed by only one Location.An Event is held at a specific Location and can be held across multiple Areas.Sporting Events, Performances, and Conferences are specific types of Events with their respective attributes.Performances can have multiple Performers associated with them.Visitors are assigned a unique VisitorID and can visit multiple Locations. Each Location can be visited by multiple Visitors.Visits are recorded for each Visitor, indicating the Location visited and the corresponding date and time.

Learn more about database on https://brainly.com/question/518894

#SPJ4

1) Coding for Table in Html

1) Coding for Table in Html

Answers

See below for the code in HTML

How to code the table in HTML?

The given table has the following features:

TablesCell mergingList (ordered and unordered)

The HTML code that implements the table is as follows:

<table border="1" cellpadding="1" cellspacing="1" style="width:500px">

<tbody>

 <tr>

  <td colspan="1" rowspan="2"><strong>IMAGE</strong></td>

  <td colspan="1" rowspan="2"><strong>name</strong></td>

  <td colspan="2" rowspan="1"><strong>first name</strong></td>

 </tr>

 <tr>

  <td colspan="2" rowspan="1"><strong>last name</strong></td>

 </tr>

 <tr>

  <td>DOB</td>

  <td>yyyy</td>

  <td>mm</td>

  <td>dd</td>

 </tr>

 <tr>

  <td>Qualifications</td>

  <td colspan="3" rowspan="1">references</td>

 </tr>

 <tr>

  <td>

  <ol>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

  <td colspan="3" rowspan="1">

  <ol type = "a">

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

   <li>&nbsp;</li>

  </ol>

  </td>

 </tr>

</tbody>

</table>

<p>&nbsp;</p>

Read more about HTML at:

https://brainly.com/question/14311038

#SPJ1

can i plug in a sata drive while the computer is on

Answers

No, it is not recommended to plug in a SATA drive while the computer is on. Doing so can pose risks to both the drive and the computer's components.

When a SATA drive is connected or disconnected while the computer is running, it can lead to various issues. Hot-plugging a SATA drive may cause data corruption, system crashes, or even damage to the drive itself. The SATA interface is not designed for hot-plugging, and a sudden connection or disconnection can disrupt data transmission and cause conflicts with the operating system. To avoid any potential problems, it is best to power off the computer before connecting or disconnecting a SATA drive, ensuring a safe and stable environment for the drive and the computer.

Learn more about  SATA drive here:

https://brainly.com/question/32142562

#SPJ11

Give reasons why you care for your sense organs​

Answers

Answer:

You care for your sense organs because they help you give awareness and help us to have contact with your surroundings. If you don't care for it the results may be severe.

Write a white paper or PowerPoint presentation demonstrating that you understand the essential elements of a patch
management program. Evaluate at least three patch management software solutions, recommend one, and describe why
you are making this recommendation
Use the list provided in the lesson as your template and search the Internet for information on patch management
concepts and vendor solutions to help create your plan.

Answers

Answer:

When is this due?

Explanation:

I will write it

What computer configuration will be the fastest to successfully run this program?Note that your program may terminate due to the lack of memory

Answers

Without knowing the specific program being run, it is difficult to give an exact answer. However, in general, a computer configuration with a high-speed processor, ample RAM, and a solid-state drive (SSD) would be the fastest to successfully run a program.

A high-speed processor, such as an Intel Core i7 or i9, will be able to handle complex calculations and instructions more quickly than a lower speed processor. Ample RAM, typically 8GB or more, will allow the computer to store and access data quickly, reducing the risk of running out of memory. An SSD is faster than a traditional hard drive, which can significantly speed up program load times and overall performance.Other factors such as the operating system, graphics card, and other hardware specifications may also impact program performance. It's important to consult the program's system requirements and recommended hardware specifications to ensure the computer is capable of running it efficiently.

To learn more about configuration click on the link below:

brainly.com/question/31161920

#SPJ4

How should the teachers respond to the parental complaints of student C? If they fail the student, the student will likely be rejected from the Ivy League College and could lose scholarship opportunities. If they bow to the parent's pressure and allow a third try to make up the work, this student will have an unfair advantage over student B.

Answers

Answer:

the teacher should give the student some time to work with since they dont have the same avantage as the others

Explanation:

all should have an fair time as others

Which of the following is a benefit of display advertising over search advertising?

A
Display advertising is cheaper than search advertising

B
Appearing on relevant websites offering advertising space

C
Ads can appear at the top of search engine results pages

D
Display ads are more likely to be clicked on​

Answers

Answer:

D.

Explanation:

Sports photography is not included in news coverage.


True


False

Answers

Answer:

False yes it is

Explanation:

what is classification? multiple choice determines values for an unknown continuous variable behavior or estimated future value determines which things go together segments a heterogeneous population of more homogeneous subgroups assigns records to one of a predefined set of classes

Answers

Heterogeneous population of more homogeneous subgroups assigns records to one of a predefined set of classes.

What do you mean by Heterogeneous population ?

Every member of a population or sample that is heterogeneous has a different value for the trait that interests you. For instance, your group would be considered diverse in terms of height if each member ranged in height from 4'3" to 7'6". Heterogeneous populations are very prevalent in the actual world.

In a population living on an island where there is no influx of new residents, all the individuals will have the same characteristics, such as immunity to disease. A population that exhibits significant trait variation is said to be heterogeneous.Although this phrase has a common usage in statistics, it is most often used in relation to samples taken from distinct populations that may or may not be identical. In case the population. The populations are said to be homogeneous if they are identical, and hence, the sample data are also said to be homogeneous.

To know more about heterogeneous population please click here ; https://brainly.com/question/29696883

#SPJ1

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Create an infographics using the Word Processing Software, informing the audiences about internet safety practices.

Answers

Here is a suggested infographic on internet safety practices using Microsoft Word:

[A Word document shows the following infographic:]

Staying Safe Online

Protect your personal information. Never share your name, address, phone number, passwords, or Social Security Number on social media or public websites.

Be wary of phishing emails and malicious links. Never click links or download attachments from unknown or untrusted sources. Legitimate companies will not ask for sensitive data via email.

Use strong and unique passwords. A strong password contains a minimum of 8 characters, a mix of letters, numbers and symbols, and is not based on personal information. Use different passwords for different online accounts.

Be cautious of what you post. Anything you post online can potentially last forever. Do not post anything that you would not want seen by anyone.

Turn on two-factor authentication whenever possible. This adds an extra layer of security for your accounts like email, social media, and cloud storage services.

Ensure all devices and software are up to date. Install the latest updates to keep security patches current to protect against threats.

Be wary of public Wi-Fi networks. Public networks are not secure and all your online activity and information can be visible to others. Avoid conducting sensitive activities on public Wi-Fi.

Signal for help if anything suspicious happens. If you notice any suspicious activity on your accounts or devices, changing passwords or unauthorized logins, report it immediately to the concerned companies and consider filing a police report.

Online privacy and security is a shared responsibility. Be proactive and spread awareness about internet best practices to help keep everyone safe online. Together, we can make the internet a safer place!

Does this infographic look okay? I tried to highlight some key best practices around protecting personal information, using strong passwords, being cautious of what is posted online, enabling two-factor authentication, keeping software up to date, avoiding public Wi-Fi and knowing how to get help if needed. Please let me know if you would like me to modify anything in the infographic. I can also suggest some other topics or formatting styles if required.

A brief overview of some important internet safety practices that you can include in your infographic  using the Word Processing Software is given.

How to explain the information

Use strong passwords: Use a combination of uppercase and lowercase letters, numbers, and symbols in your passwords, and avoid using personal information.

Enable two-factor authentication: Two-factor authentication provides an extra layer of security by requiring a second form of authentication in addition to your password.

Be careful with personal information: Don't share personal information like your full name, address, phone number, or social security number online.

Learn more about Word Processing on

https://brainly.com/question/985406

#SPJ1

What might happen to the wire if the uneven load is never balanced

Answers

If an uneven load on a wire is never balanced, it can lead to a variety of potential problems and risks. One of the most common consequences of uneven loading is the buildup of stress and tension in the wire, which can cause it to become overstretched and potentially snap or break.

When a wire is subjected to uneven loading, such as when a heavier weight is placed on one side of the wire than the other, the tension in the wire becomes unbalanced. This can cause the wire to become stretched beyond its normal limits, which can lead to deformation, fatigue, and ultimately failure. If the wire is not balanced, it may also be more susceptible to external factors such as wind, vibration, and temperature changes, which can exacerbate the stress and strain on the wire.

In addition to the risk of wire failure, uneven loading can also lead to other safety hazards. For example, if the wire is used to support a structure or equipment, an imbalance in the load can cause the structure to become unstable or the equipment to malfunction. This can result in property damage, injuries, and even loss of life.

To prevent these types of issues, it is important to ensure that loads are evenly distributed on wires and other support structures. This can be achieved through the use of proper rigging techniques, such as the use of equalizer bars or spreader bars, and by carefully monitoring loads to ensure that they are balanced at all times. By taking these precautions, the risk of wire failure and other safety hazards can be minimized.

To learn more about Wire loading, visit:

https://brainly.com/question/25922783

#SPJ11

Consider the following code segment. Int count = 5; while (count < 100) { count = count * 2; } count = count 1; what will be the value of count as a result of executing the code segment?

Answers

Using the while loop, the value of count as a result of executing the following code segment is 161.

int count = 5;    

while (count < 100)

{

count = count * 2;  // count value will 10 20 40 80 160  then exit the while loop as count<100

}

count = count + 1; // here, 161 +1

When a condition is not satisfied, a "While" loop is used to repeat a certain piece of code an undetermined number of times. For instance, if we want to ask a user for a number between 1 and 10, but we don't know how often they might enter a greater number, until "while the value is not between 1 and 10."

While the program is running, the statements are continually executed using both the for loop and the while loop. For loops are used when the number of iterations is known, but while loops execute until the program's statement is proven incorrect. This is the main distinction between for loops and while loops.

To learn more about While loop click here:

brainly.com/question/29102592

#SPJ4

Kieran wants to search a database quickly for information on the last time a patient came to his medical facility. This information is contained in one table. Which feature would make the most sense for him to use?

A. Query

B. Report

C. Filter

D. Sort

Answers

D. Sort

I hope im correct

Sort feature would make the most sense for him to use.

What is Medical facility?

In general, a health facility is any place that offers medical services. Small clinics, doctor's offices, urgent care facilities, big hospitals with sophisticated emergency rooms, and trauma centers are all examples of healthcare facilities.

One typical indicator of a country or region's prosperity and quality of life is the quantity and caliber of its health services. Health care facilities are frequently subject to some legal regulation; frequently, a facility must first get a license from a regulatory body before it can begin operations.

Governments, for-profit companies, non-profit groups, and occasionally even private citizens may own and run healthcare facilities, with the proportions varied by nation.

Therefore, Sort feature would make the most sense for him to use.

To learn more about Sort, refer to the link:

https://brainly.com/question/18568184

#SPJ5

in addition to good design sense, what else do web designers need to be proficient in?

Answers

In addition to good design sense, web designers need to be proficient in front-end coding languages.

A web designer refers to an individual who is saddled with the responsibility of writing executable codes (instructions) for the design and development of a website, especially by using a hypertext markup language (HTML).

Generally, it is expected that all web designers a good design sense in website development. Additionally, web designers need to be proficient in front-end coding languages, so as to ensure the graphical display and user-interface (UI/UX) are attractive and properly rendered.

Some examples of front-end coding languages include:

CSSHTMLJavascriptReactJQuerryVue

Read more on web design here: https://brainly.com/question/8391970

When might you use a template to create a new document?

Answers

Answer:

business plan, predefined page layout, fonts, margins, and styles.

Explanation:

A template is a document type that creates a copy of itself when you open it. For example, a business plan is a common document that is written in Word. Instead of creating the structure of the business plan from scratch, you can use a template with predefined page layout, fonts, margins, and styles.

One of your team members works long hours and behaves very formally, especially when the manager is around. this
team member is likely to be from . select 2 options.
-the united states
-norway
-sweden
- china
-japan

Answers

Based on the given scenario, team member is likely to be from:

ChinaJapan

What is a formal behavior?

A Formal speech or behavior is known to be a  very serious one instead of one been relaxed or friendly.

Note that this is often used in official situations and Based on the given scenario, team member is likely to be from China and Japan because their way of life and relating to business conduct is always straight to the point, serious and no jokes.

Learn more about formal behavior from

https://brainly.com/question/8838403

#SPJ2

What is the purpose of the Define Custom Show dialog box?

to select the animations that will be shown
to determine the show type of a slide show
to select which presentation will be displayed
to select the specific slides that will be shown

Answers

The purpose of the Define Custom Show dialog box is to select the specific slides that will be shown in a presentation.

The Define Custom Show dialog box is a tool in Microsoft PowerPoint that allows users to create a custom presentation by selecting specific slides from their existing presentation.

This feature is especially useful when a presenter wants to show a particular subset of slides to a specific audience or in a specific order.

By using the Define Custom Show dialog box, presenters can choose which slides to include or exclude, and they can arrange them in a new order that makes sense for the presentation they want to give.

This feature helps to eliminate the need for creating multiple versions of a presentation and allows presenters to quickly and easily customize their presentation to meet the specific needs of their audience.

For more such questions on Define Custom Show dialog box:

https://brainly.com/question/23108558

#SPJ11

Truel on false Computer as very useful machine in data processing:True​

Answers

Answer:

Yes it is true that I have read

True because you can access the internet and use the sources.

I need help building this Assignmen in Java, Create a class "LoginChecker" that reads the login and password from the user and makes sure they have the right format then compares them to the correct user and password combination that it should read from a file on the system. Assignment Tasks The detailed steps are as follows: 1-The program starts by reading login and password from the user. 2- Use the code you built for Assignment 8 Task 2 of SENG101 to validate the format of the password. You can use the same validation rules used in that assignment. You are allowed to use any functions in the String library to validate the password as well. Here are suggestions for the valid formats if you need them. A- User name should be 6-8 alphanumeric characters, B- Password is 8-16 alphanumeric and may contain symbols. Note, your format validation should be 2 separate functions Boolean validateUserName(String username) that take in a username and returns true if valid format and false otherwise. Boolean validatePwd(String pwd) that take in a password and returns true if valid format and false otherwise. 3- The program will confirm if the user name and password have the required format before checking if they are the correct user/password 4- If the correct format is not provided, the program will keep asking the user to enter login or password again 5- Relevant output messages are expected with every step. 6- Once the format is confirmed, the system will check the login and password against the real login and password that are stored in a file stored in the same folder as the code. 7- For testing purposes, create a sample file named confidentialInfo.txt 8- the file structure will be as follows: first line is the number of logins/passwords combinations following line is first login following line is the password following line is the next login and so on. 9- the program should include comments which make it ready to generate API documentation once javadoc is executed. (7.17 for reference) A -Documentation is expected for every class and member variables and methods. 10- Once the main use case is working correctly, test the following edge cases manually and document the results. A- what happens if the filename you sent does not exist? B- what happens if it exists but is empty? C- what happens if the number of login/password combinations you in the first line of the file is more than the actual number combinations in the file ? what about if it was less? 11- Generate the documentation in html format and submit it with the project.

Answers

Here's an implementation of the "LoginChecker" class in Java based on the provided assignment requirements:

import java.io.BufferedReader;

import java.io.FileReader;

import java.io.IOException;

public class LoginChecker {

   private String username;

   private String password;

   public LoginChecker(String username, String password) {

       this.username = username;

       this.password = password;

   }

   public boolean validateUserName(String username) {

       // Validate username format (6-8 alphanumeric characters)

       return username.matches("^[a-zA-Z0-9]{6,8}$");

   }

   public boolean validatePwd(String password) {

       // Validate password format (8-16 alphanumeric and may contain symbols)

       return password.matches("^[a-zA-Z0-9!#$%^&*()-_=+]{8,16}$");

   }

   public boolean checkCredentials() {

       // Check if username and password have the required format

       if (!validateUserName(username) || !validatePwd(password)) {

           System.out.println("Invalid username or password format!");

           return false;

       }

       // Read logins and passwords from the file

       try (BufferedReader br = new BufferedReader(new FileReader("confidentialInfo.txt"))) {

           String line;

           int numCombinations = Integer.parseInt(br.readLine());

           // Iterate over login/password combinations in the file

           for (int i = 0; i < numCombinations; i++) {

               String storedUsername = br.readLine();

               String storedPassword = br.readLine();

               // Check if the entered username and password match any combination in the file

               if (username.equals(storedUsername) && password.equals(storedPassword)) {

                   System.out.println("Login successful!");

                   return true;

               }

           }

           System.out.println("Invalid username or password!");

       } catch (IOException e) {

           System.out.println("Error reading the file!");

       }

       return false;

   }

   public static void main(String[] args) {

       // Prompt the user to enter login and password

       // You can use a Scanner to read user input

       // Create an instance of LoginChecker with the entered login and password

       LoginChecker loginChecker = new LoginChecker("user123", "pass123");

       // Check the credentials

       loginChecker.checkCredentials();

   }

}

Please note that you need to replace the placeholder values for the username and password with the actual user input. Additionally, make sure to have the confidentialInfo.txt file in the same folder as the Java code and ensure it follows the specified format in the assignment.

Make sure to compile and run the program to test its functionality.

Learn more about Java here:

https://brainly.com/question/33208576

#SPJ11

Type the correct answer in the box. Spell all words correctly.
What does Clara create that programmers can use to write code?
Clara works in a software development company. Her boss identifies that she has strong problem-solving skills. Clara’s boss places her on the planning team to create____ for programmers.
This is for Edmentum final! thanks

Answers

Answer:

design documents

Explanation:

Usually, in a software development company or information technology (IT) department, software is developed through a team effort. Such teams have programmers and various other professionals, such as software developers and engineers. These professionals perform parts of the entire software development process. For example, the programmer is not the only person in a team who can formulate a solution to a problem. Many times, software developers and system analysts do this. They create design documents for the programmer to follow. Based on these design documents, a programmer writes the code for the program.

Other Questions
Which of the following by itself is consistent with the directions that the price level and real GDP changed at the onset of the Great Depression?:a. aggregate demand shifted right.b. aggregate demand shifted left.c. aggregate supply shifted right.d. aggregate supply shifted left. Of the five things that you listed in question 1, which one do you think holds the most promise for making a real difference in environmental quality over the long term.The Five Things are Transport, Agriculture, Culture, Economics, and Energy Who created the above piece of art? a. David Hammons b. Christo and Jeanne-Claude c. Robert Smithson the first use of anabolic steroids was in the treatment for what ailment? 2. Based on what you have learned, what can you infer aboutthe effectiveness of trench warfare? In a sample of 400 voters, 360 indicated they favor the incumbent governor. The 95% confidence interval of voters favoring the incumbent is. What are the 4 types of lies? One message that i learned from the text is that acting with kindness is more important than following the rules CONFUZZELED very much One of the ways entrepreneurs achieve success is by using resources more efficiently. This is an example of how entrepreneurs use ______________ strategy.an imitativeA. an imitativeB. a low-cost leaderC. a differentiationD. a combination Which of the following is a true statement? a. All mammals have menstrual cycles. b. The endometrial lining is shed in menstrual cycles but reabsorbed in estrous cycles. c. Estrous cycles are more frequent than menstrual cycles. d. Ovulation occurs before the endometrium thickens in estrous cycles. What is the name of place where you can find only the males such as animals, birds, human beings? you are going to deposit $3,400 in an account that pays .40 percent interest per month. how much will you have in 5 years? A certain business is marketing its product and hasdetermined that, when it raised the selling price of itsproduct, its sales went down. The number of unitssold, P, is modeled by the equation P=1200-20s,where s is the selling price, in dollars. Based on thismodel, what is the decrease in selling price from 700units sold to 900 units sold?a) 5b) 10c) 15d) 20 vvA leader should avoid a directive leadership style when ________.tasks are highly structuredworkers have an external locus of controltasks are stressful and ambiguouswork groups experience conflictA leader should avoid a directive leadership style when ________.tasks are highly structuredworkers have an external locus of controltasks are stressful and ambiguouswork groups experience conflict if one side of a square measures (3x - 8)ft., find the area of the square show work Question 2 This is a rhombus. Using it's properties, what is the measure of it by using the numbers: 120 ( and it has 1, 2, 3, for the number of angles) Special Parallelograms. I need to find the 3 angles Which examples of situational irony does Saki use to create satire? Select two options.Bertha hopes that she will not be eaten by the wolf, but she is.The wolf comes to the park to eat pigs, but eats Bertha instead.The children do not think that they are going to like the story, but they do.The aunt wants the bachelor to learn his lesson, but she learns hers instead.Bertha thinks that it is good to win medals for 16. Which of the following most directlycontributed to the Union victory in the CivilWar?(A) The assassination of Lincoln turned publicopinion against the Confederacy(B) The Union possessed greater resources andpopulation(C) European nations ultimately intervened onbehalf of the Union(D) The Confederacy failed to recruit effectivemilitary leaders Weighing a Bacterium Scientists are using tiny, nanoscale cantilevers 4 micrometers long and 500 nanometers wide-essentially miniature diving boards-as a sensitive way to measure mass. The cantilevers oscillate up and down with a frequency that depends on the mass placed near the tip, and a laser beam is used to measure the frequency. A single E. coli bacterium was measured to have a mass of 710 femtograms = 7.101016 kg with this device, as the cantilever oscillated with a frequency of 17.1 MHz .Treating the cantilever as an ideal, massless spring, find its effective force constant.