Write a program that reads a list of scores and then assigns grades based on the following scheme:The grade is A if score is 7= best – 10.The grade is B if score is 7= best – 20.The grade is C if score is 7= best – 30.The grade is D if score is 7= best – 40.The grade is F otherwise.

Answers

Answer 1

To create program that assigns grades based on a list of scores, you can use the following approach in Python, The grades are then printed alongside.

Simple direct grading: The instructor only needs to provide a single point value to each piece of work. Grading criteria: Each assignment is graded by the teacher in accordance with the criteria provided on a form.

The form's text entry box allows the teacher to enter a point value for each requirement in the rubric.
1. Read the list of scores and determine the best score.
2. Use conditional statements to assign grades based on the difference between the best score and the current score.
3. Print the result.
Here's a concise example in Python:
```python
# Sample list of scores
scores = [95, 85, 75, 65, 55]
# Determine the best score
best = max(scores)
# Assign grades and print the results
for score in scores:
   if score >= best - 10:
       grade = 'A'
   elif score >= best - 20:
       grade = 'B'
   elif score >= best - 30:
       grade = 'C'
   elif score >= best - 40:
       grade = 'D'
   else:
       grade = 'F'
   print(f"Score: {score}, Grade: {grade}")
```
This program reads the list of scores, determines the best score, and then assigns grades based on the given criteria. The grades are then printed alongside the corresponding scores.

Learn more about assign grades here

https://brainly.com/question/28554933

#SPJ11


Related Questions

Discuss the Autonomous Robots and Additive Manufacturing contribution to Smart Systems. Why are these two technologies are important for the Smart Systems? Explain the technologies with an example.

Answers

Autonomous robots and additive manufacturing are two crucial technologies that significantly contribute to Smart Systems. Autonomous robots, equipped with sensors, artificial intelligence, and navigation capabilities, can perform tasks with minimal human intervention. They enhance efficiency, safety, and flexibility in various industries. For example, in a smart warehouse, autonomous robots can navigate the facility, locate items, and autonomously pick, pack, and transport them, streamlining the order fulfillment process.

Additive manufacturing, also known as 3D printing, revolutionizes traditional manufacturing methods by constructing objects layer by layer. It enables rapid prototyping, customization, and on-demand production. For instance, in a smart healthcare system, additive manufacturing can be employed to produce personalized medical implants, such as customized prosthetics or dental implants, based on patient-specific requirements, resulting in improved patient outcomes and reduced lead times. Both technologies contribute to the advancement of Smart Systems by optimizing processes, enhancing productivity, and enabling customization in various industries.

what is the difference between stdev.s and stdev.p?

Answers

stdev.p is utilized if your data represents the whole population,

stdev.s is utilized if your data is a sample of the entire population

jordan, a software engineer, is responsible for maintaining the private piece of his company's internet network that is accessible to clients by means of a unique password. this piece of the company's network is known as the .

Answers

Jordan, as a software engineer, is responsible for maintaining the private piece of his company's internet network that is accessible to clients by means of a unique password. This piece of the company's network is known as the client portal or client access portal.

It is crucial that Jordan ensures the security and confidentiality of the information stored within this portal, and he must take all necessary measures to protect it from unauthorized access. This includes enforcing strong password policies, regularly updating passwords, and monitoring access to the portal to prevent any potential breaches.

The term "user account" refers to the distinct pairing of username and related password. One of the best methods for authenticating a user to grant access to the system and use of resources is that.

In a database, a username and password are always saved together. A user account is the name given to the combination of the two that constitutes it. Each user is uniquely identified by their user account, which also gives them access to the system.  

A computer system might be configured with several user accounts, each with a unique username and password. Only through their unique user account, which is made up of their username and password, can the specific user access the computer system.

Learn more about  unique password here

https://brainly.com/question/28565376

#SPJ11

Web polls that allow anyone to weigh in on a topic are a type of __________ poll. a. exit b. deliberative c. tracking d. straw

Answers

Web polls that allow anyone to weigh in on a topic are a type of straw poll. D. Straw.

What are web polls?

Web polls are a type of online survey that allows users to vote or express their opinions on a particular question or topic. They are often used by websites, social media platforms, and other online communities to engage users and gather feedback on various issues.

Web polls are typically simple and straightforward to use, with a question or statement presented, followed by a set of answer choices or options. Users can then select their preferred option, and the results are usually displayed immediately or after a certain period of time.

Learn more about polls on https://brainly.com/question/10404069

#SPJ1

The Microsoft Excel application has several preset Auto Fill options, but___
is not one of the presets.
dates
days
months
formats
HELP!!

Answers

Answer:

Im pretty sure its days

But I studied this like 2 years ago im not sureee

Explanation:

Type the correct answer in the box. Spell all words correctly.

Bella is creating a research paper for the first time In Microsoft Word. She is taking a lot of time to create and format the bibliography section.

Which section in Microsoft Word can she use to expedite the process?

Bella can use the section called

In Microsoft Word to create the bibliography.

Reset

Next

Answers

Bella can use the "References" section in Microsoft Word to expedite the process of creating and formatting the bibliography.

In Microsoft Word, the "References" section provides various tools and features specifically designed for managing citations, bibliographies, and other reference-related tasks. By using the built-in citation and bibliography tools within the "References" tab, Bella can easily insert and manage citations, choose the desired citation style, and automatically generate the bibliography based on the cited sources. This eliminates the need for manual formatting and saves a significant amount of time when creating a research paper.

You can learn more about bibliography at

https://brainly.com/question/23780564

#SPJ11

when an increase in technology only improves one of the goods on the of, the ppf shifts out equally along both axes. True/False ?

Answers

True, When an increase in technology only improves one of the goods on the of, the ppf shifts out equally along both axes.

False. When an increase in technology improves the production of one good, the production possibility frontier (PPF) shifts outwards only along the axis of that good, becoming steeper for the other good. The slope of the PPF reflects the opportunity cost of producing one good in terms of the other, and if the production of one good becomes more efficient, the opportunity cost of producing it will decrease, leading to a steeper slope for the other good.

Therefore, the shape of the PPF changes and moves away from the origin in the direction of the good that has seen an improvement in technology. The new PPF represents a higher level of production efficiency, as more of both goods can be produced with the same resources. This means that the economy has increased its capacity to produce and has greater flexibility in choosing the combination of goods it wants to produce.

Learn more about PPF here:

https://brainly.com/question/17581360

#SPJ4

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

describe how you would attempt to build a growth-chamber for growing plants. the device would need to be completely powered by a person and grow plants such as sugar beets.

Answers

To build a human-powered growth chamber for growing sugar beets, one could create a system that utilizes human energy to generate the necessary power for lighting, temperature control, and irrigation. The design could incorporate a stationary bicycle or similar mechanism that converts human pedaling into electrical energy.

This energy could be used to power LED grow lights, fans for air circulation, and a water pump for irrigation. Additionally, the growth chamber should be equipped with sensors to monitor and maintain optimal environmental conditions for sugar beet cultivation, including temperature, humidity, and nutrient levels.

Creating a human-powered growth chamber requires a thoughtful design that efficiently harnesses human energy. The stationary bicycle or similar mechanism would be connected to a generator, which would convert the rotational energy from pedaling into electrical energy. This energy can then be stored in batteries or directly used to power the various components of the growth chamber. LED grow lights are ideal for providing the necessary light spectrum for plant growth while minimizing energy consumption

 Sensors play a crucial role in monitoring and controlling environmental parameters, enabling adjustments to temperature, humidity, and nutrient levels as needed. By combining human power with efficient technology, a sustainable and self-sufficient growth chamber can be created for cultivating sugar beets.

learn more about environmental parameters here

brainly.com/question/32321815

#SPJ11

What is a “backdoor”

Answers

Answer:

A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network or software application.

Explanation:


8.
How do you setup a Formula in Excel correctly ?
7.
Define the term "Cell".

Answers

A cell is the basic unit of a worksheet or a spreadsheet that is used to hold data. Each cell is identified by a specific cell address consisting of the column letter and the row number. It can contain a variety of data types, such as numbers, text, and formulas. The intersection of each row and column forms a cell.8.

A formula in Excel is a mathematical calculation used to derive a value from other cells, functions, or values. It is used to perform mathematical calculations, manipulate data, and produce results. Here is how to set up a formula in Excel correctly:
Step 1: Click on the cell where you want the formula to appear
.Step 2: Type the equals (=) sign, which is the operator used to denote a formula. This informs Excel that a formula is going to be entered.
Step 3: Enter the mathematical expression or formula you want to use.
Excel uses standard mathematical operators such as addition, subtraction, multiplication, and division to evaluate a formula. For example, to add the values in cells A1 and B1, you would type "=A1+B1"Step 4: Press Enter to complete the formula, and the result will appear in the cell.

Learn more about Excel here,
https://brainly.com/question/32962933

#SPJ11

To save the changes to the layout of a table, click the Save button on the _____

Answers

To save the changes to the layout of a table, click the Save button on the Table Tools Layout tab in Microsoft Word.

Once you have made changes to the layout of a table, you can save those changes by clicking on the Save button located on the Table Tools Layout tab. This tab will appear at the top of the screen when you have a table selected. The Save button is usually located in the upper-left corner of the tab.Before you click the Save button, make sure to review your changes to ensure they are correct. Once you save the changes, you cannot undo them unless you have saved a backup copy of the original table.It is important to save your changes regularly as you work on your document to prevent losing any unsaved work. You can also use the AutoRecover feature in Word to automatically save your work at regular intervals in case of unexpected computer or software crashes.

To learn more about Microsoft Word click the link below:

brainly.com/question/26695071

#SPJ4

What is a benefit of the Name Manager feature?
A) add, edit, filter names you have created
B) add, edit, filter predetermined names for cells
C) create a name from a selection
D) rename a worksheet or a workbook

ANSWER: A

Answers

Answer:Its A

Explanation: edge2020

The benefit of the Name Manager feature is to add, edit, and filter names you have created. The correct option is A.

What is the Name Manager feature?

The name manager feature is present in the ribbon present in the window of the tab. To open this, open click the formula tab. For instance, we sometimes utilize names rather than cell references when working with formulas in Excel.

The Name Manager allows us to add new references, update existing references, and delete references as well.

To interact with all declared names and table names in a worksheet, use the Name Manager dialog box. You could want to check for names with mistakes, confirm the reference and value of a name, see or update the descriptive comments, or figure out the scope, for instance.

Therefore, the correct option is A) add, edit, and filter the names you have created.

To learn more about the Name Manager feature, refer to the link:

https://brainly.com/question/27817373

#SPJ2

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

Use the factorial operation to evaluate 9!.

8 + 7 + 6 + 5 + 4 + 3 + 2 + 1

8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1

9 + 8 + 7 + 6 + 5 + 4 + 3 + 2 + 1

Answers

When 9! is evaluated, we get 9×8×7×6×5×4×3×2×1.

What is factorial operation?

A factorial operation is a mathematical formula represented by an exclamation mark. (!). This operation is carried out when a whole number is being multiplied by its successive smaller numbers until it gets to 1.

E.g

n! = n(n-1)(n-2)........(1)

From the question,

We are asked to evaluate 9!

9! = 9×8×7×6×5×4×3×2×1

Hence, when 9! is evaluated, we get 9×8×7×6×5×4×3×2×1.

Learn more about factorial operation here : https://brainly.com/question/25966410

Instructions
Please modify your 4.2.5 Growing Circle activity on CodeHS and then submit it here.

Your circle should start being as big as the width of the screen and should decrease in size until it disappears.

Here is the code i have in growing circle so far
/* Constants */
var START_RADIUS = 1;
var INCREMENT = 1;
var CHANGE_COLORS_AT = 10;
var circle;

function start(){
circle = new Circle(START_RADIUS);
circle.setPosition(getWidth() / 2, getHeight() / 2);
add(circle);

setTimer(drawer, 50);

}

function drawer(){

circle.setRadius(circle.getRadius() + INCREMENT);

if((circle.getRadius() % CHANGE_COLORS_AT)== 0){
circle.setColor(Randomizer.nextColor());
}
if((circle.getRadius() * 2) > getHeight()){
stopTimer(drawer);
}
}

Answers

The modification of Growing Circle activity on CodeHS is in the explanation part.

What is programming?

The process of carrying out a specific computation through the design and construction of an executable computer program is known as computer programming.

Here's the modified code for the Growing Circle activity on CodeHS that starts as big as the width of the screen and decreases in size until it disappears:

/* Constants */

var START_RADIUS = getWidth() / 2;

var DECREMENT = 1;

var circle;

function start() {

 circle = new Circle(START_RADIUS);

 circle.setPosition(getWidth() / 2, getHeight() / 2);

 add(circle);

 setTimer(drawer, 50);

}

function drawer() {

 circle.setRadius(circle.getRadius() - DECREMENT);

 if (circle.getRadius() <= 0) {

   stopTimer(drawer);

   remove(circle);

 }

}

Thus, this modified code will make the circle shrink from its starting size until it disappears.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ1

One tool under What-If-Analysis is Scenarios. Which best describes the purpose of setting up and using scenarios

1. to quickly combine multiple formulas from different cells into just one
2. to instantly compare results when data in numerous cells change to specified values
3. to conduct automatic complex statistical analysis on a range of cells
4. to constrain some cells to certain values so that the wrong data are rejected if entered​

Answers

Answer:

Option B, to instantly compare results when data in numerous cells change to specified values

Explanation:

Scenario setting with in the What If Analysis is used to compare various scenarios with in the same excel sheet. Scenarios has set of values that are saves and updated automatically as the values with in the cell changes. Also the scenarios can be switched.

Hence, option B is correct

During which step of the etl process can data that fails to meet expected patterns or values be rejected to help clean up dirty data?.

Answers

The extract is the step of the ETL process that can data that fails to meet expected patterns or values be rejected to help clean up dirty data.

What are the steps of the ETL process?

The five steps of the ETL process are as follows:

Extract.Clean.Transform.Load.Analyze.

Among the five above-given steps of the ETL process, extract, transform, and load are the most important process step of the ETL. The transformation step of an ETL process involves the execution of a series of rules or functions to the extracted data to convert it to a standard format. It is the third step of the ETL process.

While extraction is the first step of the ETL process that significantly imports and consolidates the structured and unstructured data into a single repository.

Therefore, the extract is the step of the ETL process that can data that fails to meet expected patterns or values be rejected to help clean up dirty data.

To learn more about the ETL process, refer to the link:

https://brainly.com/question/26801686

#SPJ1

When someone refers to "space" on a computer or device, they are usually referring to _____, which allows the user to save a file for future use, even after the computer has been turned off.

Answers

Answer:

Memory.

Explanation:

When someone refers to "space" on a computer or device, they are usually referring to memory, which allows the user to save a file for future use, even after the computer has been turned off.

In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. There are basically two (2) main types of memory;

1. Read only memory (ROM).

2. Random access memory (RAM).

Answer: Secondary Storage

Explanation: Source: trust me bro

how many bits and bytes are occupied by six long variables​

Answers

Answer:

24 bytes = 192 bits

Explanation:

A long is typically 4 bytes or 4*8 = 32 bits

However, on some 64 bit systems, a long is defined as 64 bits so the answer is not universal.

At startup, Windows Server 2012 Core presents _______.

Answers

At startup, Windows Server 2012 Core presents a command window.

What is a Windows Server used for?

Windows Server is known to be a kind of a group of operating systems that is made by Microsoft that aids enterprise-level management, data storage, applications, and others.

The Command window is known to be that which gives a person  the information, it also gives instructions, and gives room for one  to be able to enter commands usually at the Command prompt.

Therefore, note that at startup, Windows Server 2012 Core presents a command window as it is the first thing that will come up.

Learn more about Windows Server from

https://brainly.com/question/25554117

#SPJ1

Which type of program can hide itself from normal inspection and detection? trojan horse stealth trojan spyware rootkit

Answers

A type of software program which can hide itself from normal inspection and detection is: D. rootkit.

What is a malware?

A malware can be defined as any type of software program or file that is designed and developed to be intentionally harmful to the host computer, server, or network, especially for the purpose of wreaking havoc, damage and destruction after gaining an unauthorized access.

In Computer technology, a rootkit is a type of trojan which refers to a set of tools or software program that is designed and developed to gain access and control of an end user's computer system without revealing its presence i.e it hides its presence.

Read more on rootkit here: https://brainly.com/question/15061193

#SPJ1

The acquisition of a new machine with a purchase of 109,000, transportation cost 12,000,instillation cost 5,000 and special acquisition fees of 6000 could be journalized with a debit to the asset account for

Answers

$132,000

-------------------------------------------------------------------------------------------------------------

                                                                                                   hope this helps!

A computer system can be divided roughly into four components: the hardware, the operating system, the _________, and a user. What goes in the blank?

Answers

Answer:

application programs

Explanation:

Have a nice day!

Which are options available for formatting tables? Check all that apply.

merging cells
including quotes
splitting cells
including shading
including borders

Answers

Hey,

so the sort answer is all but B "including quotes"

the long answer is that all of them but b are for formatting aka style.

Hope this helps

-scav

Answer:

A,C,D,E

Explanation:

the correct banner marking for unclassified documents with cui is

Answers

(U) Banner line. o (CUI) At a minimum, CUI markings for unclassified documents will include the acronym “CUI” at the top and bottom of each page.

It is mandatory to use the unclassified marking “(U)” as a section marking for unclassified content inside CUI papers or materials. Footers, ISOO letter, banners, and part marking will only be designated “Unclassified” or “(U)” for unclassified information.

What is the CUI?

A conversational user interface (CUI) is a computer user interface that simulates a real-life conversation.

CUI is information generated or controlled by the government that requires protection or distribution controls in accordance with applicable laws, regulations, and government-wide policies. CUI is not protected information.

The CUI Program will improve information sharing by making it more timely and uniform, while also better protecting sensitive information throughout the federal government and with non-federal stakeholders.

The unclassified marking “(U)” must be used as a section marker for unclassified content inside CUI documents or materials.

To learn more about the CUI, refer to:

https://brainly.com/question/9489565

#SPJ2

Which of the following are the functions of e-mail? Check all of the boxes that apply.

Whichstoring contacts

showing all recipients all of the time

sorting e-mail by date or sender

setting the priority of an e-mail

Answers

Answer:

showing all recipients all of the time

Answer:

1 3 4

Explanation:

Select the mistake that is made in the proof given below. Theorem. The sum of any two consecutive integers is odd. Proof. Since 4= 3+1, then 3 and 4 are consecutive integers. Also, 3+4 = 7. Furthermore, 7=2-3+1 Since 7 is equal to 2k+1 for an integer k, then 7 is an odd number. Therefore the sum of any two consecutive integers is odd. ■ Failure to properly introduce variable. Generalizing from examples. Misuse of existential instantiation. Assuming facts that have not yet been proven.

Answers

The mistake made in the given proof is the failure to properly introduce a variable.

In the proof, the statement "Since 4 = 3+1, then 3 and 4 are consecutive integers" is correct.

However, the subsequent step, "Also, 3+4 = 7," assumes that the sum of any two consecutive integers is 7. This is where the mistake lies.

The proof attempts to generalize from a specific example (3 and 4) to claim that the sum of any two consecutive integers is odd. However, this is an incorrect generalization.

In reality, the sum of any two consecutive integers is always an even number. This can be proven mathematically:

Let n be an arbitrary integer. The consecutive integers would be n and (n+1). The sum of these two consecutive integers is:

n + (n+1) = 2n + 1

This expression can be rewritten as 2n + 1, where 2n represents an even number and 1 is an odd number.

When an even number is added to an odd number, the result is always an odd number.

Hence, the correct statement would be: "The sum of any two consecutive integers is odd only when one of the integers is even and the other is odd."

This revised statement accurately reflects the pattern observed in the given specific example and can be proven mathematically for all consecutive integer pairs.

For more questions on variable

https://brainly.com/question/28248724

#SPJ8

(Malicious Code) Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do?

Answers

Upon connecting your Government-issued laptop to a public wireless connection, Disconnect from the public wireless connection, run a malware scan, and change all passwords.

When connecting to a public wireless network, you are at a higher risk of exposing your device to malicious code or malware. Therefore, it is crucial to disconnect from the network immediately and run a malware scan to check for any potential threats. Changing all your passwords is also important as it can prevent hackers from accessing your personal and sensitive information. By taking these precautionary measures, you can protect yourself and your device from potential cyber attacks that could compromise your data and compromise the security of your Government-issued laptop.

learn more about laptop here:

https://brainly.com/question/31115377

#SPJ11

Which of the following is a visual thinking tool that aids students in organizing ideas through analysis, synthesis, and comprehension? outline outliner mind map drawing

Answers

Answer:

The answer is "mind map drawing".

Explanation:

In the given-question, the above given choice is correct because it includes the use of texts and images to understand the creation, explain, communicate, and resolve issues.

Its resources can help students of all ages with progress learning skills through all academic areas. The map draws visual thought resources is used to help students create ideas via analysis, synthesis, and understanding.

Answer:

mind map

Explanation:

Other Questions
You have an account that starts at $2500 with an interest rate of 3.25% compound yearly. How much is in the account after 10 years? Round your answer to the nearest hundredth. Which strategy best helps a famous brand company reach consumers?selling at trade showssending out mailings in small townsadvertising nationallymarketing selectively How does the author develop her ideas in the text? In What Killed the Dinosaurs? an emotional response to frustration of desires, threat to one's needs (emotional or physical), or a challenge; normal emotion that can be positive when expressed in a healthy manner the psychological contract between employers and workers is still very strong.true/false Which verb conjugation best completes this sentence?Ramn _____ sed.A. tieneB. tenerC. tengoD. tienes Can someone help me with this? Right answer gets brainliest!! :) Who is Alison Grace Dwivedi on january 1, abc, inc., issued $100,000 of 10%, 5-year bonds, for $92,280. interest is due semiannually. when abc records the first interest payment, which will be greater the debit to interest expense or the credit to cash? true or false: ebonics, also known as african american vernacular english (aave) or black vernacular english (bev), is a dialect of american english. Why is the sky blue? The earth is surrounded by an atmosphere. PLS HELP, WLL GIVE BRAINLEST, AND DONATE POINTS, PLEASE HELP ASAP!!!!!! ALSO GIVING 30 POINTS 1. If a silkworm can produce 24 inches of silk every 15 minutes, how long will it take toproduce enough silk for a scarf, which requires 45 meters of silk? (1m = 39.37 in) What is the following sum?16xy +4/3/54x8,54x{X/)+12+y(2/28)8x{X/Xy) + 12x2y? (1/6)16xy/2y2[48xy(2/2)PLEASE HELP!!!!!!!! 8.What are different types of Renewable Energy? Let f(x)=3x^2+5. The quadratic function g(x) is f(x) translated 3 units up. What is the equation for g(x) in simplest from? Enter your answer by filling in the box. The center of the circle is shown.Circle with radius 9.What is the exact area of the circle? Question 3 options:32418981 answer fast pls A business owner who takes risk describes which of the following?a. Entrepreneurb. Status quoC.Inventord. Entrepreneurship 9. Which of the following is true?A. A person under 21 years old can purchase a long gun.OB. There is no requirement to register a gun in Texas.OC. A person who has an assault of a family member conviction is not eligible to possessa firearm within 5 years of conviction.O D. All of the aboveBackNext Why would a wealthy business owner oppose socialism?