When declaring an array, you want to use a ____ to specify the number of elements the array can hold

Answers

Answer 1

When declaring an array, you want to use a size to specify the number of elements the array can hold.

In computer programming, an array is a collection of data items having the same data type stored in contiguous memory locations and identified by a common name. The syntax for declaring an array is in the following manner: datatype arrayName[elements] where datatype specifies the type of data being held in the array, and elements specify the number of elements in the array. For instance, if you want to store five integers in an array, you may declare it in the following manner: int myArray[5] Arrays are 0-indexed, which means that the first element of an array is accessed using the index 0, the second element using the index 1, and so on.

Learn more about array:

brainly.com/question/29989214

#SPJ11


Related Questions

. What is the annual cost if Lightning uses the current network
(with warehouses specialized as in Table optionally to meet
European demand?
2. Should Simone make all warehouses flexible given the add

Answers

To calculate the annual cost if Lightning uses the current network with warehouses specialized as mentioned in the table to meet European demand, specific cost information and calculations are required. As for Simone making all warehouses flexible, a detailed analysis considering various factors such as demand variability, cost implications, and operational efficiency is necessary to make an informed decision.

To determine the annual cost if Lightning uses the current network with specialized warehouses, it is essential to have detailed cost information, including factors such as warehouse operating costs, transportation costs, inventory holding costs, and any other relevant expenses. Without specific cost data, it is not possible to provide an accurate calculation of the annual cost.

Regarding the decision of making all warehouses flexible, Simone needs to consider various factors. Flexibility in warehouses allows for better responsiveness to demand variability and market changes. However, making all warehouses flexible incurs additional costs in terms of facility modifications, equipment upgrades, and potentially increased operating expenses.

Simone should conduct a thorough analysis considering the level of demand variability across different regions, the cost implications of making warehouses flexible, the potential benefits in terms of improved customer service and operational efficiency, and the overall strategic goals of the company. By evaluating these factors, Simone can make an informed decision on whether to make all warehouses flexible or adopt a more targeted approach based on demand patterns and market dynamics.

Learn more about  information here: https://brainly.com/question/31713424

#SPJ11

Write a program that outputs a subtraction practice problem for a student, outputting the larger random number
first and the smaller random number second.

this is in C++ and i cant figure it out

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

#include <time.h>

int main(void)

{

   srand(time(NULL));

   int num1, num2;

   int val;

   while (true)

   {

       num1 = rand() % 100 + 1; //Random number between 1-100

       num2 = rand() % 100 + 1; //Random number between 1-100

       if (num1 >= num2)

       {

           printf("%d - %d = ", num1, num2);

           scanf("%d",&val);

           if (val == num1-num2)

           {

               printf("Correct!\n");

           }

           else

           {

               printf("Incorrect!\n");

           }    

       }

       else

       {

           printf("%d - %d = ", num2, num1);

           scanf("%d",&val);

           if (val == num2-num1)

           {

               printf("Correct!\n");

           }

           else

           {

               printf("Incorrect!\n");

           }

       }    

   }

}

Explanation:

First, we create two random numbers and save the values.  Then we check to see which value is larger.  Based on that, we change how we display the format to the user.  Then we check to see if the user input number is equivalent to the subtraction problem.  If it is, we display Correct!  Else, we display Incorrect!

Cheers.

which statement is true about hyperlink fields? (1 point) you can edit a hyperlink value in design view. hyperlinks cannot launch excel spreadsheets or word documents. hyperlinks cannot be used to launch webpages. you can edit a hyperlink value in datasheet view.

Answers

The statement "you can edit a hyperlink value in datasheet view" is true about hyperlink fields.

Hyperlink fields in a database table store links to external resources, such as web pages, documents, or files. The link is represented as a clickable text in the field, and when the user clicks on the hyperlink, the associated resource is opened in the default program or browser. In Access, hyperlink fields can be edited in both Design and Datasheet views. In Design view, the field properties allow you to set various hyperlink options, such as the display text, address, and screen tip. In Datasheet view, you can edit the hyperlink value directly by clicking on the field and typing in the new link. Hyperlink fields are not limited to launching web pages and can also launch other file types, such as Word documents and Excel spreadsheets, as long as the appropriate program is installed on the user's computer.

To know more about hyperlink field,

https://brainly.com/question/30012385

#SPJ11

which data mining process/methodology is thought to be the most comprehensive, according to kdnuggets rankings?

Answers

CRISP-DM methodology is thought to be the most comprehensive, according to kdnuggets rankings.

What is data mining?Analyzing a vast amount of data to find patterns and trends is known as data mining.Businesses can utilize data mining for a variety of purposes, such as figuring out what products or services their customers are interested in purchasing, as well as for fraud and spam filtering.Based on the information users supply or request, data mining systems analyze patterns and connections in data.In order to make money, social media corporations utilize data mining techniques to commodify their users.Since consumers frequently are not aware that data mining is taking place with their personal information, especially when it is used to influence preferences, this use of data mining has come under fire recently.

To learn more about data mining, refer to

https://brainly.com/question/2596411

#SPJ4

to help ensure that an html document renders well in many different web browsers

Answers

Answer:

Doctype Declaration

Explanation:

In order to make sure that it renders correctly in a wide range of browsers, a Doctype Declaration needs to be added to the top of the HTML code. This declaration basically makes sure that the web browser knows how the code was written so that it can correctly read it. This is used because many web browsers use different default settings for reading code and can sometimes not display code that was not designed specifically for that web browser unless otherwise specified.

Answer:

I think it is:

B. a doctype declaration

Explanation:

Write an OCaml function
digitsOfInt : int -> int list
such that digitsOfInt n returns [] if n is less than zero, and returns the list of digits of n in the order in which they appear in n.
In [ ]:
let rec digitsOfInt n = (* YOUR CODE HERE *)
In [ ]:
assert (digitsOfInt 3124 = [3;1;2;4]);
assert (digitsOfInt 352663 = [3;5;2;6;6;3]);
Consider the process of taking a number, adding its digits, then adding the digits of the number derived from it, etc., until the remaining number has only one digit. The number of additions required to obtain a single digit from a number n is called the additive persistence of n, and the digit obtained is called the digital root of n. For example, the sequence obtained from the starting number 9876 is 9876, 30, 3, so 9876 has an additive persistence of 2 and a digital root of 3.
Write two OCaml functions:
additivePersistence : int -> int
digitalRoot : int -> int
that take positive integer arguments n and return respectively the additive persistence and the digital root of n.
In [ ]:
let additivePersistence n =
(* YOUR CODE HERE *)
let digitalRoot n =
(* YOUR CODE HERE *)
In [ ]:
assert (additivePersistence 9876 = 2);
assert (digitalRoot 9876 = 3);

Answers

In Ocaml, Hence, a value representing a function is called a function. (fun x -> x Plus 1);; -: int -> int = "fun" is another name for this. OCaml. Let plusone x equal x plus one; var plusone: int to int = "fun".

Ocaml is it only functional?

The phrase "largely pure" refers to the fact that ML-derived dialects like OCaml allow adverse effects through the use of references and arrays. Yet, because functional languages promote this way of thinking, the majority of the code you create will be "pure functional".

What function () serves what function?

A function is, to put it simply, a "chunk" or code that you may reuse rather than manually typing it out numerous times. With functions, programmers can break a problem down into smaller, less manageable sections, all of which can complete a particular task.

To know more about var visit:

https://brainly.com/question/16990125

#SPJ4

chad has written the majority of his code in scratch and is ready to start thinking of test cases to make sure that his program functions properly, and when issues arise, fix them. chad is also going to show his program to his classmate and ask for any feedback or changes he could add to make his program better. this process is known as what?

Answers

The process is known as Iterative Development Process.

What is the meaning of Iterative process?

A project, product, or initiative is built, improved, and refined through the iterative process. The iterative development method calls for teams to produce, test, and rewrite until they are happy with the final product. An iterative approach can be compared to a trial-and-error methodology that advances your project toward its eventual goal.

Iterative processes are a key component of agile project management and lean techniques, although they may be used by any team, not only those that use agile approaches. You will make adjustments to your design, product, or project over the course of the iterative process until you and your team are happy with the project's final deliverable.

To learn more about iterative process, use the link given
https://brainly.com/question/26995556
#SPJ1

true or false. deepfakes are mirror websites that are stored in the deep web.

Answers

Answer:

False. Deepfakes are not websites stored in the deep web. They are videos that have been manipulated using artificial intelligence (AI)

Deepfakes are not mirror websites that are stored in the deep web. Therefore, the given statement is false.

What are deep fakes?

Deepfakes are manipulated videos or images that use artificial intelligence to create realistic depictions of people doing or saying things that they never actually did. The term "deep fake" is a combination of "deep learning" and "fake".

Deepfakes are created using deep learning algorithms and machine learning techniques, which are trained on large datasets of images and videos. The algorithms can then generate new images or videos that appear to be realistic and convincing, even though they are not real. Deepfakes can be used for a variety of purposes, some of which are harmless, such as creating realistic special effects in movies or video games.

Thus, they do not mirror websites and are not stored on the deep web. Instead, deep fakes are created using algorithms and machine learning techniques that analyze and manipulate existing video or image footage to create a new, manipulated version. Hence, the given statement is false.

Learn more about deep fakes, here:

https://brainly.com/question/30309447

#SPJ2

Why should even small-sized companies be vigilant about security?

Answers

Answer:businesses   systems and data are constantly in danger from hackers,malware,rogue employees, system failure and much more

Explanation:

hackers are everywhere

lincoln is a network security specialist. he is updating the password policy for his company's computing infrastructure. his primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. what does he do?

Answers

Lincoln will lower the password expiration time in his company's password policy to reduce the likelihood of an attacker being able to compromise and use a password before it expires.

As a network security specialist, Lincoln's primary method of improving password policy is to lower the chance that an attacker can compromise and use the password before it expires. He may do this by implementing a password rotation policy, requiring users to change their passwords on a regular basis. He may also enforce stronger password requirements, such as a minimum length, and complexity, and avoid the use of common words or phrases. Another approach may be to enable two-factor authentication, which requires users to provide a secondary method of identification in addition to their password. By implementing these policies, Lincoln can help reduce the likelihood of a successful password attack, improving the overall security of the company's computing infrastructure.

learn more about network security here:

brainly.com/question/14407522

#SPJ4

In combination, the powerful tools that systems analysts use to provide a framework for rapid, efficient software development, is called a ____ environment.

Answers

Answer:

4GL is the answer

hope this is what ur looking for...

sales management at ursa major solar wants to allow users create new account records with pre populated values.which feature should administrator

Answers

Question:  sales management at ursa major solar wants to allow users create new account records with pre populated values.which feature should administrator

Answer:  Sales representatives at Universal containers often schedule in

person meetings at customer offices. Management wants to track   activities for this meeting category to clearly display customer office meetings in the account , contact or opportunitity page  layouts, as well as adding this data to reports.

Explanation:

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

What is row and column? class 9

Develop a​ lot-for-lot solution and calculate total relevant
costs for the gross requirements in the following​ table*.

Answers

I have developed a lot-for-lot solution and calculated the total relevant costs for the gross requirements provided in the table. The lot-for-lot solution aims to minimize inventory costs by producing or ordering exactly the required quantity for each period.

A lot-for-lot solution involves producing or ordering the exact quantity required to meet the demand in each period. In this case, we will calculate the total relevant costs based on the gross requirements provided in the table. To calculate the total relevant costs, we multiply the quantity required in each period by the cost per unit. This gives us the cost for each period. Then, we sum up the costs for all periods to obtain the total relevant costs.

The lot-for-lot solution helps minimize inventory holding costs by avoiding excess inventory. It ensures that each period's demand is met precisely without any surplus or shortage. By producing or ordering only what is needed, we can optimize costs and improve efficiency in the supply chain. Once we have calculated the total relevant costs using the lot-for-lot solution, we can compare it with alternative solutions to determine the most cost-effective approach. This analysis allows us to make informed decisions regarding production or procurement strategies that will minimize costs and meet the demand efficiently.

Learn more about  production here: https://brainly.com/question/29304354

#SPJ11

Design thinking is another name for agile manifesto?
True or False?

Answers

Design thinking IS indeed another name for agile manifesto

Select the correct text in the passage.
Which three phrases describe a wireframe?

Tracy uses a (pictorial summary of an entire website) in her team meeting. It is a (two-dimensional illustration) of how (each web page on a website will look.) Known as a workflow diagram, this (explains how pages in a website connect to one another.) It is a (design tool), and it (shows the overall framework of a website.) It is a (visual representation of how much space each element on a page should take.)

Answers

Answer:

A B D

Explanation:

What keyword can we use within a form to pass it as an argument to a JavaScript snippet? A. form B. onSubmit C. send D. this

Answers

Answer:

the answer is: this

Explanation:

trust me

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

given the following c program and the mapping of registers to variables, complete the mips implementation of main. do not implement return 0; in main(). int dif(int a, int b){ return a - b; } int sum(int a, int b){ return a b; } int main(){ int x, y; w

Answers

The given C program defines two functions, `dif` and `sum`, and an incomplete `main` function. The task is to complete the MIPS implementation of `main` by considering the provided mapping of registers to variables.

What is the task in completing the MIPS implementation of the given C program's main function?

The given C program defines two functions, `dif` and `sum`, and an incomplete `main` function. The task is to complete the MIPS implementation of `main` by considering the provided mapping of registers to variables.

To complete the MIPS implementation of `main`, you need to determine the values of `x` and `y`, and then call the `sum` and `dif` functions using the appropriate arguments.

Since the variable mappings are not provided in the question, it is not possible to provide an exact MIPS implementation.

The implementation would require assigning specific register numbers to the variables `x` and `y`, loading their values into the respective registers, and then using those registers as arguments in the function calls to `sum` and `dif`.

Without the specific variable mappings, it is not possible to provide a complete MIPS implementation.

Learn more about C program

brainly.com/question/30905580

#SPJ11

what does the binary odometer show about representing large numbers​

Answers

Answer and Explanation:

The binary odometer represents the large number to judge that what happened when there is a large number that gets too large

Here we visit the level 2 of the binary odometer widget in the chapter of Code studio

This represents a widget that reproduced an odometer of a car in which the tracking of a device could be known that how much far the car is driven with respect to the miles or kilometers

An odometer, also known as an odograph measures the distance that a vehicle (including bicycles, and cars) has travelled

What the binary odometer shows about representing large numbers is that more a number larger than the number displayable will cause it to roll-over overflow error and therefore, a new system will be required

A binary odometer is an odometer based on the binary number system of 1s and 0s

When the values represented by the binary odometer is very large such that the value exceeds the largest number it can display, such as having all 1s, the odometer rolls-over, and restarts with a 1 at the right while the rest digits are 0s, that is the odometer rolls over

Therefore, representing large numbers requires more resources such as new odometer that can show large numbers

Learn more about binary odometer here:

https://brainly.com/question/4922102

if a process step has a large setup time and a small pure-processing time per unit, what batch size will result in the fastest throughput time for any one unit through this step? assume there are multiple resources at this step, each with plenty of capacity.

Answers

Using the smallest batch size possible would result in the quickest throughput time for any one unit through the process step. The amount of time needed to set up each unit will be reduced as a result.

Impact of batch size on throughput?

On test hardware that can handle more inference work in parallel, larger batch sizes (8, 16, 32, 64, or 128) can lead to higher throughput. However, the latency may increase as a result of the higher throughput.

Describe Unit?

A single, indivisible entity is referred to as a unit in many different professions. A unit is the accepted unit of measurement in mathematics, such as a metre for length or a kilogramme for mass.

To know more about unit visit:-

https://brainly.com/question/29775379

#SPJ4

An octet is equal to ____________________ bits, which equals one byte.

Answers

An octet is equal to Eight bits, or one byte, make up an octet. bits, which equals one byte.

In computing, an octet is a group of 8 bits that can stand in for a character or a number. An octet is made up of eight bits, each of which can only be either 0 or 1. Data is frequently represented in binary form in computers, which substitutes a base-2 number system for the base-10 number system commonly used in daily life. Digital information is measured in bytes, which are made up of eight bits. File sizes, storage capacities, and data transfer rates are all measured in bytes. A set of eight bits is referred to as a "octet" in networking and telecommunications.

learn more about octet here:

https://brainly.com/question/30908473

#SPJ11

Which of the following can be used to connect securely to a remote computer? (Choose all that apply) .An SSH client .A VPN connection .A dynamic-link library .An SSD client

Answers

An SSH client and a VPN connection can be used to connect securely to a remote computer making it a secure way to connect to a remote computer.

An SSH client is a software program that uses the Secure Shell protocol to securely access a remote computer. This protocol encrypts data transmitted between the client and server, ensuring that your connection remains private and secure.

A VPN (Virtual Private Network) connection allows you to create a secure connection to a remote computer over the internet. It encrypts your data and hides your IP address, making it more difficult for third parties to intercept or monitor your online activities.
To know more about connection visit:

https://brainly.com/question/28337373

#SPJ11

Which search mode behaves differently depending on the type of search being run?
(A) Fast
(B) variable
(C) Smart
(D) Verbose

Answers

The search mode that behaves differently based on the type of search is option (C) Smart.

Which search mode behaves differently depending on the type of search being run?

The search mode that behaves differently depending on the type of search being run is option (C) Smart.

Smart search mode is designed to adapt its behavior based on the type of search query or context.

It uses various algorithms and techniques to provide more relevant and tailored search results. For example, in a text search, it may prioritize keyword matching and relevancy, while in a file search, it may consider file attributes and metadata.

Smart search mode aims to enhance the search experience by dynamically adjusting its algorithms and strategies to improve the accuracy and efficiency of the search results based on the specific search context.

Learn more about mode

brainly.com/question/28566521

#SPJ11

The library is purchasing Argus TL2530P All-In-One Thin clients. What does it mean that the thin clients are 802.3at compliant?

Answers

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

Learn more about server on:

https://brainly.com/question/29888289

#SPJ1

why is technology bad for you

Answers

Answer: Constant device use might strain your eyes. It can cause a headache, focus issues, itching, blurred or double vision, and light sensitivity. This is one of the main arguments against technology that we may make.

Explanation:

In a computer network, a _____ is an expansion card located within the system unit that connects the computer to a network.

Answers

Answer:

Explanation:

Technically, a NIC is a physical card that connects to an expansion slot in a computer. Many computers and wireless devices now include an integrated networking component called a network adapter. This may be an Ethernet controller and port attached to the edge of a motherboard or a small wireless networking chip located on the motherboard.

what entry would you type in your crontab file to schedule a job to run the script located at /home/agreen57/script.name at 5pm every monday?

Answers

A cron schedule that is frequently used is cron job every monday. Because cron cannot notify you if your jobs fail or never start, we developed Cronitor.

On Unix-like operating systems, a task scheduler is the Cron command-line program. It typically automates system maintenance or administration, though its general-purpose nature makes it useful for things like periodically downloading files from the Internet and email. Users who set up and maintain software environments use cron to schedule jobs (commands or shell scripts), also known as cron jobs, to run at fixed times, dates, or intervals .

Cron works well for scheduling routine chores. The associated at utility can be used to schedule one-time tasks.

The name Cron comes from the Greek word chronos, which means time.

To know more about cron click here:

https://brainly.com/question/27185401

#SPJ4

Why do companies collect information about consumers? A. Because they want to meet new friends on social networks B. Because they take consumers' best interests to heart C. Because they want to effectively advertise to consumers D. Because they are looking for good employees to hire​

Answers

Answer:

C. Because they want to effectively advertise to consumers.

Explanation:

Companies collect info for more accurate advertisements, which are designed to make people interact with them more commonly.

What is the difference between operating systems and application software?
* Application software translates itself into language for the BIOS, whereas operating systems are what users
interact with
Application software is what the user interacts with, and operating systems are what translate application
software.
Application software is located within the hardware, and operating systems are what the user interacts with.
Application software is located within the hardware, and operating systems are what translate application
software for the BIOS.

Answers

Answer:

Application software is what the user interacts with, and operating systems are what translate application software

Explanation:

The difference between the operating system and the software is that the application system has user interaction and the operating system has a translate application. Hence option B is correct.

Waht is a opering system  ?

An operating system is software that manages the computer hardware and software resources and also provides the services to the computer program. The operating system works on the basis of time-sharing and schedules the tasks for efficient allocation of time.

The application software is based on the application that is developed by the company such as Microsoft or adobe.

Find out more information about the operating system.

brainly.com/question/1763761

Other Questions
what does is to the mean in anatomy ethod of reporting cash flows from operating activities begins with net income and works backward to derive cash from operating activities. Help Me Please Will Mark Brainliest Write of a double spaced page about your experience in FIVE this year. In order to see the dna molecules, __________ is added to the gel which fluoresces under uv light. A home improvement retailer reports fencing to be sold to customers as ______, while an industrial company reports fencing around its facility as ______. ANOTHER ONE!!! WHOEVER SLOVES THIS IS A LIFESAVER lucian is a recent college graduate and is relatively new at your firm. he has been asked to write a report on a customer site visit for his supervisor, and he is unclear as to what should be included in the report and the appropriate style of writing. he asks you for help. Manjiro is very courageous in the story and becomes a hero. this is shown in the story when he what do I know before the start of this module? Question 5 of 11Write an equation of the form y = mx for the line shown below.(-3,6)(-2,4)Answer hereI5SUBMIT Question 2 (28 points): Production and Costs A company called EasySoft operates in the software industry. The software production function is given by q=K41L41, where K indicates the number of machines and L is the labor used. Capital and labor can be acquired in competitive markets at unit cost v and w, respectively. (a) (7 points) Sketch two representative isoquants for this production function. Analyze the elasticity of substitution between capital and labor. Would the elasticity of substitution for this technology be higher or lower compared to that of the production technology given by q=min{K,L} ? (b) (7 points) Analye the production function q=K41L41. Solve the cost-minimization problem. Derive contingent demands for labor and capital as functions of costs of labor and capital and target level of output. Derive the total cost function C(v,w,q). (c) (7 points) Now assume that the target level of output is 2, w=4 and v=1. Fllustrate the solution of the cost-minimization problem in the (L,K)-diagram. Clearly indicate the isoquant and the relevant level curve of the cost function. (d) (7 points) Describe at least two main properties of cost functions. Do they hold for the cost function derived in (b). Explain your conchusions. HELP HELP HELP EXTRA POINTS What was the Supreme Courts decision regarding Indian Removal? How did Jackson respond to this ruling? what is the y intercept and slope of this equation (will mark brainliest!!) Fill in the blanks with the correct forms of the present progressive to complete the following sentence. Tito y Ramn (poner) _________ ________________________ la mesa. Hello people ~The sides of a triangle are 5, 12 & 13 units. Check if it has a right angle or not. "The workers brought their concerns tobut their boss seemed uninterested."Fill in the blank with the correct pronoun.A)heB)himC)theirD)them Evaluate the following argument.If you text while driving, then you're going to have an accident. You don't text while driving. So, you're not going to have an accident.Select one:a. Inductive, validb. Inductive, strongc. Deductive, valid d. Inductive, weake. Deductive, invalid Which of the following is true of Spain's explorations of the New World?a. Members of the Spanish parties suffered greatly from disease.b. Florida was the first region in the present-day continental United States that Spain colonized.c. Spain's explorations had no impact on the size of the Native American population.d. Individual conquistadores always traveled alone.e. Spain sought to forestall Portuguese incursions into the New World. Which expression are equivalent to 8-4(-x+5)