What kind of data type would a Python programmer assign a variable to indicate a fractional number

Answers

Answer 1

Answer:

Float

Explanation:

I don't know python, but my knowledge and google confirmed that float is the answer you are looking for.

I hope this helped!


Related Questions

select the value of the sum ∑k=−23k2.
a. 3
b. 9
c. 14

Answers

The value of the sum ∑\(k= - 23k2\) is 9 (option b).

The given sum involves the summation of \(k^2\) from\(k=-2\) to \(k=3.\)Evaluating each term of the sum and adding them up, we get

\((-2)^2 + (-1)^2 + 0^2 + 1^2 + 2^2 + 3^2 = 4 + 1 + 0 + 1 + 4 + 9 = 19.\)

Therefore, the value of the sum is \(19/2 = 9.5\). However, since the possible options are integers, we choose the closest integer to 9.5, which is 9 (option b).

In conclusion, the value of the sum ∑\(k= - 23k2\) is 9 (option b). To solve this problem, we simply needed to evaluate each term of the sum and add them up. It is important to pay attention to any restrictions on the possible solutions, such as in this case where the options were integers.

The closest option is 9. Therefore, the correct answer is b.

You can learn more about summation at

https://brainly.com/question/10577562

#SPJ11

PLEASE ASAP!!

Today, most film editors manually cut and splice the actual film footage once it arrives.


O True
O False

Answers

The correct answer should be true, as their job is to *edit* the footage.

Answer:

True

Explanation:

edg2021

The film editor is such an important person on a film that he is often hired before the cast and other crew. This editor is responsible for revising the filmed footage until it becomes the finished film. The editor begins by reading the script to get familiar with the story. It is important for the editor to know the script because film scenes are generally shot and edited out of sequence. When footage begins to come in, the editor reviews the footage and production notes provided by the director and production team. These notes contain details about the footage and the director’s comments about the footage. The editor then uploads or transfers the footage to computers in the editing bay and begins editing the footage into finished scenes. The editing bay is the control room with editing equipment, computers, monitors, and sound system where film editors manipulate plot, sound, graphics, and score to produce a well-constructed scene. This is a painstakingly detailed and time-consuming task

Biyu knows that she spends more time than she should on the computer. Lately, she has been getting a lot of
headaches. She is not sure if there is any connection between this and the time she spends on her laptop. What is
the BEST response to Biyu?
She may be exposed to too much red light from her computer screen.
O
There is a good chance it is eye strain, so she should cut back and see if that helps.
She is definitely injuring herself and should avoid all screens going forward.
Computers do not cause physical health problems, so it is likely something else.

Answers

There is a good chance it is eye strain, so she should cut back and see if that helps.

What is meant by eye ?

The visual system's organs include the eyes. They give living things the ability to see, to take in and process visual information, and to perform a number of photoresponse functions that are not dependent on vision.Light is detected by the eyes, which transform it into neuronal electro-chemical impulses.There are 10 essentially diverse types of eyes with resolving capacity, and 96% of animal species have an intricate optical system.Arthropods, chordates, and molluscs all have image-resolving eyes.The simplest eyes, known as pit eyes, are eye-spots that can be placed inside a pit to lessen the angle at which light enters and influences the eye-spot and to enable the organism to determine the angle of incoming light.

To learn more about eye refer to

https://brainly.com/question/1835237

#SPJ1

What can you add to your presentation from the Insert tab?

Animations
Pictures
Variants
Transitions

Answers

Answer:

B. PICTURES

Explanation:

Answer:

I know its late but pictures is the answer.

Explanation:

I took the test and got it right.

A negatively charged object is located in a region of space where the electric field is uniform and points due north. The object may move a set distance d to the north, east, or south. Rank the three possible movements by the change in electric potential energy (ue) of the object. Rank from greatest increase to decrease in ue. To rank items as equivalent, overlap them.

Answers

Equation: ue = q * E * d, where q is the charge of the object, E is the strength of the electric field, and d is the distance travelled by the object.

Where in a particular area of space is a negatively charged object located?

A negative-charged object is positioned in an area of space where the electric field is directed vertically upward.

Where are the negative charges located?

Subatomic particles can carry an electric charge. In the nucleus of atoms, protons have positive charge and electrons carry negative charge in ordinary matter.

To know more about object visit:-

https://brainly.com/question/14585124

#SPJ4

Which type of digital picture is made by strong individual pixel value

Answers

Answer  :a bitmap because it is a 'map' of where the 'bits' of information are stored

Explanation:

This information is stored as a sequence of numbers defining the colour of each pixel.

Answer:

raster

Explanation:

Raster images, such as digital photographs, store the color value of each individual pixel.

which answer illustrates “compound interest”

Answers

Answer:

d- you earn interest on the money in your savings account. Then you, in addition earn interest on interest

Explanation:

The compound interest means the interest i.e. earned on the money that saved by you and the interest you earned.

Therefore as per the given options, the last option is correct as it represents the interest earned in the saving account plus it earns interest on interest

Hence, all the other options are incorrect

While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for

Answers

Answer:

Record time offsets.

Explanation:

In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.

The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.

Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.

Additionally, the time stamp varies depending on the operating system being used;

- For windows operating system, it uses a 64 bit time stamp.

- For Linux or Unix, it uses a 32 bit time stamp.

A film producer is having difficulty with distribution. After major and minor theaters show no interest in the film, what would the logical next move be for him to take?


release the soundtrack on compact disc

make a sequel

give up

pursue Internet distribution

Answers

Answer:

pursue internet distribution

Explanation:

Answer:

B: pursue internet distribution

Explanation:

edg2021

A film producer is having difficulty with distribution. After major and minor theaters show no interest

By default a word 2k13 document has one _______​

Answers

Answer:

HUHHHHHHHHHHHH??????????

Explanation:

The Normal. dotm template opens whenever you start Microsoft Word, and it includes default styles and customizations that determine the basic look of a document. Note: Any changes that you make to Normal.

Answer:

im sorry wha? Imaoo

Explanation:

Multiple Select
Which of the following statements about localization are true? Select 2 options.
The goal of localization is to create an application or site that looks and feels like it was created for a specific market.
Really the only issue in localization is translating the text into another language.
You should avoid slang and idioms, since they will not be understandable to many audiences.
It is a good idea to use lots of images, since they are easily understood by all cultures.
For consistency, it is a good idea to use dollars as a currency in all versions of an application

Answers

Answer:

A. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

B. Really the only issue in localization is translating the text into another language.

Explanation:

In Computer science, localization can be defined as the process of designing, developing and adaptation of computer software applications or websites for different languages and geographical regions with peculiar differences.

This ultimately implies that, the main purpose for localization of a product such as a website or software application is to ensure they are specialized and specifically suited for a linguistic or geographical region.

The following statements about localization are true;

I. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

II. Really the only issue in localization is translating the text into another language.

Answer:

C. You should avoid slang and idioms since they will not be understandable to many audiences.

A. The goal of localization is to create an application or site that looks and feels like it was created for a specific market.

are the answers

Explanation:

A typical IT infrastructure has seven domains: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain requires proper security controls that must meet the requirements of confidentiality, integrity, and availability.

Question 1

In your opinion, which domain is the most difficult to monitor for malicious activity? Why? and which domain is the most difficult to protect? Why?

Answers

The most difficult domain to monitor for malicious activity in an IT infrastructure is the Remote Access Domain, while the most difficult domain to protect is the System/Application Domain.

The Remote Access Domain is challenging to monitor due to the nature of remote connections. It involves users accessing the network and systems from outside the organization's physical boundaries, often through virtual private networks (VPNs) or other remote access methods.

The distributed nature of remote access makes it harder to track and detect potential malicious activity, as it may originate from various locations and devices. Monitoring user behavior, network traffic, and authentication attempts becomes complex in this domain.

On the other hand, the System/Application Domain is the most challenging to protect. It encompasses the critical systems, applications, and data within the infrastructure. Protecting this domain involves securing sensitive information, implementing access controls, and ensuring the availability and integrity of systems and applications.

The complexity lies in the constant evolution of threats targeting vulnerabilities in applications and the need to balance security measures with usability and functionality.

To learn more about Remote Access Domain, visit:

https://brainly.com/question/14526040

#SPJ11

Marvel Parts, Inc., manufactures auto accessories. One of the company’s products is a set of seat covers that can be adjusted to fit nearly any small car. The company has a standard cost system in use for all of its products. According to the standards that have been set for the seat covers, the factory should work 1,040 hours each month to produce 2,080 sets of covers. The standard costs associated with this level of production are: Total Per Set of Covers Direct materials $ 40,560 $ 19.50 Direct labor $ 7,280 3.50 Variable manufacturing overhead (based on direct labor-hours) $ 4,160 2.00 $ 25.00 During August, the factory worked only 600 direct labor-hours and produced 1,800 sets of covers. The following actual costs were recorded during the month: Total Per Set of Covers Direct materials (5,000 yards) $ 34,200 $ 19.00 Direct labor $ 6,660 3.70 Variable manufacturing overhead $ 4,140 2.30 $ 25.00 At standard, each set of covers should require 2.5 yards of material. All of the materials purchased during the month were used in production. Required: 1. Compute the materials price and quantity variances for August. 2. Compute the labor rate and efficiency variances for August. 3. Compute the variable overhead rate and efficiency variances for August.

Answers

Where the above conditions are given,

Materials Price Variance   -$2,500Materials Quantity Variance   $9,750Labor Rate Variance: $120Labor Efficiency Variance -$1,540Variable Overhead Rate Variance: $180Variable Overhead Efficiency Variance: -$880

What is the explanation for the above?

Materials Price Variance

Actual Quantity Purchased x (Actual Price - Standard Price per Unit)

= 5,000 yards x ($19.00 - $19.50)

= 5,000 yards x (-$0.50)

= -$2,500

Materials Quantity Variance

Standard Price per Unit x (Actual Quantity Used - Standard Quantity Allowed)

= $19.50 x (5,000 yards - (1,800 sets x 2.5 yards/set))

= $19.50 x (5,000 yards - 4,500 yards)

= $19.50 x 500 yards

= $9,750

Labor Rate Variance

Actual Hours Worked x (Actual Rate - Standard Rate per Hour)

= 600 hours x ($3.70 - $3.50)

= 600 hours x $0.20

= $120

Labor Efficiency Variance

Standard Rate per Hour x (Actual Hours Worked - Standard Hours Allowed)

= $3.50 x (600 hours - 1,040 hours)

= $3.50 x (-440 hours)

= -$1,540

Variable Overhead Rate Variance

Actual Hours Worked x (Actual Rate - Standard Rate per Hour)

= 600 hours x ($2.30 - $2.00)

= 600 hours x $0.30

= $180

Variable Overhead Efficiency Variance

Standard Rate per Hour x (Actual Hours Worked - Standard Hours Allowed)

= $2.00 x (600 hours - 1,040 hours)

= $2.00 x (-440 hours)

= -$880

Learn more about variance at:

https://brainly.com/question/25417216

#SPJ4

What is the purpose of the CC option in an email?
A.
Create a carbon copy of the message.
B.
Save the message as a template for future use.
C.
Send a copy of the message to one or more people.
D.
Forward a message to multiple recipients.
( Edmentum MSE )

Answers

Answer:

c

Explanation:

send a copy of the messege

A digital animator produces a model of a person jumping on a trampoline. Which measure is a boundary condition of the model?

the designation of zero potential energy as the height of the trampoline

the height of the first jump that the person makes on the trampoline

the velocity of the person as they fall back to the trampoline

the changes that occur in kinetic and potential energy

Answers

The designation of zero potential energy as the height of the trampoline is a boundary condition of the model.  It involves the minimum potential energy principle.

The minimum potential energy principle is a key concept in different disciplines, including, among others, physics, thermodynamics and chemistry.

This principle states that a structure will deform and/or will change its position to minimize the total potential energy.

The minimum potential energy principle states that the loss of potential energy is due to its dissipation as heat.

Learn more about the potential energy here:

https://brainly.com/question/15126517

use the words from the list to complete the sentences about RAM and ROM..........( ROM, RAM and video cards) _______ are memory chips which run the software currently in use. _______loses its contents when the power is removed. ________stores info which needs to be permanent and does not lose its content when the power is removed​

Answers

Answer:

RAM are memory chips which run the software currently in use.video cards loses its contents when the power is removed. ROM stores info which needs to be permanent and does not lose its content when the power is removed​

Explanation:

write a program to convert Fahrenheit temperature into Celsius​

Answers

Answer:

Explanation:

#include<stdio.h>

#include<conio.h>

int main()

{

float farenhite, celcius;

farenhite = 64;

celcius = ((farenhite - 32)*5)/9;

printf("\n\n temperature in celcius is : %f", celcius);

return 0;

}

How can I crack a computer password?

Answers

Try to use easy passwords first like the persons birthday fav color etc then move on to harder passwords

Consider the following method, which implements a recursive binary search.
/** Returns an index in nums where target appears if target
* appears in nums between nums[lo] and nums[hi], inclusive;
* otherwise, returns -1.
* Precondition: nums is sorted in ascending order.
* lo >= 0, hi < nums.length, nums.length > 0
*/
public static int bSearch(int[] nums, int lo, int hi, int target)
{
if (hi >= lo)
{
int mid = (lo + hi) / 2;
if (nums[mid] == target)
{
return mid;
}
if (nums[mid] > target)
{
return bSearch(nums, lo, mid - 1, target);
}
else
{
return bSearch(nums, mid + 1, hi, target);
}
}
return -1;
}
The following code segment appears in a method in the same class as bSearch.
int target = 3;
int[] nums = {2, 4, 6, 8, 10, 12, 14, 16, 18, 20};
int targetIndex = bSearch(nums, 0, nums.length - 1, target);
How many times will bSearch be called as a result of executing the code segment above?
A. 1
B. 2
C. 3
D. 4
E. 5

Answers

The correct answer to the question is option B.

2.The bSearch method above is a recursive binary search method. It is designed to return the index of a target number, in an array if it exists in the array, or -1 if it doesn't.Precondition: nums is sorted in ascending order. lo >= 0, hi < nums.length, nums.length > 0 So for the code segment: `int target = 3; int[] nums = {2, 4, 6, 8, 10, 12, 14, 16, 18, 20}; int targetIndex = bSearch(nums, 0, nums.length - 1, target);` The first bSearch call is `bSearch(nums, 0, nums.length - 1, target)` which is called once to begin the recursive binary search.  The function void *bsearch(const void *key, const void *base, size_t nitems, size_t size, int (*compar)(const void *, const void *)) of the C library looks for a member that matches the object linked to by key in an array of nitems objects, the initial member of which is pointed to by base. Each array member's size is determined by size.

Know more about recursive binary here:

https://brainly.com/question/31974110

#SPJ11

what is the difference between a database schema and a database state?

Answers

Answer:

A database schema or an intention gives a description of the database. This can be considered as a blueprint of a database, and gives a list of fields in the database with their data types. ... A database state provides the present state of the database and its data.

What is the output of this line of code? print(3**3) A. 6 B. 9 C. 27 D. 3

Answers

Answer:

C. 27

Explanation:

The output of this line of code is :

print(3**3) = 27

The reason for this is that ** is the operator for exponentiation, it raises the number on the left to the power of the number on the right.

So 3**3 means 3 raised to the power of 3 which is equal to 27.

Therefore the output will be C. 27

hw10 q4. what effect will increasing the page size of a virtual memory system likely have on the hit rate of the tlb? state your answer. after two newlines, give your reasoning.

Answers

Increasing the page size of a virtual memory system is likely to have a negative effect on the hit rate of the TLB (Translation Lookaside Buffer).


The TLB is a cache that stores recently accessed page table entries. When a process accesses a virtual address, the TLB is checked to see if the corresponding physical address is already present in the cache. If it is, a TLB hit occurs and the physical address can be accessed quickly. If it is not, a TLB miss occurs and the page table must be consulted, which is a much slower process.

When the page size of a virtual memory system is increased, the size of each page table entry also increases. This means that fewer entries can fit in the TLB, reducing the chance of a TLB hit. As a result, the hit rate of the TLB is likely to decrease when the page size is increased.

Learn more about TLB (Translation Lookaside Buffer):

https://brainly.com/question/13013952

#SPJ11

I have a tech question. I'm not getting emails from someone. I still have a lot of storage on my account. I have tried swapping devices. I have tried logging out and logging back in. I'm not sure what to do.

Answers

Answer:

you have delete your old mails And check out your met connection and also check you didn't block him

Auditing B2B eCommerce Systems You are the audit senior at Perrett & Perrin and are conducting the audit of Deam McKellar Walters (DMW) for the year ended 30 June 2021. DMW is a manufacturer of electric cars parts, supplying all the major car brands. DMW buys and sells parts via a B2B hub, an online marketplace where many businesses use a common technology platform to transact. As per the audit plan, the junior auditor has undertaken tests of controls over the B2B system, selecting a sample of electronic transactions to test whether: i. ii. iii. iv. Access to the hub is restricted to only authorised entities as intended; The security infrastructure includes a firewall to act as a barrier between the private hub and the public internet; Programmed controls ensure the order is 'reasonable'; The method of payment or credit worthiness of the customer has been established. Required: a. For each of the above tests, explain the purpose/objective of the control.

Answers

The purpose of the control of the tests conducted by the junior auditor of Deam McKellar Walters (DMW) for the year ended 30 June 2021 are:Access to the hub is restricted to only authorized entities as intended - This control ensures that only authorized entities have access to the hub as intended. Unauthorized entities should not have access to the B2B system.

The objective/purpose of the control of each of the tests conducted by the junior auditor over the B2B eCommerce System of DMW is as follows:

i. Access to the hub is restricted to only authorized entities as intended:The purpose of this control is to ensure that access to the hub is restricted to only authorized entities so that unauthorized persons do not get access to the hub.ii. The security infrastructure includes a firewall to act as a barrier between the private hub and the public internet:The objective of this control is to secure the hub from being accessed by any third party or any unauthorized person by using a firewall which will act as a barrier between the public internet and the private hub.iii. Programmed controls ensure the order is 'reasonable':The objective of this control is to ensure that there are programmed controls which ensure that the orders that have been placed by the customers are reasonable or not. These programmed controls will check and verify the details of the order placed. If the order seems unreasonable or there are any doubts regarding the order then it will not be processed by the system.iv. The method of payment or credit worthiness of the customer has been established:The objective of this control is to ensure that before processing the orders, the method of payment or the creditworthiness of the customer has been established to avoid any kind of fraud or misrepresentation.

Learn more about auditing at

https://brainly.com/question/32781320

#SPJ11

fill in the blank: documentation is the process of tracking during data cleaning. select all that apply

Answers

Documentation is the process of tracking during data cleaning, deletion, changing, and additions. The correct options are a, b, and d.

What is data documentation?

The practice of recording every element of a project's design, sampling, data gathering, cleaning, and analysis that can have an impact on the outcomes is known as data documentation.

Data documenting is an ongoing activity that takes place as a research project progresses, rather than being a one-time requirement or retrospective task. It will describe how your data was generated, the context in which it was used, the data's structure and contents, and any data manipulations that were carried out.

Therefore, the correct options are a, deletion, b, changing, and d, additions.

To learn more about data documentation, refer to the link:

https://brainly.com/question/2901657

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. deletion.

b. changing.

c. bias

d. additions.

Aside from ms excel, what other spreadsheet programs are used today find out what these are and describe their similarities and differences with excel.

Answers

Answer:

Libre office, Gogle sheet

Explanation:

Spreadsheets programs are immensely useful to organizations as they are used for entering data and making several analytical calculations and

decision. The most popular spreadsheet program is Excel which is from Microsoft. However, other spreadsheet programs have been developed. The most common of those are ;Libre office and Gogle sheets.

Similarities between the programs include :

Most have similar functionality and aim, which is to perform and make analytics easy.

The differences may include ; Microsoft excel is credited to Microsoft corporation and the program which forms part of Microsoft office suite including Word , power point, outlook e. T c. Microsoft excel is this not a free program.

Gogle sheets is from Gogle.

Libre office is open source and hence it is free

Hard disks are permanently sealed inside the hard drive case, along with the ____ and an access mechanism.

Answers

Answer:

Platters.

Explanation:

Hard disks are permanently sealed inside the hard drive case, along with the platters and an access mechanism.

Platters are the circular, rotating disks within a hard drive where the data is stored magnetically. They are typically made of glass, aluminum, or ceramic and are coated with a magnetic material.

Which of the following is NOT a career in the Information Support and Services pathway?

a
Website engineers
b
Technical writers and editors
c
Database administrators
d
Software developers

Answers

Answer:

here yuuuurrrrr Vote for me nah jk

Which of the following is NOT a career in the Information Support and Services pathway? aWebsite engineers

What’s ur guys rank of all 3D Mario games (all of these are great games btw)? These are my opinions I’d rly enjoy hearing yours. I’d say mine is

8. Super Mario 64
(sorry guys just all the bottomless pits were an issue and sometimes I was frustrated like with tryna shoot the cannon getting all those coins in the first level and the little corner parts in front of the pyramid but overall rly important and still fun)
8.5/10

7. Super Mario Sunshine
(it’s like Mario 64 but less frustrating without the bottomless pits and have to start all the way over but still has the issue of having to climb all the way up from high areas but those are the only issues with these two and how they have to )
8.8/10

6. Super Mario 3D Land
(not as mind blowing as 3D World or as big as it but still fun)
9/10

5. Bowsers Fury (actual power ups and it’s one interconnected world with a giant bowser and most of it is platforming challenge after platforming challenge which I like in my 3D Mario games)
9.3

4. Super Mario Odyssey (it’s great and not a lot of bottomless pits but the moons don’t feel super worth because of how many there are sometimes I stumble onto them)
9.5/10

3. Super Mario 3D World (I’ve had it since kindergarten ok? Its basically 3D Land but even better with tons of platforming challenges and even tho the first 6 or 7 worlds are a cakewalk the later parts get harder and harder and it’s super fun with friends)
9.9/10

1 & 2 tie Mario Galaxy 1 & 2 (I’ve had the first since I’ve existed and I recently got the second and I somehow feel so nostalgic towards it even tho I’ve never played it before this year (a lot of games from around 2009-2011 I feel nostolgic for even tho I’ve never played them) these two games are basically perfect with the only bad level being cleaning up trash for that robot but with the gravity mechanics and super fun platforming challenges while also being super original they are going to stand the test of time I’m sure of it)
10/10

Answers

Answer:

super mario galaxy best of all time

Explanation:

Terrance is looking for a storage device to be used for backup storage. The device has to have a large storage capacity and be portable. What is the best device for Terrance's needs?

External hard drive
Disk drive
Hard drive
USB flash drive

Answers

Answer:

its external hard drive  and flash drive

Your welcome

Explanation:

Other Questions
An extraordinary item should be reported separately as a component of incomeA. After cumulative effect of accounting changes and before discontinued operations of a component of a businessB. After discontinued operations of a component of a businessC. After cumulative effect of accounting changes and after discontinued operations of a component of a businessD. Before discontinued operations of a component of a business The proteases involved in initiating and carrying out programmed cell death are called. If the drilling subcontractor plans to dill and anchor hole at 3:00pm today for an anchor that will not be installed tomorrow morning at 7:00 am , the the subcontractor should what do i meed to do. i am starting a becelets business california kari is creating a costume collar for her dog. The dogs neck is 7 inches wide. Approximately how many yards of ribbon will she need to wrap around the dogs neck? Which function transforms the graph of y = x2so that it is first shifted down2 units and is then reflected across the x-axis? what do they mean by why might it be problematic to think of live performance as existing in opposition to recorded media cgi has radically undermined question 13 options: a) the traditional distinctions between realism and formalism. b) the traditional distinctions between realism and classicism. c) the traditional distinctions between formalism and classicism. d) the traditional distinctions between classicism and the avant-garde. g que significa atletismo solve pls brainliest According to the calculator, the monthly payment Demarco and Tanya should anticipate paying for principal and interest is $208. $877. $669. $1,200. Question 3 of 10Which point on the standing wave is the result of the constructiveinterference of two crests?BDA. AO O oB. BC. CD. D Find a vector function, r(t), that represents the curve of intersection of the two surfaces.The cylinderx2 + y2 = 25and the surfacez = xyr(t)=?? which measures can be taken to prevent wrong-site, wrong-client, wrong-procedure surgical errors? select all that apply. 100. In order to produce a magnetic field, an electriccharge must be(1) stationary(2) moving(3) positive(4) negative True or false: to compress files archived with the zip command, you must use an external compression program such as gzip or bzip2 in a pipeline with zip. What is:a panel interviewa group interviewa formal interviewa informal interview 3) Barbara can walk 3,200 meters in 24 minutes. How far can she walk in 3minutes? (journal pg. 49)+320 meters400 meters640 meters720 meters Question 57How do the circulatory system and immunesystem work together to respond to an injury?Increased blood flow allows for anincrease in the exchange of O2 and CO,at the site of the injury.Increased blood flow kills healthy cellswhich prevents infection at the site of theinjuryIncreased blood flow carries white bloodcells to the site of the injury.Increased blood flow removes infectedcells from the body at the site of theinjury. Which is the best way for a small interest group with little money to influence congressional representatives to support their stance on an issue?showing representatives how the groups stance on the issue fits with their partys philosophyproviding representatives on appropriate committees with detailed information about the issuepromising support for the reelection of influential representatives in return for support on the issuedeveloping long-term relationships with representatives who would have the most interest in the issue