Which number system is used to store information digitally in a computer? decimal (base 10) binary (base 2) octal (base 8) hexadecimal (base 16)

Answers

Answer 1

The Binary (base 2) is the system that is used to store information digitally in a computer option (B) binary (base 2) is correct.

What is the binary system?

Bits (binary digits) are used by computers to represent values. Data is stored using the binary number system. The binary number 10110110 is an 8-bit binary number since each digit (0 or 1) is a bit.

The only system that is adaptable enough to allow for the representation of data other than numbers is the binary number system.

A binary code uses a two-symbol system to represent text, computer processor instructions, or any other data.

Thus, the Binary (base 2) is the system that is used to store information digitally in a computer option (B) binary (base 2) is correct.

Learn more about the binary system here:

https://brainly.com/question/18415534

#SPJ4


Related Questions

write steps to convert data into table

Answers

Answer:

write steps to convert data into table

write steps to convert data into table
write steps to convert data into table

one of the most popular uses of automated clearing houses is the

Answers

One of the most popular uses of automated clearing houses (ACH) is the direct deposit of payroll funds to employees' bank accounts.

Direct deposit is an electronic payment option that allows employers to make deposits directly into employees' bank accounts on paydays.However, there are other popular uses of ACH, including direct debit, e-commerce payments, and government payments (such as social security benefits and tax refunds). Additionally, ACH is used for business-to-business transactions, bill payments, and money transfers between individuals.one of the most popular uses of automated clearing houses is the electronic transfer of funds, including direct deposits, bill payments, and electronic fund transfers between bank accounts.

To learn more about  payroll visit: https://brainly.com/question/541599

#SPJ11

What type of animation is used to move objects off of a slide?
A Elaborate
B Emphasis
CEntrance
D Exit

Answers

Answer:

I do not know 100% but i think it is the Exit which is letter D

Explanation:

What does the acronym PECs stand for?

Answers

Answer:

Picture Exchange Communication System

Explanation:

PECS stands for Picture Exchange Communication System

Answer:

Picture Exchange Communication System

Explanation:

there

mark me brainliest pls

A(n) ________ store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

Answers

Answer:

app

Explanation:

An app store allows users to download apps. It can be in the form of a website or an app.

An app store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

What is app store?

App stores are primarily online storefronts where buyers can browse through the many categories of apps, view information about each app including reviews or ratings, and download the app including app purchase, if necessary – many apps are offered at no cost.

For more than 10 years, finding and downloading apps has been made safe and dependable by the App Store. But the App Store is more than just a store; it's a modern destination committed to giving you life-changing experiences.

The Apple Store App essentially serves as a mechanism for in-app purchases of Apple products rather than online ones. Your programs would be downloaded from the app store.

Thus, it is app store.

For more details about app store, click here:

https://brainly.com/question/2814429

#SPJ2

Part 1: Overcoming Challenges In Week 1, you completed the Success Prep Inventory (located in Ch. 2, Section 2.1.2 of your myBook, Powered by zyBooks) in which you were asked, "As you begin at the University of Phoenix, what do you think is your biggest challenge?" Reflect on this challenge and what you have learned over the past 5 weeks. Write a 150-to 200-word response to the following questions: - Explain how this course has helped you with challenges. What actions have you taken during the past 5 weeks to work toward overcoming challenges? What are your plans moving forward? What resources (including University or otherwise) have you used to help overcome challenges? > Part 2: Goal Setting Write a 150-to 200-word response to the following questions: - How does setting goals lead to success? - What are the benefits of both short-and long-term goals? - Think about your long-term goal of graduating. What specific short-term goals do you need to meet to achieve your long-term goal of graduating? Part 3: Time Management When you started this course, what was your initial estimate, in general, for the time required each week to spend on schoolwork? Write a 150-to 200-word response to the following questions: Was your initial estimate of time needed for this course accurate? Why or why not? Discuss the schedule you developed for this course, GEN/201. What worked well with your schedule? Using the content taught in class, what time management skills can you implement to ensure success in future classes? (Be honest about your schedule, noting strengths and areas for growth). Are there areas where you struggled with time management? How do you plan to overcome these challenges? What resources are available to support you? > Part 4: Communication Write a 150-to 200-word response to the following questions: How has this course helped you develop more effective communication skills that you can use in future courses and in the workplace? Provide 2 specific communication methods and academic and workplace examples. Rise to the Top Action Plan Workshe GEN/201 v Which of the 5 steps in the writing process (prewriting, organization, drafting, revising, editing) do y anticipate will be the most challenging for you? What is your action plan for overcoming this challenge? Share a resource from the Center for Writing Excellence that will support you in the writing proces: How do you plan to network both academically and professionally during your degree program? ter your response

Answers

In Part 1, the student reflects on their biggest challenge at the University of Phoenix and how the course has helped them overcome it. They discuss the actions taken in the past 5 weeks, future plans, and resources used to overcome challenges. In Part 2, the focus shifts to goal setting, explaining how it leads to success and the benefits of short- and long-term goals.

The student outlines specific short-term goals needed to achieve their long-term goal of graduating. Part 3 explores time management, discussing the initial estimate of time required for the course, the schedule developed, and time management skills learned in class. The student also identifies areas of struggle and resources to overcome them.

Finally, in Part 4, the student elaborates on how the course has improved their communication skills for academic and workplace scenarios. They mention specific methods and examples. The response also includes the anticipated challenging step in the writing process and a resource from the Center for Writing Excellence to support them. The conclusion addresses academic and professional networking plans.

The student begins by discussing how the course has helped them with challenges and outlines the actions taken to overcome obstacles in Part 1. They mention using resources, including those from the University, to support their progress. Part 2 explores the significance of setting goals for success and discusses the benefits of short- and long-term goals. The student identifies specific short-term goals related to graduating and how they contribute to the long-term goal. Part 3 reflects on the initial estimate of time required for the course and discusses their schedule and time management skills.

The student acknowledges areas of struggle and plans to overcome them while utilizing available resources. In Part 4, the student discusses how the course has enhanced their communication skills with specific examples. They also anticipate challenges in the writing process and propose an action plan to overcome them using resources from the Center for Writing Excellence. The response concludes by emphasizing academic and professional networking plans during the degree program.

Learn more about networking here: https://brainly.com/question/30456221

#SPJ11

When your grounded and the only thing you can get on is a computer........................oh wellllllllllllllllllllllllllllllllllllllll

Answers

Answer:

I feel your pain

i mean u could log into ur snap and ig but i mean sure why not???

which of the following are components of a database system? select all that apply. question 3 options: query processor storage manager output mechanism transaction manager

Answers

The components of a database system are the query processor, storage manager, and transaction manager.

The components of a database system include:

Query processor: The query processor handles the execution of database queries. It parses and interprets queries, optimizes query execution plans, and coordinates the retrieval and manipulation of data.

Storage manager: The storage manager is responsible for managing the storage of data in the database. It handles tasks such as data organization, disk space allocation, and access control. The storage manager interacts with the operating system to read and write data to and from storage devices.

Transaction manager: The transaction manager ensures the ACID properties (Atomicity, Consistency, Isolation, Durability) of database transactions. It manages the execution of transactions, handles concurrency control to ensure data consistency, and ensures the durability of committed transactions.

The output mechanism is not considered a component of the database system as it pertains more to the presentation of query results rather than the core functionality of the database system itself.

To know more about database system, visit:

brainly.com/question/17959855

#SPJ11

Question 2 / 5
Which of the following is a drug?
a.)alcohol
b.)water
c.)tea
d.)coffee

Answers

Answer:

alcohol

Explanation:

Answer:

alcohol

Explanation:

i mean it's self explanatory

-
Which of the following is an example of academic integrity?
A. You work on each assignment mostly by yourself
B. You don't copy work or allow others to copy your work
c. You look up answers on the internet without citing the source
D. You work with close friends on assignments without instructor approval

Answers

Answer:

B. You don't copy work or allow others to copy your work

Explanation:

The example of academic integrity is that you don't copy work or allow others to copy your work. The correct option is B.

What is academic integrity?

The moral code or ethical policy of academics is known as academic integrity. The R.C., regarded as the "grandfather of academic integrity," popularised the phrase.

Being honest, fair, polite, and responsible in your studies and academic work is referred to as having academic integrity.

It entails acting in accordance with these ideals both when producing your own work and engaging with that of others.

Academic integrity is the practise of doing learning, teaching, and research with the principles of honesty, trust, fairness, respect, and responsibility.

Students, teachers, researchers, and all other staff members should act honestly, take responsibility for their choices, and be fair in all aspects of their job.

Thus, the correct option is B.

For more details regarding academic integrity, visit:

https://brainly.com/question/9540934

#SPJ2

can you find an entire non-constant function so. that f only takes values outside the unit circle?

Answers

Answer:

Yes Go into the Unit G-bit section in the Tool window

Explanation:

CYBERSECURITY. ITS THE ONLY ONE I GOT STUCK ON PLS HELP.
Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?

Answers

Answer:  How might these features enhance cybersecurity for Windows users:

1) Boot in safe mode - The safe mode only loads minimal and trusted drivers and services (excluding third-party options) thereby allowing isolation of potential issues, viruses, and trojan malware.

2) Boot from disk - The boot from disk option loads the operating system from a disk image, rather than loading it from the host system. This eliminates the loading of corrupted, infected, or altered boot loader files from a suspect system.

3) Start-up Utility - The startup utility provides the user with direct control over what applications, services, batch files, drivers, and scripts are run during the startup process. This can remove third-party bloatware or malware that can impact system performance or compromise cybersecurity for the user(s) data, access, identity, and applications.

Explanation:

All of these Windows tools enable different options for users to manage, troubleshoot, and protect their systems, data, identity, and applications from cybersecurity breaches, hackers, monitoring, and potential trojan malware. Used in together, they provide a comprehensive set of tools that can protect and disable cybersecurity threats and exploited vulnerabilities.

Please remember to vote this as Brainliest if I earn it!   :)

The termination of devices and fixtures is completed during a construction phase known as:_________

Answers

The termination of devices and fixtures is completed during a construction phase known as Trim-out.

Trim-out typically occurs towards the end of the construction process when the building's structure is complete, and the focus shifts to the installation and finishing of various components, including electrical devices and fixtures.

During this phase, electricians or contractors install and connect the final electrical components, such as outlets, switches, light fixtures, ceiling fans, and other devices that require electrical connections.

The term "trim-out" comes from the idea of adding the finishing touches to a construction project, similar to how trim or molding is added to enhance the appearance of a room or structure.

Learn more about construction phase here:

https://brainly.com/question/31443422

#SPJ4

The network socket programming requires, that the UDP server needed only one socket, whereas the TCP server needed two sockets. Discuss why this condition occurs. If the TCP server were to support n simultancous connections, each from a different client hos, recommend how many sockets would the TCP server need be to use?

Answers

In network socket programming, UDP server required only one socket, whereas the TCP server required two sockets. This occurs because of the following reason:UDP protocol is connectionless and does not require the establishment of a connection between client and server,

whereas TCP is a connection-oriented protocol and requires the establishment of a connection before data transfer. Thus, in the case of UDP, there is no need to create a separate socket to listen to incoming connection requests, but in the case of TCP, a separate socket is needed for listening to incoming connection requests from clients. One socket is used for listening and accepting incoming connection requests, while the other socket is used for data transfer between the client and server.Now, if the TCP server were to support n simultaneous connections, each from a different client host, then the TCP server would need n+1 sockets. This is because the server would require one socket to listen to incoming connection requests from clients, and n sockets would be required to handle data transfer between the server and n clients. Therefore, the total number of sockets needed would be n+1. Note that this is just a theoretical calculation, and in practice, the number of sockets required would depend on the specific application requirements.


Learn more about network socket programming here,
https://brainly.com/question/12972718


#SPJ11

I don't understand how to do these. It's python by the way.

I don't understand how to do these. It's python by the way.
I don't understand how to do these. It's python by the way.

Answers

Answer:

Disclaimer: I dont put the Euler, magic word, and another variables, you need to do this

Explanation:

print(eulersNumber[16])

print(eulersNumber[26])

print(eulersNumber[31])

print(magicWords[:3]+magicWords[8:10])

3° I dont know how i can make this

print(a[::-1])

print(b[::-1])

print(c[::-1])

print(x[::-1])

print(y[::-1])

Have a nice day

Write a Java program which declares and populates an array with some values (at least 5 values). Then it should call a method passing it the array. The method should modify the array values using a loop. Lastly, after the program calls the method, it should display the modified array contents to the console.

Answers

Answer:

CODE IN JAVA :

import java.util.*;

public class Main

{

public static void modifyArray(int[] arr, int n){

for(int i = 0; i < n; i++){

arr[i] = -1; // each value is modified to -1

}

}

public static void main(String[] args) {

int n;

System.out.print("Enter size of array(atleast 5): ");

Scanner sc = new Scanner(System.in);

n = sc.nextInt();

int array[] = new int[n]; // array with size n declared

// populating the array

System.out.print("Enter array elements: ");

for(int i = 0; i < n; i++){

array[i] = sc.nextInt();

}

// modifying array via a function

modifyArray(array, n);

// printing array values after modifiction

System.out.print("Array after modification: ");

for(int i = 0; i < n; i++){

System.out.print(array[i] + " "); // space separated

}

}

}

Explanation:

Nico needs to change the font and color of his worksheet at once. Use the drop-down menu to determine what he should do.

First, he should select all of the worksheet at once by clicking the
.

Then, he should right-click the
to change the font of the whole worksheet at once.

Release the cursor and select the
to change the color of the font.

Release the cursor and both font and color should be changed.

Answers

Answer:

he should click the top left corner of the worksheet

he should right click the font-drop down choices

release the cursor and select the color-drop down choices

Explanation:

I just did this

The things that Nico needs to do include the following:

He should click the top left corner of the worksheet.He should right-click the font-drop down choices.He should release the cursor and select the color.

It should be noted that fonts and colors are used in order to make one's work more pleasing to the eyes. Therefore, the steps that are illustrated above are important for Nico to change the font and color of his worksheet at once.

Read related link on:

https://brainly.com/question/18468837

Julian is looking at an outline in word. Which lines should he look at to see level 1 text
1 The lines farthest to the right
2the lines farthest to the left
3 the top line
4the bottom line

Answers

Note that Julian should look at the lines farthest to the left to see level 1 text in an outline in Word. (Option B)

What is the rationale for the above response?

In MSWord, headings are typically formatted using a hierarchical structure, with the main headings being Level 1 and subsequent subheadings being Level 2, Level 3, and so on.

Headings are formatted hierarchically with the main headings as Level 1, subsequent subheadings as Level 2, and so on. The indentation of the outline on the left margin indicates the heading level, with Level 1 headings typically having no indentation, and thus, the leftmost lines show level 1 text.

Learn more about MSWord:

https://brainly.com/question/28021914

#SPJ1

how can I protect myself online?​

Answers

There are many ways to do it, but the main ones are to keep your personal information off the internet (For instance address, debit cards, social security number, and they won't teach you this in classes, but never take a picture of your keys and post them on the internet)

Linux is a powerful and free OS®️
-True
-False

Answers

Answer:

TRUEE

Explanation:

It’s is true that Linux is powerful and free

In Java I’m having trouble with variables. When I try to call a variable from my while loop it says, “finger cannot be resolved to a variable.” The error is on line 49.

In Java Im having trouble with variables. When I try to call a variable from my while loop it says, finger

Answers

You're declaring variable finger inside your while loop so it only exists inside your while loop. You're then trying to use your finger variable outside your while loop, which is impossible because finger only exists inside your while loop.

Try declaring total at the beginning of your program, adding finger to total before you break from your while loop and then adding randNum to your total at the end.

To better understand why you can't use finger outside your while loop, look up "java scope". This will explain why you can only use variable in the regions they're declared in.

. assume a five-layer networking model. there are 1200 bytes of application data. a 20-byte header is added at the transport layer, a 40-byte header is added at the internet layer and a 14-byte header is added at the data link layer. the data link layer also adds a 10-byte trailer. a. how many total bytes are sent to the physical layer?

Answers

Data size from the application layer plus transport layer header equals the total number of bytes sent to the hardware.

The data that the application wants to convey is located in which tier of the TCP/IP five-layer network model?

The data payload field of the segment contains the information that the application must send. The TCP segment has now been generated and will be transmitted into the IP layer to be encased inside the IP datagram (there are still a lot more fields, but this should be plenty).

What are the five network model layers?

The five-layer networking architecture serves as the foundation for the TCP/IP concept. They are the physical, data link, network, transport, and application layers, arranged from bottom (the link) to top (the user application).

To know more about header visit:-

https://brainly.com/question/13263813

#SPJ4

The ____ command is used to restore the table's contents to their previous values.
a. COMMIT; RESTORE;
b. COMMIT; BACKUP;
c. COMMIT; ROLLBACK;
d. ROLLBACK;

Answers

To return the table's contents to their previous values, use the ROLLBACK command.

How can I get data out of a table in SQL?

To get data out of our tables, utilize the SELECT command in SQL. The output of this command is always a table, which we can use to develop dynamic web pages or desktop apps or to browse with our database client software.

How would the table row "WHERE" be deleted? Which command would be used?

The DELETE command can be used to remove rows from a table. To delete individual rows or all rows from a table, use the DELETE command. Provide the table and an optional search condition (WHERE) that specifies which rows to delete in order to delete rows.

To know more about ROLLBACK command visit:-

https://brainly.com/question/29853510

#SPJ4

What variable/s can you manipulate in the simulation to make all the items get the same proximate values for their acceleration? explain how this idea will work.

Answers

The variable that can be manipulated in the simulation to make all the items get the same proximate values for their acceleration is the final velocity.

What are variables?

The table reveals that their initial velocities are all the same and are all zero. So in order to achieve the same result, the end velocity will need to be changed to approximate acceleration values for them.

Acceleration is the rate at which a speed changes over time, and it occurs when the acceleration is constant or equal to zero, then it is zero. If the last is the values of all the parameters' velocities are extremely near, they will have approximate acceleration values.

Therefore, the variable that can be manipulated is the final velocity.

To learn more about variables, refer to the link:

https://brainly.com/question/19234698

#SPJ1

What variable/s can you manipulate in the simulation to make all the items get the same proximate values

write a class implementing a simplified graph adt that has only the functions relevant to undirected graphs and does not include update functions using the adjacency matrix structure. your class should include a constructor that takes in a file to create two vectors - a collection v of vertex elements and a collection e of pairs of vertex elements - to produce a graph g that these two collections represent.

Answers

Applying our graph ADT using either the adjacency list or adjacency matrix is quite simple. An example of the way the code can be is given by the image attached.

Which structure is used to implement the graph ADT?

An adjacency matrix is a method for showing a graph via the use of a boolean matrix with only 0's and 1's. A finite graph can take the shape of a square matrix on a computer, wherein the boolean value of the matrix signifies the presence of a direct route connecting two vertices.

Therefore, Valuable understandings regarding the structure of the graph and the connections among its vertices can be obtained through manipulations of the adjacent matrix.

Learn more about matrix from

https://brainly.com/question/94574

#SPJ1

write a class implementing a simplified graph adt that has only the functions relevant to undirected
write a class implementing a simplified graph adt that has only the functions relevant to undirected
write a class implementing a simplified graph adt that has only the functions relevant to undirected
write a class implementing a simplified graph adt that has only the functions relevant to undirected

Why should you use a server provider instead of a personal server?

Answers

One should use a service provider rather than a personal server because Dedicated Servers services may provide the power and control you need for network administration while also keeping your network secure and saving you time and money. You may designate servers to accomplish tasks such as maintaining several websites or coordinating all of your company's printing.

What is a dedicated Server?

A dedicated hosting service, also known as a dedicated server or managed hosting service, is a form of Internet hosting in which the client rents a whole server that is not shared with anybody else.

If your website is having difficulty keeping up with increased traffic, it may be time to convert it to a dedicated server. This is essentially a server that exclusively hosts your site, and it may not only increase the speed of your site, but also improve page loading times and help you optimize security.

Learn more servers:
https://brainly.com/question/28320301
#SPJ1

Which visual aid component accompanies a photograph to provide further meaning? a. Scale c. Legend b. Map d. Caption Please select the best answer from the choices provided A B C D.

Answers

The correct answer is d. Caption. A caption is a brief description or explanation that accompanies a photograph to provide additional context, information, or interpretation.

It helps to enhance the understanding and meaning of the photograph for the viewer. a. Scale c. Legend b. Map d. Caption Please select the best answer from the choices provided A B C D.Caption. A caption is a brief description or explanation that accompanies a photograph to provide additional context, information,

learn more about explanation here ;

https://brainly.com/question/29024147

#SPJ11

which of the following is not accomplished using the query tools tab?

Answers

The query tools tab in most software programs is used to create and manipulate queries for databases. The following tasks are commonly accomplished using the query tools tab: creating, modifying, and running queries; filtering data; sorting data; joining tables; and summarizing data.

However, tasks such as designing forms, reports, and macros are not typically accomplished using the query tools tab. These tasks are usually completed using other tabs or menus within the software program.
The Query Tools tab typically provides a set of tools and options for working with queries in a database management system (DBMS). While the specific functionality may vary depending on the software or application being used, one common task that is generally not accomplished using the Query Tools tab is data manipulation or modification.

The Query Tools tab is primarily focused on assisting with query development, execution, and analysis. It may include features such as query builders, SQL editors, query execution options, query performance analysis, and result set manipulation.

On the other hand, tasks related to data manipulation, such as inserting, updating, or deleting records, are typically performed using different tools or interfaces within the DBMS. These tasks are often handled through dedicated forms, data entry screens, or specific data manipulation tools provided by the DBMS.

Learn more about DBMS here: https://brainly.com/question/14806077

#SPJ11

pls help its important ​

pls help its important

Answers

Answer:

I think it's the last one

write a function print multiples(n, m) that will print out the first m multiples of the integer n, one per line. here are some examples: >>> print multiples(2, 10)

Answers

An example of a function in Python code is:

def print_multiples(n, m):

   for i in range(1, m+1):

       print(n * i)

# Example usage

print_multiples(5, 7)

How to write the function?

Here's an example of a Python function print_multiples(n, m) that prints out the first m multiples of the integer n, one per line:

def print_multiples(n, m):

   for i in range(1, m+1):

       print(n * i)

# Example usage

print_multiples(5, 7)

In this function, we use a for loop to iterate m times, starting from 1 and ending at m. For each iteration, we calculate the multiple of n by multiplying n with the loop variable i. Finally, we print the calculated multiple on a new line using the print() function.

When you run the function print_multiples(5, 7), it will print out the first 7 multiples of 5

Learn more about functions at:

https://brainly.com/question/18521637

#SPJ4

Other Questions
What are the men doing? What are the women doing?In the lottery If the measure of angle ACB is 50 degrees, what is the measure of angle AOB Question is in the picture. As the x-value increasesby 2, the y-values increasesby 60. Hait es un pas que encaja en una de las siguientes clasificaciones lingsticas: a. hispanoamericana b. iberoamericana C. latinoamericana d. Ninguna de las anteriores. Write a paragraph to complete a sample expository essay. Then review your paragraph and the essay asa whole and make changes where needed to ensure that the style is appropriately formal. Read the quote and determine whether you agree, then elaborate on what makes an effective writer?All effective writing is rewriting. There are very few geniuses who can transcribe what is in their head directly as a finished copy on the page. Culling, cutting, rethinking, juxtaposing and rearranging are the very basics of writing. - Bryce Courtenay Visual sources should be used within the discussion to reinforce and explain the written information. Is escrow used for recurring or nonrecurring fees? Three ballet dancers are positioned con stage. Alice is straight behind Crter and directly left Becky. If Crter and Alice are 12 feet apart, and Becky and Crter are 20 feet apart, what is the distance between Alice and Becky? If you increase the number of slits in an array (but keep the spacing between adjacent slits the same), what happens to the diffraction pattern?Select all the true statements.1-The number of bright fringes decreases.2-The number of bright fringes increases.3-The width of the bright fringes decreases.4-The distance between the centers of the bright fringes increases.5-The distance between the centers of the bright fringes decreases.6-The width of the bright fringes increases. The party leader who keeps close contact with all members of his or her party and acts as a communications link within the party is known as the party? A wheel rotates through an angle of 15.6 rad as it slows down uniformly from 22.0 rad/s to 13.5 rad/s. What is the magnitude of the angular acceleration of the wheel week 6: value of simulation modeling discuss the following. what are the advantages and limitations of simulation models? include specific comparisons to lp models in your comments. name a place that you can't be there for too long. Which BEST explains how the Land Ordinance of 1785 influenced education? Generate 10,000 Gaussian random numbers with a mean of 80 and stan dard deviation of 23.5. (You'll want to suppress the output so that you don't overwhelm the command window with data.) Use the mean function to a mean of 80. Use the atd function to confirm that your array actually has a mean of 80. Use the atd function to confirm that your standard deviation is actually 23.5 As keisha runs the generator, which best describes what should happen to the needle that measures electric current? it will move to a large positive value and stay there. it will move back and forth between 0 and a large positive value. it will move back and forth between a large positive and a large negative value. it will move to a large negative value and stay there. what maximum power can be generated from an 18 v emf using any combination of a 6.0 resistor and a 9.0 resistor? Help meeeeeeeeeeeeeee pleaseeeeeee!