What are the values of A[K] and A[K+1] after code correspopnding to the following pseudocode is run?
A[K] = 10;
A[K+1] = 20;
A[K] = A[K+1];
A[K+1 ] = A[K];
Group of answer choices

A. A[K] = 20, A[K + 1] = 20

B. A[K] = 20, A[K + 1] = 10

C. A[K] = 10, A[K + 1] = 20

D. A[K] = 10, A[K + 1] = 10

Answers

Answer 1

Answer:

After running the given pseudocode the values will be:

A. A[K] = 20, A[K + 1] = 20

Explanation:

The given pseudocode appears to be applied on an array.

Let us look at the given pseudocode one by one

A[K] = 10;

This line of code assigns value 10 to the position A[K] in array

A[K+1] = 20;

This line of code assigns value 20 to the position A[K+1]

A[K] = A[K+1];

This line will assign the value at A[K+1] to A[K] which means value 20 will be assigned to A[K]

so after this line A[K] = 20

A[K+1 ] = A[K];

This line will assign the value in A[K] to A[K+1] as A[K+1] has the value 20 currently so

A[K+1] = 20

Hence,

After running the given pseudocode the values will be:

A. A[K] = 20, A[K + 1] = 20

Answer 2

Answer:

After running the given pseudocode the values will be:

A. A[K] = 20, A[K + 1] = 20

Explanation:

The given pseudocode appears to be applied on an array.

Let us look at the given pseudocode one by one

A[K] = 10;

This line of code assigns value 10 to the position A[K] in array

A[K+1] = 20;

This line of code assigns value 20 to the position A[K+1]

A[K] = A[K+1];

This line will assign the value at A[K+1] to A[K] which means value 20 will be assigned to A[K]

so after this line A[K] = 20

A[K+1 ] = A[K];

This line will assign the value in A[K] to A[K+1] as A[K+1] has the value 20 currently so

A[K+1] = 20

Hence,

After running the given pseudocode the values will be:

A. A[K] = 20, A[K + 1] = 20


Related Questions

Which of the following database types would be best suited for storing multimedia? A) SQL DBMS B) Open-source DBMS C) Non-relational DBMS

Answers

The non-relational DBMS would be best suited for storing multimedia.

Storing multimedia, such as images, audio, and video, typically involves handling large volumes of data with complex structures. In this context, non-relational DBMS, also known as NoSQL databases, are often better suited compared to SQL and open-source DBMS.

Non-relational DBMS, unlike SQL DBMS, do not rely on the traditional relational model and provide greater flexibility in managing unstructured and semi-structured data. They are designed to handle the scalability and performance requirements of multimedia applications. NoSQL databases employ various data models, such as document-oriented, key-value, columnar, or graph, which can better accommodate the storage and retrieval needs of multimedia content.

SQL DBMS, on the other hand, are well-suited for structured data and complex query requirements, making them more appropriate for traditional relational data management scenarios. Open-source DBMS refers to the licensing model of the database software and can include both SQL and non-relational databases.

Learn more about DBMS here:

https://brainly.com/question/30637709

#SPJ11

Which of these are prototyping techniques? (Select all that
apply)
SELECT THE CORRECT ANSWER(S)
A. Prototype for empathy
B. User-driven prototype
C. Wizard of Oz
D. Prototype to decide

Answers

These are prototyping techniques is: A. Prototype for empathy, B. User-driven prototype, C. Wizard of Oz, D. Prototype to decide.

Prototyping techniques are methods and tools used to create prototypes in the software development process. Prototypes are important for software developers because they help to identify potential problems early in the development cycle, before the final product is complete.  A. Prototype for empathy: This technique is used to create a prototype that is designed to elicit an emotional response from users. The purpose of this type of prototype is to help developers understand the user's emotional response to the product, which can be useful in refining the design.

B. User-driven prototype: This technique involves creating a prototype that is designed to allow users to interact with the product. The purpose of this type of prototype is to help developers understand how users will interact with the product, which can be useful in refining the design. C. Wizard of Oz: This technique involves creating a prototype that is designed to simulate the product without actually building it. So the answer is A, B, C, D.

Learn more about prototyping techniques: https://brainly.com/question/28338016

#SPJ11

and this please. help me​

and this please. help me

Answers

Answer:

I think its 1 to 4 2 to 3 3 to3 2 to 2 1 to 1

Explanation:

Write a python code using tracy turtle to draw the following shape

Write a python code using tracy turtle to draw the following shape

Answers

Answer:

import turtle

t = turtle.Turtle()

R = 20

N = 8

def rect(x,y,w):

 t.penup()

 t.setpos(x,y)

 t.pendown()

 for _ in range(4):

   t.left(90)

   t.forward(w)

rect(0,0,R*N)

rect(R*N,0,R*N)

rect(0,-R*N,R*N)

rect(R*N,-R*N,R*N)

for x in range(1,N+1):

 t.penup()

 t.setpos(0,-R*x)

 t.pendown()

 t.circle(R*x)

Explanation:

Not a turtle expert, but this seems to do the job.

_____ lay(s) out a framework for the future and provide(s) a blueprint for control

Answers

Strategic planning lay(s) out a framework for the future and provide(s) a blueprint for control. This planning process helps organizations set their goals, priorities, and actions to achieve desired outcomes and sustainable success.

Strategic planning serves as a framework for the future by setting the organization's trajectory and providing a blueprint for control by defining the strategies, tactics, and measures required to steer the organization towards its desired outcomes.

By engaging in strategic planning, organizations assess their current situation, identify opportunities and challenges, and develop a roadmap for success. This roadmap, often referred to as a strategic plan, outlines the organization's vision, mission, values, goals, and objectives.

The strategic plan serves as a guiding document that outlines the steps to be taken, the resources needed, and the timelines for implementation. It provides a clear direction for decision-making and helps establish control mechanisms to monitor progress and make necessary adjustments along the way.

To learn more about blueprint: https://brainly.com/question/4406389

#SPJ11

A declaration for an enumerated type begins with the ________ key word.

Answers

A declaration for an enumerated type begins with  option D: enum key word.

What is the enum key?

The indexed type query operators are used in TypeScript's keyof enum. Enums in TypeScript have different applications, but one frequent one is the use of string enums to denote a collection of static values that the user can choose from. Most likely, we have to define a type whose elements are the member keys using the keyof operator.

Therefore, one can say that an enumerated (unchangeable) type is declared via the enum keyword. An enum is a unique "class" that symbolizes a collection of constants (unchangeable variables, like final variables).

Learn more about declaration from

https://brainly.com/question/28940033
#SPJ1

See full question below

A declaration for an enumerated type begins with this key word.

enumerated

enum type

ENUM

enum

Write a while loop that adds 7 to userin, assigns userin with the sum, and outputs the updated userin, followed by a newline. The loop iterates until userin is greater than or equal to 21 Ex: If input is 11, then the output is 18 25 1 #include 2 using namespace std; 3 4 int main() { 5 6 7 B 9 while() 10 11 12 13 14 15 16) int user In; cin>> userIn; cout << userIn; return 0;

Answers

To write a while loop that adds 7 to userIn, assigns userInwith the sum, and outputs the updated userIn followed by a newline, and iterates until userIn is greater than or equal to 21, you can follow these steps:

1. Include the necessary headers and namespace.
2. Declare and initialize the 'userIn' variable.
3. Write a while loop with a condition that checks if 'userIn' is less than 21.
4. Inside the loop, add 7 to 'userIn', and assign the result back to 'userIn'.
5. Output the updated 'userIn' followed by a newline.
6. End the loop.
7. Return 0 at the end of the 'main' function.

Here's the complete code:

```cpp
#include
using namespace std;

int main() {
   int userIn;
   cin >> userIn;

   while (userIn < 21) {
       userIn += 7;
       cout << userIn << endl;
   }

   return 0;
}
```

For the given example input 11, the output would be:

```
18
25
```

To get a similar answer on while loop :

https://brainly.com/question/30706582

#SPJ11

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

Choose the first programming language for personal computers that was released in the 1970s by Microsoft

Choose the first programming language for personal computers that was released in the 1970s by Microsoft

Answers

Answer:

Altair BASIC programming language

Explanation:

The Altair BASIC programming language was built for the Altair 8800 microcomputer by childhood friends, Bill Gates and Paul Allen in March 1975

The interpreter for the Altair BASIC programming language was developed by Bill Gates while Paul Allen worked on the simulator

The newly developed programming language worked without flaw during the demonstration to Micro Instrumentation and Telemetry Systems, MITS

Microsoft was founded by Bill Gates and Paul Allen on the 4th of April 1975

Answer:

C.) Altair BASIC programming language

Explanation:

What is the gear ratios of a gear train with an input gear of 48 teeth and an output gear of 12?

A. 1:4
B. 1:3
C. 4:1
D. 3:1

Answers

Answer:

D: 4:1

Explanation:

If you divide 48 by 12, you get 4. 12 is 1/4 of 48. Therefore, you keep it at 4:1.

In order to compute the gear ratio, one of two methods can be used: either divide the output speed by the input speed (i=Ws/We) or divide the number of teeth on the driving gear by the number of teeth on the driven gear (i=Ze/Zs). Thus, option C is correct.

What gear ratios of a gear train with an input gear?

The total debt divided by the total shareholders' equity yields the net gearing calculation. The amount of equity that would be needed to pay off all outstanding obligations is shown by the ratio, which is expressed as a percentage.

The speed ratio (also known as velocity ratio) of a gear train is the proportion of the driver's speed to the driven or follower's speed. Train value: The gear train's train value is defined as the difference between the speed of the driver and the speed of the driven or follower.

Therefore, 48 divided by 12 results in 4. 12 is 1/4 of 48. You leave it at 4:1.

Learn more about gear ratios here:

https://brainly.com/question/28883796

#SPJ2

The ALIGN attribute of the P-tag cannot take what value right or left or justify or center?​

Answers

The align attribute of p tag can not take 'much' value

#LETS STUDY

#BRAINLEST LOVE❣️

Complete the sentence.
A _______ error might appear when you are attempting to view a secure web page

Answers

Answer:

An internal server error

Recognizing the trade-off between interesting design features and cost is part of which stage of the product development life cycle?

Answers

Answer: detailed product design

Explanation:

What is digital divide

Answers

Explanation:

A digital divide is any uneven distribution in the access to, use of, or impact of information and communications technologies between any number of distinct groups, which can be defined based on social, geographical, or geopolitical criteria, or otherwise.

what is the degree of multiprogramming for a single-processor system

Answers

The degree of multiprogramming in a single-processor system refers to the number of programs that can be kept in main memory simultaneously. It determines the efficiency and responsiveness of the system by allowing multiple processes to execute concurrently.

The degree of multiprogramming in a single-processor system is a crucial factor in determining the system's efficiency and responsiveness. It represents the number of programs that can reside in main memory concurrently. When multiple programs are present in memory, the processor can switch between them, executing instructions from different programs in a time-shared manner. This allows for better resource utilization and improved system performance.

The degree of multiprogramming depends on several factors, including the available memory capacity, the size of the programs, and the system's scheduling algorithm. If the degree of multiprogramming is low, only a limited number of programs can be loaded into memory, resulting in underutilization of system resources. On the other hand, a higher degree of multiprogramming enables more programs to be present in memory, increasing resource utilization and potentially improving system responsiveness. However, increasing the degree of multiprogramming also comes with its challenges. As more programs compete for system resources, the overhead of context switching between processes and managing memory increases. This can lead to increased response time and potential performance degradation if the system becomes overloaded. In conclusion, the degree of multiprogramming in a single-processor system determines the number of programs that can be concurrently executed in main memory. Finding the optimal degree of multiprogramming requires a balance between resource utilization and system responsiveness, taking into account factors such as available memory, program size, and scheduling algorithms.

Learn more about algorithms here-

https://brainly.com/question/31936515

#SPJ11

The rules that govern the correct order and usage of the elements of a language are called the of the language:.

Answers

The syntax of a language are the rules that govern the correct order and usage of the elements of a language.

What is a programming language?

This is a set of rules that are used to send commands to a computer system as a prompt to have it perform certain tasks.

The syntax of a language are the rules that are used in that particular programming language.

Read more on syntax here: https://brainly.com/question/21926388

G Draw a Finite State Machine for a Moore machine that when fed an arbitrary string of 1's and 0's can detect whether it has encountered the serial input sequence 01110. If and when it does, it should emit a 1 as output and stop. Otherwise, it should emit a 0 and continue processing the input stream

Answers

The FSM consists of five states: Q0, Q1, Q2, Q3, and Q4. The initial state is Q0. Each state represents a specific pattern of input encountered so far.

The transitions between states are labeled with input/output pairs. For example, "1/0" means that upon receiving a 1, the FSM transitions to the next state, while emitting a 0 as output. Similarly, "0/1" means that upon receiving a 0, the FSM transitions to the next state, while emitting a 1 as output. The final state is Q4, which emits a 1 as output and halts the processing upon reaching the input sequence 01110. The Finite State Machine (FSM) diagram provided represents a Moore machine designed to detect the serial input sequence 01110. The FSM has five states: Q0, Q1, Q2, Q3, and Q4. The initial state is Q0, indicating that no input has been processed yet.

Learn more about FSM here: brainly.com/question/29990464

#SPJ11

What are cyber criminals like today?

Answers

Answer:

here's the answer I found

What are cyber criminals like today?

What is the quotient of 13.5÷0.75?

Answers

Answer: 18
Step-by-step explanation: The quotient is the answer to a division problem. If you multiply 0.75 by 18 you get 13.5. Hope this helps!

Name the type of software which provides the user interface. [1 mark

Answers

Explanation:

user interface, also sometimes called a human-computer interface, comprises both hardware and software components. It handles the interaction between the user and the system.

There are different ways of interacting with computer systems which have evolved over the years. There are five main types of user interface:

command line (cli)

graphical user interface (GUI)

menu driven (mdi)

form based (fbi)

natural language (nli)

People can propose and enact state laws by gathering signatures on a petition through?

Answers

people can propose and enact state laws by gathering signatures on a petition through a process known as the initiative or citizen initiative. This process allows citizens to bypass the state legislature and propose new laws or amendments to existing laws directly to the voters.

To initiate this process, a group of individuals or an organization must first draft a proposed law or amendment and then gather a certain number of signatures from registered voters in the state. The number of required signatures varies by state and is usually based on a percentage of the total number of votes cast in the previous statewide election.
Once the required number of signatures is gathered and verified, the proposed law or amendment is placed on the ballot for a vote in the next statewide election. If the majority of voters approve the proposed law or amendment, it becomes law and is added to the state's statutes.
The initiative process is a form of direct democracy that allows citizens to have a greater say in the laws that govern them. However, it can also be a controversial process as it can be used by special interest groups to push their own agendas, and the language of the proposed law or amendment can be confusing or misleading to voters.
In summary, the initiative process allows citizens to propose and enact state laws by gathering signatures on a petition, and is an important tool for promoting citizen participation and engagement in the democratic process.

To know more about petition visit:

brainly.com/question/819792

#SPJ11

Which of these might be an example of an advertiser's target group? A. People who watch a variety of TV shows B. People the advertiser knows nothing about C. People who live in the same region of the country D. People who have no access to media

Answers

An example of an advertiser's target group is: B. People the advertiser knows nothing about.

What is an advertisement?

An advertisement can be defined as a group of consumer promotions programs which is designed and developed with the sole intention of making the various goods or services that are being offered by a business firm to become known, popular and familiar to all of its customers and potential customers.

This ultimately implies that, consumer promotions programs such as online display and television advertisements, can help a business firm in the following positive ways:

To generate store traffic.To enhance brand loyalty.To facilitate and influence the final decision of a customer to purchase an item.

In this context, we can infer and logically deduce that an example of an advertiser's target group is people the advertiser knows nothing about.

Read more on advertisements here: https://brainly.com/question/1658517

#SPJ1

which one would be considered critical information

Answers

Critical information refers to any data, information, or knowledge that is vital to the operation, stability, or success of an organization. It encompasses both sensitive and confidential information.

Critical information may include:Trade secrets - These are proprietary techniques or knowledge that a company uses to create a product or service.Customer information - This data includes personal and financial information about customers that a company must keep secure and private. This information may include names, addresses, social security numbers, or credit card numbers.

Financial data - Financial data includes information such as account balances, credit scores, investment performance, or income reports. Financial data is crucial to the success of a business and must be kept confidential and secure.Intellectual property - Intellectual property refers to any unique creation or invention that is the result of a person's creativity or intellectual effort. Intellectual property may include patents, trademarks, copyrights, or other proprietary data. This information is critical to the success and competitive advantage of a business.

To know more about knowledge visit:

https://brainly.com/question/28025185

#SPJ11

Complete the following sentences by choosing the best answer from the drop-down menus.
A_____ Programming Language is a language that physically runs on the website visitor's own computer.
An example of a programming language that is frequently used to develop websites with existing
databases is______
______is an example of a programming language that is supported in all browsers.
A program that physically runs on the web host's computer is called a____ Programming Language.

Answers

A Client-Side Programming Language is a language that physically runs on the website visitor's own computer.

What is an example of the programming language?

An example of a programming language that is frequently used to develop websites with existing databases is PHP.

JavaScript is an example of a programming language that is supported in all browsers.

A program that physically runs on the web host's computer is called a Server-Side Programming Language.

Read more about programming languages here:

https://brainly.com/question/16936315

#SPJ1

Answer:

Complete the following sentences by choosing the best answer from the drop-down menus.

A

✔ Client Side

Programming Language is a language that physically runs on the website visitor’s own computer.

An example of a programming language that is frequently used to develop websites with existing databases is

✔ PHP

.

✔ JavaScript

is an example of a programming language that is supported in all browsers.

A program that physically runs on the web host’s computer is called a

✔ Server Side

Programming Language.

Explanation:

What tcp/ip layer is also known as the process layer because this is where the protocol stack interfaces with processes on a host machine?

Answers

The protocol stack interacts with host machine processes at the network layer, which is also referred to as the process layer.

What is meant by internet layer?

The IP layer, commonly referred to as the network layer, receives and sends packets for the network. The potent Internet Protocol (IP), the Address Resolution Protocol (ARP), and the Internet Control Message Protocol are all part of this layer (ICMP).

Due to the fact that this is where the protocol stack interacts with host machine programs or processes, the TCP/IP Application layer is often referred to as the Process layer.

Network packets are transported over network boundaries, if necessary, to the target host indicated by an IP address, using a set of internetworking techniques, protocols, and specifications collectively known as the internet layer.

The network layer, commonly referred to as the internet layer, receives and sends packets for the network. It consists of the reliable ARP (Address Resolution Protocol), ICMP (Internet Control Message Protocol), and IP (Internet protocol) protocols.

To learn more about network layer, refer to:

https://brainly.com/question/20162870

#SPJ4

uppose the cache access time is 10ns, main memory access time is 200ns, the hard drive access time is 10ms, the tlb hit rate is 98%, the cache hit rate is 95% and the page fault rate is 0.001%. assuming non-overlapped access, what is the average access time for the processor to access an item

Answers

The average access time for the processor to access an item is 19.5.

What is average access time?

Average access time is defined as a standard statistic for evaluating the performance of computer memory systems. Access time is the amount of time it takes for an electronic system to respond to a request and provide the needed data.

Main memory access time = 200 ns

Cache access time = 10 ns

Hit ratio = 0.95

Average access time

= 0.95 x 10 + ( 1 - 0.95 ) x 200

= 9.5 + 0.05 x 200

= 9.5 + 10

= 19.5

Thus, the average access time for the processor to access an item is 19.5.

To learn more about average access time, refer to the link below:

https://brainly.com/question/14287236

#SPJ1

Which formula calculates the total value of a single row of cells across a range of columns in excel

Answers

The formula which calculates the total value of a single row of cells across a range of columns in Microsoft Excel is: =SUM(C15:Y15).

Microsoft Excel can be defined as a software program (application) that is typically designed and developed by Microsoft Inc., to avail its end users the ability to analyze and visualize spreadsheet documents.

A spreadsheet can be defined as a file or document which comprises cells in a tabulated format (rows and columns), that are typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer systems through the use of Microsoft Excel.

In Microsoft Excel, the SUMIF function is a function which is used to calculate the total value of cells that meet a specific criteria such as:

Text.Dates.Numbers.

Hence, "=SUM(C15:Y15)" is a formula which can be used to calculate the total value of a single row of cells across a range of columns in Microsoft Excel.

Read more: https://brainly.com/question/24249483

what is the checksum of 148​

Answers

Answer:

The summary on the given topic is summarized in the explanation portion below.

Explanation:

A means to ensure that somehow a machine data communication or transfer has no bits missing are termed as Checksum. These would be determined in many extremely difficult directions but there's no response.Whereas if checksum appears unacceptable or inaccurate, the machine is compared mostly with documentation it gets or collects and lends it a position.

Write a program that inputs the length of two pieces of wood in yards and feet (as whole numbers) and prints the total.
MUST BE IN PYTHON

Answers

The program that inputs the length of two pieces of wood in yards and feet (as whole numbers) and prints the total is given below:

The Program

#Getting inputs from the User

feet_1= int(input("Enter the first length in feet: "))

inche_1 = int(input("Enter the first length in inches "))

feet_2 = int(input("Enter the second length in feet: "))

inche_2 = int(input("Enter the second length in inches "))

# Calculations

inches = inche_1 + inche_2

inc_to_ft = inches // 12

rem_from_div = inches % 12

sum_ft = a_ft + b_ft + inc_to_ft

#Printing the final result

print("Feet: {} Inches: {}".format(sum_ft, rem_from_div))

Read more about computer programs here:

https://brainly.com/question/23275071

#SPJ1

How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data on secondary storage. Users can only read and write data on primary storage. The CPU can only read and write data on primary storage. Users can only read and write data on secondary storage.​

Answers

Answer:

i don't know but you can get Socratic  it scan questions and tell answers

Explanation:

Answer:

The CPU can only read and write data on primary storage.

 Users can only read and write data on secondary storage

Explanation:

i got it correct

Other Questions
plssss answer emergency i will mark you as brainlist ............. question is On Thursday afternoon at camp, Sasha played basketball and went swimming before dinner. She started playing basketball at 2:41 P.M. and played for 46 minutes. Then she swam for 1 hour and 54 minutes. Dinner lasted for 1 hour and 19 minutes. What time did dinner end?Include A.M. or P.M. in your answer (for example, 11:58 A.M.). compared to banks, finance companies borrow in [ larger / smaller ] amounts and lend in [ larger / smaller ] amounts 1. A Catalyst speeds up/slows down a chemical reaction.2. An enzyme is a protein/fat/carbohydrate.3. An enzyme is a catalyst for many chemical reactions that take place in cells. True/False?4. Enzymes work by lowering the activation energy needed to start chemical reactions. What is the "activation energy?'5. Lowering the activation energy speeds up/slows down the rate of chemical reactions6. Enzymes can speed up one/many chemical reaction(s).7. The reactions of an enzyme-catalyzed reaction are called.8. What is the "active-site" on any enzyme? hi i have a question about this Cancer susceptibility can run in families due to ________ run like the wind sells ceiling fans. target profit for the year is $470,000. if each fan's contribution margin is $32 and fixed costs total $222,640, the number of fans required to meet the company's goal is What is Half of 3/4 pounds of chocolate chip cookies Label the steps of the water cycle below(HELP PLEASE) Which religion is based on the Quran?OA. BuddhismO B. HinduismO c. IslamO D. Judaism If a criminal defendant enters a plea of no lo contendere, what have they done?O a. pled not guilty by reason of insanityO b. pled guiltyO c. chosen not to contest the charges against themO d. pled not guilty BRAINLIEST FOR THE FIRST CORRECT ANSWER!! im revising for a test and my teacher gave me some questions to do but i dont understand them. could you pls help me out in which phase transition the entropy will increase? group of answer choices condensation freezing all mentioned processes sublimation deposition 6. Which market structure gives more consumer surplus, Cournot (simultaneous) or Stackelberg (sequential)? Explain your answer. 10 points Solve for c=5 5/6 times 2 According to reservation records at the hybrid motel/hotel chain Mo'Hotel, 36% of reservations include special requests about room selection, check-in times, or other issues. Let the random variable, x, represent the number of sleeping room reservations that include a special request. The collection is all 2500 sleeping room reservations made last week. #7: When a random sample of 25 such reservations are selected, what is the chance that at least ten (10) but no more than twelve (12) included special requests? For this problem, carry at least four digits after the decimal in your calculations. Answers may vary slightly due to rounding Case studies showed that out of 10,579 convicts who escaped from certain Identify 3 resources, two exports, and one job you would have if you lived in the New England colonies What is the capital of India? Which sentence correctly uses a semicolon?A. He had an extensive collection of foreign stamps he even had one;from Antarctica.AB. He had an extensive collection of foreign stamps he even; had onefrom Antarctica.C. He had an extensive collection; of foreign stamps he even had onefrom Antarctica.D. He had an extensive collection of foreign stamps; he even had onefrom Antarctica. Pleaseeee help I dont know the answer