You enjoy helping people find solutions to problems that they are having with technology. Which job might be best for you?

A database manager

B technical support

C website design

D data scientist

Answers

Answer 1

Answer: B - technical support

Explanation:


Related Questions

Which of the following is not a characteristic of a good value log entry

Answers

What are we supposed to find? Help us

Write the method public static doublell quizAverages (double (1 scores). which takes a 2D array of doubles that represent quiz scores for students in a course and returns an array of quiz averages. Specifically, each column represents a quiz, and each row represents a student in the class. Therefore, what the method returns is an array of column averages, essentially. Assume that all students take the same number of quizzes

Answers

Answer:

import java.util.Arrays; public class Main {    public static void main(String[] args) {        double [][] studentScores = {                {78, 40, 97},                {89, 90, 68},                {70, 35, 88}        };        System.out.println(Arrays.toString(quizAverages(studentScores)));    }    public static double[] quizAverages(double [][] scores){        double average[] = new double[scores[0].length];        for(int col = 0; col < scores[0].length; col++){            double sum = 0;            for(int row =0; row < scores.length; row++){                sum += scores[row][col];            }            average[col] = sum / scores[col].length;        }        return average;    } }

Explanation:

The solution code is written in Java.

Firstly, create a static method that take one input parameter, double type two dimensional arrays and this method will return one array of average as required by question (Line 11).

In the method, declare a double type array and initialize its size with the length of the column of the input scores array (Line 12).

Create a double layer of for loop with outer loop to iterate through the column of the input score array and the inner loop to iterate through the row (Line 13-15). In the outer loop, create a sum variable to hold the value of summation for each column (Line 14). In the inner loop, increment the sum variable with the score in each row (Line 16). After finishing one inner loop cycle, the sum is divided by the length of column and assign it to an item of average array in outer loop before proceed to the next round of outer loop to repeat the same process (Line 18).

At last return the average array (Line 20).

We can test the method using a sample data (Line 4-8) and print out the output returned by the method (Line 9).  

What does the coding phase involve?
A.
testing and debugging code to remove all possible errors
B.
writing sequences of statements in a suitable programming language to produce the desired program
C.
designing a proper pseudocode using human-readable language
D.
compiling and interpreting programs into machine language
E.
breaking down the entire code into workable modules

Answers

Answer:

I do believe it is D im not sure

Answer:

Ay homie the answer is B

Explanation:

Edmentum

Frankie is sitting in her first photography lecture course and feels quite prepared since she has been taking photos her whole life. However, when the professor begins the lecture by asking what a photograph is all about on the most basic level, Frankie incorrectly responds "memories." What would have been a more accurate answer? O A creativity O B. light O C. darkness OD. chemicals​

Answers

Answer:

B. light

Explanation:

In the most basic level, all photographic processes are about capturing light, in a film or in a digital sensor.

PLEASE HELP IN JAVA

A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs.

Ex: If the input is:

3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank

the output is:
867-5309

Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize)

Hint: Use two arrays: One for the string names, and the other for the string phone numbers.

Answers

Answer: import java.util.Scanner;

public class ContactList {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Read the number of word pairs in the list

       int n = scnr.nextInt();

       scnr.nextLine(); // Consume the newline character

       

       // Read the word pairs and store them in two arrays

       String[] names = new String[n];

       String[] phoneNumbers = new String[n];

       for (int i = 0; i < n; i++) {

           String[] parts = scnr.nextLine().split(",");

           names[i] = parts[0];

           phoneNumbers[i] = parts[1];

       }

       

       // Read the name to look up

       String name = scnr.nextLine();

       

       // Call the getPhoneNumber method to look up the phone number

       String phoneNumber = getPhoneNumber(names, phoneNumbers, name, n);

       

       // Print the phone number, or "None" if the name is not found

       if (phoneNumber != null) {

           System.out.println(phoneNumber);

       } else {

           System.out.println("None");

       }

   }

   

   public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) {

       // Search for the name in the array and return the corresponding phone number

       for (int i = 0; i < arraySize; i++) {

           if (nameArr[i].equals(contactName)) {

               return phoneNumberArr[i];

           }

       }

       // If the name is not found, return null

       return null;

   }

}

Explanation: The program inputs the number of word sets, stores them in two clusters (names and phoneNumbers), and looks up a title by calling the getPhoneNumber strategy to return the comparing phone number. Prints phone number or "None" in the event that title not found. getPhoneNumber strategy takes nameArr, phoneNumberArr, contactName, and arraySize as contentions. The strategy looks for a title and returns the phone number in case found, something else invalid.

what is a good rule-of-thumb for using color background in a worksheet?

Answers

Answer: The answer is given below

Explanation:

A good rule-of-thumb for using color background in a worksheet are:

• Avoid using more than four colors as ideally 2-3 colors should be used.

• Opt for tones, shades, and tints rather than being tempted to use many colors.

• Colors that are controversial should be avoided.

• Color should be added when it's required to pass across a message.

• A base color should first be selected, then complementary colors should be added to it.

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

Which of the code segments will always correctly assign the maximum element of the array to the variable max ? Select one: a. I only b. II only c. III only

Answers

The most significant value in arr is negative. This is due to the code setting the maxVal to zero. Because the check is for > maxVal, which is zero if all integers in the array are zero, it will never set maxVal for a negative number.

What do you name code segments?

The name "segment" is derived from the memory segment, a prior technique of memory management that was superseded by paging. When a programme is stored in an object file, the code segment is included in that file; when the loader loads the programme into memory so that it can be executed, various memory regions (in particular, as pages) are allocated, corresponding to both the segments in the object files and segments only needed at run time. For example, the code segment of an object file is loaded into memory and mapped to a corresponding code segment.

Because the code segment in memory is normally read-only and has a set size, it may usually be put in read-only memory (ROM) on embedded systems The requirement for loading. If the code section is not read-only, the design allows for self-modifying code.

Learn more about memory from here;

https://brainly.com/question/11103360

#SPJ4

How are the aims of science and technology different?

Answers

Answer:

goal of technology is to create products that solve problems and improve human life.

Explanation:

The words science and technology can and often are used interchangeably. But the goal of science is the pursuit of knowledge for its own sake while the goal of technology is to create products that solve problems and improve human life.

Algorithm:

Suppose we have n jobs with priority p1,…,pn and duration d1,…,dn as well as n machines with capacities c1,…,cn.

We want to find a bijection between jobs and machines. Now, we consider a job inefficiently paired, if the capacity of the machine its paired with is lower than the duration of the job itself.

We want to build an algorithm that finds such a bijection such that the sum of the priorities of jobs that are inefficiently paired is minimized.

The algorithm should be O(nlogn)


My ideas so far:

1. Sort machines by capacity O(nlogn)
2. Sort jobs by priority O(nlogn)
3. Going through the stack of jobs one by one (highest priority first): Use binary search (O(logn)) to find the machine with smallest capacity bigger than the jobs duration (if there is one). If there is none, assign the lowest capacity machine, therefore pairing the job inefficiently.

Now my problem is what data structure I can use to delete the machine capacity from the ordered list of capacities in O(logn) while preserving the order of capacities.

Your help would be much appreciated!

Answers

To solve the problem efficiently, you can use a min-heap data structure to store the machine capacities.

Here's the algorithm:

Sort the jobs by priority in descending order using a comparison-based sorting algorithm, which takes O(nlogn) time.

Sort the machines by capacity in ascending order using a comparison-based sorting algorithm, which also takes O(nlogn) time.

Initialize an empty min-heap to store the machine capacities.

Iterate through the sorted jobs in descending order of priority:

Pop the smallest capacity machine from the min-heap.

If the machine's capacity is greater than or equal to the duration of the current job, pair the job with the machine.

Otherwise, pair the job with the machine having the lowest capacity, which results in an inefficient pairing.

Add the capacity of the inefficiently paired machine back to the min-heap.

Return the total sum of priorities for inefficiently paired jobs.

This algorithm has a time complexity of O(nlogn) since the sorting steps dominate the overall time complexity. The min-heap operations take O(logn) time, resulting in a concise and efficient solution.

Read more about algorithm here:

https://brainly.com/question/13902805

#SPJ1

More than one component in a particular automotive electric circuit is not working. Technician A starts testing the circuit at the power source. Technician B starts testing the circuit at its load. Who is right?

Answers

Hi there! Hopefully this helps!

--------------------------------------------------------------------------------------------------

The answer is A, testing the circuit at the power source.

______ provide visual representations of the options available for a given command

Answers

The visual representations is provided by the Gallery in the computer system.

Basically, gallery means the collection of pictures in a Computer.

Gallery is what enables systematic display and the management of distinct images in the computer.

A very good illustration is use of Clipart images. It is a ready made picture gallery available in the computer.

Every function on computer are represented with an icon, the icon images are enable through the Gallery.

In conclusion, the Visual representations of the options available for a given command is provided by the Gallery.

Read more about Gallery here

brainly.com/question/2946480

Given a plaintext block and a round key 0 with the following values:
• =
• 0 =
Compute the following AES operations:
(a) The initial AES AddRoundKey layer. (6 pts)
(b) The SubBytes layer from the first round. (6 pts)
(c) The ShiftRows layer from the first round. (6 pts)
(d) The MixColumn layer from the first round applied only to the to the first
column of the internal state. (10 pts)
2. Let plaintext ′ be from problem 1 with the first byte changed to ff. That is,
′ =
Answer the following questions.
(a) Compute the results of the initial AddRoundKey layer with ′ as the input.
How many bytes are different from your answer to problem 1(a)? (4 pts)
(b) Compute the results of the round 1 SubBytes layer with the results from part
(a) as the input. How many bytes are different from your answer to problem
1(b)? (4 pts)
(c) Compute the results of the round 1 ShiftRows layer with the results from
part (b) as the input. How many bytes are different from your answer to
problem 1(c)? (4 pts)
(d) Compute the results of the round 1 MixColumn layer on the first column of
the results from part (c) as the input. How many bytes are different from
your answer to problem 1(d)? (4 pts)
(e) How many bytes would be different in the remaining 3 columns if ′ were
used instead of ? (2 pts)
(f) How many bytes would be different at the end of round 1 if ′ were used
instead of ? (2 pts)
(g) How many bytes would be different at the end of round 2 if ′ were used
instead of ? (2 pts)

Answers

Answer:

people were telling me what to do all the time and I did not enjoy it.( change into passive voice

Which of the following components provides a number of critical services, including a user interface, memory management, a file system, multitasking, and the interface to hardware devices?a. RAMb. Operating system (OS)c. BIOSd. Hard drive

Answers

Answer:

b. Operating system (OS)

Explanation:

Operating System is a term that is mostly referred to as a computer system's component, program or software technology, that carry out various operations for the whole Computer System.

These operations include:

1. a user interface

2. memory management

3. a file system

4. multitasking

5. the interface to hardware devices.

Hence, in this case, the right answer is option B: Operating System.

In what year was napier bone invented ​

Answers

The Napier's Bones is a manually-operated calculating device, invented by the Scottish mathematician John Napier in the early 17th century, around the year 1617.

What is Napier bone used for?

Napier's Bones, also known as Napier's rods, are used for multiplication, division, and square root calculations. The device consists of a set of rectangular rods or bones with each bone representing a single digit in the multiplication table.

By manipulating the rods, users can quickly perform calculations that would otherwise be time-consuming to complete by hand. The Napier bone is an early example of a calculating device and is considered a predecessor to modern mechanical calculators.

Learn more about Napier bone  at:

https://brainly.com/question/24242764

#SPJ1

(Print distinct numbers) Write a program that reads in numbers
separated by a space in one line and displays distinct numbers (i.e., if
a number appears multiple times, it is displayed only once). (Hint:
Read all the numbers and store them in list1. Create a new list list2.
Add a number in list1 to list2. If the number is already in the list,
ignore it.)

Answers

I've included my code in the picture below.

(Print distinct numbers) Write a program that reads in numbersseparated by a space in one line and displays

What enables image processing, speech recognition & complex gameplay in ai

Answers

Deep learning, a subset of artificial intelligence, enables image processing, speech recognition, and complex gameplay through its ability to learn and extract meaningful patterns from large amounts of data.

Image processing, speech recognition, and complex gameplay in AI are enabled by various underlying technologies and techniques.

Image Processing: Convolutional Neural Networks (CNNs) are commonly used in AI for image processing tasks. These networks are trained on vast amounts of labeled images, allowing them to learn features and patterns present in images and perform tasks like object detection, image classification, and image generation.Speech Recognition: Recurrent Neural Networks (RNNs) and their variants, such as Long Short-Term Memory (LSTM) networks, are often employed for speech recognition. These networks can process sequential data, making them suitable for converting audio signals into text by modeling the temporal dependencies in speech.Complex Gameplay: Reinforcement Learning (RL) algorithms, combined with deep neural networks, enable AI agents to learn and improve their gameplay in complex environments. Through trial and error, RL agents receive rewards or penalties based on their actions, allowing them to optimize strategies and achieve high levels of performance in games.

By leveraging these technologies, AI systems can achieve impressive capabilities in image processing, speech recognition, and gameplay, enabling a wide range of applications across various domains.

For more such question on artificial intelligence

https://brainly.com/question/30073417

#SPJ8

How do I find questions to answer?

Answers

Answer:

you go to the left side

Explanation:

yea

What's the difference between cross-site scripting and cross-site request forgery? How do you protect against cross-site request forgery? Against cross-site scripting?

Answers

Answer:

Cross-site request forgery requires a secure website or network that needs user authentication while Cross-site scripting is for websites with no user authentication policies.

Explanation:

Cross-site request forgery is a process used by hackers and network administrators to forcefully grant access to users on a secure website or network. If an administration trust a user who has lost his authentication details, he uses cross-site request forgery to give access to the user.

Cross-site scripting is basically javascript program execution from a server. It is not secure and vulnerable to attacks.

Product reviews are written by:
OA. people with specialized knowledge.
B. clever advertising copywriters.
C. consumers who may use the product.
OD. people on social networking sites.

Answers

Product reviews can be written by all of the above. People with specialized knowledge, clever advertising copywriters, consumers who may use the product and people on social networking sites can all write product reviews.

Need help with this python question I’m stuck

Need help with this python question Im stuck
Need help with this python question Im stuck
Need help with this python question Im stuck

Answers

It should be noted that the program based on the information is given below

How to depict the program

def classify_interstate_highway(highway_number):

 """Classifies an interstate highway as primary or auxiliary, and if auxiliary, indicates what primary highway it serves. Also indicates if the (primary) highway runs north/south or east/west.

 Args:

   highway_number: The number of the interstate highway.

 Returns:

   A tuple of three elements:

   * The type of the highway ('primary' or 'auxiliary').

   * If the highway is auxiliary, the number of the primary highway it serves.

   * The direction of travel of the primary highway ('north/south' or 'east/west').

 Raises:

   ValueError: If the highway number is not a valid interstate highway number.

 """

 if not isinstance(highway_number, int):

   raise ValueError('highway_number must be an integer')

 if highway_number < 1 or highway_number > 999:

   raise ValueError('highway_number must be between 1 and 999')

 if highway_number < 100:

   type_ = 'primary'

   direction = 'north/south' if highway_number % 2 == 1 else 'east/west'

 else:

   type_ = 'auxiliary'

   primary_number = highway_number % 100

   direction = 'north/south' if primary_number % 2 == 1 else 'east/west'

 return type_, primary_number, direction

def main():

 highway_number = input('Enter an interstate highway number: ')

 type_, primary_number, direction = classify_interstate_highway(highway_number)

 print('I-{} is {}'.format(highway_number, type_))

 if type_ == 'auxiliary':

   print('It serves I-{}'.format(primary_number))

 print('It runs {}'.format(direction))

if __name__ == '__main__':

 main()

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Computer programmers are responsible for writing code that tells computers commands to follow.

True
False

Answers

True is the correct answer.

Answer:

True

Explanation:

the answer is true

The code repeat 3 [forward 50 right 120] creates which shape?
a square
a circle
a pentagon
a triangle

Answers

Answer:

Triangle. D

Explanation:

I have no Idea, I was searching for the answer like most of you guys are doing. But my best guess is Triangle

Answer:

D. A triangle is your answer

Explanation:

The triangle is the only shape in this list that has 3 sides.

Answerer's Note:

Hope this helped :)

Match the network media to their characteristic. shielded twisted-pair cable coaxial cable optic-fiber cable used by cable service providers to transmit TV programs arrowRight is heavy and difficult to deploy arrowRight offers the fastest transmission speeds: about 100 Gigabits per second (Gbps)

Answers

Optic-fiber cable - offers the fastest transmission speeds: about 100 Gigabits per second (Gbps).

What is Gigabits?

Gigabits (Gb) is a unit of measurement for digital information throughput. It is the equivalent of one billion bits, or 1,000 megabits (Mb). Gigabits are commonly used to measure the speed of an Internet connection, and are often referred to as “Gigabit internet speeds”. The amount of data that can be transferred over a Gigabit connection is significantly higher than over a slower connection.

shielded twisted-pair cable - is heavy and difficult to deploy
coaxial cable - used by cable service providers to transmit TV programs
optic-fiber cable - offers the fastest transmission speeds: about 100 Gigabits per second (Gbps).

To learn more about Gigabits
https://brainly.com/question/289615
#SPJ1

Answer:

Offers the fastest transmission speeds

about 100 Gigabits per second (Gbps): optic-fiber cable

is heavy and difficult to

deploy: shielded twisted-pair cable

used by cable service providers to

transmit TV programs: coaxial cable

Explanation:

I hope this helps!

BTW PLATO

If you can photoshop please text me i need help for my digital media class 7862381441

Answers

Answer:

I don't know what that is but what type of work you need help with

have a good day :)

Explanation:

Use the drop-down menu to complete the sentences about pseudocode.
Pseudocode provides a
Pseudocode
of what is happening in the computer program.
detail(s) every single step of the program.

Use the drop-down menu to complete the sentences about pseudocode.Pseudocode provides aPseudocodeof what

Answers

Pseudocode provides a high-level overview of what is happening in a computer program

How does pseudocode do this?

Pseudocode presents a broad perspective of the operations performed within a program by a computer. Acting as an intermediate phase bridging human-understandable language and executable code.

Although not outlining each step in a comprehensive manner, pseudocode captures the key steps and algorithms that are crucial in accomplishing the requested functionality.

The emphasis is on the coherence of the sequence of steps, the methods for making choices, and the significant functions, empowering developers to skillfully design and articulate the framework of their program well in advance of actual implementation in a given coding language.


Read more about pseudocode here:

https://brainly.com/question/24953880

#SPJ1

Choose the correct term to complete the sentence.
The media is usually repressed in
governments.

Choose the correct term to complete the sentence.The media is usually repressed ingovernments.

Answers

A dictator government  has all power in the hands of one individual/group, suppressing opposition.  The media is usually repressed in dictatorial government

What is the government?

Dictatorships have limited to no respect for civil liberties, including press freedom. Media is tightly controlled and censored by the ruling authority. Governments may censor or control the media to maintain power and promote propaganda.

This includes restricting freedom of speech and mistreating journalists. Dictators control information flow to maintain power and prevent challenges, limiting transparency and public awareness.

Learn more about government from

https://brainly.com/question/1078669

#SPJ1

who is the owner of apple company??​

Answers

Answer:

Steven Paul Jobs......

....

Account numbers sometimes contain a check digit that is the result of a mathematical calculation. The inclusion of the digit in an account number helps ascertain whether the number is a valid one.
Write an application named CheckDigit that asks a user to enter a four-digit account number and determines whether it is a valid number.
The number is valid if the fourth digit is the remainder when the number represented by the first three digits of the four-digit number is divided by 7. For example, 7770 is valid, because 0 is the remainder when 777 is divided by 7.
If the account number is valid, output The account number is valid. If the account number is invalid output Invalid. If the account number is too short or too long output Account number invalid - it must have 4 digits.
---
PLEASE JUST COMPLETE MY CODE: I need the last part of this code completed please - If the account number is too short or too long output Account number invalid - it must have 4 digits.

Answers

Here is how you can complete the code:

account_number = input("Enter a four-digit account number: ")

if len(account_number) != 4:

 print("Account number invalid - it must have 4 digits.")

 exit()

if int(account_number[3]) == int(account_number[0:3]) % 7:

 print("The account number is valid.")

else:

 print("Invalid.")

This code first prompts the user to enter a four-digit account number. It then checks the length of the input. If it is not equal to 4, it prints the message "Account number invalid - it must have 4 digits." and exits the program. If the length of the input is 4, it then checks if the fourth digit of the account number is equal to the remainder of the first three digits divided by 7. If it is, it prints "The account number is valid." Otherwise, it prints "Invalid."

Learn more about code, here https://brainly.com/question/497311

#SPJ4

Account numbers sometimes contain a check digit that is the result of a mathematical calculation. The

Online, it is easy to think of communication as “computer to ____________” rather than “_________ to ___________”.
a.
person, computer, person
b.
computer, person, computer
c.
person, person, person
d.
computer, person, person

Answers

I would say D but if not I’m terribly sorry

Hope this helps

Have a great day/night

Online, it is easy to think of communication as “computer to computer” rather than “person to person”. Thus, option D is correct.

What is communication?

It is possible to describe communication as the act of passing the information between one person or group of people to the next. Communicating facilitates easy understanding of what a different person is trying to say or convey. There are two forms of communication: both verbal and nonverbal.

With the help of communication the person can tell and feature tthe data between the person and an group. In this, that data is given to the people and the data is not given to the person but it is rather given to the person. As this data is been transferred from one computer to another and then it reaches the people.

Therefore, option D is the correct option.

Learn more about communication, here:

https://brainly.com/question/22558440

#SPJ2

Other Questions
a person with a developmental disabilities and left side hemiparesis from a stroke needs to be moved from bed to a chair. the chair should be positioned so the move how are subsistence and commercial farming the similar 12.) 15 + (-15) + 12 Why was "Society for Applied Anthropology" originally created?a) visibility of the long-term thawing of ice in arctic regionsb) principles of human behavior to correct social problemsc) resource amplification in highland urban environmentsd) resurgence of garbage imperialism in equator countriese) weakened fracking in the desert areas of arctic regions _______ can cause an explosive eruption from a shield volcano. Jack is buying fencing to surround his garden. If his garden has a perimeter of 42 feet, and fencing costs $5.00 a yard, how much money will he need for the fencing? HELP ME IDK WHAT TO DO!!! Find the measure of angle f given the information below. A= 122 degrees E=48 degrees the image is below!! Consider this conditional statement.If a person is a professional athlete, then the person is a professional hockey player.(a) Give the contrapositive of the statement.If (Choose one)then (Choose one)(b) Give the converse of the statement.If (Choose one)then (Choose one)(c) Give the inverse of the statement.If (Choose one)then (Choose one) Create your own unique real-world example and use matrices to solve it. Which of the following best describes the US economy in 1998 during President Clintons term?It was in a recession.It was in a depression.The federal budget was balanced.The deficit was somewhat lowered. Did the control experiment verify or refute the results from exercise 1? use your results from exercises 1 and 2 to validate your answer. Experiment 1 E Data Table 1 B Data Table 2 Data Table 1: Antacid Neutralization Data Mass of 0. 59 Crushed Antacid (9) Concentration 1. 0 of HCI (M) Volume HCI 5. 0 (mL) Concentration 1. 0 of NaOH (M) Initial NaOH 9. 4 mL Volume (mL) Final NaOH 8. 2 mL Volume (mL) Total Volume 1. 2 mL of NaOH Used (mL) Experiment 1 Data Table 1 Data Table 2 Data Table 2: Experimental Results I 0. 1825 g 0. 0012 HCl available for neutralization (g): Moles of NaOH required to reach stoichiometric point (mol): HCI neutralized by antacid (g): neutralized per gram of antacid (9) 0. 1387 0. 2774 Experiment 2 El Data Table 3 B Data Table 4 Data Table 3: Control Experiment Data Concentration 1. 0 of HCI (M) Volume HCI 5. 0 (mL) Concentration 1. 0 of NaOH (M) Initial NaOH 9. 2 mL Volume (mL) Final NaOH 3. 6 mL Volume (mL) Total Volume 5. 6 mL of NaOH Used (mL) Data Table 4: Control Experiment Results 0. 2049 Moles of 0. 0056mol NaOH needed to neutralize 5. 0 mL of 1. OM HCI (mol): Grams of HCI neutralized (g): NaOH 4. 4mL volume difference between back titration and control (ml): Grams of 0. 160g HCI neutralized by NaOH volume difference (9) Find the value of each variable. Round to the nearest tenth ifneeded.yAZ123 The food code is created by what government agency: Which of the following is true regarding taxes?It is not possible to transfer wealth through generations taxfree.High tax brackets indicate planning opportunitiesIt is not really po Bonjour pouvez vous m aider svp donner 3. Raison pour la quel j ai choisi ce pome si je mourais l bas de Guillaume appolinaire merci as a judge in a federal court, christine can decide, among other things, whether the laws or actions of the executive and legislative branches are constitutional. the process for making this determination is known as . . . which supreme court case resolved the debate over the national authority to establish a bank? A ball is launched from a 190.4-foot tall platform. The equation for the ball's height h at time t seconds after launch is h (t) = - 16t? 1.6t + 190.4, where h is in feet. What is the maximum height the ball achieves before landing? what are the four calculator operations that a student is expected to be able to perform on the ap test?