given a class named animals and a class variable named ducky which will reference an animals object, which is the correct way, using the textbook's pseudocode, to create an animals object?

Answers

Answer 1

The correct way, using the textbook's pseudocode, to create an animals object : Set ducky = New Animals ()

What are the basics of pseudocode?Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers. A "text-based" detail (algorithmic) design tool is pseudocode. The Pseudocode rules are not too complicated. Statements that demonstrate "dependence" must all be indented. Some of them are while, do, for, if, and switch.Pseudo code: It's just a plain text document with annotations and instructive text that implements an algorithm. It has no grammar like any other programming language, making it impossible for a computer to compile or comprehend.A simplified version of an algorithm that expresses coding logic in English is known as pseudocode. It enables programmers to plan the architecture of any algorithm using straightforward instructions.

Learn more about pseudocode refer to :

https://brainly.com/question/24735155

#SPJ4


Related Questions

What certificates are contained on the common access card.

Answers

Answer:

Public Key Infrastructure (PKI) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.

Two digital fingerprints.

Digital photo.

Personal Identity Verification (PIV) certificate.

Organizational affiliation.

Agency.

Explanation:

Multiple Choice Adobe System =0.30, Dow Chemical =0.21, Office Depot =0.49 Adobe System =0.27, Dow Chemical =0.33, Office Depot =0.40 Adobe System =0.21, Dow Chemical =0.30, Office Depot =0.49 Adobe System =0.33, Dow Chemical =0.33, Office Depot =0.33

Answers

Adobe System = 0.30, Dow Chemical = 0.21, Office Depot = 0.49.

Which set of values represents the correct percentages for Adobe System, Dow Chemical, and Office Depot?

In the given multiple-choice options, we are provided with three different sets of values for Adobe System, Dow Chemical, and Office Depot. We need to determine which set of values is correct.

By evaluating the options, we can see that the only set of values where the percentages sum up to 1 (100%) is Adobe System = 0.30, Dow Chemical = 0.21, Office Depot = 0.49. Therefore, this is the correct answer.

Learn more about Dow Chemical

brainly.com/question/27857287

#SPJ11

An end-user has reported that a legitimate sender sent an unexpected email stating the user needed to urgently update the password account information to a vendor website. Once the user clicked on the URL in the email, the user was taken to a landing page to update the user's credentials. The user entered the credentials, despite noticing the URL was slightly misspelled. What happened in this situation

Answers

Group of answer choices.

A) The attacker has sniffed the user's packets on the user's local network and has captured the user's credentials in plain text.

B) The user is a victim of a pharming attack by using social engineering to trick the user into clicking a link that redirected their traffic to a spoof website.

C) The user is the victim of an impersonation attack, where the attacker used intimidation by coaxing the target and engaging with them by putting them at ease.

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Answer:

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

This ultimately implies that, the user in this scenario is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website to make it look like a credible, authentic and original one.

Answer:

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Imagine that you had the assignment to create a website that would pair people with the ideal poster to put up in their room based on their personality. What information could you include in the logical data model for that program? List at least five items. Your answer:

Answers

Answer:

Here are six key components that you might include:

1. User Profile: This would include demographic information such as name, age and location. Also, preferences, hobbies, and interests, etc., to better understand their tastes and personalities.

2. Personality Quiz/Assessment Results: You could include a section that details the results of a personality quiz or assessment. This might contain personality traits, MBTI type, or results from another standardized personality test.

3. Poster Details: This would include a wide variety of information about each poster, such as dimensions, color scheme, subject matter (abstract, landscapes, celebrities, movies, etc.), style (minimalist, grunge, pop art, etc.), and price.

4. Purchase History: Keeping track of posters the user has purchased in the past can help predict what they might like in the future.

5. User Feedback: You may want to include a feedback mechanism where users can rate and review the posters they've received. This feedback could be used to refine recommendations for that user and others with similar tastes.

6. Preferences: Preferences for posters could also be directly taken from users, including favorite colors, themes (like nature, space, movies, music, etc.), preferred artists or styles, among others.

A logical data model can outline the specific data requirements for each project. However, should the project require it, it is made to integrate with different logical data models without any issues.

Thus, The creation and design of a logical data model can be done apart from the database management system. The kind of database management system used has only a small impact.

Data types with precise lengths and precisions are contained in data attributes. There are no primary or secondary keys specified in logical data modeling. At this stage of the data modeling process, it is necessary to check and refine connector specifications that were established before developing relationships.

A logical data model is comparable to a graphical representation of an industry's information needs.

Thus, A logical data model can outline the specific data requirements for each project. However, should the project require it, it is made to integrate with different logical data models without any issues.

Learn more about Logical data model, refer to the link:

https://brainly.com/question/31086794

#SPJ1

what dog breed is this
a chow chow
b Siberian husky
c Portuguese pondego
d toy poodle
click picture for example

what dog breed is this a chow chow b Siberian huskyc Portuguese pondegod toy poodleclick picture for

Answers

Answer:

C i'm pretty sure

Explanation:

Hope i help

ANSWER ASAP!!!!!!!!

Which statement regarding dialogues in multiplayer games is true?
A.
Dialogues are based only on players’ actions.
B.
Dialogues are restricted to the game’s characters.
C.
Dialogues may be between the game’s characters as well as the players.
D.
Dialogues serve the sole purpose of advancing the storyline.
E.
Dialogues are based only on events that have occurred in the game.

Answers

Answer:

The answer to this question will mostly be E

Windows operating systems do not allow you the option to assign multiple IP addresses to a single network connection. True or False

Answers

False. Windows operating systems do allow you to assign multiple IP addresses to a single network connection.


False. Windows operating systems do allow you the option to assign multiple IP addresses to a single network connection. Here's a step-by-step explanation:

1. Open the "Control Panel" and navigate to "Network and Sharing Center."
2. Click on "Change adapter settings" on the left side.
3. Right-click on the network connection you want to configure and choose "Properties."
4. Select "Internet Protocol Version 4 (TCP/IPv4)" and click on "Properties."
5. In the "General" tab, click on "Advanced."
6. In the "IP Settings" tab, you can add, edit, or remove multiple IP addresses for the same network connection.

This process demonstrates that Windows operating systems do permit the assignment of multiple IP addresses to a single network connection.

Learn more about :

Operating Systems : brainly.com/question/1033563

#SPJ11

Customizable diagrams, including List, Process, and Cycle diagrams, are built into Word and can be found in
O SmartArt.
O WordArt.
O Clip Art
O Pictures

Please help ASAP

Answers

Answer:

clip art

Explanation:

i hope this helps you

How big of a role does social media play in the mental health of people? Does it do more harm or good? Explain why. in 400 words

Answers

The role that social media play in the mental health of people is big. The use of social media is one that is known to have c positive effects for example connecting people, giving a platform for self-expression, and others.

What is the  role that social media?

The  key bad  impacts of social media on mental health is one that is known to have the potential for addiction. Social media platforms are said to be set up to be a form of engaging, which can result to individuals spending excessive amounts of time going through their feeds and this may lead to depression.

Hence the negative impact of social media on mental health is the one that can also lead to cyberbullying that is Online harassment.

Learn more about  role that social media from

https://brainly.com/question/1163631

#SPJ1

Create a GPO for a firewall rule to block port 139 for employees. Do you recommend blocking this port? Why? Provide a screenshot showing all steps of your work

Answers

A firewall rule can be created to block port 139 for employees. However, whether or not to block this port depends on the specific network requirements and security considerations of the organization.  

Port 139 is used by the NetBIOS session service, which is responsible for file and printer sharing on Windows networks. By blocking port 139, organizations can prevent unauthorized access to shared resources and reduce the risk of certain network-based attacks, such as the spreading of malware or unauthorized file access. However, it's important to consider the specific needs of the organization and the impact of blocking port 139. If file and printer sharing is required for employees to perform their tasks, blocking this port may hinder their productivity. Additionally, some legacy applications or systems may still rely on port 139, so blocking it without proper consideration and testing could lead to compatibility issues. Ultimately, the decision to block port 139 should be based on a thorough understanding of the organization's network infrastructure, security requirements, and the potential impact on employees' work. It is recommended to consult with network administrators or security experts to evaluate the risks and benefits before implementing any firewall rule.

Learn more about malware here:

https://brainly.com/question/29786858

#SPJ11

can someone help me with this trace table - its computer science

can someone help me with this trace table - its computer science

Answers

TThe while loop keeps going until count is greater than or equal to 10.

count = 0, sum = 0

count = 2, sum =2

count = 4, sum = 6

count = 6, sum = 12

count = 8, sum = 20

count = 10, sum = 30

Now that count is equal to 10, it exits the while loop and the program ends. The values above complete your trace table.

how to select today's file with a script in linux and upload to ftp

Answers

Answer:

look on yt

Explanation:

or iinternet

Write a function buckets(equiv, lst) that partitions a list into equivalence classes. That is, buckets (equiv, lst) should return a list of lists where each sublist in the result contains equivalent elements, where two elements a and b are considered equivalent if equiv (a, b) returns True. For example:

Answers

The function initializes an empty list result to store the equivalence classes. It then iterates over each item in lst, and for each item, it searches for the first sublist in result that contains an equivalent item using the next function and a generator expression. If such a sublist is found, the item is added to the existing sublist using the append method. Otherwise, a new sublist is created with the current item and added to result.

Here is one possible implementation of the buckets function in Python:

def buckets(equiv, lst):

   """

   Partitions a list into equivalence classes based on the given equivalence function.

   Parameters:

   equiv (function): A binary function that takes two elements as input and returns True if they are equivalent.

   lst (list): The list to be partitioned.

   Returns:

   list: A list of lists, where each sublist contains equivalent elements.

   """

   result = []

   for item in lst:

       # Find the first sublist in the result that contains an equivalent item

       sublist = next((sublist for sublist in result if equiv(sublist[0], item)), None)

       if sublist is not None:

           # Add the item to the existing sublist

           sublist.append(item)

       else:

           # Create a new sublist with the current item

           result.append([item])

   return result

The buckets function takes two arguments: equiv, a binary function that takes two elements as input and returns True if they are equivalent, and lst, the list to be partitioned.

To know more about function,

https://brainly.com/question/30858768

#SPJ11

Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.

Answers

Answer:

Redirection

Explanation:

This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.

Answer:

The  ismap  attribute is used in this case to identify the type of image map.

Explanation:

Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.

what is the purpose of the self parameter? group of answer choices to create variables with public visibility enables changes in the implementation without affecting users of a class store the data for all objects created by the same class refers to the object on which the method was invoked previous

Answers

To access class-specific variables, use the self parameter, which is a reference to the currently running instance of the class.

What is a self parameter ?

There is no way around the term "self" while working with Pythn.

Both the defining of methods and the initialization of variables use it.

Every time a method is defined, the self method is explicitly invoked.

The class instance is represented by the self. You can access the class's attributes and methods in Pythn with this keyword. It connects the given arguments and the attributes.

Pythn does not utilize the notation o refer to instance attributes, therefore we use self instead. In Pythn, there are ways that cause the instance to be passed but not automatically received.

Hence, To access class-specific variables, use the self parameter, which is a reference to the currently running instance of the class.

Learn more about self parameter click here:

https://brainly.com/question/20392727

#SPJ4

Travel Agency Scenario:public int getShortestLayover()

Answers

The public int getShortestLayover() is a method used in travel agencies to determine the shortest possible time for a layover. A layover is a time period during a trip where a passenger must wait in an airport before boarding the next flight to their destination.

The getShortestLayover() method works by analyzing different factors such as the location of the airports, the airline’s schedules, and the availability of flights. It takes into account the arrival and departure times of the passenger's flights and determines the shortest possible layover based on these factors. The importance of this method lies in providing passengers with the best possible experience. A long layover can be a frustrating and tiresome experience for passengers, especially if they are in a foreign country. By minimizing the duration of layovers, travel agencies can improve customer satisfaction and enhance the overall travel experience. In conclusion, the getShortestLayover() method is a valuable tool for travel agencies to optimize flight schedules and provide the best possible experience for their customers. By taking into account different factors, this method helps to minimize layover times and improve the overall travel experience.

Learn more about travel agencies here-

https://brainly.com/question/29770268

#SPJ11

What is wrong with the following code snippet? Language: Java 1 byte[] data = null; 2 FileInputStream stream = null; 3 File file = new File("example.txt"); 4 try { 5 stream = new FileInputStream(file); 6 data = stream.readAllBytes(); 7 catch (java.io.IOException ignored) { 8 } finally { 9 stream.close(); 10} Select the correct answer: The file may be closed before all data is read. If an error is raised, the file will remain open. If opening the file fails, a different error is raised. Not all bytes from the file are read.

Answers

The correct answer is: The file may be closed before all data is read. The try block does not have a corresponding catch block for the IOException that can be raised by the readAllBytes() method.

This can result in the file not being closed properly if an exception is raised. To fix this issue, a catch block should be added to handle the IOException and close the stream in the finally block. Additionally, it is not guaranteed that all bytes from the file will be read as the readAllBytes() method may not be able to read the entire file in one go. It is recommended to use a loop to read the data in chunks instead.

learn more about IOException here:

https://brainly.com/question/15068332

#SPJ11

What is a counter? In typography

Answers

answer:

in typography, it is an area entirely or partially enclosed by a letter form or a symbol

explanation:

・two types: closed & open

・closed —  A, B, D, O, P, Q, R, a, b, d, e, g, o, p, and q

・open — c, f, h, s

Why are financial records important? How does keeping organized financial records contribute to successful money manageme?

Answers

Answer:

Financial records are very important for any organization. There are many reasons to keep records such as knowing financial situation, meeting tax obligations

Explanation:

Firstly is knowing the financial situation of the company which help to further contribute with organization.

Secondly organization meet the ta obligations assign by the government.

explain four sitting postures in a computer laboratory​

Answers

1. Push hips back
2. Adjust seat
3. Sit up straight and roll your shoulders back
4. Feet flat on floor

What is the advatage of print, broadcast, film/cinemavido games, new meida

Answers

Print media, such as newspapers, magazines, and books, offer the advantage of in-depth coverage and analysis of topics.

They allow for detailed reporting and interpretation of events and issues, as well as providing a permanent record of information. Print media can also be easily archived and referenced for future use.

Broadcast media, such as television and radio, offer the advantage of immediacy and reach. They can quickly disseminate information to a wide audience, and their visual and auditory nature can make stories more engaging and memorable. Broadcast media can also offer live coverage of events, allowing audiences to experience breaking news in real time.

Film/cinema and video games offer the advantage of immersive storytelling. They can transport audiences to other worlds and allow them to experience stories in a more visceral and interactive way. They also have the ability to use powerful visual and auditory effects to convey emotions and ideas.

New media, such as social media and digital platforms, offer the advantage of interactivity and engagement. They allow for direct communication and interaction between content creators and audiences, as well as enabling audiences to participate in the creation and sharing of content themselves. New media can also provide personalized content recommendations based on users' interests and preferences.

To know more about Print media click here:

brainly.com/question/29884875

#SPJ4

to construct a bar using excel chart tool choose as the chart type

Answers

To construct a bar using the Excel chart tool, choose "Bar Chart" as the chart type.

The bar chart is a widely used chart type in Excel for visualizing data in a categorical manner. It is particularly useful for comparing different categories or groups. To create a bar chart in Excel, you need to follow these steps:

1. Select the data range: Highlight the data that you want to include in the bar chart, including both the category labels and the corresponding values.

2. Insert the chart: Go to the "Insert" tab in the Excel ribbon and click on the "Bar" chart button. From the dropdown menu, select the specific bar chart style you prefer, such as clustered bar, stacked bar, or 3D bar.

3. Customize the chart: Once the bar chart is inserted, you can customize various aspects, such as axis labels, chart title, color scheme, legend, and data labels, to enhance readability and convey the intended message effectively.

By choosing "Bar Chart" as the chart type in Excel, you can easily present your data in a clear and visually appealing manner, allowing for easy comparison and analysis of different categories or groups.

Learn more about Bar Chart

brainly.com/question/32121650

#SPJ11

Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks.
T
F

Answers

The statement "Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks" is true.

Bottom-up design starts with identifying the small, individual components of a problem and then gradually building up towards the bigger picture. This approach allows for a more detailed and thorough understanding of the problem, as well as the ability to identify any potential issues early on. By breaking down a problem into smaller tasks, it becomes easier to manage and tackle, resulting in a more efficient and effective solution. Overall, bottom-up design is an important and valuable approach in problem-solving and project management.

learn more about Bottom-up design here:

https://brainly.com/question/31937326

#SPJ11

Which of the following is NOT a factor of identifying graphic design?

Which of the following is NOT a factor of identifying graphic design?

Answers

Answer:

i think it is a

Explanation:

sorry if it is wrong

Answer: answer is B

Explanation:

I am sure about it

an it technician installs a solid-state drive (ssd) into a motherboard connector that enables high-performance storage and is oriented horizontally. what has the it technician installed?

Answers

An IT technician installs a solid-state drive (SSD) into a motherboard connector that allows for high-performance storage and is horizontally oriented because, they have installed a storage device that stores data in memory chips rather than spinning disks.

The IT technician, in this case, installed a 2.5-inch SSD, which is the most common form factor for solid-state drives. The IT technician may have installed the SSD for a variety of reasons, including faster read and write times, lower power consumption, and lower noise levels. Solid-state drives are known for their speed and dependability, as well as their low heat production and lack of moving parts, which decreases the risk of failure.

In comparison to traditional spinning-disk hard drives, SSDs are smaller, quicker, and more reliable. Because of their solid-state nature, SSDs have a lower chance of breaking, making them ideal for users who want a storage option that will last longer. While the price of SSDs is higher than that of traditional hard drives, the enhanced performance is well worth the extra expense in many cases.

Know more about solid-state drive here:

https://brainly.com/question/28476555

#SPJ11

The CIO of an IT company would like to investigate how a software developer’s work experience (in number of years), professional certifications (number of certificates), and knowledge of various computer languages (number of programming languages) contribute to his/her work performance. The work performance is measured on the scale of 1 to 1000 so that the higher one’s score, the better his/her work performance. He collects data from 20 software developers in his company which is provided in the table below.
Copy and paste this data into an Excel file to get started.
Employee ID Years of experience Num of certificates Num of progLang Performance
1 27 3 8 880
2 11 1 2 686
3 6 2 1 681
4 21 3 4 877
5 26 3 4 975
6 21 3 4 902
7 18 3 3 900
8 15 2 5 882
9 14 2 3 775
10 5 1 3 650
11 17 2 5 908
12 14 2 4 687
13 15 3 4 891
14 7 2 3 566
15 5 3 1 959
16 13 2 5 793
17 11 2 4 778
18 31 3 7 975
19 16 2 5 846
20 12 3 6 779
Using Pivot Table on this data, what is the standard deviation for the performance of software developers who have obtained 3 certificates and know 4 programming languages?
Select one:
a. 911.25
b. 61.5
c. 0
d. 4
e. 43.7
What is the response variable in this regression model?
Select one:
a. Employee ID
b. Work experience
c. Professional certifications
d. Performance
e. Knowledge of computer languages
What is the value of R-squared of this regression model?
A. 62.7%
b. 79.2%
c. 8.96%
d. 64.7%
e. 45.4%

Answers

The standard deviation for the performance of software developers who have obtained 3 certificates and know 4 programming languages is 43.7 (option e).

What is the Response Variable?

The response variable in this regression model is the "Performance" (option d).

The value of R-squared for this regression model is 79.2% (option b).

The response variable in this regression model refers to the variable being predicted or explained by the other variables in the model. In this case, the "Performance" of software developers is the response variable, as it is the variable of interest being influenced by the years of experience, certifications, and knowledge of programming languages.

Read more about response variable here:

https://brainly.com/question/30469121

#SPJ4

Teens are more likely to access the news online or by watching the news on TV.
OA. True
OB. False

Answers

The answer is True.

What technology advancements came in 1960-1969

Answers

Several technology advancements emerged in the 1960s, including:

1. The development of the first computer mouse in 1964 by Douglas Engelbart

2. The creation of the first video game, Spacewar!, in 1962

3. The invention of the first laser in 1960 by Theodore Maiman

4. The launch of the first communication satellite, Telstar, in 1962

5. The introduction of the first cassette tape in 1963 by Philips

6. The development of the first computer language, BASIC, in 1964 by John Kemeny and Thomas Kurtz

7. The first manned moon landing in 1969 by NASA's Apollo 11 mission.

which of the following do not have a definite shape but take the shape of the container into which they are put? a. water and paper b. water and fine sand c. fine sand and paper d. ice cubes and water

Answers

Answer:

BASICALYL JUSTDO PAPER A

Explanation:

is a keyboard a software?

Answers

Answer:

Yes

Explanation:

Because it's apart of software hope this helps

The hardware is all the tangible computer equipment, such as the keyboard and mouse. The software is what makes the hardware work or lets you get things done, such as writing documents with Microsoft Word or playing a Solitaire game.

Is a keyboard a software or hardware?
Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, the software is the set of instructions that can be stored and run by hardware.


Hope it helps, have a great day!❤️✨
Other Questions
Sony sets its televisions at 3 price levels of BD 300, BD 600, and BD 1000. Sony is using a. product line pricing b.market-skimming pricing c. promotional pricing d. by-product pricing A food manufacturer is trying to maximize profit by selling wheat-based cereal (C) and wheatbread(B) with raw wheat (W). The production functions are:Cereal:C=30Wc-1.5WcBread:B=74WB-2WBConstraint:Wc+WB = 8294Profit is $1.00 per box of cereal and $0.50 per pack of wheat bread. There are 8,294 units ofraw wheat available.How much wheat should go to the cereal (WC)? Enter as a value. ROUND TO THE NEARESTWHOLE NUMBER.Type your answer... people are better at advocating for themselves than they are advocating for others true or false ? The surface area of a balloon varies directly as thesquare of mits radius. The area is 325 in? when theradius is 5 in. What is the area when the radius is7 in.? -(7-2x) + 7 = -7What is X? the mechanism of choice used to structure the production and consumption of goods in society is known as . Someone plz help me :( under normal conditions, most nutrients are reabsorbed in which portion of the nephron What is the density of a book with a mass of 60g and a volume of 20 cm3? * my cat (be) fond of travelling .... the correct form of verb is Question 1 (1 point) There were 3 friends that decided to race their bikes down a hill without peddling. They all approached the top of the hill with a velocity of 2m/s. When they got down to the bottom of the hill 15 seconds later, they had achieved a velocity of 15m/s. To their surprise, they all made it down at the same time. What was their acceleration? a 1.15 m/s2 b 7.5 m/s2 c .87 m/s2 d 1 m/s2 Question 2 (1 point) What is the acceleration of a 450 horsepower race car if the car had a mass of 1000Kg and began at a velocity of 10m/s. After 1.75 sec., the car has a velocity of 45m/s? a 10 m/s2 b 25.71 m/s2 c 4.5 m/s2 d 20 m/s2 Question 3 (1 point) A car going 75 mph (35 m/s) hits a wall and comes to a stop. It takes 1.25 s for the car to come to a stop. What is the acceleration of the car? a -60 m/s2 b 60 m/s2 c -28 m/s2 d 28 m/s2 Question 4 (1 point) An Olympic skier starts from rest the top of a hill, accelerating down the hill until he comes to a turn 12 seconds later. his velocity at the turn is 55 m/s, what was his acceleration when he got to the turn? a -.22 m/s2 b .22 m/s2 c 4.58 m/s2 d -4.58 m/s2 Question 5 (1 point) A boy rolls a tennis ball down the hallway and it takes 4.5 seconds to come to a stop. If the ball started with a velocity of 17m/s, what was the acceleration of the ball? a 3.78 m/s2 b -3.78 m/s2 c -4.5 m/s2 d 0 m/s2 he saw the danger but kept on advancing change into complex sentaence. Helen, age 17, wanted to buy a motorcycle. She did not have the money to pay cash but persuaded the dealer to sell a cycle to her on credit. The dealer did so partly because Helen said that she was 22 and showed the dealer an identification card that falsely stated her age as 22. Helen drove the motorcycle away. A few days later, she damaged it and then returned it to the dealer and stated that she voided the contract because she was a minor. The dealer said that she could not do so because (a) she had misrepresented her age and (b) the motorcycle was damaged. Can she void the contract Jeanine often bites her nails whenever she is nervous, prompting looks from strangers and her co-workers. According to Freud, Jeanine is most likely stuck in the stage of development known as the Assume that the NC stop button is replaced with an NO stop button and that the program is changed so it operates as before. Should the field wire connected to one end of the stop button break off a) the motor would stop automatically. b) pressing the stop button would stop the motor. c) pressing both the start and stop buttons would stop the motor. d) none of these b dd c b cis this invalid or validor not enough information So i woke up at 3 And im really tired so i go Drink coffee, but it doesn't help cause i Watched IT 2 so can yall help me out here What number comes after quintillion? Estimate 3 70 to the nearest integer. help please I don't know it