which of these is an example of input?

Answers

Answer 1

Answer:

It's A.

Explanation: When you plug in headphones you are imputing them into your device.


Related Questions

Question 3 A tree could be considered a data structure. O True False Question 8 Given the set S - (0.1.2.3.4.5.6.7.8.9.10.11.12,13,14,15). what is IPIS)? None of these O 65536 O 16 O 256 Given the relation R = f(a.a) (b,b).c.c).(b.d).(c.bl. we would say that Ris None of these symmetric reflexive anti-symmetric O transitive anti-reflexive

Answers

The answers to the questions are as follows: Question 3: True. Question 8: None of these. Question 9: None of these

For question 3, a tree can indeed be considered a data structure. Trees are hierarchical structures that store and organize data in a specific way.

For question 8, the set S is given as (0,1,2,3,4,5,6,7,8,9,10,11,12,13,14,15). However, the meaning of "IPIS" is not provided in the question, and therefore the correct answer cannot be determined.

For question 9, the relation R is given as f(a.a) (b,b).c.c).(b.d).(c.bl. However, it is unclear what the notation represents, and the nature of the relation cannot be determined. Therefore, the correct answer is "None of these."

Learn more about trees as data structures here: brainly.com/question/31967071

#SPJ11

discuss how each of the following constructs is used in sql, and discuss the various options for each construct. specify what each construct is useful for a. nested queries b. joined tables and outer joins c. aggregate functions and grouping d. triggers e. assertions and how they differ from triggers f. the sql with clause g. sql case construct h. views and their updatability i. schema change commands

Answers

This can be used to generate different outputs based on user input, or to perform calculations on data.

What are Views and Their Updatability ?

Virtual tables called views are created using the information in one or more tables. They are employed to offer a personalized picture of the data and to make complicated searches simpler. Views cannot be updated, therefore modifications made to the view do not affect the underlying tables.

What are Schema Change Commands ?

To change a database's structure, use the schema change commands. Tables, columns, and other objects can be added or removed using these instructions. They can also be used to modify already-existing objects, for as by adding constraints or changing a column's data type.

To learn more about schema change commands visit:

https://brainly.com/question/13014061

#SPJ4

State Whether the given statement are TRUE OR FALSE. 13X1=13

23] The result of any condition is true ,false or unknown.

24] The WHILE and UNTIL can be placed at the end of DO….LOOP.

25] When a program contains a loop , it means it can repeat statements only

once.

26] The first version of visual basic was VB. Net

`27] The name of the form 1 dialog box which appears by default can be

changed .

28] The Error window opens when there are some coding mistakes.

29] E.F Codd proposed the first type of relational database model.

30] there is a way to rename the tables in Access.

31] One row will have one unit of complete information .

32] The text can be only numerical

33] currencies cannot be stored in Access

34] A number of list items go within the <ul> tags give right​

Answers

Answer:

true

Explanation:

because everyone know that 13x1=13

Let's say you own an online T-shirt store. You offer three sizes (small, medium and large) and 10 different colors. Customers can choose what images to print on their T-shirts from a database of 200 pictures. You want to employ a push/pull combined supply chain model. What would be your answers to the following questions? 1. Where shall be the push/pull boundary (.e., decoupling point) on your supply chain? Why? (6 points) 2. Discuss the benefit of employing a push/pull combined supply chain model for your online T-shirt store. Would it be better than a push or a pure pull model for your business? Why?

Answers

1. The push/pull boundary, or decoupling point, in the supply chain of an online T-shirt store can be strategically placed at the customization stage.

In this case, the push side of the boundary would include the production and stocking of blank T-shirts in various sizes and colors, while the pull side would involve the customization process where customers select the image to be printed on their chosen T-shirt.

The decoupling point at the customization stage makes sense because it allows for greater flexibility and responsiveness to customer demands. By keeping blank T-shirts in stock without customization, the store can respond quickly to customer orders and reduce lead times. The customization process, which involves printing the selected image on the T-shirt, can be initiated only after receiving the customer's specific request. This approach reduces inventory holding costs for customized T-shirts and enables the store to meet individual customer preferences.

2. Employing a push/pull combined supply chain model offers several benefits for an online T-shirt store:

a. Flexibility and customization: The push side of the supply chain allows the store to maintain a stock of blank T-shirts in various sizes and colors, providing a range of options for customers. The pull side enables customers to personalize their T-shirts by selecting images from a database. This customization capability enhances customer satisfaction and creates a unique selling proposition for the store.

b. Reduced inventory and cost efficiency: By keeping blank T-shirts as the inventory, the store can minimize the risk of carrying excess stock of customized T-shirts, which may become obsolete if customer demand changes. This approach helps in reducing inventory holding costs and improving cost efficiency.

c. Faster response times: With the decoupling point placed at the customization stage, the store can quickly respond to customer orders. The push side ensures that the store has a ready inventory of blank T-shirts, while the pull side initiates customization only after the customer's order is received. This reduces lead times and allows for faster order processing and delivery.

d. Improved customer satisfaction: The combined push/pull model allows customers to have a wide selection of T-shirt sizes, colors, and image choices. It provides a personalized and unique experience, enhancing customer satisfaction and loyalty.

Compared to a pure push model, where pre-customized T-shirts are stocked in anticipation of demand, the push/pull model offers greater flexibility and reduces the risk of carrying excess inventory. Similarly, compared to a pure pull model, where T-shirts are only produced after receiving customer orders, the push/pull model enables faster response times and a wider range of options for customers.

In summary, employing a push/pull combined supply chain model is beneficial for an online T-shirt store as it allows for customization, reduces inventory holding costs, improves response times, and enhances customer satisfaction. It provides a balance between flexibility and cost efficiency, making it a suitable choice for such a business.

Learn more about customization stage here:

https://brainly.com/question/30547901

#SPJ11

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
A. Boot the computer from the Windows installation disc and run Startup Repair.
B.Boot the computer from the Windows installation disc and perform a clean installation of Windows.
C.Boot the computer from the Windows installation disc and run Reset this PC.
D.Boot the computer from the Windows installation disc and run System Restore.

Answers

Answer:

C.Boot the computer from the Windows installation disc and run Reset this PC

Hold down the shift key continuously until the Advanced Recovery Options menu appears. To troubleshoot, click. Click Reset this PC after that. Choose whether to perform a clean install and remove everything, or to keep your files. Thus, option C is correct.

What Windows installation disc and run Reset this PC?

From the menu, choose Settings > Update & Security > Recovery. The title of the page should say “Reset this PC.” Next, click Get Started. Choose between removing everything or keeping my files.

In Windows 10, launch the Settings window by clicking the Start menu, then selecting the gear icon in the lower left corner. Another choice from the list of apps is the Settings app. Click Update & Security > Recovery in Settings, then decide Get started under reboot this PC.

Therefore, Boot the computer from the Windows installation disc and run Reset this PC.

Learn more about Windows installation here:

https://brainly.com/question/24282472

#SPJ5

owen works in a real-estate office. A contract needs to be signed but the client is out of town. What should Owen do?

Answers

Owen should either mail it to the client and have it expedited or get consent to have the form signed in the clients name

what advantages do the client-server architecture have over the peer-to-peer architecture? each correct answer represents a complete solution. choose all that apply.

Answers

The advantages that  the client-server architecture have over peer-to-peer is option D. All of the above

A. Easier maintenance

B. Greater organization

C. Tighter security

What is the client-server architecture?

Client-server architecture has the advantage of easier maintenance because there is a central point of control, rather than having to manage each individual computer as with peer-to-peer. It also offers greater organization because data and resources are centralized and more easily managed.

Additionally, client-server architecture offers tighter security compared to peer-to-peer, as the server can act as a gatekeeper for accessing sensitive information.

Learn more about client-server architecture form

https://brainly.com/question/21755186

#SPJ1

See full question below

What advantages does the client-server architecture have over peer-to-peer?

A. Easier maintenance

B. Greater organization

C. Tighter security

D. All of the above

Write a function analyze_text that receives a string as input. Your function should count the number of alphabetic characters (a through z, or A through Z) in the text and also keep track of how many are the letter 'e' (upper or lowercase). Your function should return an analysis of the text in the form of a string phrased exactly like this: "The text contains 240 alphabetic characters, of which 105 (43.75%) are ‘e’."


Using function

Answers

Answer:

def analyze_text(sentence):

   count = 0

   e_count = 0

   for s in sentence:

       s = s.lower()

       if s.isalpha():

           count += 1

       if s == "e":

           e_count += 1

   return "The text contains " + str(count) + " alphabetic characters, of which " + str(e_count) + " (" + str(e_count*100/count) + "%) are ‘e’."

Explanation:

Create a function called analyze_text takes a string, sentence

Initialize the count and e_count variables as 0

Create a for loop that iterates through the sentence

Inside the loop, convert all letters to lowercase using lower() function. Check each character. If a character is a letter, increment the count by 1. If a character is "e", increment the e_count by 1.

Return the count and e_count in required format

what are the benefits of studying biomes in your locality?​

Answers

Answer:

Because we share the world with many other species of plants and animals, we must consider the consequences of our actions. Over the past several decades, increasing human activity has rapidly destroyed or polluted many ecological habitats throughout the world. It is important to preserve all types of biomes as each houses many unique forms of life. However, the continued heavy exploitation of certain biomes, such as the forest and aquatic, may have more severe implications.

What does DOS stand for?

Answers

Answer:

Disk Operating System

Explanation:

"DOS is a platform-independent acronym for Disk Operating System which later became a common shorthand for disk-based operating systems on IBM PC compatibles."

how does a router use frames to route data through a network?

Answers

The router checks the MAC address in the frame, replaces the MAC address of the source with its own MAC address, and sends it to the proper host.

We have to give that,

To find the way to a router use frames to route data through a network.

Now, We know that,

A router uses frames to route data through a network in the following way:

The router receives an incoming frame containing data from a source device.

The router examines the destination MAC address in the frame header to determine the intended recipient of the data.

If the destination MAC address is known to the router, the router forwards the frame directly to the recipient.

If the destination MAC address is not known to the router, the router uses a process called Address Resolution Protocol (ARP) to find the MAC address of the intended recipient.

Once the router has determined the MAC address of the recipient, it forwards the frame to the appropriate interface that leads toward the recipient.

If there are multiple possible paths to the recipient, the router uses a routing algorithm to determine the best path based on factors such as network congestion, bandwidth, and other factors.

Finally, the router encapsulates the data into a new frame with a new MAC address that corresponds to the next hop on the path to the recipient and forwards the frame to the next router or the final recipient.

This process is repeated at each router along the way until the data reaches its final destination.

To learn more about routers visit:

https://brainly.com/question/28180161

#SPJ4

What is the File Transfer Protocol (FTP)?

Answers

The File Transfer Protocol (FTP) is a standard network protocol used for transferring files from one computer to another over a TCP/IP network, such as the internet.

What is network protocol?

Network protocol is a set of rules and regulations that governs communication between two or more computing devices over a computer network, allowing them to exchange data.

It is used for uploading and downloading files, as well as for managing files on remote computers. FTP uses a client-server architecture, where an FTP client is used to establish a connection to an FTP server. Once connected, users can upload, download, delete, or modify files on the remote computer.

To learn more about network protocol

https://brainly.com/question/28811877

#SPJ4

Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ____________________ time or a_____________________ or both depending on the degree and the frequency of the infraction, and the age of the perpetrator.

Answers

Answer:

1) Imprisonment

2) Fine

Explanation:

By the 2013 Mississippi Code, on Cybercrimes and Identity Theft, it is against the law to make use of electronic mail or other forma of electronic communication to engage in cyber bullying, which involves the use of threatening language of inflicting arm or with an aim to extort money from another person

The punishment for cyber bullying, includes imprisonment time or a fine or both.

Therefore, for the question, we have; Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur imprisonment time or a fine or both depending on the degree and the frequency of the infraction, and the age of the perpetrator.

please answer quick :(​

please answer quick :(

Answers

Answer:

1<2 or 15<6 is true

2<4 and 7< 3 is false

not(7>2) is false

True - false - false

Help don't know answer

Help don't know answer

Answers

Your answer is C, performance.

Write an algorithm and draw flowchart to print 30 terms in the following sequence
1,-2,3,-4,5,-6,7,-8,...........................up to 30 terms.

Answers

Answer:

/*

I don't know what language you're using, so I'll write it in javascript which is usually legible enough.

*/

console.log(buildSequence(30));

function buildSequence(maxVal){

   maxVal = Math.abs(maxVal);

   var n, list = [];

   for(n = 1; n < maxVal; n++){

       /*

        to check for odd numbers, we only need to know if the last bit

        is a 1 or 0:

       */

       if(n & 1){ // <-- note the binary &, as opposed to the logical &&

           list[list.length] = n;

       }else{

           list[list.length] = -n;

       }

   }

   return list.implode(',');

}

Which kinds of sites are not credible because anyone can change the information on them?.

Answers

Answer:

Yes

Explanation:

Non-credible websites may have poor design, broken links, and grammar and spelling errors. They may lack author, date, and/or source information. They will not be associated with credible institutions, organizations, or entities. They may contain unbelievable or incorrect information.

Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific frequency to determine the location of products. cannot be read using a handheld or pen-type scanner that reads and records data instantly. require direct line-of-sight scanning. increase data entry errors by 75 percent.

Answers

Answer:

require direct line-of-sight scanning.

Explanation:

Unlike radio frequency identification (RFID) tags, bar codes require direct line-of-sight scanning. Meaning you need a device that can scan the bar code and the scanner needs to be directly pointing at the barcode without anything in the way. This is because bar codes work by embedding the information in a design of lines that need to be scanned to retrieve the information. If anything gets in the way it interrupts the scanning process and the data is not correctly transmitted. RFID tags on the other hand do not need a direct line of sight since the information is transferred through radiofrequency. This allows the data to be transferred without a line of sight and at a distance of up to 300ft.

why should companies consider creating a big data database? name some types of information that might be found in this database and the sources of this information.

Answers

Companies should consider creating a big data database for several reasons. One of the main reasons is that big data databases allow companies to store and analyze large amounts of data from multiple sources in real-time.

This can help companies gain valuable insights into customer behavior, market trends, and other key business metrics. Additionally, big data databases can help companies make better decisions, improve operational efficiency, and identify new opportunities for growth.

Some types of information that might be found in a big data database include:

Social media data - including posts, comments, and interactions on platforms such as Facebk, Twter, and Insgram.

Web analytics data - including website traffic, page views, bounce rates, and conversion rates.

Customer data - including demographic information, purchase history, and customer feedback.

IoT (Internet of Things) data - including sensor data from connected devices such as smart appliances and wearable technology.

Financial data - including transactional data, credit scores, and investment data.

The sources of this information can vary widely depending on the type of data being collected. For example, social media data and web analytics data can be collected through APIs provided by the social media platforms or website analytics tools. Customer data may come from various sources such as CRM systems, loyalty programs, and customer surveys. IoT data can be collected directly from connected devices, while financial data may come from banking and investment systems.

Learn more about  data database here:

https://brainly.com/question/28391263

#SPJ11

After data is updated in a table, when will the query using that data be updated to reflect the change?

when the query is next run
after the file has been closed
when the query is saved with a new name
immediately, before any steps are performed

Answers

Answer:

A) when the query is next run

Explanation:

Due to the above case, query using data need to be updated to reflect the change only when the query is next run.

What is a query?

This is known to be a question or a kind of  request in terms of information that is expressed in a formal manner.

Note also that Due to the above case, query using data need to be updated to reflect the change only when the query is next run as it all the update will be shown on the next run

Therefore, option A is correct.

Learn more about query from

https://brainly.com/question/25694408

#SPJ9

You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.

Answers

Answer:

1. Right-click the sheet tab you want to hide, or any visible sheet if you want to unhide sheets.

2. On the menu that appears, do one of the following: To hide the sheet, select Hide. To unhide hidden sheets, select them in the Unhide dialog that appears, and then select OK.

Explanation:  have a good day!

HELP MEEEEEEEEEEEEEEEEEEEEEEEEEE

HELP MEEEEEEEEEEEEEEEEEEEEEEEEEE

Answers

Answer:

1) b. 10011

2) a. 15

3) b. 0.0005

What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?.

Answers

Plug-and-play devices are electronic devices that do not require any device driver to be manually installed on the host device (computer) and as such they start functioning immediately they are connected to the host device (computer).

Plug-and-play (PnP) can be defined as a technology that is designed and developed to allow an operating system (OS) of a computer to automatically detect and configure a peripheral (input and output device) as soon as they are connected to the computer.

On a related note, a plug-and-play device is an electronic device that do not require any device driver to be manually installed on the host device (computer) and as such it start to function immediately it is connected to the host device (computer).

In Computers and Technology, some examples of a plug-and-play device include the following:

External hard-driveComputer monitorKeyboardWeb-camMouse

Find more information: https://brainly.com/question/17402566

difference between electrical and electronic devices

Answers

Answer:

The differences between electrical and electronic devices is that electrical uses as energy for necessary purposes, while electronic devices are being manipulated by the electrons that are inside of the device's battery :3

Explanation:

:3

the difference between electrical and electronic devices is that the electrical devices convert the electrical energy into the other form of energy like heat. light etc where as electronic devices control the flow of electrons for performing the particular task

What will be displayed in the console when this program runs?
var numList = [10,20,30];
console.log(numList[numlist.length-1]);
A. 2
B. 3
C. 20
D. 30

Answers

Answer:

D

Explanation:

I ran it through app lab and it returned 30

The display in the console when the program runs is (D) 30

The first line of the program initializes numList to [10,20,30]

The second line of the program contains three instructions.

The first instruction calculates the length of numList; the length is 3The next instruction gets the element at index 3 - 1; i.e. the element at the 2nd index; the element is 30The next instruction prints this element i.e. displays 30

Hence, the display in the console is (D) 30

Read more about programs at:

https://brainly.com/question/19105374

Which of the following describes organizations that
self-regulate via feedback loops?
Group of answer choices
Cybernetics
Chaos Theory
Scientific Management
Classical Organization Theory

Answers

Organizations that self-regulate via feedback loops can be described as applying principles of cybernetics.

Cybernetics is a field that deals with systems and control processes, specifically focusing on the study of feedback loops and self-regulation. Organizations that employ self-regulation through feedback loops can be seen as applying cybernetic principles to their operations. In this context, feedback loops refer to the process of gathering information about a system's performance, comparing it to desired outcomes, and making necessary adjustments to achieve those outcomes.

By using feedback loops, organizations can monitor their activities, evaluate their performance, and make continuous improvements. Feedback loops involve collecting data, analyzing it, and using the insights gained to adjust behaviors, processes, or strategies. This iterative process enables organizations to adapt to changes, optimize their performance, and achieve desired outcomes.

In summary, organizations that self-regulate via feedback loops can be understood as implementing principles from cybernetics. They utilize feedback mechanisms to monitor and adjust their operations, aiming to improve performance and achieve their goals.

Learn more about Cybernetics here:

https://brainly.com/question/32095235

#SPJ11

Even if users have difficulty with a new system, it still will produce the expected benefits.
true or false?

Answers

It is possible for a new system to produce the expected benefits, even if users initially have difficulty using it. However, this statement cannot be universally classified as true or false, as it depends on a variety of factors.

Firstly, the severity of the difficulty users face can vary. If the system is too complex and users cannot navigate it effectively, it may lead to frustration and ultimately result in decreased productivity or even a rejection of the new system. On the other hand, if the system only requires a small learning curve, users may quickly adapt and the benefits can be realized.

Another factor to consider is the type of benefits that are expected. If the benefits are directly tied to user adoption and engagement with the system, then it is crucial that users can easily use it. For example, if a new communication tool is implemented but users struggle to use it effectively, it may result in decreased collaboration and communication. However, if the benefits are more tied to backend operations and processes, users may not need to have a deep understanding of the system in order to achieve the expected benefits. In summary, while it is possible for a new system to produce expected benefits even if users have difficulty with it, the severity of the difficulty and the type of benefits expected are important factors to consider. A system that is too difficult for users to navigate can ultimately result in decreased productivity and the expected benefits may not be realized.

Learn more about communication tool  here-

https://brainly.com/question/14363454

#SPJ11

When a function is defined as virtual, all functions in the hierarchy of classes with the same signa-ture marked as virtual 1) can be explicitly 2) are implicitly 3) neither a orb 4) both a and be In the inclusion approach, we the definition file separately. 1) compile 2) do not compile 3) either a orb 4) neither a norb To overload an operator for a class, we need 1) an operator 2) an operator function 3) a function 4) either a or borc If the given data should be between x and y and we try to use a data out of this range, the exception is thrown 1) domain_error 2) length_error 3) out_of_range 4) none of the above When the returned value of a function is outside a specified range, ____ is thrown. 1) an out_of_range 2) a range_error 3) either a orb 4) neither a norb

Answers

For (1), The correct answer is option 1) can be explicitly overridden. For(2), The correct answer is option 1) compile. For (3), The correct answer is option 2) an operator function. For (4), The correct answer is option 3) out_of_range. For (5), The correct answer is option 4) neither an `out_of_range` nor a `range_error`.

1) When a function is defined as virtual, all functions in the hierarchy of classes with the same signature marked as virtual can be explicitly overridden.

When a function is declared as virtual in the base class, it allows derived classes to provide their own implementation of the function. If a derived class wants to override a virtual function from the base class, it can do so explicitly by using the "override" keyword in C++. This informs the compiler that the derived class is intentionally overriding the virtual function.

The correct answer is option 1) can be explicitly overridden.

2) In the inclusion approach, we compile the definition file separately.

In the inclusion approach, the implementation of a class is split into two parts: the class declaration in a header file (.h or .hpp) and the class definition in a separate source file (.cpp). When using the inclusion approach, we compile the class definition file separately from the other source files that use the class. The class declaration (header file) is included in the source files that need to access the class.

The correct answer is option 1) compile.

3) To overload an operator for a class, we need an operator function.

Operator overloading allows us to redefine the behavior of operators for user-defined classes. To overload an operator, we need to define a special member function called the operator function. This function specifies how the operator should behave when applied to objects of the class.

The correct answer is option 2) an operator function.

4) If the given data should be between x and y and we try to use data outside this range, the exception thrown is 3) out_of_range.

The C++ standard library provides the exception class `std::out_of_range` to handle situations where an index or value is outside the valid range. This exception is typically thrown when accessing elements of a container, such as an array or a vector, beyond its valid bounds.

The correct answer is option 3) out_of_range.

5) When the returned value of a function is outside a specified range, neither an `out_of_range` nor a `range_error` is thrown.

Neither `out_of_range` nor `range_error` exceptions are thrown automatically by the C++ standard library when a returned value of a function is outside a specified range. It is the responsibility of the programmer to handle and validate the returned value if a specific range needs to be enforced.

The correct answer is option 4) neither an `out_of_range` nor a `range_error`.

To know more about operator, visit

https://brainly.com/question/30299547

#SPJ11

discuss any five barries of integrating ict tools in education​

Answers

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

E-books are a popular publishing format that makes online reading convenient and enjoyable. Use online tools and library resources to research
about e-books. Then, write a brief article of about 500 words on the growing trend of e-books. Your answer should also include the pros and cons
of e-books.

Answers

Answer:

Socratic app

Explanation:

it will help you

Other Questions
When making an investment , always consider the ____, which is the cost of your next-best investment? Which of the following statements best describes the process of photosynthesis?Chloroplasts absorb sunlight and store chemical energy.Plants use oxygen to make simple sugars.Chlorophyll builds sugars in the thylakoid membrane.Light breaks down water molecules and releases carbon dioxide. For Triangle ABC, what is the length of AB? What is the best approximation of the solution to the system to the nearest integer values? What do tessellation and calligraphy have in common?O Both involve using math.O Both contain holy wisdom.O Both are used in Islamic art.O Both are used in Islamic poetry. What are the different kinds of desires , according to Epicurus . Give an example of each QuestionReaders can make inferences about a text based on evidence in the text and their own background knowledge.Identify the inference that readers can make from each excerpt from the text.Drag each tile to the correct box.TilesFamily obligations are a heavy burden.Growing up means not being able to express herself freely.Growing up means being limited by more adult responsibilities.Dressing up for her birthday felt phony and a betrayal of herself.PairsLike a big Mexican Barbie doll,I looked at myself in the mirror . . .arrowBothThe girl I used to be,who has lost her voice . . .arrowBothAccept the clipping of my wings,the taming of my heart . . .arrowBothKnow when to be quiet and let theirelders make the decisions . . . Part a: sean buys 5 packages of fish. there are 7/8 pound fish in each package. what is the total weight, in pounds, of fish that sean buys? 5/8*7/8=35/8 or 4 3/8 ? part b: sean cooks 1 package of the fish. he eats 3/8 pound of the fish from the package. what is the total weight, in pounds, of the cooked fish that is left after sean eats 3/8? For each of the following situations, name the most efficient sorting algorithm we studied. 1) The array is mostly sorted already (a few elements are in the wrong place). 2) The data to be sorted is too big to fit in memory, so most of it is on disk. 3) You have many data sets to sort separately, and each one has only around 10 elements. I need help with this The men on the construction site liftbeams and girders as easily as lifting pennies.The tubes from their tractors exhale steam when they sigh.The foreman's voice croaks and roars like a bullfrog.One by one, their machines tear through the trees.They bully over the land like a baker's pin rolling out dough.In the absence of the trail, a skyscraper will be built.It will be large enough to touch the moon.The building's teeth will withstand the sun and wind.Its guts will house people.The men are giants. Their footprints in the wet concretewill be seen by everyone. They will be known by their shoe sizes.The land is a ghost in a dirty sheet.It needs to be cleaned and cleared and clipped.The land is like a fugitive on the run.It needs a new name and a new face and a new home.6Which of the following best summarizes the passage? A. The men at the construction site work hard lifting beams and girders and cutting away trees with their machines. They clear the dirty land and give it a new face and name by building a skyscraper on it. B. The men at the construction site work hard lifting heavy beams, clearing the land of trees. They make it bare so that they can build huge skyscrapers on it. C. The men at the construction site lift beams and heavy girders, shout until their voices start to croak like frogs, and cut trees. They leave their footprints on the wet concrete while building a skyscraper on it. D. The men at the construction site breathe steam, shout until their voices croak, and work hard trying to clear the land of trees so that they can build houses on it. w is proportional to square root of y. y is inversely proportional to x. When x = 4, y = 16 and w = 8.Find w in terms of x How did the belief that stocks were overvalued in the late 1920s effect the American economy? The future worth gradient factor (f/g, i, n) = (p/f, i, n)(p/g, i, n) a. false b. true During the year, Kim sold the following assets: business auto for a $1,000 loss, stock investment for a $1,000 loss, and pleasure yacht for a $1,000 loss. Presuming adequate income, how much of these losses may Kim claim If a beaker had a mass while empty of 100.8823 g and then 4.9961 g of solid was added to it, what would the total mass of the beaker and solid be? What ia an equation of the line that is parallel to y=3x-8 and passes through the point (4,-5)? Drag the tiles to the correct boxes to complete the pairs. Math the modes of transport to the molecules An invention will be denied patent protection if its novelty merely represents an obvious development over existing technology, also referred to as prior art. T/F? A second number is 9 times a first number. A third number is 100 more than the first number. If the sum of the three numbers is 760, find the numbers. The three numbers are (Use a comma to separate answers as needed.) The people of which country are called Flemish?