in a function header, in addition to the name of the function, you are required to furnish .

Answers

Answer 1

In a function header in addition to the name of the function additionally it should have an identifier name of each parameter,a data type of each parameter,data type of the return value

What is the parameter in a function?

With the use of parameters, a function can carry out operations without being aware of the precise input values in advance. Programmers employ parameters, which are necessary parts of functions, to separate their code into logical sections.

A function's output is referred to as its return value, and the return type refers to the data type of the return value. Whether or not a function returns a value, it must always include a return type in its declaration and definition. The identifier name helps in specifically identifying the function

Hence to conclude if there is a datatype and return value with an identifier plays an important role to furnish a header

To know  more on functions in programming follow this link:

https://brainly.com/question/20476366

#SPJ4


Related Questions

what is a good anime to watch​

Answers

Answer:

demon slayer

Explanation:

Answer:

The ancient magus bride, overlord,hunter x hunter, 86(eighty six) battle game in 5 sec, peach boy riverside, somali and the forest

Cathy O'Neal refers to the practice of pursuing the perpetrators of minor crimes as "zero
tolerance" - what is the importance of the establishment of this policing strategy for the
building of tools to predict crime hot spots?

Answers

Answer:

Supporting the Establishment of Predictive Policing Processes . ... Crime Hot Spots in Richmond, Virginia, 8:00 p.m.–12:00 a.m.................. 48. 2.11. Trends ... Using a Risk Terrain Analysis Tool to Predict Purse Snatching Risk ............ 54 ... For a policing strategy to be considered effective, it must produce tangible results. The.

is this helpful if it is can  you give brainlest

Explanation:

How do I code strings in java

Answers

Answer: Below

Explanation:

Prescribe variable as string, and anything assigned to it will be a string.
Example:
String java_string;
java_string = "Hello world";

Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.

Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.

You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:

What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.

Answers

In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:

Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.

What is the Case Facts?

First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.

Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.

Learn more about affidavit from

https://brainly.com/question/30833464

#SPJ1

A macro is assigned as a button or a ___________ shortcut.

Answers

Answer:

Quick access toolbar

What is the unordered list element?

Answers

Answer:-

The Unordered List element:-

The HTML <ul> element represents an unordered list of items, typically rendered as a bulleted list

In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.

Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.

Ex: If the input is:

apples 5
shoes 2
quit 0
the output is:

Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy

Answers

Answer:

Explanation:

import java.util.Scanner;

public class MadLibs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String word;

       int number;

       do {

           System.out.print("Enter a word: ");

           word = input.next();

           if (word.equals("quit")) {

               break;

           }

           System.out.print("Enter a number: ");

           number = input.nextInt();

           System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");

       } while (true);

       System.out.println("Goodbye!");

   }

}

In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.

Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.

General purpose application include all the following except

Answers

Answer: Web authoring

Explanation:

Here's the complete question:

General-purpose applications include all of the following except:

Select one:

a. web authoring

b. word processors

c. spreadsheets

d. database management systems

General purpose application refers to the application which can be used for different tasks. Examples of General purpose application are Spreadsheet, Word processors, Presentation software, Database management system etc.

The general purpose applications are quite different from the specialized application which focuses on a particular discipline. Therefore, the option that isn't a general purpose application is the web authoring.

General-purpose applications include all of the following except: web authoring. therefore option A is correct.

General-purpose applications are versatile software programs that can perform various tasks across different domains.

Word processors, spreadsheets, and database management systems are examples of general-purpose applications.

Word processors allow for creating and editing documents, spreadsheets help with organizing and analyzing data, and database management systems handle storing and managing data.

However, web authoring is not a general-purpose application. It is a specialized application focused on creating and designing websites. While it may have some general functionality, its primary purpose is specific to web development.

Therefore, the correct answer is "a. web authoring" as it is not considered a general-purpose application.

Know more about web authoring:

https://brainly.com/question/33531237

#SPJ6

Your question is incomplete, but most probably your full question was,

General-purpose applications include all of the following except:

Select one:

a. web authoring

b. word processors

c. spreadsheets

d. database management systems

Dana is moving to a new house. She has 15 boxes for books. Each box can hold up to 22 books. Dana has 375 books. How many more boxes does she need?

Answers

Answer:

3

Explanation:

no of boxes 15

each box hold 22 books

then 15×22=330 books occupied

left books are 375-330=45

so 45÷15=3 boxes will be need

Answers  

12

lbiros

Explanation:

2 2x12

How different is the shift key and the caps lock key ​

Answers

The capsule key is different from the shift key to type in capital letters you press the caps lock key and then type but when you press the shift key with the letter that letter becomes capital and the rest text remains small

Shift key = Capitalizes the single letter that you type while pressing the Shift key. Also allows other options on the number keys to be activated. For example: 7 also equals &

Caps lock key = Capitalizes all of the letters you type after the caps lock key is activated. Unlike the Shift key, the caps lock key does not allow the other options on the number keys to be used.

Hope this helps! Please let me know if you need more help, or if you think my answer is incorrect. Brainliest would be MUCH appreciated. Have a great day!

Stay Brainy!

Write a Java program that takes as input a paragraph as a String and identifies if any of the words in the paragraph is a $1.00 word. The value of each word is calculated by adding up the value of each one of its characters. Each letter in the alphabet is worth its position in pennies i.e. a

Answers

Answer:

In Java:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 System.out.print("Enter paragraph: ");

 String para = input.nextLine();

 String[] para_words = para.split("\\s+");

 for (int i = 0; i < para_words.length; i++) {

     para_words[i] = para_words[i].replaceAll("[^\\w]", "");

     char[] eachword  = para_words[i].toCharArray();

     int penny = 0;

     for(char c : eachword){

         int value = (int)c;

         if(value<=122 && value>=97){   penny+=value-96;     }

         else if(value<=90 & value>=65){  penny+=value-64;  }

     }

     if(penny == 100){

         System.out.println(para_words[i]);

     }

       penny = 0;

}

}

}

Explanation:

Due to the length of the explanation, I've added the explanation as an attachment

Can someone help me by showing how to convert this java in HIGH LEVEL ASSEMBLY(HLA).That would be great.

import java.util.Scanner;

public class DollarValueMenu {
public static void main(String[] args) {
Scanner scanner = new Scanner(System.in);
System.out.print("Feed me your order as 4 hex digits: ");
String input = scanner.nextLine();

// Extract the individual digits from the input string
int digit1 = Character.digit(input.charAt(0), 16);
int digit2 = Character.digit(input.charAt(1), 16);
int digit3 = Character.digit(input.charAt(2), 16);
int digit4 = Character.digit(input.charAt(3), 16);

// Calculate the cost of each item
int cost1 = digit1;
int cost2 = digit2 * 2;
int cost3 = digit3 * 3;
int cost4 = digit4 * 4;
int cost5 = digit4 * 5;

// Calculate the total order cost
int totalCost = cost1 + cost2 + cost3 + cost4 + cost5;

// Print the item quantities and total cost
System.out.println(digit1 + " $1 item");
System.out.println(digit2 + " $2 item");
System.out.println(digit3 + " $3 item");
System.out.println(digit4 + " $4 item");
System.out.println(digit4 + " $5 item");
System.out.println("Total Order Costs: $" + totalCost);
}
}

Answers

Converting Java code to High-Level Assembly (HLA) requires understanding the syntax and semantics of both languages. Here's an example of how the given Java code can be converted to HLA:

assembly:

program DollarValueMenu;

#include("stdlib.hhf")

static

  digit1:      int8;

  digit2:      int8;

  digit3:      int8;

  digit4:      int8;

  cost1:       int8;

  cost2:       int8;

  cost3:       int8;

  cost4:       int8;

  cost5:       int8;

  totalCost:   int8;

begin DollarValueMenu;

  stdout.put("Feed me your order as 4 hex digits: ");

  stdin.get(digit1);

  stdin.get(digit2);

  stdin.get(digit3);

  stdin.get(digit4);

  movzx(cost1, digit1);

  movzx(cost2, digit2);

  movzx(cost3, digit3);

  movzx(cost4, digit4);

  movzx(cost5, digit4);

  mul(cost2, 2);

  mul(cost3, 3);

  mul(cost4, 4);

  mul(cost5, 5);

  add(totalCost, cost1);

  add(totalCost, cost2);

  add(totalCost, cost3);

  add(totalCost, cost4);

  add(totalCost, cost5);

  stdout.put(digit1, " $1 item", nl);

  stdout.put(digit2, " $2 item", nl);

  stdout.put(digit3, " $3 item", nl);

  stdout.put(digit4, " $4 item", nl);

  stdout.put(digit4, " $5 item", nl);

  stdout.put("Total Order Costs: $");

  stdout.puti(totalCost, nl);

end DollarValueMenu;

In this HLA version, we use the `stdout.put` function to display output and `stdin.get` to read input. The `movzx` instruction is used to move values into the appropriate variables and zero-extend them to 8 bits. The `mul` instruction multiplies the values, and the `add` instruction sums the costs.

Please note that HLA code may require additional setup and includes specific libraries, so ensure that you have the necessary environment and libraries set up before running the code.

For more questions on HLA, click on:

https://brainly.com/question/31365734

#SPJ8

"As part of integrating your solution your client indicates that they have certain technologies enabled on their network that allows defined and flagged traffic to reach its source destination based upon the priority of the traffic. What does the client have enabled on their network

Answers

Answer:

quality of service

Explanation:

The are two schools of ____________ are Symmetry and Asymmetry.

Answers

The two schools of design that encompass symmetry and asymmetry are known as symmetrical design and asymmetrical design.

Symmetrical design is characterized by the balanced distribution of visual elements on either side of a central axis. It follows a mirror-like reflection, where the elements on one side are replicated on the other side, creating a sense of equilibrium and harmony.

Symmetrical designs often evoke a sense of formality, stability, and order.

On the other hand, asymmetrical design embraces a more dynamic and informal approach. It involves the intentional placement of visual elements in an unbalanced manner, without strict adherence to a central axis.

Asymmetrical designs strive for a sense of visual interest and tension through the careful juxtaposition of elements with varying sizes, shapes, colors, and textures.

They create a more energetic and vibrant visual experience.

Both symmetrical and asymmetrical design approaches have their merits and are employed in various contexts. Symmetry is often used in formal settings, such as architecture, classical art, and traditional graphic design, to convey a sense of elegance and tradition.

Asymmetry, on the other hand, is commonly found in contemporary design, modern art, and advertising, where it adds a sense of dynamism and creativity.

In conclusion, the schools of symmetry and asymmetry represent distinct design approaches, with symmetrical design emphasizing balance and order, while asymmetrical design embraces a more dynamic and unbalanced aesthetic.

For more such questions on symmetry,click on

https://brainly.com/question/31547649

#SPJ8

Cable television systems originated with the invention of a particular component. What was this component called?​

Answers

Answer:

Cable television is a system of delivering television programming to consumers via radio frequency (RF) signals transmitted through coaxial cables, or in more recent systems, light pulses through fibre-optic cables. This contrasts with broadcast television (also known as terrestrial television), in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television; or satellite television, in which the television signal is transmitted by a communications satellite orbiting the Earth and received by a satellite dish on the roof. FM radio programming, high-speed Internet, telephone services, and similar non-television services may also be provided through these cables. Analog television was standard in the 20th century, but since the 2000s, cable systems have been upgraded to digital cable operation.

Explanation:

\(hii\)have a nice day ✌️✌️

Cable television systems originated with the invention of a particular component. The component is a coaxial cable. The correct option is A.

What is a cable television system?

Radiofrequency (RF) signals are transferred through coaxial cables, or in more current systems, light pulses are transmitted through fiber-optic cables, to deliver television programming to viewers via cable television networks.

This is in contrast to satellite television, which transmits the television signal via a communications satellite orbiting the Earth and receives it via a satellite dish.

It broadcast television, in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television.

Therefore, the correct option is A. coaxial cable.

To learn more about the cable television system, refer to the link:

https://brainly.com/question/29059599

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A. coaxial cable

B. analog transmission

C. digital transmission

D. community antenna

Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both single words. Then the program outputs last name, first name. End with newline.

Example output if the input is: Maya Jones

code in C language

Answers

Following are the code to input string value in C Language.

Program Explanation:

Defining header file.Defining the main method.Inside the method, two char array "lname, fname" is declared, which inputs value from the user-end.After input value, a print method is declared that prints the last name with ","  and first name.

Program:

#include <stdio.h>//header file

int main()//defining main method

{

char lname[15],fname[15];//defining two char array

scanf("%s%s",fname, lname);//use input method that takes string value in it  

printf("%s , %s",lname,fname);//use print method that prints string value

return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/14436979

Write a program that reads a person's first and last names separated by a space, assuming the first and

32. The broadcast address is a special address in which the host bits in the network address are all set to 1, and it can also be used as a host address.
A.True
B.False

Answers

Some host addresses are reserved for special uses. On all networks, host numbers 0 and 255 are reserved. An IP address with all host bits set to 1 is False.

How can I find a network's broadcast address?Any device connected to a multiple-access communications network can receive data from a broadcast address. Any host with a network connection could receive a message delivered to a broadcast address.All hosts on the local subnet are reached by using this address to send data. The Routing Information Protocol (RIP), among other protocols that must communicate data before they are aware of the local subnet mask, uses the broadcast address.The use of some host addresses is reserved. Host numbers 0 and 255 are set aside for use only on reserved networks. When all host bits are set to 1, an IP address is considered false.

To learn more about Broadcast address refer to:

https://brainly.com/question/28901647

#SPJ1

9
Type the correct answer in the box. Spell all words correctly.
Which attribute specifies a web address (URL) for a link?
Frank is writing a blog. In the blog, he wants to redirect his readers to his previous blog for reference. He needs to append a URL of the previous blog.
He can use the
attribute, which specifies the web address for a link.
m. All rights reserved.
Reset
Next

Answers

Answer:

In a link or web address, a blue font with an underline underneath or a websites logo can attribute to an web address/link

Why do bats sleep upside down

Answers

Answer:

Bats cannot run so it would be almost impossible for them to take off from the ground. A major advantage to hanging upside down is that bats do not need to generate lift to begin flight. They just drop out of their bed, open their wings and off they go.

Explanation:

A pitch is used to bury your screenplay? True or false

Answers

The correct answer for your question would be true

what is 30 x 30 x 30 x 30

what is 30 x 30 x 30 x 30

Answers

810,000 i asked siri

Answer:

its is 810000

Explanation:

hope this helps

g 4-6 you've been given the network 200.5.0.0 /24 and need to subnet it using vlsm as follows: bldg 1 30 hosts bldg 2 10 hosts bldg 3 10 hosts bldg 4 4 hosts what will be the network address for bldg 3

Answers

Answer:

The answer is  "200.5.0.0 32/28".

Explanation:

The requirement of the Bldg is =30.

The number of the host bits which is needed = 5

Therefore the subnet mask will be =/27

for bldg 3 netmask could be= /28

and when the /28 after that the last octet will be= 00100000.

00100000 converting value into a decimal value that is = 32.

therefore the correct value is 200.5.0.32 /28.

What data types should the following data be, Number or String?

The today's high temperature

Number
String

Answers

It should be number because people usually messure temprature in interger form. So it would be more effeicient to use number.

write a pseudocode statement that declares are variable total so it can hold integers. initialize the variable with the value?

Answers

Answer:

DECLARE total AS INTEGER

INITIALIZE total WITH "?"

Explanation:

This declares the variable total as an integer data type and initializes it with the value ?. The value ? is used to indicate that the variable has not been assigned a specific value yet. In some programming languages, this value might be treated as an error or a special value such as "null" or "undefined".

When turning on any circuit breaker , you should always stand A. At arm’s length from the load center
B.in front of the device
C. To the side of the load center
D . About two feet from the device

Answers

Answer:C. To the side of the load center

Explanation:

am i the only one that finds so much bots on peoples pages lol

Answers

Nah, I see that too lol

What are type of main protocol?

Answers

There are three main types of network protocols. These include network management protocols, network communication protocols and network security protocols:

Communication protocols include basic data communication tools like TCP/IP and HTTP.
Management protocols maintain and govern the network through protocols such as ICMP and SNMP.
Security protocols include HTTPS, SFTP, and SSL.

Hope this helps

The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi pounds, where vi and wi are integers. The thief wants to take as valuable a load as possible, but he can carry at most W pounds in his knapsack, for some integer W . Which items should he take?

Answers

Step by step Explanation:

Based on what we could deduce from the above statement, the items he should take are:

must either take one single item or must leave the other behind,and only a whole amount of an item must be taken,in which an item cannot be taken more than once into his knapsack.

Hence, the thief needs to carefully determine items with an optimal value which still falls within his specified weight (W).

If an if-else statement is true, it will include which kinds of results?


Answers

Answer:

> It will run out the function under the if statement.

Explanation:

> As an if-else statement is saying if (something = something, etc) do (this this and this [let’s refer to this as 1]) Else do (this this and not this [let’s refer to this as 2]) Since it is true, it will do the original function (1).

> It is saying if this is true, then do this (1). If it is not true, then do this (2). Basically the else is there in case the if is not true, or equal to anything other than what’s intended.

> Since it is true however, it will do what the original function (1) is. So this is our correct answer. Once again, it is; “It will do the original function under the if statement”.

> I hope this answered your query, and any other questions you may have had on the subject. #LearningWithBrainly

Write a C program that creates a function bitFlip() that takes an int parameter and returns an int that has all of the int that was passed in bits flipped.
It changes all 0s to 1s and all 1s to 0s. In the main function, read in an int num using scanf, call bitFlip(), and the function returns num with its bits flipped.
Output example:
Enter an integer: 2
Integer before bits were flipped: 00000000000000000000000000000010
Integer after bits were flipped: 11111111111111111111111111111101
The flipped number is: -3

Answers

Answer:

Here's an example C program that implements the bitFlip() function:

#include <stdio.h>

int bitFlip(int num) {

   return ~num; // Use bitwise NOT operator to flip all bits

}

int main() {

   int num;

   printf("Enter an integer: ");

   scanf("%d", &num);

   printf("Integer before bits were flipped: %032d\n", num); // Use %032d to print leading zeros

   num = bitFlip(num);

   printf("Integer after bits were flipped: %032d\n", num);

   printf("The flipped number is: %d\n", num);

   return 0;

}

The bitFlip() function takes an int parameter num and returns an int with all of its bits flipped using the bitwise NOT operator ~.

In the main() function, we first read in an integer num using scanf(). We then print out the binary representation of num using the %032d format specifier to ensure that it has 32 bits with leading zeros. We then call bitFlip() to flip the bits of num and print out the binary representation of the flipped number. Finally, we print out the value of the flipped number using %d.

Sample output:

Enter an integer: 2

Integer before bits were flipped: 00000000000000000000000000000010

Integer after bits were flipped: 11111111111111111111111111111101

The flipped number is: -3

Explanation:

Other Questions
A sample of 100 "Eggium" (Eg) atoms are taken where 30 have a mass of 15, 40have a mass of 16, 20 have a mass of 17, and 10 have a mass of 18. What is thepercent abundance of Eg-17?A 10%B 20%C 30%D 40%F 80%* The apple maggot is a pest of hawthorn plants and apple trees. Before the introduction of apple trees 200 years ago, apple maggot flies laid their eggs only on hawthorns. After the introduction of apple trees, these flies started to lay eggs in apples or hawthorns. These flies tend to live and reproduce in the type of plants they were born in. Therefore, hawthorn flies tend to mate with other hawthorn flies and apple flies tend to mate with other apple flies. Some genetic differences are currently found between these two groups of flies. If these flies become different species in the future, this will be an example of what vacation homes are the most popular of all the direct real estate investments. group of answer choices true false At the beginning of this section, the author says that a 1925 survey conducted in Muncie, Indiana, found that 21 out of 25 families who owned cars did not have bathtubs with running water. As one farm wife explained, "You can't ride to town in a bathtub." What do you think she meant by this? What is the slope of the line that passes through the points (4,2) and (-16, -10)?Write your answer in simplest form. The Appalachian Trail is about 2,175 miles long.If Katia averages 18 miles each day, how long will it take her to hike the length of the trail? 3) Ashley is buying a bagel for her friends for lunch. The personin front of her buys a half a dozen bagels (6) for $38.35. Howmuch would she pay for her and 8 friends bagels? How does the authors use of imagery help characterize the emotion of love? There are 100 strawberry pickers living in the area. The amount of wild strawberries each person can pick from the local open access strawberry field - is given by f(p) = 100 p, where p is the number of people picking strawberries. Wild strawberries can be sold at $2 each. Picking wild strawberries requires a permit of $20 per person. How many people will be picking strawberries in the field? a. 75 b. 80 c. 95 d. 100 e. 90 Multiple representations is very common in GIS. Give an example to illustrate the space of a real-world object that can be represented with different GIS data models. what is the goal of strategic planning? select one: a. consumer and company relationships b. environmental-friendly community work c. long-run profitability and growth d. financial success Photosynthetic protists are informally referred to as: A. Protozoa B. Plants C. Fungi D. Algae. Create a Find Smallest app that: - Allows a user to create a list of at least 5 food items. - Displays all of the items in the `foods` list using a `for` loop. - Using a `for` loop, display all of the items in the `foods` list with less than 7 letters. A new car is purchased for 23700 dollars. The value of the car depreciates at 15% per year. If you wanted to know the value of the car after 10 years which function would give you that information?. Complete the table in your scratch paper and answer the following question below.11. What is the total frequency of the data in the table?A. 50B. 56C. 30D. 2012. What is the total fx of the data in the table?A. 1000B. 1717C. 1789D. 200014. What is the midpoint of the scores 45-49 of the data in the table?A. 27B. 47C. 45D. 4915. What is the mean of the data in the table?A. A27.3B. 28.4C. 45.1D. 30.716. What is the median of the data in the table?A. 31.3B. 28.4C. 45.1D. 30.717. What is the mode of the data in the table?A. 31.3B. 32.5C. 45.1D. 40.3 How do you continue an abandoned shrine investigation? I need an answer asap!!!!!! What is (4 4/7) divided by 1/2? Albert Einstein (1)______ born in Germany in 1879. In 1895, he (2)______to school in Switzerland. After college, he (3)______ in Switzerland for 28 years, and then he (4)______ to the US in 1933. He (5)______ in 1955 in the US. moved waswent lived died Pregunta 2Albert Einstein (1)______ born in Germany in 1879. In 1895, he (2)______to school in Switzerland. After college, he (3)______ in Switzerland for 28 years, and then he (4)______ to the US in 1933. He (5)______ in 1955 in the US. wasdiedwentlivetmovedPregunta 3Albert Einstein (1)______ born in Germany in 1879. In 1895, he (2)______to school in Switzerland. After college, he (3)______ in Switzerland for 28 years, and then he (4)______ to the US in 1933. He (5)______ in 1955 in the US. moved died livedwentwas Pregunta 4Albert Einstein (1)______ born in Germany in 1879. In 1895, he (2)______to school in Switzerland. After college, he (3)______ in Switzerland for 28 years, and then he (4)______ to the US in 1933. He (5)______ in 1955 in the US. wasmoved liveddied wentPregunta 5Albert Einstein (1)______ born in Germany in 1879. In 1895, he (2)______to school in Switzerland. After college, he (3)______ in Switzerland for 28 years, and then he (4)______ to the US in 1933. He (5)______ in 1955 in the US. diedmovedlivedwaswent A runner is participating in the Boston Marathon. He has run 12 miles of the 26.2 mile course. What percent of the course has he run so far? What is the meaning of N, E, M, and S in periodic table Need ASAP!