Write the definition of a function named timeOnHighway that receives three parameters, all of type double: mileEndingPoint, mileStartingPoint, and speed.

Answers

Answer 1

The function named timeOnHighway takes three double parameters: mileEndingPoint, mileStartingPoint, and speed.

What is the definition of the timeOnHighway function with three double parameters?

The function definition for timeOnHighway specifies three parameters, all of which are of type double. The parameters are mileEndingPoint, representing the ending point of the journey in miles, mileStartingPoint, representing the starting point of the journey in miles, and speed, representing the speed at which the journey is undertaken.

Within the function, various calculations and operations can be performed using these parameters to determine the time spent on the highway. These calculations may involve finding the difference between the ending and starting points, dividing it by the speed to determine the duration, and returning the result.

By using the timeOnHighway function with appropriate parameter values, the program can efficiently calculate and obtain the time spent on the highway for different scenarios. This function can be utilized in various applications that require time calculations related to highway travel or distance-based calculations.

Learn more about function

brainly.com/question/28303908

#SPJ11


Related Questions

list any four e-commerce website​

Answers

Answer:

Amazon. Founded in the US in 1994, Amazon started as an online bookstore that later diversified to products including media, electronics, apparel, furniture, food, toys, and jewelry.

eBay. ...

Walmart. ...

Etsy. ...

Home Depot. ...

Target. ...

Best Buy. ...

Wayfair.

Answer:

I'm sorry is this a question?

how can i help?

Explanation:

What are the steps to creating a blank database? Use the drop-down menus to complete them.
1. Click the
tab, and click
2. Under the
category, click Blank Database.
3. Specify a name and location for the database.
4. Click

Answers

Answer:

What are the steps to creating a blank database? Use the drop-down menus to complete them.

click the file tab, and click new

Under the available Templates category, click Blank Database.

Specify a name and location for the database.

Click create.

Explanation:

Just did it on Edge :)

The steps to create a blank database in a database software includes:

Click the file tab, and click newUnder the available Templates category, click Blank Database.Specify a name and location for the database.Click create.

What is a blank database?

This is a creation of new interface that allows to stores your data in rows (records) and columns (fields).

Therefore, the database created a tables, reports, forms and queries for data storage and retrieval.

Read more about blank database

brainly.com/question/26746370

#SPJ2

To protect your information and help you to remember passwords, use your social media account login information to log into another site.
a. True
b. False

Answers

The claim that you can connect into another company using your social media login information is untrue.

What does login mean?

By contrast with the word to clock in, the noun login is derived first from verb (to) log in. Programs that employ technology locating of who has used the system. The word "log" is taken from the chip log, which was traditionally used to keep track of the miles driven at ship and was kept in a ship's register or log book.

Are user name and login the same thing?

The name assigned to a user on a network of computers is known by a variety of other names, including an username, login ID, name, and user ID. Such username is frequently an acronym for user's real name or maybe an alias.

To know more about Login visit:

https://brainly.com/question/27997504

#SPJ4

Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as ________. All of the answer choices are correct. editor reader subject matter expert

Answers

People or web do wants their privacy. Large wikis do protect the quality and accuracy of their information by assigning users roles such as Reader, Subject Expert and editor.

What is website quality?

Website quality is one that is said to be based on the quality of the software and output. Website Quality or say the Quality of Websites are said to be often measured from two views.

That is the Programmers, and End-users. The various aspects of website quality ranges from programmers who are based on the extent of Maintainability, Security, Functionality and others.

learn more about protection of quality  from

https://brainly.com/question/13171394

NEED Help

4.8.6 All Dice Values Codehs

Answers

Note that there is a syntax error in the code. The semicolon at the end of the first line should be a colon. Here is the corrected code:


for i in range(1, 7):

   for x in range(1, 7):

       print((i, x))

What is the explanation for the above response?

With this correction, the code should work properly by printing all possible pairs of numbers between 1 and 6 using nested loops.

Nested loops refer to the concept of having one loop inside another loop. The inner loop runs for each iteration of the outer loop, leading to a set of repeated iterations. Nested loops are commonly used for tasks such as iterating over multi-dimensional arrays or performing operations on every combination of two sets of data. However, care must be taken to avoid creating infinite loops.

Learn more about syntax error at:

https://brainly.com/question/28957248

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

All dice values. I don’t understand how this wrong. See attached image.

NEED Help 4.8.6 All Dice Values Codehs

Which of the following is likely to be a consequence of cloud computing in the future?
A) The preference to set up one's own computing infrastructure will increaseamong organizations.
B) The cost of obtaining elastic resources will decrease.
C) The demand for employees who know how to use and manage informationsystems will reduce.
D) The number of technology-based startups will stagnate.

Answers

The cost of obtaining elastic resources will decrease.

Is there a future for cloud computing?

It is reasonable to argue that cloud computing has a bright future. Businesses and people are increasingly turning to the cloud to store and manage their data as artificial intelligence (AI) advances. Natural catastrophes cause data loss. (One benefit of cloud computing is that data is typically spread across numerous sites, making it less susceptible to catastrophic losses.)

Natural disasters can cause data loss by affecting the hardware that stores your data. A server, for example, might be damaged by fire, flooding, earthquake, or other natural calamities. Storm-related electrical surges or outages may also cause data corruption.

To learn more about cloud computing to refer:

https://brainly.com/question/29737287

#SPJ4

How do you write mathematical expressions that combine variable and literal data

Answers

Variables, literal values (text or integers), and operators specify how the expression's other elements are to be evaluated. Expressions in Miva Script can generally be applied in one of two ways: Add a fresh value.

What connection exists between literals and variables?

Literals are unprocessed data or values that are kept in a constant or variable. Variables can have their values updated and modified since they are changeable. Because constants are immutable, their values can never be updated or changed. Depending on the type of literal employed, literals can be changed or remain unchanged.

What kind of expression has one or more variables?

The concept of algebraic expressions is the use of letters or alphabets to represent numbers without providing their precise values. We learned how to express an unknown value using letters like x, y, and z in the fundamentals of algebra. Here, we refer to these letters as variables.

to know more about mathematical expressions here:

brainly.com/question/28980347

#SPJ1

Write a pseudocode to print the sum of first 10 terms in the series:
2, 4, 9, 16, 25…

Answers

Answer:

2,4,9,16,25,36,49,64,81, 110 , 121, 144

need help design A slot machine is a gambling device that the user inserts money into and then pulls a lever (or presses a button). The slot machine then displays a set of random images. If two or more of the images match, the user wins an amount of money, which the slot machine dispenses back to the user.

Design a program that simulates a slot machine. When the program runs, it should do the following in C++ with pseudocode:

Ask the user to enter the amount of money he or she wants to insert into the slot machine
Instead of displaying images, the program will randomly select a word from the following list: Cherries, oranges, Plums, Bells, Melons, Bars
The program will select and display a word from this list three times.
If none of the randomly selected words match, the program will inform the user that he or she has won $0. If two of the words match, the program will inform the user that he or she won two times the amount entered. If three of the words match, the program will inform the user that he or she has won three times the amount entered.
The program will ask whether the user wants to play again. If so, these steps are repeated. If not, the program displays the total amount of money entered into the slot machine and the total amount won.
Be sure to divide the program into functions that perform each major task.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Design a program that simulates a slot machine.

Writting the code:

import java.util.*;

public class SlotMachine {

public static int bal = 10;

public static void main(String[] args)

{

Scanner kbd = new Scanner(System.in);

int win = 0, bet = 0;

int slot1, slot2, slot3;

Random generator = new Random();

slot1 = generator.nextInt(10);

slot2 = generator.nextInt(10);

slot3 = generator.nextInt(10);

slot1 = 3;

slot2 = 7;

slot3 = 9;

System.out.println("Starting balance = $10.00");

while (bet > 0 || win <=0)

{

System.out.println("Enter your bet (or 0 to quit): ");

bet = kbd.nextInt();

System.out.println("Slot result: \n" + slot1 + " " + slot2 + " " + slot3);

if (slot1 == slot2 && slot1 == slot3);

{

win = ((slot1 + 1) * bet);

System.out.println("You have won: $" + win);

System.out.println("Balance: $" + bal + win);

}

if ((slot1 == slot2 && slot1 != slot3)|| (slot2 == slot3 &&

slot2 != slot1) || (slot3 == slot1 && slot3 != slot2));

{

if (slot1 == slot2)

{

win = ((bet * slot1)/2);

bal = bal + win;

System.out.println("You have won: $" + win);

System.out.println("Balance: $" + bal + win);

}

else if (slot1 == slot3)

{

win = ((bet * slot1)/2);

bal = bal + win;

System.out.println("You have won: $" + win);

System.out.println("Balance: $" + bal + win);

}

else if (slot2 == slot3)

{

win = ((bet * slot2)/2);

bal = bal + win;

System.out.println("You have won: $" + win);

System.out.println("Balance: $" + bal + win);

}

}

if (slot1 != slot2 && slot1 != slot3)

{

bal = bal - bet;

System.out.println("You have won: $" + win);

System.out.println("Balance: $" + bal + win);

}

}

}

}

See more about JAVA at brainly.com/question/13437928

#SPJ1

need help design A slot machine is a gambling device that the user inserts money into and then pulls
need help design A slot machine is a gambling device that the user inserts money into and then pulls

This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false. Where should return false; be written in the code? function checkVowel(character){ var vowels = ["a", "e", "i", "o", "u"]; for(var i=0; i

Answers

Answer:

at the end, i.e., after the for loop.

Explanation:

see code.

I also added a cooler alternative implementation.

This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false.
This function checks if a character is a vowel. If it is, it returns true. Otherwise, it returns false.

The main function's return of 0 indicates a successful program execution. Return 1 in the main function denotes an error and indicates that the program did not run correctly. Returning zero indicates that a user-defined function has returned false. Returning 1 indicates that a user-defined function has returned true.

What return false be written in the code?

One of the two values is what t may return. If the parameter or value supplied is True, it returns True. If the supplied parameter or value is False, it returns False.

Because it is a string, “0” is equivalent to false in JavaScript. However, when it is tested for equality, JavaScript's automatic type conversion changes “0” to its numeric value, which is 0; as we know, 0 denotes a false value. As a result, “0” is false.

Therefore, at the end, i.e., after the for loop. I also included a more attractive alternate implementation.

Learn more about code here:

https://brainly.com/question/20345390

#SPJ5

which of the following is a limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10?

Answers

The option that is limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10 is known to be option a. Windows PE/.

What is Windows PE used for?

Windows PE (WinPE) is known to be a term that connote  a little form of an operating system.

It is known to be one that is often used to install, deploy, as well as been used to repair Windows desktop editions, Windows Server, and other kinds of Windows operating systems.

Note that with the use of the Windows PE, a person can be able to Set up their hard drive before they can install the  Windows.

Therefore, based on the above, The option that is limited and non-gui version of windows based on windows 10 technologies that can be used for installing, troubleshooting, and repairing windows 10 is known to be option a. Windows PE/.

Learn more about Windows PE from

https://brainly.com/question/14297547

#SPJ1

Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10?

a. Windows PE

b. WAIK

c. USMT

d. DISM

Select three advantages of using Cascading Style Sheets.

A) They make it possible to give specific tags specific rules.

B) They make it simple to design web pages if you do not know HTML.

C) They make it easy to edit multiple parts of the document at once.

D) They provide information about changes made to websites.

E) They cut down on the amount of code needed.

Answers

Answer:

They make it easy to edit multiple parts of the document at once., They cut down on the amount of code needed., They make it possible to give specific tags specific rules.

In a typical information security program, what is the primary responsibility of information (data) owner

Answers

The typical responsibility of the information that an owner is to determine the level of sensitivity or classification level.

What is an information security program?

The information security program is a set of activities, projects, and initiatives that help an organization IT framework and help the organization meet all the business goals leading to corresponding to the benchmarks. The main duty of the data owner is to determine the level of sensitivity of the data.

Find out more information about information security.

brainly.com/question/25226643

5. Apart from the above sounds, colours and symbols,( high pitched sound- low pitched sound, red , green, amber, cross, ticks) describe three other ways that a user
interface could signal to a user that an action was successful or unsuccessful.
Successful
a.
b.
C.
Unsuccessful
a.
b.
C.

Answers

The three ways that a user interface could signal to a user that an action was successful or unsuccessful are as follows:

Text color.Image construction. Graphical representation.

What do you mean by User interface?

The user interface may be defined as the point of interaction between the human-computer and communication in a device. It can typically include display screens, keyboards, a mouse, and the appearance of a desktop.

According to the question, the user interface generally governs the way through which a user can typically interact with an application or a website. It is a type of space that effectively involves the connection or interaction between humans and other machines.

A user interface could signal to a user that an action was successful or unsuccessful. This must be dependent on several factors like text color, graphical representation, and image construction.

To learn more about the User interface, refer to the link:

https://brainly.com/question/17372400

#SPJ9

What is Digital Etiquette? Explain in your own words

Answers

Answer:

rules about the best way to communicate

Explanation

rules about being proper and polite

Which protocol should typically not be used to ensure confidentiality of data as it traverses a network?

Answers

The protocol should typically not be used to ensure confidentiality of data as it traverses a network is FTP.

Why FTP is used?

FTP means "File Transfer Protocol" and refers to a group of rules that govern how computers transfer files from one system to another over the internet. Companies use FTP to send files between computers, while websites use FTP for the uploading and downloading of files from their website's servers.

File transfer protocol is a way to download, upload, and share files from one location to another on the internet and between computer techniques. FTP enables the transfer of files back and forth between computers or through the cloud. Users need an internet link to execute FTP transfers.

To learn more about FTP, refer to :

https://brainly.com/question/27610307

#SPJ4

Write
a program that converts meters to feet (3.279 feet per meter).
Your program must take meters as input (i.e. 3.25) and convert to
feet (i.e. 10.657). Output the results.

Answers

Here is a program written in Python that converts meters to feet using the conversion factor of 3.279 feet per meter and outputs the result:

``` meters = float(input("Enter length in meters: ")) feet = meters * 3.279 print(f"{meters} meters = {feet} feet") ```

Here's how the program works:

1. The user is prompted to enter a length in meters. The float() function is used to convert the input string to a floating-point number.

2. The meters value is multiplied by the conversion factor of 3.279 to get the equivalent length in feet.

3. The result is printed to the console using the f-string syntax to interpolate the values of meters and feet.

The output will look something like this:

Enter length in meters: 3.25 3.25 meters = 10.65725 feet

Learn more about python at

https://brainly.com/question/18317415

#SPJ11

What is one trade-off of using optical discs to store files?
OA. The drives are more expensive than SSDs, but you can read and
write to them anywhere.
B. The drives are less expensive than HDDs but have many moving
parts.
C. They keep data for a very long time when stored correctly but can
be easily scratched.
OD. They read and write data faster, but over time, the data becomes
difficult to access.

Answers

Answer:

C. They keep data for a very long time when stored correctly but can be easily scratched.

What is a PivotTable?

Answers

You use it to analyze numerical data

Answer:

A PivotTable is a tool in a spreadsheet program, such as Microsoft Excel, that allows you to organize and summarize large amounts of data. PivotTables allow you to quickly create reports and view your data from different perspectives. You can use PivotTables to create calculations, compare data, and find trends and patterns. PivotTables are a useful tool for data analysis and can help you make better decisions based on your data.

Define the followimg terms as it relates to coding.

Expression

Variable

Assignment operator​

Answers

Answer and Explanation:

In coding, an expression is used to represent values. It may contain variables and/or constant.

Examples of expressions are:

\(a - b\)     \(a * 2\)     \(4 - 3\)

Variables are literally memory locations. They are used to storing values, and they assume the values they store during program execution.

At any point in the program, the value of the variable can be changed.

Lastly, there are guidelines that follow naming variables (depending on the programming language).

Examples of accepted variable names (in C++) are:

num, num_1, num1

Assignment operator

This is the = sign. It is used for assigning values to variables.

Examples of how it is used are:

\(num1 = a - b\)

\(num\_1 = a*2\)

\(num = 4 - 3\)

The following is a wrong usage of the operator

\(4 - 3 = num\)

What is ABC computer?​

Answers

Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.

Explanation:

Help me guys..
thankyou​

Help me guys..thankyou

Answers

Answer:

spoon

excess

level

1/2 cup

whatever dry ingredient u have

Explanation:

involve using a physical attribute such as a fingerprint for authentication

Answers

Biometric authentication methods involve using a physical attribute such as a fingerprint for authentication.

How is this so?

Biometrics utilize unique characteristics of an individual, such as fingerprints, iris patterns, or   facial features, to verify their identity.

By capturing and comparing these physical attributes, biometric systems can authenticate individuals with a high level of accuracy.

Biometric authentication provides   an additional layer of security by leveraging the uniqueness and difficulty of replicating these physical attributes.

Learn more about Biometric at:

https://brainly.com/question/15711763

#SPJ4

smart tv has _____ intergrated with it

Answers

Answer:

an operating system

Explanation:

Which are potential harmful effects of intellectual property rights? Select 2 options.
A-no two companies can create the same products
B-general patents can prevent innovative ones from being filed
C-trademarks and patents may be over-enforced by companies
D-malware is easily added onto well-known apps by hackers
E-safe communication between businesses may be stifled

Answers

There are a few things that could be bad effects of intellectual property rights:

B- General patents can stop people from getting patents on new ideas: This is because general patents may be so broad that they cover a wide range of products or ideas. This makes it hard for other inventors to come up with new products or ideas that are not covered by the patent. Because of this, progress and new ideas may be slowed down.C- Companies may use their intellectual property rights too much to stop others from using similar ideas or products. This can happen when companies use their trademarks and patents to do this. Too much enforcement can lead to lawsuits that aren't necessary, high legal fees, and, in the end, less innovation and competition in the market.

The other choices have nothing to do with intellectual property:

A- No two companies can make the same products: This is not entirely true, as companies can make similar products without violating each other's intellectual property rights.D- It's easy for hackers to add malware to well-known apps: This statement has nothing to do with intellectual property rights. Instead, it's about cybersecurity.E-Businesses may not be able to talk to each other in a safe way. This statement has nothing to do with intellectual property rights, but rather with data privacy and security.

Rephrased if the above is hard to understand.

B- General patents can stop people from getting patents on new ideas: Patents are meant to spur innovation by giving inventors exclusive rights for a limited time, but patents that are too broad or general can have the opposite effect. They could stop other inventors from making new products or technologies that are similar to the patented invention but different in some way. This would slow down innovation.

C- Companies may be too strict with trademarks and patents: Too much enforcement can hurt competition, stop people from coming up with new ideas, and lead to lawsuits and legal costs that aren't necessary. When companies use their intellectual property rights to stop others from using similar ideas or products, they hurt both customers and competitors. This is because it can make it harder for people to find other products and ideas, raise prices, and make the market less diverse.

Options A, D, and E, on the other hand, are not bad things that could happen because of intellectual property rights. Option A, "No two companies can make the same products," is not always true, since companies can make similar products without violating each other's intellectual property rights. Option D, "Hackers can easily add malware to well-known apps," has nothing to do with intellectual property rights. Instead, it is about cybersecurity. Option E, "Businesses may not be able to talk to each other safely," is also not directly about intellectual property rights. Instead, it is about data privacy and security.

Consider the language ODDNOTAB consisting of all words that do not contain the substring ab and that are of odd length. (0) an applicable universal set (ii) the generator(s), (ili) an applicable function on the universal set and (iv) then use these concepts to write down a recursive definition for the language Give

Answers

The set theory is used to describe the set of strings of the ODDNOTAB language.Consider the ODDNOTAB language consisting of all odd-length words that do not include the ab substring. The following are the terms that must be included in the answer:(i) an applicable universal set(ii) the generator(s)(iii) an applicable function on the universal set(iv) using these concepts to provide a recursive definition for the language.

The following are the solutions to the given question:The universal set will be {a,b} and the generator(s) will be Ʃ. We can use the complement of the set {ab} to create a subset of Ʃ*. The word with length one, i.e., Λ, will be used as the base case and written into the language.

The recursion definition for the language ODDNOTAB can be written as:ODDNOTAB = {Λ} ∪ {x ∈ Ʃ*: x = ay or x = by for some y ∈ ODDNOTAB} where Ʃ = {a, b}.Therefore, the solution to the problem is that the language ODDNOTAB consists of all words that do not contain the substring ab and that are of odd length.

The universal set is {a, b}, the generator(s) is Ʃ, the function on the universal set is {ab} complement, and the recursive definition for the language is given as ODDNOTAB = {Λ} ∪ {x ∈ Ʃ*: x = ay or x = by for some y ∈ ODDNOTAB}.

For more question on function

https://brainly.com/question/11624077

#SPJ8

difference between nintendo switch and switch lite

Answers

Answer:

thank you sa point labyu stay safe

Answer: The switch lite is the one you can't dock onto your tv and is mostly used for handheld purposes, also you can't take off the controllers.

Explanation:

describe the component of communication system with the help of diagram

Answers

Answer:

Solution

Communication:

The communication system is a system that describes the information exchange between two points. The process of transmission and reception of information is called communication.

Components of Communication:

The three essential components of a communication system are:

Transmitter:

The transmitter modulates the message signal.

Modulation is the process of converting a signal into a form suitable for transmission.

A transmitter is a telecommunications electrical device that generates radio waves so that data may be transferred or received through an antenna.

The transmitter may generate an alternating current of radio frequency, which is then applied to the antenna, which radiates it as radio waves.

Channel:

A communication channel is a physical transmission channel in telecommunications and computer networking.

A channel is a device that delivers data from one or more senders (or transmitters) to one or more receivers.

Or in other words, the channel is what connects the output of the transmitter to the receiver input.

Receiver:

The receiver does the demodulation. Demodulation is the process of recovering the correct message signal.

The received signal, which is picked up from the broadcast signal at the channel output, is processed by the receiver to reproduce the original message signal in a recognizable form for transmission.

A radio receiver, also known as an FM receiver, is a device that receives radio waves and converts the data carried by them into useable information.

The desired frequency waves are caught using an antenna

describe the component of communication system with the help of diagram

list 4 functions of algorithm​ .ASAP,pls no Links!!! Thanks

Answers

Answer:

Simple recursive algorithms.

Backtracking algorithms.

Divide and conquer algorithms.

Dynamic programming algorithms.

Explanation:

1) If a security pays $133 in three years, its present value is
$100 if the interest rate is A) 13. B) 12 percent. C) 11percent. D)
10 percent.

Answers

If the interest rate is 12 percent, the present value would be equal to $100 because the future cash flow is discounted at a rate that matches the cash flow. Therefore, option B) 12 percent is the correct answer.

To determine the present value of a security that pays $133 in three years, we need to discount the future cash flow at a given interest rate.

Let's evaluate each option:

A) If the interest rate is 13 percent, the present value would be less than $100 because the future cash flow is discounted at a higher rate. This means that the value of receiving $133 in three years would be lower than $100 in today's terms.

B) If the interest rate is 12 percent, the present value would be equal to $100 because the future cash flow is discounted at a rate that matches the cash flow. This implies that receiving $133 in three years is equivalent to having $100 today.

C) If the interest rate is 11 percent, the present value would be greater than $100 because the future cash flow is discounted at a lower rate. This indicates that the value of receiving $133 in three years would be higher than $100 today.

D) If the interest rate is 10 percent, the present value would also be greater than $100 because the future cash flow is discounted at a lower rate. This suggests that the value of receiving $133 in three years would be higher than $100 today.

Based on the given options, the interest rate of 12 percent (option B) is the one that would result in a present value of $100 for the security that pays $133 in three years. Therefore, option B) 12 percent is the correct answer.

It's important to note that the present value calculation considers the time value of money and the interest rate. Different interest rates will yield different present values, reflecting the varying value of money over time.

Learn more about cash flow here:-

https://brainly.com/question/33655563

#SPJ11

Other Questions
Identify the term, like term, coefficient, and contant in 4e 7e 5 2e i jut cant undertand what to do pleae hurry I have to go back to cla oon and I WILL GIVE BRAINLYEST TO WHO EVER HELPS ME! 37 degree 79 degree what is the value of n whats is 17 1/4 plus 7/8 A part of an mRNA molecule with the following sequence is being read by a ribosome: 5'-UGC-GCA-3' (mRNA). The charged transfer RNA molecules shown in the figure below (with their anticodons shown in the 3' to 5' direction) are available. Two of them can correctly match the mRNA so that a dipeptide can form:Which of the following dipeptides will be formed? Proline-ThreonineGlycine-CysteineAlanine-AlanineCysteine-Alanin In cell fractionation experiments in which subcellular organelles are separated on the basis of their density, the smooth endoplasmic reticulum is_________ the rough endoplasmic reticuluma. denser than b. lighter than c. the same density asd. the same density as lipid droplets and much denser than e. None of the above If $1500 is invested at an interest rate of 4.5% per year, compounded continuously, find the value of the investment after the given number of years. (Round your answers to the nearest cent.) (a) 2 years x (b) 4 years 4 $ (c) 12 years Crowds can provide ideas in a collaborative or a competitive mode. However, the crowd's role may differ at different stages of the decision-making process.TRUE a parent brings a child to the clinic where the child is diagnosed with hookworms. the parent asks how the child got hookworms and how to prevent future occurrences. what should the nurse teach the parent to prevent future occurrences? Pls anwer this qestion it is worth 30 points PLEASE HELP ASAP!! THE FIRST AND THE CORRECT ANSWER WILL Get BRAINLIEST! What is the best way to begin a written case study like When Birds Get Flu by John DiConsiglio? A) By adding supplemental details that explain the case study B) By drawing the conclusions that result from the case study C) By providing supporting evidence that proves the case study D) By asking the main question that is addressed by the case study : (3+4)-(3-1) (3+1)=49 what is the value of Q? PLEASE SOLVE ASAP! What is the equivalent inductance (in Henries) for three inductors in parallel having values of L1=2 Wb/Amp, L2=4.2 Wb/Amp and L3=1.3 Wb/Amp? For firms in a perfectly competitive (or commodity) industry, we know that and price are equal. The price of an item yesterday was 135 . Today, the price fell to 54. Find the percentage decrease. Activity-based costing (ABC) is ? PART B Amelia Earhart: PioneerAmelia Earhart was born in 1897 in a small Kansas town. That was six years before the Wright brothers took their famous first airplane flight in Kitty Hawk, North Carolina. Over the next two decades, aviation developed rapidly, but the pilots at the controls were mainly men. Amelia Earhart broke through that barrier to become a famous aviator, and she paved the way for women who followed. Amelia Takes OffAmelia took her first flying lesson in 1921. At the end of the year, she received her pilots license. She took odd jobs and received financial help from her mother to buy her own airplane. With a plane of her own, Amelia quickly began making a name for herself in the aviation world. In October 1922, she broke a world record for female pilots by flying her plane to 14,000 feet in altitude. In 1923, she received her International Pilots Licensejust the sixteenth woman in the world to do so. Unfortunately, Amelia had to sell her plane to give her mother money, and for a while, her love of aviation became more of a hobby.But this all changed in 1928 when Amelia was contacted by publisher George Putnam, who she later married. He invited her to be a passenger on a cross-Atlantic flight. Amelia would have preferred to be the pilot, not the passenger, but at the time, flying a plane over an ocean was considered too dangerous for women.The flight was successful, and Amelia became world-famous as the first woman to fly across the Atlantic. However, Amelia was not satisfied. She did not get to operate the controls during the flight and thought of herself as being no more important to the flights success than a sack of potatoes. She was determined to fly on her own.Amelia Reaches StardomIn 1929, Amelia became involved with an organization called the Ninety-Nines, a group that promoted female pilots in the aviation industry. She was the groups first president. In May of 1932, Amelia crossed the Atlantic again, but this time she was at the controls. She made the trip from Canada to Ireland in 15 hours. She received many medals and awards for her achievement.Amelia hoped her success would open doors for women in aviation and in other fields, so she continued flying and setting records. She became the first person to fly across both the Atlantic and Pacific oceans when she flew from Hawaii to California.An Extraordinary MissionEven after proving she was a world-class aviator, Amelia still wanted more. In 1937, she set off on an amazing trip: flying around the world. Amelia started in California but faced trouble along the way. She became ill, her plane needed repairs, and bad weather forced a change in the flight route. She made it to one of her planned stops near Australia, but she never made it to her next destination. People all over the world were following the news of Amelias tripand now she was missing! President Franklin D. Roosevelt conducted a $4 million rescue mission, but Amelia was never found.Amelia hoped that her actions would inspire other women to follow their dreams. One of her lifelong missions was for the world to recognize that women could have the same careers as men. Even though she died at a young age, just 40 years old, Amelia was an inspiration to many. What problems did Amelia face once she decided she wanted to become a pilot, and how did she solve those problems? Use details from the text to support your answer. 'Managerialism is an unsatisfactory approach to the study ofemployment relations because of its failure to recognize theinherent potential for conflict in the workplace. Present adetailed and coher ______is one that is no longer useful once it's used, or lasts for less than three years. Which term describes a logical network allowing systems on different physical networks to interact as if they were connected to the same physical network?A. Virtual local area networkB. Wide area networkC. Metropolitan area networkD. Peer-to-peer