g Write a program in C to insert 10 integer values in an array and then ask user to insert one value at 6 th index, and finally print the all the values in the array.

Answers

Answer 1

To write a program in C to insert 10 integer values in an array and then ask user to insert one value at the 6th index, and finally print all the values in the array. Here is the code for the same:


#include <stdio.h>
int main() {

   int arr[11];  // Array to store 11 integers (index 0 to 10)

   int i, value;

   // Input 10 integer values

   printf("Enter 10 integer values:\n");

   for (i = 0; i < 10; i++) {

       scanf("%d", &arr[i]);

   }

   // Input a value at the 6th index

   printf("Enter a value to insert at the 6th index: ");

   scanf("%d", &value);

   // Shift elements to the right to make space for the new value

   for (i = 9; i >= 6; i--) {

       arr[i + 1] = arr[i];

   }

   // Insert the value at the 6th index

   arr[6] = value;

   // Print all the values in the array

   printf("\nAll the values in the array:\n");

   for (i = 0; i < 11; i++) {

       printf("%d ", arr[i]);

   }

   printf("\n");

   return 0;

}

In this program, we declare an integer array arr with a size of 11 to accommodate the 10 original values and the additional value to be inserted at the 6th index. We use a loop to read the 10 integer values from the user. Then, we prompt the user to enter the value to be inserted at the 6th index. Next, we shift the elements to the right starting from the 9th index to create space for the new value. Finally, we assign the value to the 6th index and print all the values in the array.

Learn more about C/C++: https://brainly.com/question/13664190

#SPJ11


Related Questions

ad extensions assist in providing users with which two things they want from their search experience?

Answers

Promotion augmentations help with furnishing clients with Pertinent data and Data in view of their second they need from their hunt insight.

What is one of the principal reasons for utilizing promotion augmentations?

A Googgle promotion expansion is an extra snippet of data that makes your promotion more valuable to perusers. It gives data like merchant surveys, different connections from your site, and phone numbers, subsequently extending your commercial.

What is the advantage of remembering promotion augmentations for your pursuit promotion?

Promotion expansions are a fast and simple method for growing your Pursuit advertisements, giving individuals more motivations to pick your business — at no additional expense. There is an entire scope of manual expansions you can decide to carry out yourself, like area data, cost, and advancement callouts.

To know more about Data visit :-

https://brainly.com/question/13650923

#SPJ4

A linear representation of a hierarchical file directory is known as what?

Answers

It is known as a directory path

Answer:

C.) a directory path

Explanation:

because I got it right.

in java, which of the following produces a compilation error?

Answers

The code snippet produces a compilation error in Java. In Java, the maximum value that a variable of type int can hold is 2147483647. Trying to assign a value greater than this to an int variable will result in a compilation error.

In the given code snippet, the value 2147483648 is being assigned to a variable of type long. However, since this value is not explicitly declared as a long by appending an "L" to the end of the number (i.e. 2147483648L), Java interprets it as an int value, which leads to a compilation error.

To avoid this error, the value should be explicitly declared as a long by appending an "L" to the end. In the given code snippet, the value 2147483648 is being assigned to a variable of type long. However, since this value is not explicitly declared as a long by appending an "L" to the end of the number (i.e. 2147483648L), Java interprets it as an int value, which leads to a compilation error.

To know more about Java visit :

https://brainly.com/question/12978370
#SPJ11

what is a type of system software that allows a user to perform maintenance type tasks​

Answers

Answer:

Computer

Explanation:

The type of system software that allows a user to perform maintenance-type tasks​ is a computer.

A computer has many programs and operating systems.

Which Application program saves data automatically as it is entered?
MS Word
PowerPoint
MS Access
MS Excel

Answers

The application program that saves data automatically as it is entered is the MS Access.

The Application program that saves data automatically as it is entered MS Access. The correct option is C.

What is MS Access?

Microsoft Access is a database management system that includes a graphical user interface, the relational Access Database Engine, and software-development tools.

It is a component of the Microsoft 365 software package and is available as a standalone product or as part of the Professional and higher editions.

Data kept in Access may be found and reported on with ease. Make interactive data entry forms. a variety of data sources can be imported, transformed, and exported.

Access is often more effective at managing data because it makes it easier to keep it structured, searchable, and accessible to several users at once.

MS Access is an application tool that automatically saves data as it is entered.

Thus, the correct option is C.

For more details regarding MS access, visit:

https://brainly.com/question/17135884

#SPJ2

write the algorithms for the problem How to post a letter ? you can put pictures for the steps ​

Answers

❖ Step 1: Start

❖ Step 2: Write a letter

❖ Step 3: Put in envelope

❖ Step 4: Paste stamp

❖ Step 5: Put it in the letter box

❖ Step 6: Stop

\(\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}\) ~←(>▽<)ノ

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

a laptop has 1gb of installed memory and uses shared video memory. if the video card is using 256mb, how much is left for the rest of the system?

Answers

Using shared video memory, a laptop has 1 GB of installed memory. If the video card is only consuming 256MB, the remaining 768MB can be used by the system.

The ability of the mind to encode, store, and retrieve information when required is known as memory. It is the process of holding onto knowledge over time in order to influence behavior in the future. Language, relationships, and the development of personal identity would all be impossible if the past was not remembered. Forgetfulness or amnesia are common terms used to describe memory loss.

A sensory processor, short-term (or working) memory and long-term memory make up the information processing system that is commonly referred to as memory. The neuron may be relevant in this. The sensory processor enables external information to be sensed as chemical and physical stimuli and attended to at different levels of focus.

Learn more about memory here:

https://brainly.com/question/28698996

#SPJ4

The letters below are jumbled. Figure out what the word is and write it on the blank line provide
1.ADTA
2.RNIRPTET
3.BYOMSL
4.MDAIGAR
5.NIGS​

Answers

1. DATA
2. PRINTER ? Not sure, because there’s another T in your question
3. SYMBOL
4. DIAGRAM
5. SIGN

Data, Printer, Symbol, Diagram, Sign

Create a formula using the daverage function to average the budget amounts for comedy projects in the projects table using i11:i12 as the criteria

Answers

This formula will calculate the average budget amount for comedy projects in the specified range. Remember to adjust the table range and criteria range according to your specific data.

To average the budget amounts for comedy projects in the projects table using the DAVERAGE function, you can use the following formula:

= DAVERAGE(table_range, criteria_range, criteria)

Here's how you can set it up step-by-step:

1. Identify the table range: In this case, the table range would be the range of budget amounts in the projects table. Let's assume this range is from column C to column F, starting from row 2 (C2:F).

2. Identify the criteria range: The criteria range would be the range of cells that contain the criteria for selecting comedy projects. In this case, the criteria range is from cell I11 to cell I12 (I11:I12).

3. criteria range: The criteria would be the condition that needs to be met for the DAVERAGE function to include a record in the average calculation. In this case, the criteria is "comedy projects".

4. Combine the formula: Now, you can combine all the elements to create the DAVERAGE formula. The final formula would look like this:

= DAVERAGE(C2:F, I11:I12, "comedy projects")

This formula will calculate the average budget amount for comedy projects in the specified range. Remember to adjust the table range and criteria range according to your specific data.

To know more about DAVERAGE function visit:

https://brainly.com/question/33596251

#SPJ11

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."
Which steps should Jonah follow to accomplish this?
navigate to the Quick Access bar, click the Save icon
navigate to the backstage view, click the Save As icon
click the File tab, click Save, type in the title, click Save
click the File tab, click Save As, type in the title, click Save

Answers

Answer:

Your answer is D.click the File tab, click Save As, type in the title, click Save

Explanation:

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."Which steps

Answer:

C

Explanation:

took the quiz

acme and abc corporations have started a secret venture together. they want to ensure that when they send messages between the two companies, they are truly unbreakable. what encryption key would provide the strongest and most secure encryption?

Answers

To achieve the strongest and most secure encryption for messages exchanged between Acme and ABC corporations, they should employ a key that utilizes asymmetric encryption, specifically a strong asymmetric encryption algorithm such as RSA (Rivest-Shamir-Adleman).

Hilter kilter encryption utilizes a couple of numerically related keys: a public key for encryption and a confidential key for unscrambling. The public key can be openly appropriated, while the confidential key remaining parts classified. In this situation, every enterprise would create their own key pair.

The process would involve:

1. Generating Key Pairs: Acme and ABC corporations would each generate their unique RSA key pairs consisting of a public key and a corresponding private key.

2. Sharing Public Keys: Both corporations would securely exchange their public keys with each other.

3. Encrypting Messages: When sending a message, one corporation would encrypt the message using the recipient's public key. This ensures that only the intended recipient possessing the corresponding private key can decrypt and read the message.

4. Decrypting Messages: The recipient corporation would then decrypt the received message using its private key.

RSA is considered a strong asymmetric encryption algorithm due to the complexity of the mathematical operations involved. It provides a robust level of security and has been widely adopted for secure communication.

By utilizing RSA encryption with strong key lengths, Acme and ABC corporations can ensure that their messages remain highly secure and virtually unbreakable, protecting the confidentiality and integrity of their secret venture.

For more such questions on RSA, click on:

https://brainly.com/question/25380819

#SPJ8

what is the minimum and maximum number of nodes at depth d in a perfect binary tree? be sure to list the nodes at depth d. do not include nodes at depth d-1 or d 1 or other depths.

Answers

In a perfect binary tree, each internal node has exactly two children, and all leaf nodes are at the same level. Therefore, the minimum and maximum number of nodes at depth d in a perfect binary tree can be calculated as follows:

At depth d=0, there is only one node, which is the root of the tree.

At depth d=1, there are two nodes, which are the children of the root.

At depth d=2, there are four nodes, which are the grandchildren of the root.

More generally, the minimum number of nodes at depth d in a perfect binary tree is 2^d, and the maximum number of nodes is 2^(d+1) - 1.

For example, at depth d=3, the minimum number of nodes is 2^3 = 8, and the maximum number of nodes is 2^(3+1) - 1 = 15. The nodes at depth d=3 are the great-grandchildren of the root.

Learn more about Binary tree here:

https://brainly.com/question/13152677

#SPJ11

Creates a table in MS Excel with each of the following accounts and indicates their effect on the expanded accounting equation The 1. in February 2020, Miguel Toro established a home rental business under the name Miguel's Rentals. During the month of March, the following transactions were recorded: o To open the business, he deposited $70,000 of his personal funds as an investment. He bought equipment for $5,000 in cash. O Purchased office supplies for $1,500 on credit. He received income from renting a property for $3,500 in cash. He paid for utilities for $800.00. He paid $1,200 of the equipment purchased on credit from the third transaction. O He received income from managing the rent of a building for $4,000 in cash. He provided a rental counseling service to a client for $3,000 on credit. He paid salaries of $1,500 to his secretary. He made a withdrawal of $500.00 for his personal use. O 0 0 O O 0 00

Answers

To create a table in MS Excel and indicate the effect of each account on the expanded accounting equation, you can follow these steps:

1. Open Microsoft Excel and create a new worksheet.

2. Label the columns as follows: Account, Assets, Liabilities, Owner's Equity.

3. Enter the following accounts in the "Account" column: Cash, Equipment, Office Supplies, Rental Income, Utilities Expense, Accounts Payable, Rental Counseling Service, Salaries Expense, Owner's Withdrawals.

4. Leave the Assets, Liabilities, and Owner's Equity columns blank for now.

Next, we will analyze each transaction and update the table accordingly:

Transaction 1: Miguel deposited $70,000 of his personal funds as an investment.

- Increase the Cash account by $70,000.

- Increase the Owner's Equity account by $70,000.

Transaction 2: Miguel bought equipment for $5,000 in cash.

- Increase the Equipment account by $5,000.

- Decrease the Cash account by $5,000.

Transaction 3: Miguel purchased office supplies for $1,500 on credit.

- Increase the Office Supplies account by $1,500.

- Increase the Accounts Payable (Liabilities) account by $1,500.

Transaction 4: Miguel received income from renting a property for $3,500 in cash.

- Increase the Cash account by $3,500.

- Increase the Rental Income account by $3,500.

Transaction 5: Miguel paid $800 for utilities.

- Decrease the Cash account by $800.

- Decrease the Utilities Expense account by $800.

Transaction 6: Miguel paid $1,200 of the equipment purchased on credit.

- Decrease the Accounts Payable (Liabilities) account by $1,200.

- Decrease the Equipment account by $1,200.

Transaction 7: Miguel received income from managing the rent of a building for $4,000 in cash.

- Increase the Cash account by $4,000.

- Increase the Rental Income account by $4,000.

Transaction 8: Miguel provided a rental counseling service to a client for $3,000 on credit.

- Increase the Rental Counseling Service account by $3,000.

- Increase the Accounts Payable (Liabilities) account by $3,000.

Transaction 9: Miguel paid $1,500 salaries to his secretary.

- Decrease the Cash account by $1,500.

- Decrease the Salaries Expense account by $1,500.

Transaction 10: Miguel made a withdrawal of $500 for his personal use.

- Decrease the Cash account by $500.

- Decrease the Owner's Equity account by $500.

Now, you can calculate the totals for the Assets, Liabilities, and Owner's Equity columns by summing the respective account values. The Assets column should include the totals of Cash, Equipment, and Office Supplies. The Liabilities column should include the total of Accounts Payable. The Owner's Equity column should include the total of Owner's Equity minus Owner's Withdrawals.

By creating this table and updating it with the effects of each transaction, you can track the changes in the expanded accounting equation (Assets = Liabilities + Owner's Equity) for Miguel's Rentals during the month of March.

To know more about MS Excel, visit

https://brainly.com/question/30465081

#SPJ11

write an alter table statement that adds two new columns to the books table created in exercise 1. add one column for book price that provides for three digits to the left of the decimal point and two to the right. this column should have a default value of 59.50. add one column for the date and time that the book was added to the database.

Answers

To add two new columns to the books table created in Exercise 1, we use the ALTER TABLE statement:

ALTER TABLE books ADD COLUMN price DECIMAL(5,2) DEFAULT 59.50, ADD COLUMN date_added TIMESTAMP;

To add two new columns to the books table created in Exercise 1, we use the ALTER TABLE statement with the ADD COLUMN clause.

The first column to be added is for book price, and it is defined with the DECIMAL data type with a precision of 5 digits, two of which are reserved for the fractional part (i.e., two digits to the right of the decimal point). The DEFAULT clause is used to specify a default value of 59.50 for the column.

The second column to be added is for the date and time that the book was added to the database, and it is defined with the TIMESTAMP data type. This data type stores both date and time information, down to the second, which is useful for tracking when data is added or modified.

The ALTER TABLE statement adds both columns to the books table, allowing for the storage of additional information about each book in the database.

For more questions like Books table click the link below:

https://brainly.com/question/26453790

#SPJ11

What does clicking and dragging the fill handle in excel

Answers

Answer:

The fill handle copies the same values, formulas, or fills a series of dates, texts, numbers, and other data to a desired number of cells. ... Click and hold the handle, then you can drag up, down, across over other cells. When you release your mouse button, it auto-fills the content to the cells you dragged over.

after writing pseudocode what step is next

Answers

The next step would be to implement the pseudocode. This means taking the instructions written in the pseudocode and translating it into a programming language, such as C++, Java, or Python.

What is programming language?

A programming language is a special language used to communicate instructions to a computer or other electronic device. It consists of a set of rules and symbols which tell the device what to do . Programming languages are used to create software, websites, mobile applications and more.  

This involves taking each step written in the pseudocode and writing code that will perform the same function. Depending on the complexity of the pseudocode, this could involve writing multiple lines of code for each step. After the code is written, it can then be tested and debugged to ensure that it works properly.

To learn more about programming language

https://brainly.com/question/23959041

#SPJ1

What is a problem (worldwide or personal) that was solved by social media?
I need to write about some sort of problem that what fixed by the use of social media

Answers

You could write about any natural disaster, in which through social media they were able to raise funds to help those affected by said disaster

hello everyone! can anybody help me? i need help with computing.
what is a pseucode?
please answer me ​

Answers

Answer:

a pseu code is a is an artificial and informal language that helps programmers develop algorithms.

Explanation:

Which of the following demonstrates an information system? Tyra is using the computer to create a birthday card for her friend. Ahmad is installing new software to improve the ease of accessing the database. Shania is creating a printed handbook of company policies for new employees. Ian is making updates to the company website to include the latest product information

Answers

Answer:

B. Ahmad is installing new software to improve the ease of accessing the database.

C. Shania is creating a printed handbook of company policies for new employees.

D. Ian is making updates to the company website to include the latest product information

Explanation:

Information Systems is an organized way of assembling, processing, storing, and sharing information. It is used by organizations to run their businesses. A typical information system will feature the people who run or control the process, the tasks they are meant to perform, the procedures which govern the work done, and the technology used to achieve those goals. Information systems incorporate information technology into the running of the business. The examples cited above, illustrate the application of information systems in business affairs. For example,

1. When Ahmad installs new software to improve the ease of accessing the database, the main components of an information system which includes; people (Ahmad), the task (which entails installation of the software), the procedures (that govern software installation), and the technology (apparently a computer system), all have a role to play.

How is an assembly converted to a binary code?

Answers

The process of converting an assembly to a binary code involves writing the assembly code in a text editor, using an assembler to translate it into machine code, and using a linker to create an executable file.

An assembly is converted to a binary code through a process called assembly language compiling or assembly language translation.

First, the assembly code is written in a text editor and saved with an .asm file extension. Next, an assembler, which is a type of software, is used to translate the assembly code into machine code, also known as binary code.

The assembler reads each line of the assembly code and converts it into the corresponding binary code, which is a series of 1s and 0s that can be understood by the computer's central processing unit (CPU). The resulting binary code is saved as an .obj file.

Finally, the .obj file is linked with other object files and libraries to create an executable file, which can be run on the computer. This linking process is done by a linker, another type of software.

Learn more about  binary code here:

https://brainly.com/question/16612919

#SPJ11

What type of network port is on the back of th esunsdr2 dx?.

Answers

The SunSDR2 DX is a modern HF transceiver with outstanding performance that is based on software-defined radio (SDR) technology. This radio comes with various ports on the back that include USB, Ethernet, and Audio ports. However, the main port that is of utmost importance is the Antenna port.

What is an antenna port?An antenna port is an RF connector that is typically used for transmitting or receiving signals. These connectors come in various shapes and sizes, depending on the type of radio you are using. In the case of SunSDR2 DX, it has a BNC female antenna connector. This type of connector is widely used in the radio world, and it provides a secure and reliable connection between the antenna and the transceiver.Although this port might seem simple, it is the backbone of any radio system.

A high-quality antenna and connector can make a huge difference in your system's performance. Therefore, it is crucial to use the right cable and connector when connecting your antenna to the SunSDR2 DX. A good quality RG-213/U coaxial cable with a BNC male connector is the most commonly used cable in radio installations.

To know more about transceiver visit:

https://brainly.com/question/9940557

#SPJ11

What are three functions the modern day computers perform?

Answers

Answer:

Calculation

Research

Entertainment

Explanation:

It can help you with your math homework by calculating

You can do your E LA homework with research

You can listen to music or play games iron computer

Structured programs can be easily broken down into routines or ____ that can be assigned to any number of programmers.

Answers

The appropriate term that fits in the blank is 'subroutines.'Explanation: Structured programming is a programming paradigm that emphasizes the significance of designing computer programs into small, hierarchical structures that can be easily understood and modified. It was introduced in the late 1960s by computer scientists Edsger Dijkstra, Niklaus Wirth, and others.

Structured programs, in general, can be easily broken down into subroutines or routines that can be assigned to any number of programmers. This improves the development and debugging of the code. Subroutines are autonomous pieces of code that can be called from any place in the program. They are reusable and can be stored in a separate file or module for use in other programs if they are common to several programs.

A structured program that is broken down into smaller modules or routines is usually easier to maintain and modify, reducing the possibility of introducing errors when making changes. Because these routines can be used in other programs, it eliminates the need to write the same code repeatedly, saving time and improving code quality.

To know more about programming visit:-

https://brainly.com/question/30590748

#SPJ11

what jtids/mids protocol dictates that platforms take turns transmitting and receiving data according to time?

Answers

Link 16 JTIDS/MIDS protocol dictates that platforms take turns transmitting and receiving data according to time. Link 16 is a standard military tactical data exchange network that allows military platforms to share data on a common network.

What is Link 16?

Link 16 is a time-division multiplexing (TDM) network that allows many users to share the same radio frequency band. The TDM method permits each user to transmit its data within its own time slot. This guarantees that the radios' messages do not collide with one another. The Link 16 terminals do this using the Time Division Multiple Access (TDMA) method.

This method ensures that platforms transmit their data at precise, prearranged intervals. Link 16 is also a secure radio that prevents eavesdropping by encrypting the information.

To know more about time-division multiplexing (TDM) visit:

https://brainly.com/question/31666197

#SPJ11

does survey monkey remembers you already took survey?

Answers

If you have an account setup already yes.

If you're under 18 and you receive _____ or more license points in 12 months, you'll be restricted to driving only to school or work for one year.

Answers

Answer:

B:6

Explanation:

FLVS :)

Answer: 6 is the correct answer

FILL IN THE BLANK. This type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms. ___

Answers

Spreadsheets  software is a type of software allows students to record, sort, mathematically analyze and represent numerical data in tabular and/or graphical forms.

Why do people use spreadsheets?

One tool for storing, modifying, and analyzing data is a spreadsheet. A spreadsheet's data is arranged in a series of rows and columns, where it can be searched, sorted, calculated, and used in a number of charts and graphs.

Therefore, A program known as a spreadsheet, also referred to as a tabular form, is used to arrange data into rows and columns. This information can then be arranged, sorted, calculated (using formulas and functions), analyzed, or graphically represented to illustrate.

Learn more about Spreadsheets from

https://brainly.com/question/26919847
#SPJ1

Question # 2 Long Text (essay) Explain why E-mail B is inappropriate for the workplace and revise it to be appropriate.

Answers

Due to its informal tone and unsuitable language, Email B is inappropriate for usage at work. Communication that is respectful and straightforward is crucial in a work setting.

What constitutes improper email use at work?

Keep it businesslike. Never express rage, use foul language, or make racial or gendered insults. Remember that sending offensive text or images via email could come back to haunt you. Even if they are intended as a joke, avoid sending or forwarding emails that contain libellous, defamatory, insulting, racist, or obscene remarks.

What does improper communication at work mean?

One manifestation of the issue is the practise of communicating with coworkers solely via email and memos and never in person. deliberately ignoring a task or working.

To know more about Email visit:-

https://brainly.com/question/14666241

#SPJ1

In a class, data fields, properties, and attributes all refer to the instance variables associated with an object. A. True B. False

Answers

Answer:

True

Explanation:

Other Questions
Find the following F distribution values from the F distribution table. (Round your answers to two decimal places.)(a) F0.05 with degrees of freedom 6 and 15(b) F0.025 with degrees of freedom 30 and 25(c) F0.01 with degrees of freedom 8 and 12(d) F0.10 with degrees of freedom 10 and 20 Dividends payable is a(n):_______. liability account with a normal credit balance and is initially recorded on the record date. (enter one word per blank.) Select the two values of x that are roots of this equation. 3x - 5 = -2x2 Please help there's 5 question its earth science A 4 dilution is performed on a culture of bacteria in order to perform viable plate counts. From the dilution, *0.1 mL* of solution is plated on solid media, and 168 colonies of bacteria grow on the petri dish. 1. 5 friends share 2 burritos.Each friend getsof the burrito. Increasing which factor will cause the gravitational force between two objects to decrease?weights of the objectsdistance between the objectsacceleration of the objectsmasses of the objects how many moles of chlorine gas react with 4.6 mol of hydrogen gas according to the balanced chemical equation? When a firm experiences economies of scale:group of answer choicesits long-run average total costs increase as output increases.it can take advantage of specialization of resources.has increased monitoring cost and lower team spirit.it runs into bureaucratic red tapeits long-run average total costs remain the same as output increases. A monopolistic competitor wishing to maximize profit will select a quantity where:. In the foundling hospital, brunelleschi carved the architectural detailing of his interior spaces in:. The phrase "laissez faire" refers to the guidelines followed by French government censors of the 19th century the idea that the government should let economic markets alone the principle that all humans should enjoy the same basic rights the concept that knowledge comes only through sensory experiences Which map is now recognized as providing the best balance of size, shape, and direction? a.globeb.Winkel projectionc.Robinson projectiond.Mercator projection someone pleaseeeeee help with my chemistry. (-90 27i) - (66 + 34i)Express your answer in the form (a + bi). Complete it with the correct conditional forms of the verbs provided.agregarcrearpodercambiarhaberquitarconstruirhacerserDe qu manera (6) ____________ personajes convincentes? Es una meditacin sobre el estado de nuestra forma de comunicarnos y el efecto que esta tiene en nuestra habilidad de mantener las relaciones ntimas. Al complicar la trama, le (7) ___________ esta elegancia y (nosotros) (8) ___________ perder su mensaje principal. Entonces no (9) ___________ la oportunidad de hablar sobre este tema tan importante que, por mi parte, creo que fue la intencin del director. who is Sonia sotomayor If a mosquito cell had 3 chromosomes, would that cell be a diploid or haploid? A rectangle that measures 10 inches by 7 inches.Which expression will determine the perimeter, in inches, of the rectangle? Find the total cost to the nearest cent.$16 haircut; 15% tip