What features are supported in C++? Select all that apply. a Virtual function b Function overloading c Operator overloading d Virtual operator

Answers

Answer 1

The features supported in C++ include virtual functions, function overloading, and operator overloading. Virtual operators are not supported in C++. Hence, options a,b and c are correct.

C++ is a powerful programming language that supports a wide range of features to help developers write efficient, flexible, and maintainable code. Some of the key features supported in C++ include:

Virtual functions: These are functions that can be overridden by derived classes. When a virtual function is called through a pointer or reference to a base class, the function that is executed is determined by the type of object pointed to or referred to, rather than the type of the pointer or reference itself.

Function overloading: This is a feature that allows multiple functions to have the same name but different parameters. When an overloaded function is called, the compiler determines which function to call based on the number and types of the arguments passed.

Operator overloading: This is a feature that allows operators such as +, -, *, and / to be redefined for user-defined types. This can make it easier to work with custom data types and can help improve the readability of code.

Virtual operators: This feature is not supported in C++. Operators cannot be declared as virtual, but they can be overloaded.

In summary, C++ supports a range of features that can help developers write efficient and maintainable code, including virtual functions, function overloading, and operator overloading. However, virtual operators are not supported in C++.

To know more about function overloading click here:

https://brainly.com/question/13111476

#SPJ11


Related Questions

How do I turn off lanschool student?

Answers

Answer:

First try logging out. If that doesn't work there is a really helpful video on how to uninstall and reinstall with everything still there. Hope this was helpful.

Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. B The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. C The message is transmitted as a single file and received in whole by the recipient’s device.

Answers

Answer:

A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.

Explanation:

Network packets are used to send data across a network. These can be routed in any order independently of one another as they will all eventually reach their destination device.

two main parts of an object-oriented programming language include objects and models. group of answer choices true false

Answers

The statement "two main parts of an object-oriented programming language include objects and models" is true. In object-oriented programming, objects are instances of classes, which are templates for creating objects.

Objects have properties and methods, which are characteristics and actions that the object can perform, respectively. Models, on the other hand, are abstract representations of real-world concepts. In OOP, models are implemented as classes and are used to create objects that have similar properties and methods. Overall, objects and classes are fundamental concepts in OOP, which enable encapsulation, inheritance, polymorphism and other features that are core to the paradigm.

Learn more about programming language: https://brainly.com/question/23959041

#SPJ4

A set of data with a correlation coefficient of -0.855 has a a. moderate negative linear correlation b. strong negative linear correlation c. weak negative linear correlation d. little or no linear correlation

Answers

A set of data with a correlation coefficient of -0.855 has a  weak negative linear correlation.

Thus, A correlation coefficient gauges how closely two variables are related to one another. The Pearson coefficient, which has a range of -1.0 to +1.0, is the correlation coefficient that is most frequently employed.

Two variables that have a positive correlation tend to move in the same direction. Two variables with a negative correlation tend to move in the opposing directions.

While a correlation value of -0.3 or lower shows a very weak association, one of -0.8 or lower suggests a strong negative relationship.

Thus, A set of data with a correlation coefficient of -0.855 has a  weak negative linear correlation.

Learn more about Corelation, refer to the link:

https://brainly.com/question/30116167

#SPJ4

You are the administrator for the ABC Company. You are looking to install Windows Server 2016, and you need to decide which version to install. You need to install a version of Windows that is just for logon authentication and nothing else. You want the most secure option and cost is not an issue. What should you install

Answers

the best door if cost isn’t a issue. I’d get the best one available

We want to implement (write) a class CashRegister. A cash register has a item count, and a total price. Write the instance variables and constructor for the CashRegister class. You only need to write the variables, constructor and constructor contents (body). You do not need to write the class header or other methods. We would need 2 private instance variables for itemCount and totalPrice. Then the constructor would be public and set both instance variables equal to 0 .

Answers

The constructor for the CashRegister class would include initializing the private instance variables itemCount and totalPrice to 0.

What would be included in the constructor for the CashRegister class?

To implement the CashRegister class, we would need to declare two private instance variables: itemCount and totalPrice. These variables would keep track of the number of items and total price of all items in the cash register, respectively.

Next, we would write a public constructor for the CashRegister class. The constructor would initialize the two instance variables to 0. Here is what the constructor would look like:

public CashRegister() {
 itemCount = 0;
 totalPrice = 0.0;
}

In this constructor, we are setting the itemCount variable to 0 and totalPrice variable to 0.0. This ensures that when a new CashRegister object is created, the itemCount and totalPrice variables are set to their initial values.

It is important to note that the header for the CashRegister class and any additional methods have not been included in this answer, as per the instructions. However, they would need to be included in the final implementation of the CashRegister class.

Learn more about constructor

brainly.com/question/31171408

#SPJ11

I need help pleaseeeee!!!

I need help pleaseeeee!!!

Answers

Answer:

True

Explanation:

Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.

Pleaseee mark me as brainliest

Hope this help <3

A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.
a. true
b. false

Answers

Answer:

A threat vector is an item of code on a distributed device that reports the condition of the device to a central server.

a. true

It is true that a threat vector is an item of code on a distributed device that reports the condition of the device to a central server. The correct option is a.

What is a threat vector?

The total number of attack vectors that an attacker can use to manipulate a network or computer system or extract data is referred to as the attack surface.

Threat vector and attack vector are interchangeable terms that describe the various ways a hacker can gain access to data or other confidential information.

The methods used by adversaries to breach or infiltrate your network are referred to as attack vectors.

Malware and ransomware, as well as man-in-the-middle attacks, compromised credentials, and phishing, are all examples of attack vectors.

A threat vector is a piece of code on a distributed device that reports the device's status to a central server.

Thus, the correct option is a.

For more details regarding a threat vector, visit:

https://brainly.com/question/28558110

#SPJ2

Imagine you are an instructor for an online course. A few hours before a test, one student emails you to ask when the test is and how to prepare. How would you help this student? Explain your answer.

Answers

Answer is given below

Explanation:

an instructor for an online course when student emails about exam time its instructor priority to tell as soon as possible tell them test date and time

and if ask for tips for last hour preparation so some advice give them as

First of all, you need to know the minimum basics like what is the name of the subject in the syllabus and how many chapters are there. Start with items that are easy to complete in less time. It boosts your self-confidence and reduces stress. Find the important things that are repeated eleven times in the exam. You can even go through the papers of previous years to find it. When reading a topic, focus 100% with 0% variations. Do not leave unimportant things. At the very least, read it. You do not need to excel in these subjects, but at least you should be able to try those answers. Do not panic before the exam, you may forget the answer in the exam if you are scared. Allocate time for each answer you write. Time management during the exam is also important. Don't forget to revies the keywords in each topic.

Performance on IQ tests have steadily increased over the generations. Please select the best answer from the choices provided T F

Answers

Answer:

True.

Explanation:

Technology can be defined as a branch of knowledge which typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life. Technologies are applied to many fields in the world such as medicine, information technology, cybersecurity, engineering, environmental and other areas of life.

Generally, technology has impacted the world significantly and positively as it has helped to automate processes, increased efficiency and level of output with little or no human effort.

An IQ test is designed mainly to test the intelligence quotient of a student, job applicants or employees working in an organization.

Performance on IQ tests have steadily increased over the generations as people are able to use technology to improve their study and gain access to numerous study resources.

Answer:

True

Explanation:

edge 2023

When a person can present their own ideas without barreling over the other person and their ideas, they are exhibiting

Answers

Answer:

Assertiveness.

Explanation:

Assertiveness can be defined as a social skill and communication style in which an individual expresses his or her feelings, ideas, desires, opinions, needs or even their rights without being disrespectful to the other party.

Basically, an individual who communicates effectively without being aggressive and disrespectful is said to possess an assertive communication skills.

This ultimately implies that, this kind of individual can effectively combine his behavioral, cognitive and emotional traits while communicating with others.

Hence, when a person can present their own ideas without barreling over the other person and their ideas, they are exhibiting assertiveness.

Which of the following statements is not true in reference to resource ownership?
O It is possible to lock out a file or folder by assigning a combination of permissions that permits access to no one at all, including the owner of the file or folder.
O ACLs are composed of ACEs.; Basic permissions are composed of advanced permissions.; All permissions are stored as part of the protected resource.
O Send an email message to an administrator when users exceed their limits. Specify different storage limits for each user.
O mproves data security, granting file and share access only to the users who need it.

Answers

The statement that is not true in reference to resource ownership is: Send an email message to an administrator when users exceed their limits. Specify different storage limits for each user.

Resource ownership is the concept of who has permission to do anything with an asset. It pertains to the rights and control that one has over an asset, as well as the responsibilities that come with ownership. An administrator can assign users storage limits, making it easy for them to identify and take measures against people who exceed those limits.

Storage quotas are an effective technique for dealing with file server storage challenges, and they may help you optimize your resources. Furthermore, storage quotas make it easier for administrators to manage storage on a file server. In addition to resource ownership, there are several other features that come into play when managing storage resources.

These features include file permissions, ACLs, and ACEs. These features improve data security and help administrators grant file and share access only to users who need it.

You can learn more about email messages at: brainly.com/question/32152166

#SPJ11

Complete the sentence about bias and equity.
Biased algorithms may make
decisions that negatively impact the lives of individuals from minority groups.

Answers

The completed sentence is:

Biased algorithms may make erroneous decisions that negatively impact the lives of individuals from minority groups.

What is a Biased Algorithm and how do you prevent one?

Algorithmic bias refers to persistent and recurring flaws in a computer system that result in "unfair" outcomes, such as "privilege" for one category over another in ways that are inconsistent with the algorithm's intended function.

Use the following steps to decrease bias in algorithms:

STEP 1: Algorithms for inventory. Make a list of all the algorithms in use or developed in your business. A steward should be designated to manage and update the inventory.STEP 2: Look for bias in each algorithm.STEP 3: Retrain erroneous algorithms. Improve or stop using biased algorithms.STEP 4: Preventive measures. Create structures and protocols for ongoing bias mitigation and a permanent team to enforce those protocols.

Learn more about Biased Algorithms:
https://brainly.com/question/23282908
#SPJ1

2
ng and Upgrading Computers: Mastery Test
Select the correct answer.
Which of the following can computer maintenance software determine?
O A.
O B.
O C.
O D.
whether your hard drive is about to fail
whether your monitor or screen is drawing too much power
the humidity inside your desktop computer
the amount of dust inside your laptop
Reset
Next

Answers

whether your hard drive is about to fail can computer maintenance software determine.

What is computer maintenance software ?

Software that centralises maintenance data and streamlines maintenance operations is known as a computerised maintenance management system, or CMMS. It aids in maximising the use and accessibility of tangible assets like machines, transportation, communications, plant infrastructures, and other assets. CMMS systems, also known as computerised maintenance management information systems (CMMIS), are used in the manufacturing, energy, transportation, building, and other sectors where physical infrastructure is essential.

A CMMS's database is its fundamental component. The information regarding the assets that a maintenance organisation is responsible for maintaining, as well as the tools, supplies, and other resources needed to do so, are organised using a data model.

Read more about computer maintenance software:

https://brainly.com/question/28561690

#SPJ1

You have a Windows 10 computer at home.
You are concerned about privacy and security while surfing the web, so you decide to block cookies from banner ad companies. However, you still want your computer to accept cookies from legitimate sites, like your bank's website.
In this lab, your task in this lab is to configure the settings in Internet Explorer as follows:
Override automatic cookie handling with the following settings:Always allow first-party cookies.Always block third-party cookies.Accept session cookies.
Configure an exception to allow cookies from mybank.com.

Answers

To configure the settings in Internet Explorer on a Windows 10 computer to enhance privacy and security while surfing the web, you need to override automatic cookie handling and configure an exception for mybank.com.

In order to configure the settings in Internet Explorer on a Windows 10 computer follow these steps:

1. Open Internet Explorer on your Windows 10 computer.
2. Click the gear icon in the upper-right corner to open the settings menu, and then select "Internet options."
3. In the "Internet Options" dialog, click on the "Privacy" tab.
4. Click the "Advanced" button under the "Settings" section to override automatic cookie handling.
5. In the "Advanced Privacy Settings" dialog, check the box next to "Override automatic cookie handling."
6. Set the following options:
  - For "First-party Cookies," select "Accept."
  - For "Third-party Cookies," select "Block."
  - Check the box next to "Always allow session cookies."
7. Click "OK" to save your settings in the "Advanced Privacy Settings" dialog.
8. Back in the "Privacy" tab of the "Internet Options" dialog, click on the "Sites" button.
9. In the "Per Site Privacy Actions" dialog, enter "mybank.com" in the "Address of website" field, and then click "Allow."
10. Click "OK" to close the "Per Site Privacy Actions" dialog.
11. Click "OK" again to close the "Internet Options" dialog and apply your settings.

Now, your Windows 10 computer is configured to always allow first-party cookies, always block third-party cookies, accept session cookies, and specifically allow cookies from mybank.com in Internet Explorer.

To learn more about Windows 10 visit : https://brainly.com/question/29892306

#SPJ11

The algorithm below is used to find the largest element in a list of numbers.
By modifying one of the lines in the program it is possible to make the algorithm find the SMALLEST element. Which line would need to be modified and how?

The algorithm below is used to find the largest element in a list of numbers.By modifying one of the

Answers

The line that can be modified in the algorithm to return the smallest of the list is line 04

From the question, we understand that:

The algorithm returns the largest of all elements in a list

The above action is executed on line 04

To change the function of the algorithm to return the smallest, line 04 must be modified as follows:

IF (num < target)

Hence, the line that can be modified in the algorithm to return the smallest of the list is line 04

Read more about algorithms at:

https://brainly.com/question/24793921

what is system software ? write it's type ?​

Answers

System software is style of software which controls a computer’s internal function, through an operating system
The types are Operating system, Utility software and language processor
System software is software designed to provide a platform for other software. Examples of system software include operating systems like macOS, Linux, Android and Microsoft Windows, computational science software, game engines, search engines, industrial automation, and software as a service applications.

Why is a positive attitude towards work important

Answers

Answer:

it lets you get more work done

Explanation:

when you have a positive work attitude you want to do more stuff, and when it's bad you won't want to do anything

advantages of practicing safety in the information communication technology laboratory​

Answers

Information communication technology (ICT) is a crucial tool to support effective communication and decision-making under complex and uncertain environments of disasters by enhancing cognitive capacity of emergency managers. With the continuous influence and evolution of communication technologies, information sharing and decision-making has drastically changed and affects each phase of emergency management. Researchers continue to investigate the relationship of human involvement for spreading public safety information through ICT. With each disaster holding diverse characteristics influencing prediction, detection, and specific activities required for prevention, mitigation, response and recovery, the need for interoperable and dependable communication infrastructure, a common operating picture, and supportive regulations, policies, and practice greatly increases. Although a national public safety communication system was proposed, there are implementation challenges between local, state, and federal agencies. This paper briefly examines the evolution of the use of ICT for public safety along with current trends, benefits and challenges, and future needs.

Explain the importance of technology in at least 100 words

Answers

Answer:

Technology is the process by which people change the environment to meet their wants and needs. Although technology is not limited to objects, technology includes computers, airplanes, software, stoves, cars, and the like. Technology covers all the infrastructure needed to create, manufacture, operate and repair a technological artifact, from company management and training of engineers to production plants and service stations. The knowledge needed to create and use a technological artifact, such as engineering know-how, production experience and technical skills, are very important and equally important parts of technology.

Technology is a relatively new and diverse concept that is constantly evolving. By the beginning of the 20th century, the term "technology" also included a set of tools, machines, tools and ideas. By the middle of the century, the concept was already defined as "the means and activities by which man shapes and manipulates his living environment".

The creation, production and use of new technological solutions required the creation of large organizations and the creation of complex technological networks. One example is the set of technologies needed for a car - oil refineries, petrol stations, repair shops, tires, car manufacturers, motorways, and so on. The role of the state in shaping technology also increased, through state technology policy and regulatory mechanisms.

which item is developed last in the cyclical process?

Answers

Answer:

Design Process

Explanation:

The multistep process by which designers and engineers design, build, and taste a new product is called the Design Process. There are multiple steps, including exploring, designing, planning, making, testing, and revising.

Answer:

Explanation:

Because of the issues that have been sketched above, a number of other methods of project management have emerged in recent years. These methods are particularly suited for IT-development projects. Examples of these relatively new streams within project management include DSDM, RUP, eXtreme Programming (XP), RAD and agile project management (McConnell, 1996; Kroll, 2004; Chromatic, 2003; Stapleton, 2002, [ii], [iii])

Although the above-mentioned methods of project management differ according to a number of aspects, they are essentially the same. Because the path toward the final goal of IT projects has proved so uncertain, these methods assume that the goal will be achieved in a number of short cycles. This is the background for the term cyclical project management for these methods

T/F if a file with the specified name already exists when the file is opened and the file is opened in 'w' mode, the file will be overwritten.

Answers

Answer:

True

Explanation:

If a file with the same name already exists, its contents are discarded and the file is treated as a new empty file. For example, in the following program, if “test. txt” already exists, its contents are removed and “GeeksforGeeks” is written to it.

Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
ex: if the input is:
2 3 4 8 11 -1
(a negative indicates the end), the output is:
4
the maximum number of inputs for any test case should not exceed 9. if exceeded, output "too many inputs".
hint: first read the data into a vector. then, based on the number of items, find the middle item.
#include
#include // must include vector library to use vectors
using namespace std;
int main() {
/* type your code here. */
return 0;
}

Answers

integer userInput

integer i

integer mid

integer array(20) number

userInput = 1

for i = 0; userInput >= 0; i = i + 1

  if number[i] > -1

     userInput = Get next input

     number[i] = userInput

i = i - 1

mid = i / 2

if i > 9

  Put "Too many inputs" to output

elseif i % 2 == 0

  Put number[mid - 1] to output

else

  Put number[mid] to output

Can someone tell me what’s wrong with this I honestly don’t know (this is in python)



def main():


age = int(input("How old are you?")


if(age == "13")


print("You can watch this movie.")


else:


print("You must be 16 or older to drive.")


main()

Answers

The problem with this code is that there are syntax errors. Firstly, the if statement is missing a closing parenthesis. Secondly, the age variable is an integer but in the if statement, it is being compared to a string "13".


This code checks if the age is greater than or equal to 13, and if it is, the user is allowed to watch the movie. If not, the user is informed that they must be 13 or older to watch the movie. There's a missing parenthesis on the input line. The condition in the 'if' statement should use an integer, not a string. The 'if' statement should have a colon at the end. The 'print' statements should be indented under the 'if' and 'else' statements.

The message in the 'print' statement should match the condition (it says "drive" instead of "watch the movie"). I fixed the issues by adding the missing parenthesis, using an integer instead of a string, adding a colon after the 'if' statement, indenting the 'print' statements, and updating the message in the 'print' statement.

To know more about code visit :

https://brainly.com/question/31228987

#SPJ11

Change the case of letter by​

Answers

Answer:

writing it as a capital or lower case.

Explanation:

T - upper case

t - lower case

not sure if that is what you meant or not

Answer:

Find the "Bloq Mayus" key at the left side of your keyboard and then type

Explanation:

Thats the only purpose of that key

Kindly share your learnings about table etiquette, table setting, and table skirting. Have at least three sentences for your answers.

TLE- 9

Answers

Table etiquette refers to the manners and social customs associated with dining at a table. This includes knowing how to properly use utensils, making polite conversation, and avoiding behaviors such as talking with your mouth full or reaching across the table.

Table setting refers to the arrangement of tableware, utensils, and decor on a table. This includes the placement of plates, glasses, and silverware in the correct order and position, as well as the use of table linens and centerpiece.

Table skirting refers to the covering of the table legs and the lower portion of the table. It is usually used to improve the aesthetics of the table and can be made of different materials such as cotton, polyester or satin. The table skirt is usually placed on top of the table cloth and is secured with clips or pins.

Select the correct answer
Kevin is scanning oild images from his cliene Ibany. He might use these scanned images in the college magazine. He might also use them an
the college website. What is the best practice for Rento failow when scanning the images?

A
scan the images with 72 DPI
B. Scan only the images that are ideal for a website
с. Scan the images with 150 DPI
D. Scan the images with 600 DPI
E. Scan the images that are ideal for a magzine

Answers

Answer:

b

Explanation:

scan the images with 72DPI

of the following potential benefits, which is LEAST likely to be provided by the upgraded system?
A Human representatives will not be needed to respond to some inquiries.
B
The company will be able to provide a human representative for any incoming call.
с
Customers are likely to spend less time listening to information not relevant to their issue.
D
Customers will be unable to mistakenly select the incorrect department for their particular issue.

Answers

Answer:

The company will be able to provide human representative for any incoming call

Explanation:

The upgrade of a system is meant to resolve identified issues in an initial system and given that the available human representative is usually less than the number of incoming call at a given time, due to a constant drive for a larger customer base, we have;

The upgraded system will provide technologies such that human representative will not be required for some inquiries, customers will listen to mainly relevant information with regards to their issues and customers will be properly directed to the correct department that are concerned with their current issue

Therefore, the LEAST likely goal of the upgraded system from among the options and therefore the least likely to be provided by the upgrade is the company will be able to provide human representative for any incoming call

Who is the CEO of Epic Games?​

Answers

Answer:

it's tim sweeney....

Explanation:

hope it helps

Answer:

Tim Sweeney

Explanation:

Which of the following describes a static variable?a)a variable with one copy shared by all class objectsb)a variable whose value may not be changedc)all of the aboved)none of the above

Answers

All of the above. A static variable in programming refers to a variable that is shared among all objects of a class.

It means that there is only one copy of the variable, and any   changes made to it will be reflected across all instances of the class. Therefore, option (a) is correct.

Additionally, a static variable can be assigned a value that remains constant throughout the program's execution. It cannot be modified once initialized, which makes option (b) also correct.

Therefore, both options (a) and (b) are valid descriptions of a static variable, which makes option (c) the correct choice. Option (d), "none of the above," is incorrect in this case.

Learn more about static variable here:

https://brainly.com/question/12948105

#SPJ11

Other Questions
the Special Product Formula for the "square of a sum" is(A + B)2 =So find the following. (Simplify your answer completely.)(6x + 4)2 =The Special Factoring Formula for the "difference of squares" is A2 ? B2 =So 16x2 ? 49 factors asFactor out the common factor. (Factor your answer completely.)4x4 + 36x3 ? 20x2 1.) Which of the following statements BEST summarizes a central idea of the article?(A) King's influence was narrowly focused.(B) King viewed gradual progress as sustainable change.(C) King's words and actions created lasting change in America.(D) King believed violence was a last resort in pursuing social justice.2.) Which of the following sentences from the article would be MOST important to include in a summary of the article?(A) In January 1957, Martin Luther King Jr. and more than 60 ministers and civil rights activists founded theSouthern Christian Leadership Conference (SCLC) to coordinate their civil rights efforts.(B) From his jail cell in Birmingham, King eloquently spelled out his theory of nonviolence: Nonviolent actionseeks to create a crisis, so that a community is forced to confront the issue and deal with it.(C) All over the country people began questioning the South's segregation (or "Jim Crow" laws) and thediscriminatory treatment of African-American citizens.(D) By 1968, King was becoming discouraged at the slow progress of civil rights in America and began totake up other causes as well.3.) Which of the following options BEST represents King's approach toward social justice?(A) authoritativeness and planning(B) collaboration and assertiveness(C) perseverance and peaceful methods(D) in-depth knowledge and negotiation4.) Based on the information in the article, which of the following statements is TRUE?(A) The Montgomery bus boycott launched King's career as an activist.(B) The ability for African-Americans to vote was King's main concern in his efforts.(C) King's training as a minister had little influence on his ideas about social justice.(D) King's philosophy included responding to action rather than instigating action. A football player runs due east for 30 yards then cuts up the field due north for adistance of 35 yards before running into the end zone.What is the total displacement of the football player? Write the expression as a complex number in standard form. (7 21i)/(7i) A stock is currently trading at $50; its annual volatility is 0.40, the risk-free interest rate is 15% per annum with continuous compounding, and t is equal to three months. Use the binomial model to answer the following questions:i. Calculate the price of a 6-month European put option with an exercise price of $105 written on this stock.ii. Calculate the price of a 6-month American put option with an exercise price of $105 written on this stock. Answer this for me ........ Calculate the density of a ball if you know its diameter is 15cm and its weight is approximately 2300 g. describe a possible mechanism that may result in the symptoms associated with dmd 5. correlational data has been found to support the claim that children who watch violent television will be aggressive children and teens. can we conclude that aggressive television viewing causes children to be aggressive. why or why not? How do the narrator's feelings change over the course of this passage? in the context of the rising divorce rates in the united states, spouses report that the divorce rates, around the world, are higher when women are . Why was nationalism so compelling to people in Europe? How can I solve 6+4x3-2 -4x+-3=17what is the answer Plz Help Asap Best Answer Gets Brainliest Why do pandas eat bamboo A convex mirror has a radius of curvature of 20 cm. A candle (4 cm tall) is placed on the axis ofthe mirror at a distance of 30 cm. How tall will the image of the candle appear to be?A. 1 cm and invertedB. 1 cm and uprightC. 4 cm and uprightD. 8 cm and invertedE. 16 cm and uprigh What is the usage of future simple tense with S+V.to be + going to ?*A.To talk about actions that started in the past and continue in the present.B.To show the duration of an action started to happen in the past and is continuing to happen until the present time.C.To talk about the situations in the future that we expect to happen but that are not in our control.D.To talk about the situations in the future after we have decided what to do. when consumers make decisions without much thought or product comparison, they are engaged in . Total surplus increases with the practice of pricediscrimination only if:A.producer surplus increases.B.output increases.C.consumer surplus increases.D.price increases.