To improve readability and maintainability, you should declare a __________ for pi instead of using literal values such as 3.14159.

Answers

Answer 1

To improve readability and maintainability, you should declare a constant for pi instead of using literal values such as 3.14159.

We can describe constants as values that are invariant quantities. These values are backed by effective researched and hence are used as a basis when solving equations or proposing new theories.

Physical constants are standard values and remain the same. For example, the value of pi is constant i.e 3.14159. In an equation or when solving mathematical equations, the value of pi will always remain the same.

While reading, such values are declared as constant simply rather than speaking the numerical value. The constants are used in almost every physical theory and serve as a basis for proving other theories right or wrong.

To learn more about pi, click here:

https://brainly.com/question/12452782

#SPJ4


Related Questions

Discuss about theResult of Risk response factors for the Project.

Answers

Risk response factors for a project are the steps taken by a project manager to deal with the identified risks in the project plan.

It is the project manager's responsibility to manage the risks and take action against them to avoid failure. In this case, we shall be discussing the results of risk response factors for the project.Risk response factors are categorized into four groups, which are acceptance, mitigation, transfer, and avoidance. The results of these risk response factors for a project are as follows:Acceptance: This is the risk response factor that accepts the potential impact of risks on the project and decides to leave it unhandled. The results of acceptance are the continued existence of risks in the project, which may lead to a negative impact on the project.Mitigation: This risk response factor involves taking actions to reduce the probability of the risks' occurrence and/or minimize the impact of the risks. The result of mitigation is the reduction of the probability and impact of the risks.Transfer: This is the risk response factor that transfers the risks to a third party. The result of transfer is the shift of liability and responsibility for the risks from the project manager to the third party.Avoidance: This is the risk response factor that involves taking action to avoid the occurrence of the risks. The result of avoidance is the complete elimination of risks from the project plan.Conclusively, the result of risk response factors for a project depends on the strategy and plan taken by the project manager to handle the identified risks. The success of the project depends on the project manager's ability to choose the right risk response factor that matches the identified risks.

Learn more about mitigation :

https://brainly.com/question/31880500

#SPJ11

In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniques will contribute to green computing?

Answers

Answer:

A) virtualization

Explanation:

These are the options for the question

A) virtualization

B) grid computing

C) recycling

D) autonomic computing

From the question, we were informed that, In attempts for a company to improve their contribution to the environment the company decides to adapt green computing. In this case, the techniques that will contribute to green computing is virtualization.

Green computing can be regarded as

environmentally responsible use of computer as well as it's resources. It involves Design study as well as manufacturing, and making use of computer and disposing it's device in environmental friendly manner.

Technologies of green computing are:

✓Virtualization,

✓Cloud computing

✓Green Data Center,

✓E-waste control

Virtualization can be regarded as process involving creation of

software-based represention or virtual representation of resources/something.

This resources/ something can be virtual applications, storage as well as networks. It helps in reducing IT expenses and as a result of this, the efficiency as well as agility for all size businesses can be boosted

character strings and dates in the where clause must be enclosed with single quotation marks (' '). true or false?

Answers

The given statement "Character strings and dates in the where clause must be enclosed with single quotation marks" is True because if you do not use single quotation marks, the database engine may misinterpret the character string or date as a column name or produce an error due to incorrect syntax.

When using character strings and dates in the WHERE clause of SQL queries, it is essential to enclose them in single quotation marks (' '). This is because SQL treats these data types differently than numerical values. Enclosing them in single quotation marks ensures that the database engine correctly interprets them as character strings or dates.

Character strings are sequences of characters, such as words or sentences, that must be treated as a single entity. Dates are specific points in time, typically represented in a standard format like "YYYY-MM-DD." Both character strings and dates are non-numeric data types and therefore need to be differentiated from numerical values in the query.

For example, when filtering records based on a character string or a date, the correct syntax would be:

SELECT * FROM tableName WHERE columnName = 'stringValue';

or

SELECT * FROM tableName WHERE columnName = 'YYYY-MM-DD';

If you do not use single quotation marks, the database engine may misinterpret the character string or date as a column name or produce an error due to incorrect syntax. Always enclosing character strings and dates in single quotation marks in the WHERE clause is a crucial step for accurate and error-free SQL queries.

Know more about Single quotation marks here:

https://brainly.com/question/30880638

#SPJ11

you've finished programming the app! Now your company has to decide whether to use an open source
license or proprietary license. explain which one you would choose and why.​

Answers

Answer:

Proprietary License gives you full ownership and trademark/patent opportunites. Open source allows for code donation and a community based development for your app. Generally speaking, if your a private entity creating an app for a client, you'll need the Proprietary Licence, which will allow you to sell the codebase to your client.

If your creating an app for your company as itself, you go either way, sell the license in licensing agreements, or have your companies community contribute and better your app from the inside.

Its entirely based on the agreements you set for the app.

When should else be used in programming?
Group of answer choices

if something should be repeated several times

in a non-conditional statement

to describe what should happen when the condition of an if statement isn’t met

to begin an infinite loop

Answers

Explanation:

The else statement is usually used when computations are still required when a condition is not met in an if and else-if statement, so the correct option is the fourth one: "to describe what should happen when the condition of an if statement isn't met".

Hope this helps :)

Answer:

he is correct

Explanation:

Define a data type and also assign a field name with options in this category in the more fields button drop-down list.

Answers

Quick Start a data type and also assign a field name with options in this category in the more fields button drop-down list.

What is data type and its types?

A data type, in programming, is a classification that specifies which type of value a variable has and what type of mathematical, relational or logical operations can be applied to it without causing an error.

In which object can you rename a field?

Open the table where the field is located in table design view in Access to rename it. then select the field whose name you want to update by clicking into its "Field Name" column. Change the field's name by typing it. Then, to preserve your structural modifications, click the "Save" option in the Quick Access toolbar.

In which situation would you want to define a default value for a field in your table?

The Enter Field Properties dialog box will appear when you click this button in the Properties group on the Table Tools Fields tab.

Learn more about data type

brainly.com/question/14581918

#SPJ4

Enumerate at least 5 furnitures you would add to your house which would be practical and energy-saving.

Answers

Answer:1. Advanced house framing

Advanced house framing, also known as optimum value engineering, is a specific framing technique wherein a house is constructed using less lumber and waste. Advanced house framing saves energy by using less wood and more insulation. According to the U.S. Department of Energy, using advanced framing can lower material costs by $500 to $1,000 for a 1,200- to 2,400-square-foot house. It can also cut labor costs by 3-5% and annual heating and cooling costs by up to 5%.

2. Cool roofs

Cool roofs are designed to reflect sunlight and lower roofing temperatures. Cool roofs are made from a type of reflective material within roofing materials such as tiles, shingles, paint or other substances. This energy-saving technique is ideal for houses in warm climates where air conditioning costs are high all year around.

3. The right exterior doors

Choosing the right exterior door for a home should be a carefully thought-out decision. When you choose a door, you should first consider the doors' energy-performance ratings. This score lets you know how well each door does in preserving the energy in your home by trapping heat or cool air inside. Using this score to help you find the ideal door will also help you narrow down your selection and find an exterior door that best matches your taste, needs and wants.

4. Skylights

Skylights are often a feature that enters homeowners' mind when they think of improving their homes' energy efficiency. Skylights have many benefits, which makes them ideal for any home. Skylights improve houses' heating, lighting and ventilation. It is important to note that if you are considering placing skylights in your home, the U.S. Department of Energy recommends they be no larger than 5% of the floor area in rooms with several windows, and 15% of the floor area in rooms with minimal windows.

5. Window treatments

Boring curtains do more than drive your spouse crazy; they can actually help reduce energy costs in your home. By being specific in your choice of window treatments, you can reduce heat loss or keep cool air inside your home. Many factors determine window treatments' energy efficiency. For example, the type of material and color of the treatment are significant, along with how it opens and closes.

Explanation:

QBasic commands any 10 with examples

Answers

Answer:

I haven't used qbasic in a quarter of a century, so my apologies if any of these are outdated.

I listed 13 here as I don't know what are being qualified as "commands" (I'm sure print is in there, but INT? LEN? these might be interpreted not so much as commands as functions)

PRINT prints text on the screen.

PRINT "How much wood would a woodcuhck chuck?"

INPUT gets text from the user

INPUT woodchuckwood$

INT casts a value as an integer

w = INT(woodchuckwood)

OPEN opens a file for input/output

OPEN "woodchuck.consumption" FOR OUTPUT AS #f

OPEN "woodchuck.consumption" FOR INPUT AS #f

CLS clears the screen

CLS

LOCATE specifies the cursor's location on the screen

LOCATE 10, 10

INKEY$ reads a character from the input buffer

a$ = INKEY$

LEN returns the length of a string

l = LEN(a$)

CHR$ takes an int and returns it's ascii value

$enter = CHR$(13)

ASC() returns the ascii value of a character:

$space = ASC(" ")

DO...LOOP repeats a loop until a condition is met:

x = 0

DO

   x = x + 1

LOOP UNTIL x = 10

SHARED declares global values as being accessible locally

SHARED $username

SHELL executes an os command

SHELL "dir /w"

what is prepositions? explain with the help of an example.​

Answers

Answer:

The definition of a preposition is a word or phrase that connects a noun or pronoun to a verb or adjective in a sentence. An example of preposition is the word "with" in the following; "I'm going with her."

hope this somewhat helped:)

Select the correct answer.
Which feature of project management includes monetary compensation for the employees?
A.
cost management
в.
time management
C.
quality control
D. resource management
E.
identification of scope

Answers

The feature of project management includes monetary compensation for the employees is D. resource management.

What is the  project management?

Resource management in project management involves effectively allocating and managing resources, including human resources (employees), to ensure that project tasks are completed efficiently and on schedule.

This may include assigning roles and responsibilities to team members, coordinating workloads, and managing compensation and benefits for employees. Cost management (A), time management (B), quality control (C), and identification of scope (E) are other important aspects of project management, but they do not directly involve monetary compensation for employees.

Read more about  project management here:

https://brainly.com/question/16927451

#SPJ1

What software maintain and increase the efficiency of a computer system?

Answers

Answer:

Computer maintenance software

Explanation:

Computer maintenance software perform optimization tasks such as the removal of files that are not used in the operation of the system or by the applications in the system such as memory dumps, temporary files, and old log files

Computer maintenance software can also perform cleaning of the registry of the computer such that clutter in the computer registry is removed

what effect does the standby 2 track serial 0/0 25 interface configuration command have? (select two.)

Answers

The standby 2 track serial 0/0 25 interface configuration command has the effect of making Router A the backup router if the Serial 0/0 interface fails. You have two routers, A and B, and they should be setup for gateway redundancy.

What is an interface configuration command?

Interface configuration instructions change how the interface works. A global configuration command that defines the interface type is always followed by an interface configuration command.

To reach interface configuration mode, use the interface interface-id command. The new popup indicates that you are in interface setup mode.

The show interface command displays the interface state of the router. This output includes, among other things, the following: Status of the interface (up/down) The interface's protocol state.

The interfaces configuration file at /etc/network/interfaces may be used to configure the bulk of the network. Here, you may assign an IP address to your network card (or use DHCP), define routing information, create IP masquerading, establish default routes, and much more.

Learn more about Routers:
https://brainly.com/question/13600794
#SPJ1

Which phrase is the best definition of sparklines in Excel 2016?

A. a type of graphic that users can insert into a worksheet
B. a type of mini chart that users can insert into a worksheet
C. a simple image that is displayed in Excel
B. a link to an outside source that is referenced in a worksheet

Answers

Answer:

The correct answer is:

B. a type of mini chart that users can insert into a worksheet

Explanation:

Microsoft excel is a spreadsheet software that is used for calculations and making payrolls.

Excel provides many visual features to display the data in graphical form. One of them is Spark lines.

Spark lines are used to show trends and variations in the collected data. Spark lines are just like mini charts.

So,

From the given options the best option is: B. a type of mini chart that users can insert into a worksheet

Hence,

The correct answer is:

B. a type of mini chart that users can insert into a worksheet

Which of the following is not a key component of a structure?
A. Name
B. Properties
C. Functions
D. Enumerations

Answers

Answer:

D i think

Explanation:

You are testing a printer you just installed, so you use the operator panel on the printer to print a test page. Later, you use the printer properties on your computer to print a test page. Instead of a normal test page, you receive several pages with garbled characters on them. What is the most likely cause of the problem

Answers

Most likely, you have the wrong driver installed.

Learning Task 5. Identify the terms being described below. Write your answer in your answer
sheet.
1. This refers to the collection, transportation, processing or disposal, managing and
monitoring of waste materials.
2. This refers to the hazard control which involves the measure of replacing one hazardous
agent or work process with less dangerous one.
3. A very important method of controlling hazards which involves proper washing of your hair,
skin, body and even your clothes.
4. This refers to the preparedness for the first and immediate response in case of any type of
emergency.
5. This hazard control refers to the removal of a specific hazard or hazardous work process.
6. What is the term used to call the range of concentration over which a flammable vapor
mixed with air will flash or explode if an ignition is present?
7. A cross-disciplinary area concerned with protecting the safety, health and welfare of people
engaged in work or employment.
8. The term used in hazard control which involves changing a piece of machinery or work
process.
9. The term used to call any piece of equipment which is used to protect the different parts of
the body such as ears and eyes such as respirators, face mask, face shield, gloves, boots,
etcetera.
10. This is a form of hazard control which involves manipulation of worker/employee’s schedule
and job rotation.

Answers

Answer:

1. Waste management.

2. Substitution.

3. Personal hygiene practices.

4. Emergency preparedness.

5. Elimination.

6. Flammability limit.

7. Occupational safety and health (OSH).

8. Engineering controls.

9. Personal protective equipment (PPE).

10. Administrative controls.

Explanation:

1. Waste management: this refers to the collection, transportation, processing or disposal, managing and monitoring of waste materials.

2. Substitution: this refers to the hazard control which involves the measure of replacing one hazardous agent or work process with less dangerous one.

3. Personal hygiene practices: a very important method of controlling hazards which involves proper washing of your hair, skin, body and even your clothes.

4. Emergency preparedness: this refers to the preparedness for the first and immediate response in case of any type of emergency.

5. Elimination: this hazard control refers to the removal of a specific hazard or hazardous work process.

6. Flammability limit: is the term used to call the range of concentration over which a flammable vapor mixed with air will flash or explode if an ignition is present.

7. Occupational safety and health (OSH): a cross-disciplinary area concerned with protecting the safety, health and welfare of people engaged in work or employment.

8. Engineering controls: the term used in hazard control which involves changing a piece of machinery or work process.

9. Personal protective equipment (PPE): the term used to call any piece of equipment which is used to protect the different parts of the body such as ears and eyes such as respirators, face mask, face shield, gloves, boots, etcetera.

10. Administrative controls: this is a form of hazard control which involves manipulation of worker/employee’s schedule and job rotation.

what is a problem that occurs when someone registers purposely misspelled variations of well-known domain names?

Answers

Answer:

Typosquatting

Explanation:

if you want to connect to the internet with your phone, you will need a wireless isp.T/F

Answers

If you want to connect to the internet with your phone, you will need a wireless internet service provider (ISP). This statement is True. This is because mobile phones connect to the internet via cellular networks, which are provided by wireless ISPs.

A wireless ISP provides internet connectivity through cellular networks or wireless technologies like Wi-Fi or 4G/5G. These ISPs offer data plans and services specifically designed for mobile devices, enabling users to access the internet on their phones while on the go. Whether you're using mobile data or connecting to a Wi-Fi network, the underlying internet connection is facilitated by the wireless ISP.

They provide the necessary infrastructure and network connectivity to ensure a reliable and seamless internet experience on your phone. Without a wireless ISP, it would be challenging to establish an internet connection on your mobile device unless you have access to other specific networks like satellite internet or wired connections. Therefore, in a general context, above mentioned statement is True.

To learn more about Internet Service Providers (ISP), visit:

https://brainly.com/question/28342757

#SPJ11

PLEASE HELPPP!!! QBASIC WORK!



Write a program that asks a user to input length and breadth of a room in feet. This program displays message ‘Big room’ if the area of the room is more than or equal to 250 sq. ft otherwise it displays ‘Small room’.

Answers

Answer:

INPUT "Input Length: ";LENGTH

INPUT "Input Width: ";WIDTH

AREA = WIDTH*LENGTH

IF AREA >= 250 THEN PRINT "Big room"

IF AREA < 250 THEN PRINT "Small room"

Explanation:

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
WPA Enterprise and WPA2 Enterprise
WEP, WPA Personal, and WPA2 Personal
WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise
WPA Personal and WPA2 Enterprise

Answers

The wireless security method that uses a common shared key configured on the wireless access point and all wireless clients is WEP, WPA Personal, and WPA2 Personal.

The wireless security method that uses a common shared key configured on the wireless access point and all wireless clients is WEP, WPA Personal, and WPA2 Personal.

However, it is important to note that this method is not recommended as it is less secure than WPA Enterprise and WPA2 Enterprise, which use individual unique keys for each wireless client. Therefore, it is recommended to use WPA Enterprise or WPA2 Enterprise for better wireless security. Thus, the wireless security method that uses a common shared key configured on the wireless access point and all wireless clients is WEP, WPA Personal, and WPA2 Personal.

Know more about the  wireless security method

https://brainly.com/question/13058162

#SPJ11

If there is more than one way to solve a problem or code a program, how do you know which way is correct? For example, do you think every student in your class modified the code in the same way?

Answers

If there is more than one way to solve a problem or code a program, the methods to know which way is correct are:

Understand the  two problem.Then Devise a plan to solve it.Then Carry out the plan.Lastly Look back and see which one works.

No, I think every student in my class, student modified the code in the differently.

How does a typical programming challenge start to be solved?

Typically, a problem statement is where a programming challenge is started to be solved. I need to be able to use the green screen technique or whatever else you decide to do to mix a foreground image and a background image. and comes to an end after you have functional code that fixes your issue.

The act of writing computer programs using programming languages is referred to as coding.

Some other ways to deal with code issues are:

Dissect the issue.Create a UML diagram or a flowchart for the current issue.Separate the issue into smaller issues or parts.Address the underlying issues.Call the solutions to each subproblem in the correct order or as necessary to connect them.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

what is a web page and a website​

Answers

Answer:

:)

Explanation:

┬─┬ノ( º _ ºノ) ♪ ♬ ヾ(´︶`♡)ノ ♬ ♪
what is a web page and a website

every complete c++ program must have a

Answers

Every C++ program must have a special function named main.

What is program?

Program is defined as a series of instructions written in a programming language that a computer may follow. Finding a set of instructions that will automate a task's completion on a computer is the goal of programming, which is frequently done to solve a specific problem.

The statements inside of main are executed one after the other when the program is run. A textbfmain function main function is a requirement for all C++ programs. It cannot be skipped because it serves as the program's entry point in C++.

Thus, every C++ program must have a special function named main.

To learn more about program, refer to the link below:

https://brainly.com/question/11023419

#SPJ1

samuel is working on a project within the ubuntu server and would like further details on example. he uses a specific command and receives further dns information on the website. what command(s) did he use to gain the dns information?

Answers

Samuel is working on a project within the Ubuntu server and would like further details on an example. He uses a specific command and receives further DNS information on the website. The command(s) he most likely used to gain the DNS information is "dig" or "nslookup".

To gain DNS information on a website within the Ubuntu server, Samuel likely used the "dig" command. This command is used to perform DNS queries and obtain information about various DNS records associated with a domain name.

These commands are commonly used to query DNS servers for information about host addresses, mail exchanges, nameservers, and related information.To use the "dig" command, Samuel would need to open the terminal on the Ubuntu server and type the command followed by the domain name he wishes to obtain DNS information about. For example, if he wants to obtain DNS information for the website "example.com", he would type the following command:

dig example.comThis command would provide Samuel with various DNS information such as the IP address associated with the domain name, the name servers used by the domain, and any additional DNS records such as MX or TXT records.It's important to note that the "dig" command may not be installed by default on all Ubuntu servers, so Samuel may need to install it before he can use it. He can do this by running the following command:

sudo apt-get install dnsutilsOnce installed, he can use the "dig" command to gain the DNS information he needs for his project.

Know more about the DNS records

https://brainly.com/question/29454775

#SPJ11

In which way is a copper cable related to a wireless transmission

Answers

Answer: whats the answer choices

Explanation:

Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her

Answers

Explanation:

A lot of people with dyslexia can relate to Stephanie.

pls answer i need to turn it in today!!

In computing flowcharts how are decisions represented?

What is the command used most for decisions?

Answers

Answer:

See Explanation

Explanation:

How decisions are represented?

In flowcharts, decisions are represented using diamond shapes (see attachment)

Decisions could be conditional statement or repetition operations which may have the form of loops or iterations.

Either of theses are represented using the diamond shapes.

Take for instance:

To check if a is greater than b... Simply write if a > b i the diamond box

Command used for most decisions

Most decisions are conditional statements; hence, the if command is often used for decisions.

pls answer i need to turn it in today!!In computing flowcharts how are decisions represented?What is

The computer code behind password input can be modified to force people to change their password for security reasons. This is known as “password expiration,” and some websites and companies use it regularly. However, people tend to choose new passwords that are too similar to their old ones, so this practice has not proven to be very effective (Chiasson & van Oorschot, 2015). Your friends have a hard time remembering passwords. What method can you devise for them so that they can remember their new passwords AND make them very different from the old ones?

Answers

Answer:

to remember the passwords you could either make a little rhyme to "help" remember it or you could be like everyone else and write it down on a piece of paper. you could also write the password over and over again to make it stick. a way to make a password different from an old one is to use completely different wording and completely different numbers.

Explanation:

Answer:

B

Explanation:

got it right

Imagine that you were hired to create the label for a new brand of soup. The client wants to emphasize that the soup has homemade flavor. Describe the tools and specific elements that you would use to create this image.

plz help

Answers

Answer:

Explanation:

For tools, I would simply use Adobe Photoshop to create the label/poster for the brand of soup. In order to make the poster or representation of the soup look homemade, I would place a picture of a kid drinking the soup at a kitchen table with a picture of the mom in the background kitchen. Then I would create a light yellowish tint in the image and steam coming from the soup bowl. This would help the brand represent a form of memory to a delicious homemade meal by a parent.

hlo plss help.
.....,, ​

hlo plss help......,,

Answers

Answer:

please sulto garera kichnu hola

Answer:

a) Analog computer

b) Laptop

c) super computer

d) Microcomputer

e) Hybrid computer

f) Digital computer

g) Laptop computer

Please mark me as brainlist

Other Questions
AssessmentYena is 38 years old, has average financial health, an intermediate time horizon, and anaverage risk tolerance. Which asset allocation would you recommend? The distance from Marni's house to her aunt's house is 3,000 miles. If Marni wants to make the trip to her aunt's house in 6 days, how many miles will she have to travel each day? Use mental math to find the answer. Identify the statements that describe Frederick Douglass's critique of slavery. Which of the choices below was NOT an action taken by farmers during the Whiskey Rebellion? A. Farmers refused to pay the whiskey tax.B. They marched in protests.C. They organized and signed petitions.D. They tarred and feathered tax collectors. Mike bought 20 packets of chips for his birthday party.he kept 4 packets with him and distributed the remaining to his friends attending his party. After the party he discovered 3 unopened packets of chips. How many packets of chips has he got? 6 I need steps to know how we did it Describe the impact that Manifest Destiny had on Native Americans. As a DBA, you want to improve efficiency of your database transactions. Which following approach is the most appropriate procedure that allows you to achieve this goal? O Backup O Consistency O Logs O Schedule O Serializability Complete the table of values What is 3/5 divided by -1/5 a researcher assigns participants to either an experimental or a placebo group without informing them. the researcher's students who test the participants are also unaware of the participants' assigned group. in this scenario, the experiment has used a 1+2+3+4 im giving a good amount of point for the answer will mark brainly HELP PLS ASAP I DONT WANT TO FAIL THIS ASSIGMENT XYZ is evaluating a project that would require an initial investment of $67,000 today. The project is expected to produce annual cash flows of $6.300 each year forever with the first annual cash flow expected in 1 year. The NPV of the project 7400. What she IRR of the project? 9.40% (plus or minus 0.02 percentage points) 6. BA? (plus or minus 0.02 percentage points 4.10.57(plus or minus 0.02 percentage points) d. 1100% (plus or minus 0.02 percentage points) e. None of the above is within 0.02 percentage points of the correct ans 7) A complete protein A) contains all 20 amino acids. B) contains all 9 essential amino acids. C) has not been denatured. D) is a polypeptide. Short Answer: Answers should be substantive but no morethan a couple of sentences.Explain why the characteristics of comparability and consistencyare important in financial reporting? What is the answer will rate you 5 stars The weight of turkeys is normally distributed with a mean of 22 pounds and a standard deviation of 5 pounds. a. Find the probability that a randomly selected turkey weighs between 20 and 26 pounds. Your answer is . Round to 3 decimals and keep '0' before the decimal point. b. Find the probability that a randomly selected turkey weighs below 12 pounds. Your answer is . Round to 3 decimals and keep '0' before the decimal point. What are some of the effects of ethical standards within professional associations? 16. Label the following statements as true or false:o Every real number is a rational number.b) Every whole number is an integer.c) Some irrational numbers are integers.d) Some integers are natural numbers.