create a "switch" statement that continues to prompt a user by doing each of the following activities, until a user presses key 5:

Answers

Answer 1

A switch statement is a programming structure that allows a program to execute different actions based on the value of a variable. To create a switch statement that continues to prompt a user until they press key 5, you would use a while loop to repeatedly prompt the user and check their input.

Here's an example: ``` int choice = 0; while (choice != 5) { // Prompt the user for their choice std::cout << "Enter a number (1-5): "; std::cin >> choice; // Use a switch statement to perform an action based on the user's choice switch (choice) { case 1: std::cout << "You chose option 1" << std::endl; break; case 2: std::cout << "You chose option 2" << std::endl; break; case 3: std::cout << "You chose option 3" << std::endl; break; case 4: std::cout << "You chose option 4" << std::endl; break; case 5: std::cout << "Exiting program" << std::endl; break; default: std::cout << "Invalid choice, please enter a number (1-5)" << std::endl; break; } } ```

In this example, the program will repeatedly prompt the user to enter a number (1-5) and perform an action based on their choice using a switch statement. If the user enters 5, the program will exit the loop and print "Exiting program". If the user enters an invalid choice, the program will print "Invalid choice, please enter a number (1-5)" and continue prompting the user. This code can be modified to perform any desired actions based on the user's input.

Learn more about loop here-

https://brainly.com/question/14390367

#SPJ11


Related Questions

Jennifer works as a programmer. She has fixed certain bits of code in a program while developing it. She has purposely left specific code in the program so she can access the program later and obtain confidential information. Which programming threat has she created?
A. logic bomb
B. trap door
C. Trojan horse
D. virus

Answers

Answer:

B. trap door

Explanation:

It's also referred to as the back door

PLEASE ANSWER FAST IM TIMED
A WYSIWYG editor will save time and make the process of Web site design an artistic practice rather than a ------- practice.

Answers

This open source software helps you either create a website through code, or design it with the help of templates and facile customizations.

What is the difference between HTML and WYSIWYG?

A WYSIWYG editor shows you a rendered web page as you edit the page. You do not see the actual HTML. When using manual coding, you see the HTML, but you must load the document in a web browser to view the rendered page.

Is WYSIWYG easy to use?

An efficient free WYSIWYG Editor comes with an easy-to-use toolbar, keyboard shortcuts, and other features that allow you to easily add or edit content, images, videos, tables, or links. A WYSIWYG editor saves time and makes web content creation quick and easy.

To know more about  WYSIWYG visit:

https://brainly.com/question/12340404

#SPJ1

Answer:

Programming

Explanation:

WYSIWYG (sometimes pronounced "wizzy wig") is an acronym that stands for "What You See Is What You Get." It is a phrase that was coined when most word processing, desktop publishing, and typesetting programs were text and code based. HTML, at its code level, is much like the early interfaces on this sort of software. A WYSIWYG editor saves time and makes the process of website design an artistic practice rather than a programming practice.

An individual involved with the aspect of a project will be concerned with budgets and the costs associated with running a business.

Answers

The storming stage of team development is complete when conflicts are resolved and leadership roles are accepted.

Answer:

this doesn't make any sense at all

Explanation:

Your computer appears to be correctly configured but the device.

Answers

It seems your computer is correctly configured, meaning that the settings and software are properly installed and functioning.

However, there might be an issue with the device, which could be a peripheral (e.g. printer, keyboard, mouse) or an internal component (e.g. graphics card, network adapter). To resolve the problem, try these steps: 1) Check if the device drivers are up-to-date; 2) Ensure the device is connected securely and powered on; 3) Verify compatibility between your computer's operating system and the device; 4) Troubleshoot the device using built-in diagnostic tools. If the issue persists, consider consulting a professional or the device manufacturer for further assistance.

To know more about graphics card visit:

brainly.com/question/13498709

#SPJ11

how do you compute percentage of spoilage




plsss paki answer​

Answers

Spoiled units / units produced ×100

Answer:

The normal spoilage will be calculated as the total number of spoiled units, divided by the total units produced, and multiplied by 100. In this case, it would be 500 / 10,000 x 100 = 5%.

Explanation:

2.2 Code Practice: Question 2

Answers

The codes are written below in python.

What are codes?

Coding is a type of computer language that facilitates communication with computers. Human languages are not understood by computers. Coding enables interaction between people and computers.

Code tells the computer what actions to take and which tasks to complete. We read input using the input() method and then convert it to a float using the float() function.

num1 = float(input("Enter a number: "))

num2 = float(input("Enter a number: "))

print("Sum: " + str(num1 + num2))

Therefore, the codes in python are written above.

To learn more about codes, refer to the link:

https://brainly.com/question/18508134

#SPJ9

The complete question is:

Question 2: write a python program to add two numbers.

I will mark brainliest and give 25 points!!!
Jaycee is presenting to a new audience and knows she wants to make some changes to her introduction. What’s the first thing she should consider before making changes?
A. What she used to grab her original audiences attention.
B. What background information is necessary for her new audience
C. What information in the original introduction was insensitive
D. What was successfully grab her new audiences attention

Answers

Answer:

B. What background information is necessary for her new audience

the content of Jaycee's introduction should be tailored to meet the needs of her new audience. Jaycee cannot assume that her new audience has the same knowledge or context as her original audience, so it is crucial to provide appropriate background information that will help them understand the context of her presentation.

Without this background information, Jaycee's presentation may be confusing or uninteresting to her new audience, leading to a lack of engagement and understanding. Therefore considering the necessary background information for the new audience is the first step Jaycee should take before making any changes to her introduction.

Explanation:

match each sentence to the type of context clue it represents.

Answers

Answer: was willing to help but there isn’t any picture of anything about what each sentence says

accessors, mutators, and other instance methods are normally defined with what type of access modifier?

Answers

Accessors, mutators, and other instance methods are normally defined with initial private public protected type of access modifier.

If the public modifier is used while defining a class, then all classes anywhere can access that class. A class is only visible within its own package if it has no modifiers (the default, also known as package-private); you will learn more about packages in a later course.

Just like with top-level classes, you can use the public modifier or no modifier (package-private) at the member level with the same meaning. Private and protected are two more access modifiers available to members. When a member is marked as private, it means that only other members of that class may access it.

The protected modifier designates that the member is only accessible within the package in which it is contained (as with package-private).

To know more about modifier click here:

https://brainly.com/question/1528982

#SPJ4

which spreadsheet menu function is used to sort all data in a spreadsheet by the ranking of a specific sorted column?

Answers

Data are arranged in ascending and descending order using the sorting process. Data structures support a number of sorting techniques, including bucket sort, heap sort, fast sort, radix sort, and bubble sort.

Explain about the Sort sheet?

To arrange the data in an array, use the SORT function. The SORT BY function is recommended since it has more options for sorting data in the grid. Since SORTBY employs a range rather than a single column index number like SORT, it can adapt for column additions and deletions.

The sort sheet uses a single column to order the data from your worksheet. When utilizing the sort, pertinent data from each row is collected and kept in one place. The Contact Name column (column A) in the example below has been sorted so that the names are shown in alphabetical order.

To learn more about Sort sheet refer to:

https://brainly.com/question/15133582

#SPJ4

14. A film's rated speed is a measure of its ____ to light.​

Answers

A film's rated speed, also known as ISO or ASA, is a measure of its sensitivity to light.

What is a Film's Rated Speed?

The sensitivity of a film to light can be measured by its rated speed, which is also referred to as ISO or ASA. It is a standardized system used to determine how much light is required to produce a usable image on the film.

A higher ISO or ASA rating means the film is more sensitive to light and will require less light to produce a well-exposed image. This can be useful in low-light situations or when using fast shutter speeds.

However, a higher rating can also result in more visible grain or noise in the final image, so photographers must balance their need for sensitivity with the desired quality of the final image.

Learn more about rated speed of films on:

https://brainly.com/question/30454862

#SPJ1

your enterprise experienced several technical issues over the last few days. there were multiple instances of passwords needing to be changed and other issues causing downtime. management has started receiving voicemails regarding fraudulent activities on their accounts. while the voicemails sound authentic, the help desk concludes that they are fake. what type of malicious activity will this be considered?

Answers

A type of malicious activity which this will be considered as is: vishing.

What is a password policy?

A password policy can be defined as a set of rules and standard that are designed and developed by the data security or networking team of an organization, so as to enhance computer security and ensure all password meet the minimum requirements such as:

Maximum age of pass.Password minimum length.Password combination.

What is social engineering?

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

In Computer technology, some examples of social engineering attacks include the following:

Quid pro quoSpear phishingBaitingTailgatingWater-holingPretextingPhishingVishing

What is vishing?

Vishing is an abbreviation for voice phishing and it can be defined as the use of telephony (telephone communication) to conduct phishing attacks.

In this context, we can reasonably infer and logically conclude that a type of malicious activity which this issue will be considered as is vishing.

Read more on Vishing here: https://brainly.com/question/14220906

#SPJ1

Which step in the software development life cycle involves writing pseudocode?

Answers

Once the pseudocode is accepted by the team, it is rewritten using the vocabulary and syntax of a programming language. The purpose of using pseudocode is an efficient key principle of an algorithm. It is used in planning an algorithm with sketching out the structure of the program before the actual coding takes place.

Answer:

design

Explanation:

flvs

What he name given to a cell with a green border around it?​

Answers

Answer:

Active cell

Explanation:

I will assume this question is about spreadsheet programs (Microsoft Office Excel, for instance).

In Microsoft Office Excel, a cell that has border around it means that the cell is currently selected. The proper word for a selected cell is an active cell.

Hence, an active cell answers the question.

Which is best online C compiler?

Answers

It offers the greatest C++ compiler, and it's extremely simple to manage different versions of a single application.

What does a software compiler do?

Compilers are specific software tools that convert the source code of one programming language into machine code, bytecode, or some other computer program. Usually, the original code is created in a high-level, understandable language for humans, such Java or C++.

Are compilers present on all computers?

No. Operating systems do this frequently but not always. Not all computers, but the majority, come with an operating system. Some highly well-known operating systems (OSs) may not include compiler or interpreter for popular programming languages, although they may do so for less well-known but platform-specific languages.

To know more about compiler visit:

https://brainly.com/question/28232020

#SPJ4

12 POINTS!!!!
Choose the value that best completes each sentence.
There are currently more than four --------internet users regularly connecting around the globe. And less than ------- percent of them live in North America.

Answers

Answer:

1) daily

2)37%

Explanation:

1) regularly implies it

Answer:billion AND 8

Explanation:

correct

a computer can function in the absence of software true or false​

Answers

Answer:false

Explanation:

it’s false, but it doesn’t have to be a complete operating system.

Jill is interested in a career as a paramedic. She is trained to use medical equipment, she remains calm under pressure, and she has good bedside manner. Which career pathway would best fit Jill's interests and skills?

Answers

Answer:

Emergency and Fire management services

Explanation:

Paramedics are trained to respond to emergency situations faced by the public. These could include, fire incidents, accidents, or other emergency situations. Paramedics are trained to be calm under pressure, to use medical equipment, as well as to have good bedside manners as their jobs might require taking care of victims of various incidents at the spot of crisis, or in ambulances before they arrive the hospitals.

So, Jill is likely interested in a career in Emergency and Fire Management Services because she would require these skills to succeed in this field.

Answer:

Emergency and Fire management services

Explanation:

The goal of a system is to

a) be natural or human-made

b) use energy

c) perform a task

d) be social or physical

Answers

Answer:

d it is d I know cause I answered it on a test I had

hope it helps

After creating a webpage with html code, what do you need to do so that others can access it on the internet?.

Answers

After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.

What is internet?

The meaning of the internet is the climate of the information based on World wide web network.

There is large network of computers connected together in offices or organizations to explore the internet.

The webpage formed using HTML code has to be uploaded on AFS. AFS is the platform everyone can view the content whichever is uploaded.

Thus, After creating a webpage with HTML, you will need to upload them to a location on AFS so that others can access it on the internet.

Learn more about internet.

https://brainly.com/question/13308791

#SPJ2

Which file attribute identifies the file as having been modified since the last backup?.

Answers

Archive File Definition

The meaning of the word Archive in the Online Computer Dictionary is used to make a copy of a backup file with the aim of protecting the original copy from damage.

How to Archive Files Into 1 File

If you want to send a large number of files, you can make the file into 1 archive file format with .zip, .tar, or .rar format first.  This method is also quite easy and fast.

First, make sure your computer has programs such as winzip, winrar.  This program is needed to archive files.

Second, you can select the file you want to archive, then right-click on the file.  The example below shows 2 files to be archived

The third step, you can directly select Add to “folder name.rar” to directly create archive files automatically.  If you want to do some settings, it can be done by selecting the Add to archive option. The Add to archive option allows you to choose the save format of the file, divide or create the archive into several parts (part 1, part 2, etc.), to create a password.  With the password, before the file can be extracted, it is necessary to enter the password first.

In addition to files, you can also archive folders directly along with the contents of the files in it.  Keep in mind, how fast the process of archiving this file will depend on how many or large files to be archived.

Learn more about archive files athttps://brainly.com/question/15355917.

#SPJ4

write chracteristics of all 5 generation of computer​

Answers

Answer:

First generation — 1940–1956

-used vacuum tubes

ENIAC, UNIVAC I, IBM 650, IBM 701 etc.

mainframes taking up entire rooms

punched cards I/O

electrostatic and mercury delay line memory, beginning use of core

Second generation — 1956-1963

-used discrete transistors

IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.

first appearance of minicomputer (PDP-8)

punched cards I/O and line printers (mainframe), TTY (minicomputers)

core memory, magnetic tape for mass storage

Third generation — 1964-1971

-used integrated circuits

IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.

mostly same I/O and memory as second generation

Fourth generation — 1971-present

-use microprocessors

PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.

transition from minicomputers to personal computers

video terminals used for I/O, specialty computer printers developed

fewer mainframes

semiconductor memory replaces core memory

hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)

Fifth generation — (current research)

-artificial intelligence and quantum computing

Answer:

The five generations of computer are characterized by electrical current flowing through the processing mechanisms listed below : The first within vacuum tubes The second within transistors The third within integrated circuits The fourth within microprocessors clips The fifth unveiled smart devices capable of artificial...

Explanation:

hope it is helpful to you

MiraculousNisha^_^

PLS HELP SOON

Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.

Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.

Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.


Write your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output

The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!


When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Answers

Answer:

Explanation:

I will answer Part 1 and you can go on from there.

Decide on a list of items the program will ask the user to input.

Your program should include at least four interactive prompts.

Input from the user should be assigned to variables and used in the story.

"What is your favorite animal?"

Variable: animal

"What word best describes your favorite animal?"

Variable: description

"What does your favorite animal like to eat?"

Variable: food

"Where do your favorite animal live?"

Variable: location

Complete the sentence.

Career and technology student organizations hold events to raise money for a charity. This is called __________

O conference
O competition
O networking
O philanthropy

Answers

The answers is D. Philanthropy

a software engineer is building a web application about popular music and wants to display aggregated data about recent hits. in order to retrieve that data, the engineer would likely use a(n) . api traditional application markup language graphical user interface

Answers

In order to retrieve the data about popular music, the engineer would most likely use an: API.

What is an API?

API is an abbreviation for application programming interface and it can be defined as a software application intermediary or computing interface that comprises tools, set of executable codes, and protocols that is designed and developed to help software applications and computers to function properly, as well enable the exchange and retrieval of data from a database.

In Computer technology, an application programming interface (API) allows a computer network device and a cloud-based server or two cloud-based servers to share data and functionality within the cloud.

In conclusion, we can logically deduce that this software engineer would most likely use an application programming interface (API).

Read more on API here: brainly.com/question/28090326

#SPJ1

show on excel please 2. Create three scenarios for scenario inputs given. Outputs are Terminal Value and 3. Enterprise Value 4. Create a Data Table that shows sensitivity of Enterprise Value to two input parameters of your choice from: Gross margin, Revenue Growth in years 1-5, steady growth after year 5 or discount rate. Do conditional formatting for data tables

Answers

To create three scenarios and analyze the Terminal Value and Enterprise Value:

1. Input scenario inputs into an Excel worksheet and calculate Terminal Value and Enterprise Value using formulas.

2. Copy the formulas and modify the inputs to create three different scenarios.

3. Observe the changes in the outputs based on the scenarios.

4. Create a Data Table to show sensitivity of Enterprise Value to chosen input parameters.

5. Apply conditional formatting to highlight values above or below a specific threshold in the Data Table.

To create three scenarios for scenario inputs given and the required outputs of Terminal Value and Enterprise Value, follow the steps given below:Step 1: Open Excel and create a new worksheet.Step 2: Input the scenario inputs given into the cells B2:B4 and enter the formulas for Terminal Value and Enterprise Value into the cells C7 and C8, respectively.Step 3: Copy the formulas from the cells C7 and C8 into the cells D7 and D8, respectively.Step 4: Modify the scenario inputs in the cells B2:B4 to create three different scenarios.Step 5: Observe the changes in the outputs in the cells C7:C8 and D7:D8 based on the three scenarios.Step 6: To create a Data Table that shows sensitivity of Enterprise Value to two input parameters of your choice, follow the steps given below:i. Select the range of cells containing the input parameters (e.g. Gross margin and Revenue Growth in years 1-5) and the output (Enterprise Value).ii. Go to the Data tab and click on the What-If Analysis drop-down menu.iii. Select Data Table.iv. In the Column input cell, select the cell containing the first input parameter (e.g. Gross margin).v. In the Row input cell, select the cell containing the second input parameter (e.g. Revenue Growth in years 1-5).vi. Click OK to generate the Data Table that shows the sensitivity of Enterprise Value to the two input parameters chosen.Step 7: Apply conditional formatting to the Data Table to highlight the values that are above or below a certain threshold. To apply conditional formatting, follow the steps given below:i. Select the cells to be formatted.ii. Go to the Home tab and click on the Conditional Formatting drop-down menu.iii. Select the Highlight Cell Rules option and then select the appropriate formatting rule (e.g. Greater Than or Less Than).iv. Enter the threshold value in the dialog box that appears and click OK to apply the formatting.

Learn more about Terminal Value here :-

https://brainly.com/question/30639925

#SPJ11

What is the missing line of code?
>>> answer = "happy birthday"
>>> _____
'Happy birthday'

Answers

Answer:

answer = "happy birthday"

answer = answer.capitalize()

print(answer)

Explanation:

Which fraction represents the shaded part of this circle? 1 2 O 4 Check Answer /3rd grade/​

Which fraction represents the shaded part of this circle? 1 2 O 4 Check Answer /3rd grade/

Answers

The Answer is 1/6 because there are 6 parts of the circle and 1 of them is shaded

Answer:

1/6 because there is one shaded and the total are 6

How can you find your local ip address from command prompt?

Answers

Answer:

First, click on your Start Menu and type cmd in the search box and press enter. A black and white window will open where you will type ipconfig /all and press enter. There is a space between the command ipconfig and the switch of /all. Your ip address will be the IPv4 address.

Explanation: Search

A_____is the most effective way of presenting information in a precise manner

Answers

A table is the most effective way of presenting information in a precise manner. A table is a visual representation of data that organizes information into rows and columns.

Tables can be used to present complex data sets in a concise and easy-to-read format, allowing the viewer to quickly identify patterns and trends.Tables are particularly effective when presenting numerical data, such as financial figures, scientific measurements, or survey results. By organizing data into columns and rows, tables make it easy to compare different values and identify relationships between them.When creating a table, it is important to use clear and concise headings and to ensure that the data is presented in a logical and consistent manner. Tables should also be designed with the audience in mind, using appropriate colors, fonts, and formatting to enhance readability and comprehension. tables are an effective tool for presenting information in a precise and organized manner, making it easier for viewers to quickly understand and analyze complex data sets.

To learn more about data click the link below:

brainly.com/question/13441094

#SPJ4

Other Questions
A key difference between an IRA and keogh plan is:a) you may withdraw your money early from a keogh plan without penalty, but not from an IRAb) you may contribute more to a keogh plan than to an IRAc) self-employed individuals may open an IRA, but not a keogh You would like to configure your Windows desktop system so that an event is recorded any time a user successfully or unsuccessfully logs on. Jennifers mom is putting a basketball hoop on the garage. The garage door is 8 feet high. There is 7 feet of wall between the top of the garage door to the garage roof. How far down from the garage roof should the hoop be placed so that it is 10 feet above the ground?a) 3b) 5c) 4d) 2 kindly use electric vlsi to plot this functionthank you in advanceUse electric binary to plot and run the schematic and layout for the following Boolean function: \[ Y=(A+B+C) . D \] Why did people in France want a Revolution? Similar figures are- Always congruent Same shape, different sizeSame size, different shapeSame size, same shape Find the real solution for the following equation(2x+2)- (x=8)=1 Explain the poetic. You don't have to feel like a waste of spaceYou're original, cannot be replacedIf you only knew what the future holdsAfter a hurricane comes a rainbow Given the following set of data: 3, 4, 5, 6, 8, 9, 9, which measures below have a value of 6? (Check all that apply.)(1) mode(2) range(3) high value(4) median Harold offers advice and guidance to many young children and young adults in his neighborhood. Which of the following words best defines Harolds role in the community?A.volunteerB.teacherC.mentorD.activist Please help! This is due in 25 minutes!! Will give brainliest, 5 star rating, 10 points, and a thanks!!!! a repository can be printed records stored in a shoebox or a collection of files in the cloud.T/F All mammals:are invertebrateslive on landbreathe with lungs Use technology to construct the confidence intervals for the population variance 2 and the population standard deviation . Assume the sample is taken from a normally distributed population. c=0.90,s2=14.44,n=30 The confidence interval for the population variance is (Round to two decimal places as needed.) The confidence interval for the population standard deviation is ( (Round to two decimal places as needed.) There are 1000 citizens in Santa Barbara. Each citizen has utility function: Ui(ci, G) = ci - 100/G where G is the length of the public beach in meters and Ci is the dollar amount that citizen i spends on the consumption of all other goods. The construction of each meter of the beach costs $10. What is the Pareto optimal length of the beach? a. 80 b. 90c. 120 d. 100 e. 110 The magnitude of a vector represents its_ Evaluate the line integral, where C is the given curve. Sc y3ds, C:x = :t?, y = t, osts 4 Evaluate the line integral, where C is the given curve. Sc xy dx + (x - y)dy C consists of line segments from (0, 0) to (2,0) and from (2, 0) to (3, 2). Write the equation of a cubic polynomial in standard form with root at 1 and double root at -5, passing through the point (3,32). Unlike the first two books in the series, which kept readers engaged through tortuous and suspenseful plots, the story in the third book was less than compelling and the _______ was predictable. Suppose you want to throw a party. you have $214 to spend. so far you have purchased 5 decorations that each cost d dollars. which expression represents the amount of money that you have left to spend?Answer: 214 - 5dWhich of the following real-world scenarios could be represented by the algebraic expression 7.65 - 2p? Select all that apply. Answers: 1) You buy 2 equally priced party favors, spending from your $7.65 gift card. 4) you give Tim twice the amount of face paint he had from your supply of 7.65 ounces. You decide to order pizzas for your party. A large pizza is cut into 12 slices. If each pizza is shared evenly among G guests, which expression represents the number of slices that each guest will eat?Answer: 12/g(these are the rest of the answers for the rest of the 7 slides of "Writing expression" assignment on e20204th: $25 dollars is the constant team so the cost for h hours is 15h and the correct expression is 15h+25 and 15(h+25) would be interpreted as adding 25 hours to the number of hours rented, and then multiplying by 15. 5th: m + 2m - s6th: No it's not true. Each table began with x/8 balloons. If two pop then you will not be able to distribute it equally among 8 tables. There are x/8 - 2 balloons left. Not all tables will be equal. 7th: n - (1/4)n - 158th: 12n/r9th: (x+3)/510th: (3r)/2 is what the second DJ had. 3 times as many songs as 3r and half as many is translated as division to 2 so half as many is translated as multiplication by 1/2. So therefore, the second DJ had (3r)/2 songs.