Answers

Answer 1
123,454,321. you just multiply 11111 by itself

Related Questions

Imagine that you wanted to write a program that asks the user to enter in 5 grade values. The user may or may not enter valid grades, and you want to ensure that you obtain 5 valid values from the user. Which nested loop structure would you use?
A. A "for" loop inside of a "while" loop
B. A "while" loop inside of a "for" loop
C. None of the above
D. Either a or b would work

Answers

The type of nested loop which I would use to write the program is:

B. A "while" loop inside of a "for" loop

What is a Loop?

This refers to the control flow statement which is used to iterate and lets a particular line(s) of code execute repeatedly

With this in mind, we can see that the type of nested loop which I would use to write the program is a "while" loop inside of a "for" loop because it is a conditional statement that continues to ask for the certain valid grades until it gets the right one.

Therefore, the correct answer is option B

Read more about loops here:
https://brainly.com/question/26098908

Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web research and develop a one-page description of the five most important things about HCI of mobile computing that the IT manager should know.

Answers

Answer:

phone grows everyday 82 percent

Explanation:

A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit

Answers

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

JavaFX application for the Sublime Sandwich Shop. The user can order sandwiches by using list boxes and the application displays the price. Each sandwich should allow a choice of at least three main ingredients (chicken, for example) at three different prices. The user should also be able to choose between three different bread types. Use CheckBoxes for additional ingredients - lettuce, tomato, etc.
Create an ArrayList to hold all of the sandwiches associated with an order. Display information about all the sandwiches that were ordered.

Answers

Answer:

package GUI;  

import java.awt.*;  

import java.awt.event.*;  

import javax.swing.*;

// Class SandwichShop definition

public class SandwichShop

{

// Creates a string array for sandwich ingredients  

String sandwichIngredients [] = {"Chicken", "Mutton", "Veg"};

// Creates a string array for bread types

String breadTypes[] = {"Bloomer", "Cob", "Plait"};

// Container object declared

JFrame jf;

JPanel p1, p2, p3, p4, mainP;

// Component object declared

JList ingredient, bread;

JLabel ingL, breadL, amountL;

JTextField amountT;

JButton amountB, exitB;

// Default constructor definition

SandwichShop()

{

// Creates frame

jf = new JFrame("Sandwich Shop");

// Creates panels

p1 = new JPanel();

p2 = new JPanel();

p3 = new JPanel();

p4 = new JPanel();

mainP = new JPanel();

// Creates list box and adds string array

ingredient = new JList<String>(sandwichIngredients);

bread = new JList<String>(breadTypes);

// Creates labels

ingL = new JLabel("Select Sandwich Ingredients");

breadL = new JLabel("Select Bread Types");

amountL = new JLabel("Amount: ");

// Creates text field

amountT = new JTextField(5);

// Creates buttons

amountB = new JButton("Check Amount");

exitB = new JButton("Exit");

// Adds components to panels

p1.add(ingL);

p1.add(ingredient);

p2.add(breadL);

p2.add(bread);

p3.add(amountL);

p3.add(amountT);

p4.add(amountB);

p4.add(exitB);

// Adds panels to main panel

mainP.add(p1);

mainP.add(p2);

mainP.add(p3);

mainP.add(p4);

// Set the main panel layout to 4 rows and 1 column

mainP.setLayout(new GridLayout(4, 1));

// Adds main panel to frame

jf.add(mainP);

// Sets the frame visible property to true

jf.setVisible(true);

// Set the size of the frame to width 400 and height 150

jf.setSize(400, 300);

// Registers action listener to exit button using anonymous class

exitB.addActionListener(new ActionListener()

{

// Overrides the actionPerformed() method

public void actionPerformed(ActionEvent ae)

{

System.exit(0);

}// End of method

});// End of anonymous class

// Registers action listener to amount button using anonymous class

amountB.addActionListener(new ActionListener()

{

// Overrides the actionPerformed() method

public void actionPerformed(ActionEvent ae)

{

// Extracts index of the selected item from the list box

int indexIngredient = ingredient.getSelectedIndex();

int indexBread = bread.getSelectedIndex();

// Checks if ingredient index is 0 and bread index is 0

// then set the amount 100 in text field

if(indexIngredient == 0 && indexBread == 0)

amountT.setText("100");

// Checks if ingredient index is 0 and bread index is 1

// then set the amount 120 in text field

if(indexIngredient == 0 && indexBread == 1)

amountT.setText("120");

// Checks if ingredient index is 0 and bread index is 2

// then set the amount 160 in text field

if(indexIngredient == 0 && indexBread == 2)

amountT.setText("160");

// Checks if ingredient index is 1 and bread index is 0

// then set the amount 190 in text field

if(indexIngredient == 1 && indexBread == 0)

amountT.setText("190");

// Checks if ingredient index is 1 and bread index is 1

// then set the amount 205 in text field

if(indexIngredient == 1 && indexBread == 1)

amountT.setText("205");

// Checks if ingredient index is 1 and bread index is 2

// then set the amount 210 in text field

if(indexIngredient == 1 && indexBread == 2)

amountT.setText("210");

// Checks if ingredient index is 2 and bread index is 0

// then set the amount 97 in text field

if(indexIngredient == 2 && indexBread == 0)

amountT.setText("97");

// Checks if ingredient index is 2 and bread index is 1

// then set the amount 85 in text field

if(indexIngredient == 2 && indexBread == 1)

amountT.setText("85");

// Checks if ingredient index is 2 and bread index is 2

// then set the amount 70 in text field

if(indexIngredient == 2 && indexBread == 2)

amountT.setText("70");

}// End of method

});// End of anonymous class

}// End of default constructor

// main function definition

public static void main(String[] args)

{

// Creates an anonymous object by calling default constructor

new SandwichShop();

}// End of main method

}// End of class

Output:

discribe two ways to zoom in and out from an image

Answers

Option 1: Spread your fingers on your laptop's trackpad.

Option 2: Press Command (or control) and the + sign.

Hope this helps!

Have a wonderful day!

Which term refers to the use of expressions to check consistency in relation to other fields in the same record?
O data validation
O record validation
O input mask
O validation text

Answers

This is the answer 3 due to the thought me

The  term validation text refers to the use of expressions to check consistency in relation to other fields in the same record.

What is the use of validation text?

The term Validation text is known to be one that helps a user to be able to have a message that can help them to be able to input data that is said to be not valid.

Conclusively, Validations rules is known to aid one in that one can check data for accuracy and consistency in terms of  data entry.

Learn more about Validation text from

https://brainly.com/question/12069810

#SPJ2

DESCRIBE THE GENERAL STRATEGY BEHIND DEALOCK PREVENTION AND GIVE A PRATICAL EXAMPLE

Answers

Answer:

........

Explanation:..........

Write a method, including the method header, that will receive an array of integers and will return the average of all the integers. Be sure to use the return statement as the last statement in the method. A method that receives an array as a parameter should define the data type and the name of the array with brackets, but not indicate the size of the array in the parameter. A method that returns the average value should have double as the return type, and not void. For example: public static returnType methodName(dataType arrayName[]) 3 The array being passed as a parameter to the method will have 10 integer numbers, ranging from 1 to 50. The average, avgNum, should be both printed in the method, and then returned by the method. To print a double with 2 decimal points precision, so use the following code to format the output: System.out.printf("The average of all 10 numbers is %.2f\n", avgNum);

Answers

Answer:

The method is as follows:

public static double average(int [] arrs){

    double sum = 0,avgNum;

    for(int i = 0;i<arrs.length;i++){

        sum+=arrs[i];

    }

    avgNum = sum/arrs.length;

    System.out.printf("The average of all numbers is %.2f\n", avgNum);

    return avgNum;

}

Explanation:

This defines the method

public static double average(int [] arrs){

This declares sum and avgNum as double; sum is then initialized to 0

    double sum = 0,avgNum;

This iterates through the array

    for(int i = 0;i<arrs.length;i++){

This adds up the array elements

        sum+=arrs[i];     }

This calculates the average

    avgNum = sum/arrs.length;

This prints the average to 2 decimal places

    System.out.printf("The average of all numbers is %.2f\n",

avgNum);

This returns the average to main

    return avgNum; }

Which of the following will cause you to use more data than usual on your smartphone plan each month?

a. make a large number of outbound calls

b. sending large email files while connected to wifi

c. streaming movies from Netflix while not connected to Wi-Fi

d. make a large number of inbound calls

Answers

Outbound calls. You would most likely make more calls TO people rather than receive.

Question No: 9 Of 50 Time Left : 59:18
ОА
QUESTION
Which of the following two entities (reading from Left to right) can be connected by the dot operator?
A class member and a class object.
A class object and a class,
A constructor and a member of that class.
OB
Ос
OD
A class object and a member of that class.

Answers

Answer:b

Explanation:

to get points

What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sensitive information is stored in one secure place, or a distributed model, where information is spread around in many different places?

Answers


Co-Ordination Difficulty: ...
Waste of Resources: ...
Larger Interests of the Enterprise Neglected: ...
Emergency Decision not Possible: ...
Lack of Qualified Managers: ...
Certain Activities Decentralization not Possible:

What is the advantages and disadvantages of hardware devices and software devices ?


Urgent need for assignment due today 12 o’clock!

Answers

Answer:

Advantages of hardware:

Physical existence

Multitasking

Speedy

Disadvantages:

Costly as different equipment cost differently

Time consuming

requires space

Privacy issues

Explanation:

Advantages of Software:

Less costly

Improved privacy controls

Requires no space

Disadvantages:

Does not have physical existence

hacking and cyber attacks may steal important information

Regular updates required

Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of old files, then writes and saves the document. Describe how the OS interacts with the disk to allow the new file to be written.

Answers

Answer:

Explanation:

In a situation like this, the OS erases the files from its core, and saves the document in its files compartment

The hard drive on Frankie's computer is completely full. In this case, the OS deletes the files from its core and saves the document in its files' compartment because it has to produce and save a new document.

What is a document?

Everybody has a distinctive signature, and signatures are crucial in proving that a person actually signed a document and accepted its terms.

An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.

Through a specified application program interface, the application programs seek services from the operating system (API)

Therefore, the OS will erase the file from the scratch and save it in a different folder.

To learn more about the document, refer to the below link:

https://brainly.com/question/14980495

#SPJ2

Write a program that inputs a line of text tokenizing the line with function strtok and outputs the tokens in reverse order i.e. last token in the sentence is printed first and first token is printed last. The user must be able to specify at most 80 characters in the sentence.

Answers

Answer and Explanation:

var gettext= prompt("please enter text");

function strtok(gettext){

var splitString = gettext.split("");

if(splitString.length<=80){

var reverseArray = splitString.reverse();

var joinArray = reverseArray.join("");

return joinArray;}

else{

Alert("too many characters");

}

}

/* we first ask for user input using the prompt function. We save this in a variable gettext which we pass to the strtok function. This function first splits the text and makes it an array so we are able to count how many characters the user enters and set an if..else condition to handle characters that may be more than 80. The reverse and join functions are then used respectively to reverse and return the string.*/

An organization needs to integrate with a third-party cloud application. The organization has 15000 users and does not want to allow the cloud provider to query its LDAP authentication server directly. Which of the following is the BEST way for the organization to integrate with the cloud application?

a. Upload a separate list of users and passwords with a batch import.
b. Distribute hardware tokens to the users for authentication to the cloud
c. Implement SAML with the organization's server acting as the identity provider.
d. Configure a RADIUS federation between the organization and the cloud provider

Answers

Answer:

The BEST way for the organization to integrate with the cloud application is:

c. Implement SAML with the organization's server acting as the identity provider.

Explanation:

Implementing SAML (Security Assertion Markup Language) integrations will provide more security to the organization (identity provider) as users' credentials are exposed to fewer parties.  SAML authenticates the users to the cloud application provider.  SAML enables the organization to pass authorization credentials to the service provider by transferring the users' identities to the service provider.

Which of the following are advantages of a local area network, as opposed to a wide area network? Select 3 options.

provides access to more networks

higher speeds

more secure

lower cost

greater geographic reach

Answers

higher speeds lower cost more secure

Answer:

✅ more secure

✅ lower cost

✅ higher speeds

Explanation:

Edge 2022

Describe the system unit​

Answers

Answer:

A system unit is the part of a computer that houses the primary devices that perform operations and produce results for complex calculations

Why use LinkedIn automation for LinkedIn?

Answers

Answer:

Using LinkedIn automation tools to run successful outreach campaigns has become popular. It’s because these tools automate tedious networking tasks such as visiting profiles, collecting data, sending out bulk connection requests, messages, and follow-ups, etc.  

With the help of the latest LinkedIn automation tools, you can quickly perform all the repetitive tasks while saving yourself a lot of time that you can use on actual relationship building and lead nurturing tasks.  

However, LinkedIn isn’t really amused when using any bots or automation tools for LinkedIn.

Write an algorithm to find the sum of the following series:
a) 1+x+x^2+x^3+...+x^20
b) 1-x+x^2-x^3+...+x^20
c) 1+x/2+(x²)/3+(x^3)/4+...+(x^20)/21

Answers

Answer:

The algorithm is as follows:

Input x

sum_a = 0

sum_b = 0

sum_c = 0

for i = 0 to 20

   sum_a = sum_a + x^i

   sum_b = sum_b + (-x)^i

   sum_c = sum_c + x^i/(i+1)

print sum_a, sum_b, sum_c

Explanation:

Required

An algorithm to solve (a), (b) and (c)

For Series (a):

This series is a geometric progression and the common ratio is x

i.e.

[tex]r = x/1 = x^2/x = ...... = x^{n+1}/x^n =x[/tex]

So, the sum of the series is:

Sum = Previous Sums + x^i --- where i is between 0 and 20 (inclusive)

For Series (b):

This series is a geometric progression and the common ratio is -x

i.e.

[tex]r = -x/1 = -x^2/x = ...... = -(x^{n+1}/x^n) = -x[/tex]

So, the sum of the series is:

Sum = Previous Sums + (-x^i) --- where i is between 0 and 20 (inclusive)

For Series (c):

This series is a neither arithmetic nor geometric progression.

It obeys the following rule:

[tex]\frac{x^i}{1+i}[/tex]  --- where i is between 0 and 20 (inclusive)

So, the sum of the series is:

Sum = Previous Sums + [tex]\frac{x^i}{1+i}[/tex]

Help Pls
I need about 5 advantages of E-learning​

Answers

Answer:

Explanation:

E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...

E-learning leads to better retention. ...

E-learning is consistent. ...

E-learning is scalable. ...

E-learning offers personalization.

Answer:

E- learning saves time and money

E-learning makes work easier and faster

E- learning is convenient

E- learning is consistent

E- learning is scalable

Explanation:

when you learn using the internet, you save a lot of time by just typing and not searching through books

what is the build in libary function to compare two strings?​

Answers

Answer:

strcmp() is a built-in library function and is declared in <string. h> header file. This function takes two strings as arguments and compare these two strings lexicographically.

Explanation:

Hope it helps

How does a Cloud-first strategy approach a client's migration to the Cloud?

Answers

Answer:

by focusing on a single discipline based on the client's greatest area need.

you get a call from a customer who says she can't access your site with her username and password. both are case-sensitive and you have verified she is entering what she remembers to be her user and password correctly. what should you do to resolve this problem?

a. have the customer clear her browser history and retry

b. look up her username and password, and inform her of the correct information over the phone

c. have the user reboot her system and attempt to enter her password again

d. reset the password and have her check her email account to verify she has the information

Answers

Answer:

answer would be D. I do customer service and would never give information over the phone always give a solution

In order to resolve this problem correctly, you should: D. reset the password and have her check her email account to verify she has the information.

Cybersecurity can be defined as a group of preventive practice that are adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use of the following;

Processes.A body of technology.Policies.Network engineers.Frameworks.

For web assistance, the security standard and policy which must be adopted to enhance data integrity, secure (protect) data and mitigate any unauthorized access or usage of a user's sensitive information such as username and password, by a hacker, is to ensure the information is shared discreetly with the user but not over the phone (call).

In this context, the most appropriate thing to do would be resetting the password and have the customer check her email account to verify she has the information.

Read more: https://brainly.com/question/24112967

Illustrate why sally's slide meets or does not not meet professional expectations?

Answers

Your missing info to solve this

Write a program that creates an an array large enough to hold 200 test scores between 55 and 99. Use a Random Number to populate the array.Then do the following:1) Sort scores in ascending order.2) List your scores in rows of ten(10) values.3) Calculate the Mean for the distribution.4) Calculate the Variance for the distribution.5) Calculate the Median for the distribution.

Answers

Answer:

Explanation:

The following code is written in Python. It uses the numpy import to calculate all of the necessary values as requested in the question and the random import to generate random test scores. Once the array is populated using a for loop with random integers, the array is sorted and the Mean, Variance, and Median are calculated. Finally The sorted array is printed along with all the calculations. The program has been tested and the output can be seen below.

from random import randint

import numpy as np

test_scores = []

for x in range(200):

   test_scores.append(randint(55, 99))

sorted_test_scores = sorted(test_scores)

count = 0

print("Scores in Rows of 10: ", end="\n")

for score in sorted_test_scores:

   if count < 10:

       print(str(score), end= " ")

       count += 1

   else:

       print('\n' + str(score), end= " ")

       count = 1

mean = np.mean(sorted_test_scores)

variance = np.var(sorted_test_scores, dtype = np.float64)

median = np.median(sorted_test_scores)

print("\n")

print("Mean: " + str(mean), end="\n")

print("Variance: " + str(variance), end="\n")

print("Median: " + str(median), end="\n")

Suppose you have a stack ADT (i.e., an Abstract Data Type that includes operations to maintain a stack. Design a flowchart or suitable logical diagram to show you could implement a queue’s enqueue and dequeue operations using two stacks, stack 1 and stack 2.

Answers

Answer:

One approach would be to move all items from stack1 to stack2 (effectively reversing the items), then pop the top item from stack2 and then put them back.

Assume you use stack1 for enqueueing. So enqueue(x) = stack1.push(x).

Dequeueing would be:

- For all items in stack1: pop them from stack1 and push them in stack 2.

- Pop one item from stack2, which will be your dequeue result

- For all items in stack2: pop them from stack2 and push them in stack 1.

Hope it makes sense. I'm sure you can draw a diagram.

The advantage of returning a structure type from a function when compared to returning a fundamental type is that a. the function can return multiple values b. the function can return an object c. the function doesn’t need to include a return statement d. all of the above e. a and b only

Answers

Answer:

The advantage of returning a structure type from a function when compared to returning a fundamental type is that

e. a and b only.

Explanation:

One advantage of returning a structure type from a function vis-a-vis returning a fundamental type is that the function can return multiple values.  The second advantage is that the function can return can an object.  This implies that a function in a structure type can be passed from one function to another.

The Federal Financial Institutions Examination Council (FFIEC) developed the Cybersecurity Assessment Tool, which can be used as a self-assessment tool for identifying a bank or financial institution's cybersecurity maturity.
a. True
b. False

Answers

Answer:

a. True

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

The Federal Financial Institutions Examination Council (FFIEC) is an interagency of government that was established on the 10th of March, 1979. FFIEC is saddled with the responsibility of developing the Cybersecurity Assessment Tool, which is then used as a self-assessment tool for identifying the maturity of a bank's or financial institution's cybersecurity.

The tax calculator program of the case study outputs a floating-point number that might show more than two digits of precision. Use the round function to modify the program to display at most two digits of precision in the output number.

Answers

Answer:

Explanation:

The following code is written in Python. The tax calculator program was not provided, therefore I created a tax calculator that takes in the total price as an input and adds a 7% tax to it. Then it uses the round() function to make sure that the total is outputted as a decimal with two decimal digits at most.

def taxCalculator(price):

   total = price * 1.07

   formattedTotal = round(total, 2)

   return formattedTotal

with the aid of examples explain the differences between open source software and licensed software​

Answers

Answer:

Explanation:

Source is when a company go no limits to run the software but can easily be taken done by a complaint or two or a bug while a licensed it a protected version of the software.

Other Questions
14. Peter needs to buy a package of pencils to write his final exam. The store offers two packages.Package 1: pack of 6 pencils for $1.68Package 2: pack of 9 pencils for $2.34Determine the cost per pencil. Which is the better deal? Round to 2 decimal places. Show all your work for full marks. During the course of your experiment you have obtained the following data: mass of the hydrate: 1.973 g mass of the anhydrate: 1.196 g The formula of the anhydrous salt: CaCl2 Calculate the following: (round to correct the number of significant figures and include units as required). mass of water loss in . number of moles of anhydrous salt after heating, in moles number of moles of water lost, in moles number of moles of water per mole of hydrate, in moles (round to the whole number) provide the formula of a hydrate Note: you will not be able to add the bscript and leave one space between ionic compound and water. An ant moves towards the plane mirror with speed of 2 m/s & the mirror is moved towards the ant with the same speed. What is the relative velocity between the ant and its image? Which words and phrases from this expert help create a tone of admiration? Select 3 options find the missing length indicated Your boss asked you to analyze Green Hamster Manufacturing's performance for the past three years and prepare a report that includes a benchmarking of the company's performance. Using the company's last three years of financial reports, you've calculated its financial ratios, including the ratios of Green Hamster Manufacturing's competition-that is, comparable ratios of other participants in the industry-and submitted the report. Along with calculating the ratios, what else is needed for your report? a. Making observations and identifying trends that are suggested by the ratio analysis b. Identifying the factors that drive the trends in the ratios c. Both of the above Most decision makers and analysts use five groups of ratios to examine the different aspects of a company's performance. Indicate whether each of the following statements regarding financial ratios are true or false? StatementsOne possible explanation for an increase in a firm's profitability ratios over a certain time span is that the company's income has increased. Market-value or market-based ratios help analysts figure out what investors and the markets think about the firm's growth prospects or current and future operational performance. A company exhibiting a high liquidity ratio means it is likely to have enough resources to pay off its short-term obligations. Debt or financial leverage ratios help analysts determine whether a company has sufficient cash to repay its short-term debt obligations. Asset management or activity ratios provide insights into management's efficiency in using a firm's working capital and long- term assets.Ratio analysis is an important component of evaluating company performance. It can provide great insights into how a company matches up against itself over time and against other players within the industry. However, like many tools and techniques, ratio analysis has a few limitations and weaknesses. Which of the following statements represent a weakness or limitation of ratio analysis?A. A firm may operate in multiple industries. B. A firm's financial statements show only one period of financial data. C. Different firms may use different accounting practices.Ratio analysis is an important component of evaluating company performance. It can provide great insights into how a company matches up against itself over time and against other players within the industry. However, like many tools and techniques, ratio analysis has a few limitations and weaknesses. HELP ASAPWrite in exponential expressionsIf both the numerator and denominator of fraction have an exponent with the same base, we can simplify the expression to the base raised to the numerators exponent minus the denominators exponent. how many dog breed are there In an accelerated failure test, components are operated under extreme conditions so that a substantial number will fail in a rather short time. In such a test involving two types of microchips, 580 chips manufactured by an existing process were tested, and 125 of them failed. Then, 780 chips manufactured by a new process were tested, and 130 of them failed. Find a 90% confidence interval for the difference between the proportions of failures for chips manufactured by the two processes. (Round the final answers to four decimal places.) The 90% confidence interval is Convert 15,000 meters to centimeters.15,000 centimeters150,000 centimeters15,000,000 centimeters1,500,000 centimeters Good evening everyone Write any three difference between symbol and molecular formula answer it ASAP thank u Which of the three levels of analysis do you think helps us best understand events inworld politics? In presenting your answer, be sure to discuss the costs and benefits of using each level of analysis, providing real-world examples to back up your argument. What qualifications should a person have to carry out these duties? A helicopter hovers 500 m above a long straight road. There is a truck to the left and right of the helicopter. The angles of depression of the two trucks from the helicopter are 60 and 20. How far apart are the two trucks? Coffee from Colombia last year was supplied at $9 per 10 pounds. This year the demand has decreased and that same supply of Colombia coffee is priced at $6 per 10 pounds. What will happen to supply of Colombian coffee this year plan a special meal for 6 people You are asked to build an LC circuit that oscillates at 13 kHz. In addition, you are told that the maximum current in the circuit can be 0.14 A and the maximum energy stored in the capacitor must be 1.4x10-5 J. What value of inductor and capacitor should you choose a stone has a mass of 10kg on earth. calculate the weight on the moon. accelaration on the moon is 10 m/s2 how Democracy do improve the quality of decision making? A 111 kg linebacker running at 1.9 m/s and a 82 kg quarterback running at 3 m/s have a head-on collision in midair. The linebacker grabs and holds onto the quarterback. (a) What is their combined speed immediately after the collision