Write a program that inputs numbers and keeps a
running difference. When the difference is less than 0,
output the difference as well as the count of how many
numbers were entered.
Sample Run
Enter a number: 100
Enter a number: 15
Enter a number: 62
Enter a number: 25
Difference: -2
Numbers Entered: 4
Hint: If you get an EOF error while running the code
you've written, this error likely means you're asking for
too many inputs from the user.

Answers

Answer 1

I've included my code in the picture below. Best of luck.

Write A Program That Inputs Numbers And Keeps Arunning Difference. When The Difference Is Less Than 0,output

Related Questions

Which version of Microsoft Office is free?
Office Online
Office 2019
Office 365
G Suite

Answers

Answer:

Most likely D

Explanation:

I've been using their products for some time now and they do not charge money.

Answer:

The Office used to be free

Explanation:

Thats all i got-

What email program would you suggest and why?

Answers

Answer:

An email program

Explanation:

And why?

Answer:

I would suggest g m a i l.

Explanation:

I use G m a i l all the time and I think it is easy to use! A lot of people think it is great too! :)

What best describes how machine learning applications work?

Answers

Note that Machine learning algorithms analyze data and learn from it to make predictions or decisions without being explicitly programmed for a specific task.

What is machine learning?

Machine learning is a type of artificial intelligence that involves training algorithms to learn from data and make predictions or decisions without being explicitly programmed to perform a specific task.

This technology work by using algorithms to analyze data and learn from it, without being explicitly programmed to perform a specific task. These algorithms can be trained on a dataset, which is a collection of data that is used to teach the algorithm to recognize patterns and make predictions or decisions. The algorithm uses the data to learn about the relationships and patterns within the data, and can then use this knowledge to make predictions or decisions about new data.

The accuracy of the predictions or decisions made by the machine learning algorithm improves as it is exposed to more data and is able to learn from it.

Learn more about Machine Learning:
https://brainly.com/question/16042499
#SPJ1

what are the key differences between ides and website builders ?

what are the key differences between ides and website builders ?

Answers

Answer:

The key differences are as follows:

IDES:

Are usually installed locallyBuild websites by writing and tweaking the source codes

Website Builders:

Are usually run from an online serverprovides beginners with an easy way to create websitesBuild websites by selection from a number of preset options

Explanation:

IDE is short for Integrated Development Environment.

They are predominantly designed to ease the use of a specific programming language. In most cases, IDEs contain tools for editing, testing, and converting the code to its final form as an application.

Other functions that come with it are a web server with a control interface, a database management system with a control interface (in most cases, a relational database that functions off of the webserver), a server-side programming language

Cheers!

Discuss in detail which search engine you think is most functional for your needs. In your response, be sure to provide examples as to why this browser is most functional to your needs by using either a professional, academic, or personal setting.

Answers

The search engine that i think is most functional for my needs is Go ogle  and it is because when browsing for things in my field, it gives me the result I want as well as good optimization.

What is the most important search engine and why?

Go ogle currently leads the search market, with a startling 88.28% lead over Bing in second place.

It is one that dominates the market globally across all devices, according to statista and those of statcounter figures (in terms of desktop, mobile, and tablet).

Note that it give users the greatest results, the IT giant is said to be always changing as well as working hard to make better or improve the search engine algorithm.

Learn more about search engine from

https://brainly.com/question/671215
#SPJ1

Write a function pop element to pop object from stack Employee

Answers

The function of a pop element to pop object from stack employee is as follows:

Stack.Pop() method from stack employee. This method is used to remove an object from the top of the stack.

What is the function to pop out an element from the stack?

The pop() function is used to remove or 'pop' an element from the top of the stack(the newest or the topmost element in the stack).

This pop() function is used to pop or eliminate an element from the top of the stack container. The content from the top is removed and the size of the container is reduced by 1.

In computer science, a stack is an abstract data type that serves as a collection of elements, with two main operations: Push, which adds an element to the collection, and. Pop, which removes the most recently added element that was not yet removed.

To learn more about functional pop elements, refer to the link:

https://brainly.com/question/29316734

#SPJ9

Which delivery model is an example of a cloud computing environment that provides users with a web based email service?
a. SaaS
b. PaaS
c. IaaS

Answers

Answer:

a. SaaS

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.

Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service.

How APIs can be useful for data collection ?​

Answers

Answer:

These softwares are a program that is a connection between computer networks, which can be useful for storing data.

According to a 2017 forecast by Cisco, there will be _____ networked devices and connections per person globally by 2021 and _____ networked devices and connections per person in North America.

Answers

According to a 2017 forecast provided by Cisco, we can deduce the following points:

There will be four (4) networked devices and connections per person globally by 2021. Thirteen (13) networked devices and connections per person in North America.

What is Cisco?

Cisco is a multinational information technology (IT) that was established on the 10th of December, 1984 in San Francisco, California, United States of America.

Basically, Cisco is saddled with the responsibility of developing, manufacturing, and selling networking devices, software, and other telecommunications equipment such as:

RouterSwitchWebexModem

Read more on networking here: https://brainly.com/question/24812743

Does the source MAC address match your PC interface?

Answers

Answer: Yes, it does

Explanation:

How are radio waves used on Earth?

Select ALL that apply
a

Traditional Radio Wave
b

Wireless Internet
c

Cell Phones
d

Light House

Answers

Answer:

A,B,C are the answers it cant be light house because it uses stored electricity which projects light energy

C and d If it’s not late yet. Not sure why they would put A tho kind of through me off

pos,neg,cust=read_statistic('food_name')
TypeError: cannot unpack non-iterable NoneType object

Answers

The error message you're encountering suggests that the function read_statistic('food_name') is returning None instead of an iterable object that can be unpacked into three variables (pos, neg, and cust).

To resolve this issue, you should check the implementation of the read_statistic function. It seems that the function is not returning the expected values. Here are a few possible reasons for this error:

File or data not found: The function may be attempting to read statistics from a file or data source that doesn't exist or is inaccessible. Ensure that the file or data is present and accessible.

Here's an example:

python

Copy code

def read_statistic(filename):

   try:

       # Code to read the statistics from the file or data source

       # ...

       

       # Assuming you have retrieved the statistics successfully

       return pos, neg, cust

   except Exception as e:

       print(f"Error occurred: {e}")

       return None

By adding error handling and printing the exception message, you can get more information about the specific issue that is causing the function to return None.

Learn more about error on:

https://brainly.com/question/13089857

#SPJ1

Ram and Hari can finish a piece of work in 6 days and 12 days respectively in how many days will they finish it working together

Answers

Answer:

4 days

Explanation:

Given - Ram and Hari can finish a piece of work in 6 days and 12 days

             respectively.

To find - In how many days will they finish it working together

Proof -

As given,

Ram and Hari can finish a piece of work in 6 days and 12 days respectively.

⇒1 day work of Ram done in = \(\frac{1}{6}\)

   1 day work of Hari done in = \(\frac{1}{12}\)

If they work together,

1 day work of both together done in = \(\frac{1}{6}\) + \(\frac{1}{12}\) = \(\frac{2 + 1}{12} = \frac{3}{12}\) = \(\frac{1}{4}\)

As we know Work is inversely proportional to efficiency

And efficiency = Person's 1 day work

As we have ,

1 day work of both together done in =  \(\frac{1}{4}\)

⇒ Total work done in 4 days if they work together.

List five negative and positive impacts of cybersecurity.

Answers

Utilizing personnel, procedures, technology, and policies to defend enterprises, their vital systems, and sensitive data from online attacks is known as cybersecurity.

What are the negative impact of cybersecurity?

Damage to reputation Since the vast majority of people would not do business with a firm that had been infiltrated, especially if it had failed to protect its customers' data, the loss of customer and stakeholder trust can be the most detrimental effect of cybercrime.

Protection for your company - cyber security solutions offer digital defense for your company, ensuring that your staff is safe from potential dangers like ransomware and adware. Increased productivity - infections can cause computers to run so slowly that work becomes nearly impossible.

A better use of time is made possible through productivity apps. Access to biometric gadgets, food management software, and exercise routines easily leads to improved health. communication with friends and family is simpler and less expensive.

To learn more about cybersecurity refer to:

https://brainly.com/question/28004913

#SPJ1

A collection of technologies that allow publishing of search results in a format suitable for syndication and aggregation. It is a way for websites and search engines to publish search results in a standard and accessible format. Originally developed by Amazon and recently adopted by Yahoo!, __________ relies on abstract-based microformats (dataRSS, eRDF, FOAF, GeoRSS, hCard, hEvent, hReview, hAtom, MediaRSS, RDFa, XFN, etc.) to integrate syndicated content into search results.

Answers

Answer:

OpenSearch

Explanation:

Indeed, OpenSearch is of course is a collection of innovative technologies that have positively influenced how websites and search engines function.

In other words, the OpenSearch technologies allow contents on websites to be displayed on search results of users on the internet by relying on microformats like dataRSS,  hEvent, and hReview.

Your company has been assigned the 192.20.0.0/24 network for use at one of its sites. You need to use a subnet mask that will accommodate 30 subnets while simultaneously accommodating the maximum number of hosts per subnet. What subnet mask will you use in CIDR notation?

Answers

To accommodate 30 subnets while maximizing the number of hosts per subnet, the appropriate subnet mask in CIDR notation would be /27.

What would this do?

This provides 5 bits for subnetting, allowing for 32 (2^5) subnets. Each subnet can then have up to 30 (2^5 - 2) usable host addresses.

The subnet mask /27 effectively divides the original 192.20.0.0/24 network into 30 subnets with the maximum number of hosts per subnet.

Therefore, to accommodate 30 subnets while maximizing the number of hosts per subnet, the appropriate subnet mask in CIDR notation would be /27.

Read more about subnet mask here:

https://brainly.com/question/28390252

#SPJ1

A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that
variable. Which of the following data types is the BEST for this purpose?

Answers

Answer:

blue 80 Omaha a set hut

Explanation:

A company is developing an on-premises app that authenticates with Azure Active Directory (Azure AD). The app will be deployed on computers that do not have a web browser. You need to allow users to authenticate on the app using a web browser on a different computer. Which solution should you use?

Answers

Answer:

Explanation:

The best solution for this scenario is to use the Azure Active Directory Authentication Library (ADAL). ADAL is an authentication library that allows applications to authenticate with Azure AD using a web browser on a different computer. ADAL is designed to work with applications that are deployed on-premises, and it supports a variety of authentication methods, including OAuth 2.0, OpenID Connect, and Windows Live Connect. ADAL also provides support for multi-factor authentication, which can help to enhance the security of the authentication process.

The solution that should be used here is in order to increase the security of the login process, ADAL additionally supports multifactor authentication.

What is Azure Active Directory (Azure AD)?

The Azure Active Directory Authentication Library is the best option in this situation (ADAL). Using a web browser on a remote machine, programs can log in with Azure AD thanks to the authentication library called ADAL.

OAuth 2.0, OpenID Connect, and Windows Live Connect are just a few of the different types of authentication that are supported by ADAL, which is built to operate with applications that are deployed on-premises.

Therefore, the appropriate course of action in this situation is to employ ADAL's enhanced support for multifactor authentication to increase the security of the login process.

To learn more about (Azure AD), refer to the link:

https://brainly.com/question/30143542

#SPJ2

importance of software in computer​

Answers

Answer:

It allows accomplishing functions using the computer. The software is the instruction we want the computer to process for us.

Explanation:

I want to type a letter. I need a software that can interpret my letters in the keyboard and the program can print what I am typing.

As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.

Answers

Answer:

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.

First, let's convert -9/2 to a decimal number: -9/2 = -4.5

Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:

1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM

Sign bit: Since the number is negative, the sign bit is 1: 1

Mantissa and exponent: Convert -4.5 into binary and normalize it:

-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2

Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)

Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101

Now, put the sign, exponent, and mantissa together: 1101 0010

So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.

B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.

To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:

Sign bit: 1

Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)

Mantissa: Smallest mantissa is 0000

The 8-bit representation is 1001 0000. Converting this to decimal:

-1 * 2^{-2} * 1.0000 which is -0.25.

The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.

C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.

To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:

Sign bit: 0

Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)

Mantissa: Largest mantissa is 1111

The 8-bit representation is 0110 1111. Converting this to decimal:

1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.

The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.

Explanation:

Upload your completed chart using the information you gained in your interviews.

Answers

Answer:

1.) X-ray Technician

Lead Apron & X-ray Machine

X-ray machine is used to make an image of a person’s bones, and the lead apron is used to block the radiation.

2.) Shipyard Project Manager

Hardhat & Gas Monitors

Gas monitors are used to detect gas leaks; while the hardhats are used to protect from falling objects.

3.) Teacher

Computers & Promethean Boards

Computers are used to project the assignments onto the Promethean boards.

Explanation:

Make me the brainliest!!! Thanks!!!

You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!

Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.

Answers

Confidential Computer Forensics Investigation Report

Case Number: 2023-4567

Date: June 22, 2023

Subject: Computer Forensics Investigation Findings

I. Introduction:

The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.

II. Computer Information:

The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.

III. Access and Usage:

During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.

IV. Forensic Tools and Findings:

Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.

Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.

File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.

Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.

V. Conclusion:

Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.

The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.

Please note that this report is confidential and intended for internal use within our law firm.

Sincerely,

[Your Name]

Computer Forensics Investigator

[Law Firm Name]

I hope this helps. Cheers! ^^

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

No links, thank you

Subject: Economics/Computer Technology

Which is the most direct benefit to consumers from the Internet?

A. Packages arrive in the mail faster.

B. Online businesses don't need many employees.

C. Online sales enable instant gratification.

D. It is easier to compare prices.

Answers

Answer:

The most direct effect that the internet has had on retail sales is THE DEVELOPMENT OF E-COMMERCE.

E- Commerce refers to the commercial transactions that are conducted via the internet. The advance in technology has makes it possible for the retailers to advertise their products and get across to the consumers via the internet. Buying and selling on the internet is now more preferable to most people than the traditional buying and selling because of its convenience.

Help please Budget on excel

Help please Budget on excel

Answers

Note that this is a Microsoft Excel prompt. The completed tables and charts are attached accordingly.

Why is Microsoft Excel Important?

Users of Microsoft Excel can discover patterns and arrange and classify data into useful categories. Excel can also assist organizations in better comprehending the structure and activities of their personnel by categorizing worked hours and arranging employee profiles and budgets.

Excel is also very beneficial for pupils. They use the program to construct graphs and charts. It is becoming increasingly popular among students for projects and other purposes.

Excel may be used to provide a comparative study of various school and student data.

Learn more about MS Excel:
https://brainly.com/question/20395091
#SPJ1

Help please Budget on excel
Help please Budget on excel
Help please Budget on excel
Help please Budget on excel

I need help including my other one I posted

I need help including my other one I posted

Answers

Answer:

2. I like the form of it, I like the porportion of it.

3. I dont know what a purpose of this maybe it a person wearing a tuexdo stepping out of his house or something.

4. Another thing that would work well is texture.

I want to write a Java program to display the multiplication table for the number entered by the user and the values doesn’t exceed 100 .For example if the user enter 3 the output should be like this :

3
6
9
12
15
18
21
24
27
30
33
36
39
42
45
48
51
54
57
60
63
66
69
72
75
78
81
84
87
90
93
96
99

Answers

Answer:

yes that is correct

Explanation:

hopefully this helps good luck

Cerise is explaining computer viruses to her students. What is the best way for her to explain a computer virus?
A.
It is a programming error that crashes the system.
B.
It is a code that creates multiple copies on loading and damages the system.
C.
It is a type of advanced operating system used by organizations.
D.
It is a code that protects computers from malware attacks.

Answers

B. It is a code that creates multiple copies on loading and damages the system

Answer:

B. it is a code that creates multiple copies on loading and damages the system

How do internet gateway routers help to defend the network from cyberattack?

Answers

Answer:

Predict and prevent web attacks before they reach your corporate network or your users – wherever they are. Set up first line defence to protect your most valuable asset – your data.

Explanation:

The best solution at Gateway between the Internet (Public) and the Intranet (Vast LAN/VLAN (Private)) for the intruder detection, drop or deny, stopping spam emails and viruses/malwares, protect from exploiting vulnerabilities, flood a targets in application and communication protocol etc. and a best monitoring, evaluation and analysis tool for the better safeguard. Normally we intend to implement either a software or hardware firewall which enforces a set security policies that needs to be fine-tuned according to the recent advancement and race.

We can take all possible measures for the security of databases servers, web servers, systems servers with a set of inbuilt security mechanism and secure travel of transactions over the net based on encryption & VPN as choices are available.

Casey is researching the American Revolution and needs to create a short PowerPoint presentation about the major events of the war. Two websites have all the necessary information, but there are several things that Casey should check besides the information on the sites. What are some things that the website should have before Casey uses it for the project? Provide at least three different things.

Answers

Credible website? Can be one
Other Questions
rebecca is 24 years old and is involved in a bad automobile accident. under her current automobile insurance, she chose a $2000 deductible. after filing her claim, the insurance company told her she had to pay the deductible before they would pay for the remaining damages. what could rebecca do to lower her deductible? help please#6Suppose 2 follows the standard normal distribution. Use the calculator provided, or this title to determine the so that the following is true P(Z > e) 0.7611 ound your answer to two decimal places. O identify the correct systematic name for the disaccharide lactose. Why did Padre Martinez want New Mexicans to be excused (dispensed) from tithing (giving financial support to the Church)? A satellite, placed into the Earth's orbit to investigate the ionosphere, had the following orbit parameters: perigee, 474 km; apogee, 2317 km (both distances above the Earth's surface); period, 112.7 min. Find the ratio vp/va of the speed at perigee to that at apogee. Which of the following is a similarity between sales promotion and consumer promotion?a. Both are focused toward creation of a deep partnership between the marketer and the partner.b. Both are focused toward making an extra profit by increasing the prices of the products with high demand.c. Both are focused toward creating advertisements through nonpersonal communication means.d. Both are focused toward enhancement and promotion of immediate sales. Employee is directly related to an organization's ability to communicate effectively.A) salaryB) satisfactionC) attendanceD) work style A line passes through the points ( 3, 4) and (6, 10). Write its equation in slope-intercept form. how effective do you think social media is about getting the word out for an event? explain Karen bought a notebook for $1.80, a pen for $1.05, and a package of crayons. she paid with a $5.00 bill and received $0.65 in change. how much did she pay for the crayons? Do kinetic and static friction move the same direction. Select the correct answer.Some crops in Mathew's field were destroyed by some insects. To avoid future destruction of his crops, he decided to release sterile male insectsin his field. Which pest control technique did he use?OAchemical pest control.cultural pest controlOC. genetic pest controlOD. biological pest control what percentage of the sun's total mass is lost each year as a result of fusion converting mass into energy? What event had the immediate effect of causing Germany to declare war on the allies What is the greatest common factor (GCF) of 124 and 152? A. 2 B. 1 C. 8 D. 4 A chord of a circle is 18cm long.it is 6.3cm from the center of the circle.calculate the radius of the circle to the nearest whole number? David madd 4/3 of quart of fruit juice. Each mug he had holdes 1/3 of a quart. How many mugs will David be able to fill? Simplify the expression. csc^2x-1/1+sin xA. csc x+1B. csc x(csc x-1)C. sin^2x-csc xD. csc^2x-cos x tan x An intermetallic compound is found in the magnesiumgallium system that has a composition of 41. 1 wt% mg58. 9 wt% ga. Specify the formula for this compound. can you identify the value of each digit ?