A nutritionist who works for a fitness club helps members by evaluating their diets. As part of her evaluation, she asks members for the number of fat grams and carbohydrate grams that they consumed in a day. Then, she calculates the number of calories that result from the fat, using the following formula: calories from fat = fat grams X 9 Next, she calculates the number of calories that result from the carbohydrates, using the following formula: calories from carbs = carb grams X 4 The nutritionist asks you to write a program that will make these calculations.

Answers

Answer 1

In python:

fat = int(input("Enter the # of fat grams: "))

carbs = int(input("Enter the # of carbohydrate grams: "))

print("The calories from fat are {} and the calories from carbs is {}".format(fat * 9, carbs * 4))


Related Questions

How do you modify WordArt? Give specific details and steps

NEED THIS ASAP

Answers

The steps to modify a WordArt text are:

Click on the Editing WordArt TextThen Double click or select  the WordArt image.Via the use of the Format command tab, in the Text group, select Edit Text and the Edit WordArt Text dialog box showThrough the use of the Text text box, make all changes you want.Select OK.

What is Word art?

Word art or text art is known to be a kind of an art that is made up of text, creating words or phrases along with  visual imagery.

Therefore, The steps to modify a WordArt text are:

Click on the Editing WordArt TextThen Double click or select  the WordArt image.Via the use of the Format command tab, in the Text group, select Edit Text and the Edit WordArt Text dialog box showThrough the use of the Text text box, make all changes you want.

Select OK.

Learn more about WordArt from

https://brainly.com/question/938171

#SPJ1

How could this code be simplified?
set dialoguel to "Hi there!"
set dialogue2 to "I mean.
set dialogue3 to
set dialogue4 to "Quack' Quack"
OA. By using a control structure
B. By using a repeat loop
C. By replacing it with an array block
O D. By renaming all the variables

Answers

The given code can be simplified if there is the use of a A. control structure.

What is a Program Code?

This refers to the set of instructions that are given to a computer system to execute commands.

Hence, we can see that the code can be simplified if there is the use of a control structure because it would analyze variables and choose directions in which to go based on given parameter

Read more about program codes here:

https://brainly.com/question/26134656

#SPJ1

Valiant is an NGO that has very strong opinions against the government. It has faced a number of legal notices and its IP address has been blocked numerous times for voicing out dissent on online forums and social media. Valiant has requested your help as a network analyst to find a way around this problem so that it won't receive any more legal notices due to IP address tracking. Which of the following methods will you use in this scenario?
1. Proxy server
2. Firewall
3. IDS
4. IPS

Answers

In this situation, firewall techniques will you employ.

The firewall's definition ?

The monitoring and filtering of incoming and outgoing network traffic by a firewall, a network security tool, is done in accordance with the security policies that have already been defined by the company. Essentially, a firewall is the wall that separates a private internal network from the public Internet.

What are the three types of firewalls?

There are four main kinds of firewalls, depending on how they work. a packet-filtering firewall. Firewalls that use packet filtering are the most traditional and fundamental. Routers at the circuit level. Stateful Check Firewalls. Applied-Level Gateways (Proxy Firewalls).

To know more about firewall techniques visit :-

https://brainly.com/question/13055134

#SPJ1

How to use the screen mirroring Samsung TV app

Answers

If you want to show what's on your phone or computer screen on a Samsung TV, you can do it by these steps:

Make sure both your Samsung TV and the thing you want to copy are using the same Wi-Fi.

What is  screen mirroring

The step also includes: To get to the main menu on your Samsung TV, just press the "Home" button on your remote.

The  screen mirroring is Copying or making a duplicate of something. They are repeating each other's words to try to fix the problem between them. This is the way to show what is on your computer or phone screen on another screen by using wireless connection.

Learn more about  screen mirroring from

https://brainly.com/question/31663009

#SPJ1

Identify the correct characteristics of Python lists. Check all that apply. Python lists are enclosed in curly braces { }. Python lists contain items separated by commas. Python lists are versatile Python data types. Python lists may use single quotes, double quotes, or no quotes.

Answers

Answer:

Python lists contain items separated by commas.

Python lists are versatile Python data types.

Python lists may uses single quotes, double quotes, or no quotes.

Explanation:

Python Lists are enclosed in regular brackets [ ], not curly brackets { }, so this is not a correct characteristic.

Answer:

a c d

Explanation:

Please help to answer this, I need to see the most genius of computer out here​

Please help to answer this, I need to see the most genius of computer out here

Answers

The sign "####" is used as a temporary name or hidden element in different situations.  

When someone writes "#1 REF. ", they are probably referring to a certain book or article.

The word "NAME. " is written after "iii," which means someone wants to know a name or what to call something.

What are the symbols

We use  "####" a lot in programming or data entry to show something that needs to be filled in or figured out . For instance, you can use it to show a number that you don't know, to represent a code or name that's missing, or to show that certain information is hidden or private.

The number "#1" is like an ID given to a source. "REF" means "reference" and shows that the following information is about that source.

The name text means that someone might be asking for a name, or asking about how names are chosen or used.

Read more about symbols here:

https://brainly.com/question/29886201

#SPJ1



b) Briefly explain what do the following symbols/letters stand for?

1) ####

#1) REF!

iii) NAME?

The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cycle if at least one edge can still be relaxed after performing nm times of relaxations. The algorithm, however, does not specify which cycle is a negative cycle. Design an algorithm to report one such cycle if it exists. You should make your algorithm runs as fast as possible.

Answers

Answer:

- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.

- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".

- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.

- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.

Explanation:

The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.

david is troubleshooting a new android application his company is creating. he has installed the app on an android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. which of the following should david enable on the device?

Answers

David enables the power user in his device in order to troubleshoot a new android application.

What is Troubleshooting?

Troubleshooting may be defined as a systematic and well-arranged procedure that is used to locate the cause of a fault in a computer system and correct the relevant hardware and software issues.

The process of approaching problem-solving using a logical and methodical approach is essential to a successful resolution. The group of power users includes those rights and permission that are essentially required to permit the computer-wide setting in order to install drivers.

Therefore, David enables the power user in his device in order to troubleshoot a new android application.

To learn more about Troubleshooting, refer to the link:

https://brainly.com/question/14394407

#SPJ1

A stack is a ___________________ data structure.

Answers

Answer:

A stack is a base data structure.

You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!

Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.

Answers

Confidential Computer Forensics Investigation Report

Case Number: 2023-4567

Date: June 22, 2023

Subject: Computer Forensics Investigation Findings

I. Introduction:

The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.

II. Computer Information:

The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.

III. Access and Usage:

During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.

IV. Forensic Tools and Findings:

Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.

Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.

File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.

Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.

V. Conclusion:

Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.

The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.

Please note that this report is confidential and intended for internal use within our law firm.

Sincerely,

[Your Name]

Computer Forensics Investigator

[Law Firm Name]

I hope this helps. Cheers! ^^

A cyberbully is someone who invades another person’s privacy by posting mean-spirited messages. repeatedly sending text messages. visiting questionable websites. stealing original work.

Answers

Answer:

Its A.

Explanation:

Took the exam review

Answer:

A

Explanation:

on edge

Which feature of a website takes you to a different part of the website or a totally different website when you click on it? A. graphics B. formal text C. hyperlink D. animation

Answers

Answer: C

Explanation:

Answer:

hyperlink

Explanation:

The feature of a website that takes you to a different part of the website or a totally different website when you click on it is called a hyperlink. Hyperlinks are typically underlined and appear in a different color than the surrounding text. They can be used to navigate between pages on the same website or to link to external websites.

Assume a system uses 2-level paging and has a TLB hit ratio of 90%. It requires 15 nanoseconds to access the TLB, and 85 nanoseconds to access main memory. What is the effective memory access time in nanoseconds for this system?

Answers

Answer:

The effective memory access time  = 293.5 nanoseconds.

Explanation:

Given that:

TLB hit ratio = 90%

= 90/100

= 0.9

Require time to access TLB = 15 nanoseconds &

Time to access main Memory = 85 nanoseconds

The objective is to estimate the effective memory access time in nanoseconds for this system .

The effective memory access time  = [TLB Hit ratio (  main memory  access time + required time to access TLB) + ( 2 × main memory  access time) + required time to access TLB) × (2 - TLB hit ratio)]

The effective memory access time = [0.9 ( 85 + 15 ) + ( 2 × (85 ) + 15) × ( 2 - 0.90)

The effective memory access time  = 293.5 nanoseconds.

Does the security burden fall primarily on the user? On

the company that the user is doing business with? On

both? Support your answer.​

Answers

Answer:

yes and no because of the security

Explanation:

yes and no because of the security

which optical storage media has greatest storage capacity?​

Answers

A Blu-ray Disc has the greatest storage capacity.

The optical storage media has greatest storage capacity is Single-layer, single-sided Blu-ray disc.

What is the  Blu-ray disc.

A Blu-ray disc can store the most information compared to other types of optical discs. A one-sided Blu-ray disc can store around 25 GB of information.

Dual-layer or double-sided discs are discs that have two layers or two sides, which allows them to store more information. New Blu-ray discs with 20 layers can store up to 500 GB of data. Small DVDs can save about 4. 7 GB of data. A DVD that has two layers or can be played on both sides can store up to 8. 5 GB of data. If it is both dual-layer and double-sided, it can hold up to 17 GB of data.

Read more about  Blu-ray disc here:

https://brainly.com/question/31448690

#SPJ6

Dan is working on a printing project. Which important points must he consider while printing? document size texture printing stock color mode He must print in CMYK because that color mode retains all the colors. arrowRight He must keep the font size at 12 points to maintain proper readability. arrowRight He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. arrowRight He must avoid printing on colored stock to avoid distortion of the ink color.

Answers

Answer:

Down below

Explanation:

Color Mode  - He must print in CMYK because  that color mode retains all the colors.

Document Size  - He must keep the font size at  12 points to maintain proper readability.

Texture  - He must use paper that’s glossy  on one side and uncoated on

the other to produce fine-quality prints.

Printing Stock  - He must avoid printing on colored  stock to avoid distortion of the ink color.

 

Colour Mode—He must print in CMYK because  that colour mode retains all the colours. Document Size—He must keep the font size at  12 points to maintain proper readability. Texture—He must use paper that’s glossy  on one side and uncoated on the other to produce fine-quality prints. Printing Stock—He must avoid printing on coloured stock to avoid distortion of the ink colour.

What is Texture?

Felt-textured papers are frequently described as soft and having a woven or textile-like appearance.

In menus, stationery, and when searching for an artistic flourish to go with a design or image, the paper's surface can be employed to great effect when printing images.

Thus, the statement are matched above.

For more details about textured, click here:

https://brainly.com/question/14989874

#SPJ5

3.23 LAB: Seasons Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day. Ex: If the input is: April 11 the output is: Spring In addition, check if the string and int are valid (an actual month and day).

I need a C Programming language.

Answers

Answer:

Explanation:

Hello jbagcal

I am sorry I don't know the answer

Thank you

Which of the following lists presents the introduction of various types of media in the United States in the
correct sequential order?
O newspaper, television, movies, radio
O newspaper, movies, radio, television
newspaper, radio, television, movies
newspaper, movies, television, radio.

Answers

Answer: The correct answer is newspaper, movies, radio, television...

Explanation:

Write a program that can be used to gather statistical data about the number of movies college students see in a month. The program should ask the user how many students were surveyed and dynamically allocate an array of that size. The program should then allow the user to enter the number of movies each student has seen. The program should then calculate the average, median, and mode of the values entered. Be sure to including comments throughout your code where appropriate.

Answers

bet ... a program that can be used to gather statistical data about the number of movies college students see in a month. The program should ask the user how many students were surveyed and dynamically allocate an array of that size. The program should then allow the user to enter the number of movies each student has seen. The program should then calculate the average, median, and mode of the values entered. Be sure to including comments throughout your code where appropriate.

Develop a simple game that teaches kindergartners how to add single-digit numbers. Your function game() will take an integer n as input and then ask n single-digit addition questions. The numbers to be added should be chosen randomly from the range [0, 9] (i.e.,0 to 9 inclusive). The user will enter the answer when prompted. Your function should print 'Correct' for correct answers and 'Incorrect' for incorrect answers. After n questions, your function should print the number of correct answers.

Answers

Answer:

2 correct answer out of 3

Two of the most fundamental functions for dealing with interprocess communication are read() and write(). Consider the following otherwise valid C program:int r, pipeFDs[2];
char message[512];
pid_t spawnpid;

pipe(pipeFDs);
spawnpid = fork();

switch (spawnpid)
{
case 0:
close(pipeFDs[0]); // close the input file descriptor
write(pipeFDs[1], "hi process, this is the STUFF!!", 21);
break;

default:
close(pipeFDs[1]); // close output file descriptor
r = read(pipeFDs[0], message, sizeof(message));
printf("Message received from other: %s\n", message);
break;
}

Select each of the following answers that is correct. CAN BE MULTIPLE CHOICES...
(1) The read() call may block until data becomes available
(2) When the read() call returns, this one call will return all of the data that was sent through the pipe, which is different behavior than if this was a socket
(3) If the read() call blocks, the process will be suspended until data arrives
(4) The write() call will return before all of the data has been written, if the corresponding read() call blocks mid-transfer
(5) Pipes can fill, which will cause the write() call to block until the read() call is able to read data from the pipe

Answers

Answer: Provided in the explanation section

Explanation:

int r, pipeFDs[2];

char message[512];

pid_t spawnpid;

pipe(pipeFDs);

spawnpid = fork();

switch (spawnpid)

{

case 0:

close(pipeFDs[0]); // close the input file descriptor

write(pipeFDs[1], "hi process, this is the STUFF!!", 21);

break;

default:

close(pipeFDs[1]); // close output file descriptor

r = read(pipeFDs[0], message, sizeof(message));

printf("Message received from other: %s\n", message);

break;

}

Observation of the program:

The read() call may block until data becomes available If the read() call blocks, the process will be suspended until data arrives Pipes can fill, which will cause the write() call to block until the read() call is able to read data from the pipe

⇒ Therefore,Option 1,3 and 5 correct

Cheers i hope this helped !!!

You should always keep a backup of data stored in the cloud because the cloud provider does not automatically do this True or false???

Answers

Answer:

False

Explanation:

which of the following can be helpful when you are study

ing for a test​

Answers

There are many techniques that can be helpful when studying for a test. Here are some suggestions:

Start early: Don't wait until the last minute to begin studying. Starting early gives you more time to review the material, identify areas that require further study, and practice with sample questions.

How best to prepare for a test?

Make a study schedule: Plan out your study sessions ahead of time. Allocate time for each subject or topic, and stick to your schedule. Having a plan will help you stay organized and focused.

Use active learning strategies: Instead of simply reading through your notes, try active learning strategies such as summarizing the material, creating flashcards, or explaining the concepts to someone else.

Take breaks: It's important to take regular breaks during your study sessions to avoid burnout. Take a short walk, stretch, or do something else that is relaxing and enjoyable.

Get enough sleep: Getting enough sleep is crucial for retention and recall of information. Make sure you get adequate sleep in the days leading up to the test.

Read more about studying here:

https://brainly.com/question/29447503

#SPJ1

Which of the following best describes the ribbon?

Answers

In computer science, a ribbon refers to a graphical user interface (GUI) element used in software applications to provide access to various functions and features.

What is the Ribbon?

The ribbon is typically a horizontal strip located at the top of the application window and contains tabs and groups of commands organized by functionality.

Users can click on a tab to display a group of related commands, and then select the desired command to perform a specific task. The ribbon was introduced in Microsoft Office 2007 and has since been adopted by many other software applications as a modern and user-friendly interface for organizing and accessing program features.

Read more about graphics here:

https://brainly.com/question/18068928

#SPJ1

Essay:
1. What are the things needed to gain access to the Internet?  
2. Do you think social media is a helpful tool for people? Why or why not?
3. Write down your best experience on how internet helped you in a strenuous situation.​

Answers

Answer:

1) There are three ingredients needed to access the Internet from a laptop or desktop computer: (1) an ISP, (2) a modem and (3) a Web browser.

2) yeah ofcourse social media ia a very helpful tool for people because it helps us connect with people all around the globe.It helps you clear you doubts for the perfect example is now.You know you are clearing your doubt here in brainly which can be considered as a social media.

write a c program to insert and delete values from stack( to perform pop and push operations) using an array data structure

Answers

Answer:

How to implement a stack in C using an array?

A stack is a linear data structure that follows the Last in, First out principle (i.e. the last added elements are removed first).

This abstract data type​ can be implemented in C in multiple ways. One such way is by using an array.

​Pro of using an array:

No extra memory required to store the pointers.

Con of using an array:

The size of the stack is pre-set so it cannot increase or decrease.

write a c program to insert and delete values from stack( to perform pop and push operations) using an
write a c program to insert and delete values from stack( to perform pop and push operations) using an

A simple machine produces 25 joules of output work for every 50 joules of input work. What is the efficiency of this machine?.

Answers

Answer:
The efficiency of the machine is 50%


Explanation:

The efficiency of a machine is defined as the ratio of the output work to the input work, expressed as a percentage. Therefore, we can calculate the efficiency of the given machine using the formula:

Efficiency = (Output Work / Input Work) x 100%

We are given that the machine produces 25 joules of output work for every 50 joules of input work. Therefore, the efficiency of the machine is:

Efficiency = (25 / 50) x 100% = 0.5 x 100% = 50%

So the efficiency of this machine is 50%. This means that only half of the input work is converted into useful output work, while the other half is lost as heat, friction, or other forms of energy loss.

Changing how information is represented so that it can be read by a computer is called

Boolean
data
decode
encode

Answers

Answer:

Your answer is D) Encode

Explanation:

Definition of Encode: To change how information is represented so that it can be read by a computer.

To encode something is to convert it into a programming code. Changing a letter into its binary equivalent or converting an analogue sound into a digital file are two examples. Thus, option D is correct.

What information is represented so that it can be read?

Encoding is the procedure used in computers to convert a string of characters (letters, numbers, punctuation, and specific symbols) into a format that is specifically designed for efficient transmission or storage.

Decoding is the process of transforming a formatted character string back into its original form.A computer input device called OCR is made to turn scanned images of printed, typed, or handwritten text into digital text.

Therefore, to alter the representation of information so that a computer can read it.

Learn more about information here:

https://brainly.com/question/13629038

#SPJ2

9. In a program with 25% loads, 10% stores, 11% branches, 2% jumps, 52% R-type. The standard CPI for each instruction type is 2 cycles loads, 2 cycles stores, 1 cycle branches, 2 cycles jumps, 1 cycle R-type. The branches have a misprediction penalty of an additional 2 cycles when it misses, which happens 30% of the time. Loads create a RAW hazard 20% of the time adding in an extra cycle to the execution time. What is the average CPI for this program on this processor

Answers

Answer:

2.6

Explanation:

The rules of the new game were undefined.
We couldn't figure out how to play it, so we
chose another game.
made too easy
not explained
not written
made very long
X

Answers

Answer: not written

Explanation: The game should have data for it and it if it was undefined maybe the creator had something missing or a command messed up.

Other Questions
Convert 7g/dm^3 of H2O to mol/dm^3 at a university, the probability that an incoming freshman will graduate within four years is 0.654. what is the probability that at least 70 out of a group of 110 incoming freshman will graduate in four years? which of the following were found to be true in a study by the american press institute concerning reader comprehension? Which American colony economy was based primarily on agriculture and cash crops (1) Playing a team sport such as soccer or lacrosse can help a child learn important life skills, such as sportsmanship, loyalty, and discipline. (2) Sports also give children a chance to have fun with their friends. (3) However, being on a team can also put undue pressure on a child, canceling out the positive effects. (4) Generally though, the majority of children who play team sports have a positive experience, perform better in school, and develop strong relationships with others. Which sentence contains a rebuttal? A marshmallow is toasted over a campfire. Is this a physical or a chemical change? Claim:Evidence 1:Reasoning 1:Evidence 2:Reasoning 2: OPINION AS AN ENGINEER RELATED TO THE USE OF "Capacity Planning"METHODS IN INDUSTRY / IMPORTANCE OF THE APPLICABILITY THEYHAVE. which element of the marketing mix addresses the question of whether customers have similar product needs across international markets segments? What was one key result of the signing of the Magna Carta? Someone could help me to answer a Macbeth study guide plisss ??? Its due today. PLSSSSS HELP I BEG YOU I WILL GIVE BRAINLIEST WHOEVER ANSWERS FIRAT AND CORRECT.!!! Fill in the blanks below with correct units.1.) Chau has a cellular phone. Its mass is about 100? Grams or kilograms2.) Miguels classroom is about 8? Millimeters, centimeters, meters or kilometers 3.) it took about 170? Millimeters or liters of water to fill the bathtub A manufacturer produces light bulbs that have a mean life of at least 500 hours when the production process is working properly. Based on past experience, the population standard deviation is 50 hours and the light bulb life is normally distributed. The operations manager stops the production process if there is evidence that the population mean light bulb life is below 500 hours. if you select a sample of 100 light bulbs and find mean bulb life is 490 hours. Perform the hypothesis test at the significance level of 0.01. Referring to Scenario 9-10, what is the test statistic PLEASE HELP FAST! The question is below: 2. V151.32 is between which of the following 2 integers?A. 12 and 13B. 15 and 16C. 75 and 76D. 120 and 130E. 151 and 152 how many groups of 7 does it take to make 7 tens Find the value of x. In the food web the trophic level with the least energy includes which of the following organisms?A)GrassesB)snakesC)hawksD)mice Which foreign policy strategy was thought to lesson tensions with the Soviet Union? A: brinkmanship. B: reapproachment. C: containment. D: detente How to find three consecutive odd numbers whose product is 2145? How do you turn that in to a polynomial