PLEASE HURRY!!!
Look at the image below!

PLEASE HURRY!!!Look At The Image Below!

Answers

Answer 1

Answer:

If the user enters 162.5, the output will be 162.5

Explanation:

Please click thanks button hun


Related Questions

Write a function convert (int n, int base) that uses stack to convert a positive integer n to any base between 2 and 9. You may use simple iteration continually divides the decimal number by base and keeps track of the remainder by using a stack. Please use the methods from ADT Stack below. Write a program to test your function.

Answers

Answer:

import java.util.*;

public class DemoStack {

  public static void convert(int n, int base) {

      Stack<Integer> st = new Stack<Integer>();

      int temp = n ;

      while(n !=0) {

         st.push(n % base);

         n = n / base ;

      }

      System.out.printf("The number %d in base %d : ", temp, base);

      while(!st.isEmpty()) {

          System.out.print(st.pop());

      }

  }

  public static void main(String{} args) {

      Scanner sc = new Scanner(System.in);

      System.out.print("Enter number : ");

      int n = sc.nextInt();

      System.out.print("Enter base : ");

      int base = sc.nextInt();

      convert(n, base);

  }

}

Explanation:

Code is written in JAVA.

This code displays:

1) Enter number : 'x'

2) Enter base : 'y'

3) The number 'x' in base 'y' : abcdefg

Which feature transfers a slide show into a word-processing document?
O Video from Website
O Broadcast Slide Show
O Create Handouts
O Format Painter
Hurry
I need help

Answers

Answer:

Create Handouts

Explanation:

Answer:

C    Create Handouts

Explanation:

IM JUST BUILT DIFFRENT

Suppose your user entered a weight of 115.6. What will be the result of the following code?

strWeight = input("Enter your weight in pounds: ")
weight = int(strWeight)
print (weight)

115

115.6

116

An error occurs.

Answers

The answer is 115.

An integer cannot contain decimals points and it rounds down to the nearest whole number.

Answer:

An error occurs.

Explanation:

Answer on edge 2020

Within the the Assignment05.java file, you must define the following static methods. In the main method, you may program any code that wish to test the methods you have been asked to define.
1) Write (define) a static method named displayGreeting, that takes no arguments and returns no value. When this function is called, it should print the text "Hello, and welcome!".
Example:
displayGreeting() will print Hello, and welcome!
2) Write (define) a static method named displayText, that takes a single String argument and returns no value. When this function is called, it should print the value of the argument that was passed to it.
Examples:
displayText("Hello") will print Hello
displayText("123") will print 123
displayText("abc" + "123") will print abc123
3) Write (define) a static method named printTotal, that takes three int arguments. When this function is called, it should print the sum of the three arguments passed to it. This function should return no value.
Examples:
printTotal(0, 0, 0) will print 0
printTotal(0, 1, 3) will print 4
printTotal(100, 23, 2) will print 125
4) Write (define) a static method named getTotal, that takes three int arguments. When this function is called, it should return the sum of the three arguments passed to it as an int.
Examples:
getTotal(0, 0, 0) will return 0
getTotal(0, 1, 3) will return 4
getTotal(100, 23, 2) will return 125
5) Write (define) a static method named getAverage, that takes three int arguments. When this function is called, it should return the average of the three arguments passed to it as a double.
Examples:
getAverage(0, 0, 0) will return 0.0
getAverage(0, 1, 3) will return 1.33333...
getAverage(100, 13, 7) will return 40.0
6) Write (define) a static method named averageLength, that takes three String arguments. When this function is called, it should return the average length (number of characters) of the String arguments passed to it as a double.
Examples:
averageLength("a", "abc", "ab") will return 2.0
averageLength("hello", "goodbye", "monday") will return 6.0
averageLength("wednesday", "tuesday", "monday") will return 7.33
7) Write (define) a static method named lengthOfShortest, that takes two String arguments. When this function is called, it should return the length (number of characters) of the shortest String argument passed to it as an int.
Examples:
lengthOfShortest("abc", "ab") will return 2
lengthOfShortest("hello", "goodbye") will return 5
lengthOfShortest("thursday", "friday") will return 6
8) Write (define) a static method named stringOfStars, that takes one String argument. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument passed to it.
Examples:
stringOfStars("abc") will return "***"
stringOfStars("Hello, world!") will return "*************"
stringOfStars("0123456789") will return "**********"
9) Write (define) a static method named maxStringOfStars, that takes two String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the longest string argument passed to it.
Examples:
maxStringOfStars("a", "abc") will return "***"
maxStringOfStars("hello", "goodbye") will return "*******"
maxStringOfStars("thursday", "friday") will return "********"
10) Write (define) a static method named midStringOfStars, that takes three String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument with the length that would be in the middle if the lengths of the arguments were arranged in ascending order.
Examples:
midStringOfStars("a", "abc", "ab") will return "**"
midStringOfStars("hello", "goodbye", "yes") will return "*****"
midStringOfStars("123456", "12", "1234") will return "****"

Answers

import java.util.Arrays;

public class Assignment05{

   public static void displayGreeting(){

       System.out.println("Hello, and welcome!");

   }

   public static void displayText(String txt){

       System.out.println(txt);

   }

   public static void printTotal(int a, int b, int c){

       System.out.println(a+b+c);

   }

   public static int getTotal(int a, int b, int c){

       return a+b+c;

   }

   public static double averageLength(String a, String b, String c){

       return (a.length() + b.length() + c.length())/3;

   }

   public static double getAverage(int a, int b, int c){

       return (a + b + c)/3;

   }

   public static int lengthOfShortest(String a, String b){

       if (a.length() > b.length()){

           return b.length();

       }

       else{

           return a.length();

       }

   }

   public static String stringOfStars(String txt){

       String newTxt = "";

       while (newTxt.length() < txt.length()){

           newTxt += "*";

       }

       return newTxt;

   }

   public static String maxStringOfStars(String txt, String txt1){

        String newTxt = "";

       if (txt.length() >= txt1.length()){

         

           while (newTxt.length() < txt.length()){

               newTxt += "*";

       }

           return newTxt;

       }

       else{

             while (newTxt.length() < txt1.length()){

           newTxt += "*";

       }

           return newTxt;

       }

   }

   public static String midStringOfStars(String a, String b, String c){

       String arr[] = {a, b, c};

       Arrays.sort(arr);

       String txt = "";

       while (txt.length() <  arr[1].length()){

           txt += "*";

       }

       return txt;

   }

   public static void main(String[] args){

       displayGreeting();

       displayText("hello");

       printTotal(1,2,3);

       System.out.println(getTotal(2,2,43));

       System.out.println(getAverage(100,13,7));

       System.out.println(averageLength("a", "abc", "ab"));

       System.out.println(lengthOfShortest("abc", "ab"));

       System.out.println(stringOfStars("abcd"));

       System.out.println(maxStringOfStars("a", "bbbbb"));

       System.out.println(midStringOfStars("aaa","aa", "abcedas"));

       

       

   }

}

I hope this helps!

Which type of competition features many firms, some variety of goods, low barriers to entry, and little control over prices?

Answers

Answer:

Monopolistic competition

Monopolistic competition is characterized by many firms, some variety in products, few barriers to entry, and little control over prices.

Explanation:

Answer: pure competition

Explanation:

Question 3 (1 point)
What function would you use to find the average rating I gave a video?
Count
Max
Sum
Min
Average
I think it's average but I want to double check

Answers

It says average in the question so it’s most likely not that, and is probably min.

Lauren and her parents reviewed the lesson information on how to stay safe online. When Lauren told her parents that she had been using the password "Computer1” for all of her online accounts, her mother suggested that she change it.

Why did Lauren’s mother suggest she change her password?

It could be easily guessed.
It contained personal information.
It contained only one number.
It contained too many letters.

Answers

it could be easily guessed , the first one

Answer:

A): it could easily be guessed

Explanation:

I got it right thanks to the other person! give them brainiest, please!

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Answers

Answer:

Traffic padding

Explanation:

Traffic padding is a way of inserting draw randomly in such a manner that it would be difficult to make traffic analysis by any intruder. It hides the traffic pattern through the insertion of dummy traffic into the network and then the intruder sees it as a different traffic pattern. But what the intruder observes is a cover mode which actually hides the systems real operation mode.

write a program to find whether the given number of three digits is an integer such that the sum of the cubes of its digits is equal to the number itself. For example, 371 is since 3**3 7**3 1**3

Answers

Answer:

Written in Python

userinp = int(input("Input: "))

strinp = str(userinp)

total = 0

for i in range(0, len(strinp)):

    total = total + int(strinp[i])**3

if userinp == total:

    print("True")

else:

    print("False")

Explanation:

This line prompts user for input

userinp = int(input("Input: "))

This line converts user input to string

strinp = str(userinp)

This line initializes total to 0

total = 0

The following iteration sums the cube of each digit

for i in range(0, len(strinp)):

    total = total + int(strinp[i])**3

This if statement checks if the sum of the cube is equal to the user input

if userinp == total:

    print("True") This is executed if true

else:

    print("False") This is executed if false

Hexadecimal representation of a code word CAB

Answers

Answer:

(434142)16

Explanation:

Anna is a high school senior who plans to go to UT in the fall. Her parents have saved up some money
for her college education, but it will not be enough to pay for her tuition all four years. She does not
believe she will qualify for need based assistance. What advice would you give Anna?

Answers

Since Anna  does not believe she will qualify for need based assistance, the  advice that I would  give Anna is that she should be hopeful and not worry and then I will tell her also that since her parents cannot afford the fees, then she is more than qualified for it.

What is a need-based aid?

If you have a financial need and meet other eligibility requirements, you may be eligible for need-based funding. More need-based aid than what you actually need is not permitted.

Therefore,   the best advice one can give a person who is having financial issues is that they need to be confidence and also have the courage to believe that when they source for college funds, they will get it.

Learn more about assistance from

https://brainly.com/question/26641539
#SPJ1

write a function that will prompt the user for his/her age, // weight, and midicholrean count. Then calculate and return their // jedi level (returns a double). Remember to assign the retuned value // to the variable 'jedi_level'.

Answers

Answer:

Explanation:

Assuming that the jedi_level is calculated by adding the age and weight of the individual and then dividing by the midicholrean count we can use the following Java function to grab all the required info from the user and calculate and return the jedi_level.

public static double JediLevel () {

           Scanner in = new Scanner(System.in);

           System.out.println("Enter age: ");

           double age = in.nextDouble();

           System.out.println("Enter weight: ");

           double weight = in.nextDouble();

           System.out.println("Enter midicholrean count: ");

           double midi = in.nextDouble();

           double jedi_level = (age + weight) / midi;

           return jedi_level;

       }

Question #3
Dropdown
What type of data is the result of each of the following lines of code?

str(2.34)
O float
O this causes an error
O int
O string

int('2')
O float
O this causes an error
O int
O string

float(2)
O float
O this causes an error
O int
O string

Answers

Answer:

string, int, float

Explanation:

just took it. have a good one!

Answer: string, int, float

Explanation: got it right on edgen

A ____ database is a storage model in which common entities are stored within separate tables that use unique key identifiers to build relationships among these entities. a.network b.hierarchical c.flat d.relational

Answers

Answer:

Relational Database

Explanation:

The above description explains the relational database. Hence, from the list of given options, option D answers the question.

Analyzing each options:

Flat database makes use of text files to store data

Hierarchical database makes use of tree like structure

Network database makes use of nodes

Only the relational database database organize data in form of table

Write a program that accepts the names of three political parties and the number of votes each received in the last mayoral election. Display the percentage of the vote each party received.

Answers

Answer:

Written in Python

parties = []

votes = []

total = 0

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

    total = total + vote

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

Explanation:

This declares an empty list for parties

parties = []

This declares an empty list for votes

votes = []

This initializes total votes to 0

total = 0

The following iteration allows user to enter details for party and corresponding votes

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

This calculates the total vote

    total = total + vote

The following iteration prints the required details

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

The Apple iPhone includes a settings menu where you can toggle various accessibility options on or off:
Bold Text
oo
Button Shapes
What is the minimum number of bits that can represent those 2 options?

Answers

The minimum amount of bits that can represent these two options is 2 bits.

The minimum amount of bits that can represent the two options is 2 bits.

What are accessibility options?

This is known to be the various accessibility features such as text-to-speech, etc. that can be found on any system or mobile phones.

Conclusively, there is the use of these features in a lot of technologies as it serves as  assistive technology. Note that lowest amount of bits that can represent these two options above is 2 bits as that is the only lowest point it can go.

Learn more about bits from

https://brainly.com/question/19667078

Explain how it would give a potential intruder an additional advantage if he can spend a week stealthily watching the behaviors of the users on the computer he plans to attack.

Answers

Normally, the attack comes from an intruder who already studied the victim's behavior.

> The attacker can create a database from the history of browsing of the possible victim and then create an attack based on the victim's behavior of browsing.

> If the attacker has access to the user directory he can put the executables files in those folders.

> If the wi-fi is not secured, the attacker can check the network in order to spread a possible worm.

It is possible to see that are several ways which the attacker can use in order to obtain more information from the victims. But that depends on how deeply the attacker studied the victim.

If an  attacker had watched the behaviors of the users on the computer and has plans to attack, they can:

What is an intruder in cyber security?

The person called an Intruder is known to be a kind of online vulnerability scanner that is said to be a form of cyber security weaknesses that a person may have an exposed systems and  data breaches.

Learn more about attacker from

https://brainly.com/question/24956493

define operating system

Answers

Answer:

the software that supports a computer's basic scheduling tasks.

Answer:

The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

Explanation:

: process that monitors system traffic and adds resources as needed, within set limits


: process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource


: process to determine what volume a system can handle by comparing its performance to standards in the industry

Answers

Process that monitors system traffic and adds resources as needed, within set limits : Auto scaling

Process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource:  Load balancing

Process to determine what volume a system can handle by comparing its performance to standards in the industry : Benchmarking

What is performance?

Performance is the measure of how effectively a particular task is done or in other words maximum output can be obtained from the input.

The process which monitors system traffic and adds resources as needed, within set limits is called as Auto scaling.

Process that allocates tasks to resources to increase efficiency and avoid overloading any one resource is known as Load balancing.

Process to determine what volume a system can handle by comparing its performance to standards in the industry termed as Benchmarking.

Thus, all the terms are defined.

Learn more about performance.

https://brainly.com/question/15466511

#SPJ2

Has protection for proprietary software gone too far, as some critics suggest? (b) If not, why? (c) If so, what are the implications for innovation and competition in the computer industry? (d) How can we achieve an appropriate balance between those who hold legal rights to proprietary information and ordinary users who wish to access, share, and communicate that information? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (knowledge)

Answers

Answer:

In the clarification section following, the definition of the query is mentioned.

Explanation:

I acknowledge with maybe some opponents that patent security has gone too far. As tech manufacturers say, they already lost a lot of money in future sales in developed countries owing to software piracy. In reality, most consumers living in developed countries also couldn't manage to spend the rates set by certain tech firms, so firms did not lose any actual sales because, even in some developing countries, their pricey tech would essentially not sell mostly on the free market.So then, due to the extremely insufficient need for individuals, the consequences for creativity and competitiveness in the computing industry are restricted. Only the owners of copyright as well as the users with the resources to manage to offer for the pricey software have the opportunity to use it, as both a consequence of increasingly innovating, the market is restricted and weak.We ought to defined as the tendency doctrines: equal use as well as the first sale, to reach an acceptable compromise between someone who has legitimate rights to confidential information against common people who want to view, distribute, and interact the information. The first selling happens after the artist's concept has indeed been purchased out during the first occasion, during which stage the rightful owner loses ownership of the act's work.

In recent times, innovators including adversaries have focused on the use of reverse engineering, supported either by the reasonable-use doctrine of both the copyright Act.

8. Write a function that takes a 2D array as an input and outputs all values greater than 20 into a column array. Use logical indexing array

Answers

Answer:

Follows are the code to this question:

#include<stdio.h>//defining header file

int main()//defining main method

{

  int d[2][2];//defining 2D array

  int i, j;//defining integer variable

  printf("Enter values: \n");//print message

  for(i=0; i<2; i++)//defining for loop for input column value

  {

     for(j=0;j<2;j++)//defining for loop for input row value  

     {

        scanf("%d", &d[i][j]);//input values

     }

  }

  printf("value which is greater than 20: \n ");//print message

  for(i=0; i<2; i++)//defining for loop for print  column value  

  {

     for(j=0;j<2;j++)//defining for loop for print row value

     {

         if(d[i][j]>20)//defining if block that check value is greater then 20

         {

              printf("%d ", d[i][j]);//print values

         }

      }

     printf("\n");//use print for line break

  }

  return 0;

}

Output:

Enter values:  

44

12

11

55

value which is greater than 20:  

44  

55  

Explanation:

In the above-given code, a 2D array "d" and two integer variable "i and j" are defined, in which two for loop are used for input value from the user end.

After accepting the value from the user end, and again use the two for loop, in which, if block is defined, that checks array value is greater than 20 and print its values.

Suppose there are two links between a source and a destination. The first link has transmission rate 50 Mbps and the second link has transmission rate 10 Mbps. If the only traffic in the network comes from the source, what is the throughput for a large file transfer?

Answers

Answer:

10 Mbps

Explanation:

In this situation, the throughput for a large file transfer would be 10 Mbps. This is because in situations where there are more than one entries going into a single destination the throughput will be the lowest transmission rate as this rate would be the one that is bottlenecking the entire transfer. That is because the other links would be able to handle the speed of the lowest transmission rate but the lowest rate cannot handle the speeds of the other links, thus limiting the throughput.

A computer program checks to see if the user of a software program has clicked on a photo. This is an example of a requirement that can be evaluated in
a string statement.
a goto statement.
a global statement.
a conditional statement.

Answers

Answer:

A conditional statement

Explanation:

I just took the review and got it right

Answer:

A conditional statement

Explanation:

I took the test

Write a program that computes value of the following arithmetic expression for values of x and y entered by the user: 5.4xy - 12.3y 18.23x - 8.23

Answers

Answer:

Explanation:

The following code is written in Java and first asks the user to enter the values for X and Y, it then saves those values in two different variables and uses them in the arithmetic expression given in the question and solves it. The answer is saved to the variable named result and displayed on the window.

class brainly{

   public static void main(String[] args)

       {

           Scanner in = new Scanner(System.in);

           System.out.println("Enter value for x");

           double valueX = in.nextDouble();

           System.out.println("Enter value for y");

           double valueY = in.nextDouble();

           double result = (5.4 * valueX * valueY) - (12.3 * valueY * 18.23 * valueX) - 8.23;

           System.out.println(result);

       }

   }

Which programming language hides the complexity of data objects and provides a simplified interface?
A.
machine language
B.
assembly language
C.
procedural language
D.
object-oriented language
E.
RAD

Answers

Answer:

D. Object-Oriented Langauge

Explanation:

Answer:

Your answer is D!

Explanation:

From PLATO!

How many keys are required, if you are to ensure a secret communication for every possible pair of communicating parties

Answers

Answer:

7140 pairs of key

Explanation:

In calculating the number of pairs of keys required, the formula to be used is

n * (n−1) / 2

So for example, if we're to consider 120 users. This means our n is 120, and thus applying it in the formula would yield the calculation

120 * (120-1) / 2 =

120 * 119 / 2 =

14280 / 2 =

7140 key pairs.

Therefore, we boldly state that be number of pairs of key required is 7140

When Nico di Angelo met Mr. D he talked on and on about what?

Answers

Answer:

his mythologic game

Explanation: idk i think

Answer:

The first time he met Mr. D, he called him "The Wine Dude", which irritated the god, but he forgot about it soon after as Nico complimented him.

(100 Points!)
The ___ search engine is the most common in use today.
A Boolean-based
B Crawler-based
C algorithm-based
D government-based

Answers

Answer:

B

Explanation

just did it on egd 2020

Answer:

Crawler-based

Explanation:

Just took the review

Which type of evidence should victims collect to help officials catch cyber bullies ?

-home addresses
-birthdays
-social media
-usernames user
-passwords

Answers

Answer:

Social media

Explanation:

Social media and usernames user so that they can find them without any problem : D

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways

Answers

Answer:

Access control tools

Explanation:

Access control tools are used to enforce security measures in the use of computers and computerized systems. These tools ensure that unauthorized people are not allowed to get access to systems or certain places.

Passwords, biometrics, and security tokens are some means that help to regulate access to reserved places and systems. These tools evaluate the identity of users authenticate them and either grant or deny them access to the sites they wish to gain entrance to.

Other Questions
When the amount of which 2 gases in the atmosphere change, the amount of energy absorbed by the surface changes. what is the reflection of (0,3) over the x axis Scientists often use containers to hold chemicals. A beaker can hold solids or liquids that wont release gas and are unlikely to splatter if stirred or heated. A test tube is basically a smaller version of a beaker. It can hold small amounts of chemicals. If youre worried about a substance splattering, an Erlenmeyer flask might be a good tool to use. Erlenmeyer flasks have a triangular shape to minimize splattering and spilling. To be extra safe about spills, you might use a stopper. However, never heat a container with a stopper on it!According to the passage, why is a substance in an Erlenmeyer flask less likely to spill than a substance in a beaker?Abecause Erlenmeyer flasks can never be heatedBbecause Erlenmeyer flasks can only hold solid substancesCbecause Erlenmeyer flasks hold smaller amounts of substances than beakersDbecause Erlenmeyer flasks have a triangular shape Calculate, to the nearest cent, the present value of an investment that will be worth $1,000 at the stated interest rate after the stated amount of time. HINT [See Quick Example 4.] 5 years, at 1.2% per year, compounded weekly (52 times per year) Los nios ______ acuestan despus de cepillar___ los dientes en la noche. (Which reflexive pronoun fits the sentence?) *metenosse Mi hermano y yo_________un gato. Su nombre es pepe 9. A line passes through (-4,-6) and (4, 10). What is the slope? Can someone fill this out? Srry its a bit blurry The graph shows the distance traveled by an Olympic-level sprinter over time during a race.Find the slope of the line, and complete the sentences below. no one helped me so 15 points and brainliest to best answer please i need this done!Bird feeders can be found in backyards around the globe. Some people like to watch as the birds flock to the feeders and peck at the seeds. Others may like the idea that they are offering a service by feeding the local birds in their neighborhood. But do bird feeders help native populations of birds? A recent study suggests that bird feeders may do more harm than good by increasing competition for food.A team of scientists in New Zealand observed that bird feeders may be attracting more invasive, or non-native, birds. They conducted an experiment to see if this observation could be supported with data. The scientists set up 23 bird feeder locations scattered around urban areas. Food in the form of mixed bird seed and bread was offered daily at 11 experiment locations. "Twelve locations were left alone, without food, to serve as a control group. The number of birds that visited each location was counted daily. The study went on for almost two years. After analyzing the data, scientists discovered that the 11 experimental bird feeders attracted two to three times the number of invasive species of birds as the control group feeders. The control group feeders had approximately equal numbers of native and invasive birds visit them. The team of scientists noted that the increase in invasive species may have been due to the food choices that were offered at each feeder. Native birds typically eat fruit, nectar, and insects. Invasive birds were more attracted to the mixed bird seed and bread. The data supported the conclusion that backyard bird feeders were not helping native bird populations and suggested that invasive species are pushing out native species in competition for food.The team of scientists also noted that they are not suggesting that people stop feeding the birds. They just want people to be aware of the types of food they offer and how often they fill the feeders. Making better choices in backyard feedings may help increase the number of local birds that visit while decreasing visits from invasive species.Conducting backyard bird feeder experiments is a great way to see which local birds and which invasive birds are in your neighborhood. The more you know about the local bird populations and their food preferences, the better equipped you are to support them in a more positive way.THE QUESTION------ How did the backyard bird feeders in the article increase competition in that ecosystem? 10. Which of the following is equivalent to 432 X 15? Oh helpp idk what to do supercalifragilisticexpialidocious and the meaning of lifecorrelation? yes. 2y+1 A bond has a par value of $1,000, a current yield of 7.02 percent, and semiannual coupon payments. The bond is quoted at 102.73. What is the amount of each coupon payment what is 2/3 divided by 1/2? The most common reason for writing a flyer or brochure is to:describeinformpersuadeall of the above Ferdinand Freight Company charges a flat rate of $200 plus $0.75 per pound to transport freight inthe metro area. This cost is represented by the function below where w is the weight of the freightin pounds and c(w) is the cost given the weight of the freightc(w) = 200+ 0.750 The temperature on Wednesday evening was -5 Fahrenheit. The temperature decreased another 8 throughout the night. What was the temperature on Thursday morning? Justify your reasoning. Evaluate and solve for the variable and show your work please. x 7 = 4 + 1012 c = 84 10 = 4y + 3y 42 + 20 = 2x + 13x