A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter's e-mail account and says her daughter has a number of emails in her inbox suggesting she has run away to be with a 35-year-old woman. Write a 2 to 3 page paper/report (not including title or reference page) explaining how you should proceed. Make sure you adhere to the grading rubric and write the report in APA format.

Answers

Answer 1

Answer: Wait, you're asking strangers to write a report for you? Just use common sense--tell her to forward the emails to the police department, or to provide the login details or the IPv4 logs (depending on the email service) to work off of. Considering that she most likely has the email linked to her phone, you should get into contact with her phone provider to locate the daughter. I don't know what else to say considering that you're asking strangers for an essay to be written for you. Hopefully what I said helps, but I doubt that anyone's going to write a full two page essay.

Answer 2

APA offers authors a dependable structure they can use each time they write. Authors' arguments or research are more effectively organized when they are consistent.

What are advantages to write issue in APA format?

The APA format helps papers on usually complex issues to be more understandable. It makes reading and understanding papers easier.

Utilize common sense and instruct her to transmit the emails to the police department, or, depending on the email service, to supply the login information or the IPv4 logs for investigators to use.

You should get in touch with her phone provider to find the daughter because she almost certainly has the email connected to her phone.

Therefore, I don't know what else to say, considering that you're asking strangers for an essay to be written for you.

Learn more about APA format here:

https://brainly.com/question/12548905

#SPJ2


Related Questions

Write a SQL query to find the population of the planet named 'Caprica' -- 10 points Find the first name, last name, and age of people from bsg_people whose last name is not 'Adama' -- 10 points Find the name and population of the planets with a population larger than 2,600,000,000 -- 10 points Find the first name, last name, and age of people from bsg_people whose age is NULL -- 12 points

Answers

The question is incomplete! Complete question along with answer and step by step explanation is provided below.

Please find the attached question.

Answer:

a) SQL Query:

SELECT population

FROM bsg_planets

WHERE name='Caprica';

b) SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE lname!='Adama';

c) SQL Query:

SELECT name, population

FROM bsg_planets

WHERE population > 2600000000

d) SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE age IS NULL;

Explanation:

a) Write a SQL query to find the population of the planet named 'Caprica'

Syntax:

SELECT  Column

FROM TableName

WHERE Condition;

For the given case,

Column = population

TableName  = bsg_planets

Condition = name='Caprica'

SQL Query:

SELECT population

FROM bsg_planets

WHERE name='Caprica';

Therefore, the above SQL query finds the population of the planet named 'Caprica' from the table bsg_planets.

b) Find the first name, last name, and age of people from bsg_people whose last name is not 'Adama'

Syntax:

SELECT  Column1, Column2, Column3

FROM TableName

WHERE Condition;

For the given case,

Column1 = fname

Column2 = lname

Column3 = age

TableName  = bsg_people

Condition = lname!='Adama'

SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE lname!='Adama';

Therefore, the above SQL query finds the first name, last name and age of people whose last name is not 'Adama' from the table bsg_people.

c) Find the name and population of the planets with a population larger than 2,600,000,000

Syntax:

SELECT  Column1, Column2

FROM TableName

WHERE Condition;

For the given case,

Column1 = name

Column2 = population

TableName  = bsg_planets

Condition = population > 2600000000

SQL Query:

SELECT name, population

FROM bsg_planets

WHERE population > 2600000000

Therefore, the above SQL query finds the name and population of the planets with a population larger than 2,600,000,000 from the table bsg_planets.

d) Find the first name, last name, and age of people from bsg_people whose age is NULL

Syntax:

SELECT  Column1, Column2, Column3

FROM TableName

WHERE Condition;

For the given case,

Column1 = fname

Column2 = lname

Column3 = age

TableName  = bsg_people

Condition = age IS NULL

SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE age IS NULL;

Therefore, the above SQL query finds the first name, last name and age of people whose age is NULL from the table bsg_people.

Answer:

SQL Query : select population from bsg_planets where name='Caprica';

SQL Query : select fname,lname,age from bsg_people where lname!='Adama';

SQL Query : select name,population from bsg_planets where population > 2600000000;

SQL Query : select fname,lname,age from bsg_people where age='NULL';

Explanation:

using MySQL Workbench.

SQL Query : select population from bsg_planets where name='Caprica';

Because this sql query will return the population from bsg_planets where the name is Caprica;

SQL Query : select fname,lname,age from bsg_people where lname!='Adama';

Because this SQL query will return the first name ,last name and age from the bsg_people where last name is not adama.

SQL Query : select name,population from bsg_planets where population > 2600000000;

Because this SQL query will return the name and population where population is greater than 2600000000

SQL Query : select fname,lname,age from bsg_people where age='NULL';

Because this SQL query will return the first name ,last name and age from the bsg_people where age is NULL.

escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. Justify your response with at least one credible source.Explain which of these features you would consider to be the most beneficial if you were a member of the IT team supporting a network. Justify your response with at least one credible source.

Answers

Answer:

Due to Brainly's policy on answering questions, posting links as "credible source." is prohibited, but you can let me know in case you'll still want to know the "credible source."

Explanation:

The three improvements you think came about with the introduction of intrusion prevention technology are:

1.The prevention of intruders from attacking the database

2.The data is protected and is more secured as the intruders are removed from the network.

3.The  data is not changed and misused as hackers cannot access it

The best feature which is can be termed as the most beneficial is that data is not changed neither can it be misused as the company's data is secured and protected from the outside world and the data can be used effectively and efficiently without any major changes.This means the company does not suffer any losses due to hacking of data.

Instructions
Write a method named buildArray that builds an array by appending
a given number of random two-digit integers. It should accept two
parameters–the first parameter is the array, and the second is an
integer for how many random values to add.
Print the array after calling buildArray .

Sample Run
How many values to add to the array: 12

[14, 64, 62, 21, 91, 25, 75, 86, 13, 87, 39, 48)​

Answers

Answer:

import java.util.Arrays; import java.util.Random; public class Main {    public static void main(String[] args) {        int [] testArray = {};        buildArray(testArray, 12);    }    public static void buildArray(int [] arr, int size){        arr = new int[size];        Random rand = new Random();        for(int i=0; i < size; i++){            arr[i] = rand.nextInt(90) + 10;        }        System.out.println(Arrays.toString(arr));    } }

Explanation:

The solution code is written in Java.

Firstly, create a method buildArray that takes two parameters, an array and an array size (Line 10).

In the method, use the input size to build an array with size-length (Line 11). Next, create a Random object and use a for loop to repeatedly generate a random integer using the Random object nextInt method. The expression rand.nextInt(90) + 10 will return an integer between 10 - 99. Each generated random integer is assigned as the value for one array item (Line 16).

At last, print out the array to terminal (Line 19).

In the main program, we can test the method by passing an empty array and a value 12 as array size (Line 7). We will get a sample array as follow:

[81, 36, 15, 20, 32, 84, 10, 13, 98, 12, 45, 45]

Original Problem statement from the Text: A retail company must file a monthly sales tax report listing the sales for the month and the amount of sales tax collected. Write a program that Asks for the month, the year, and the total amount collected at the cash register (that is, sales plus sales tax). Assume the state sales tax is 4 percent and the county sales tax is 2 percent. Example: If the total amount collected is known and the total sales tax is 6 percent, the amount of product sales may be calculated as: LaTeX: S\:=\frac{T}{1.06}S = T 1.06 S is the product sales and T is the total income (product sales plus sales tax). The program should display a report similar to this: Month: March, 2019 -------------------- Total Collected: $ 26572.89 Sales: $ 25068.76 County Sales Tax: $ 501.38 State Sales Tax: $ 1002.75 Total Sales Tax: $ 1504.13

Answers

To calculate the product sales and respective sales taxes for a retail company, divide the total collected amount by 1.06 to find the net sales, and then calculate individual taxes by applying the county and state tax rates.

The student has asked to write a program for calculating the sales tax for a retail company. When computing the amount of sales tax, you need to know the rate of the sales tax and apply it to the original price. However, in the context of the problem given, the total amount collected at the cash register already includes the sales tax. As such, the calculation to find the product sales (S) before tax should be done using the formula S = T / 1.06, where T is the total income including tax and 6% is the combined state and county sales tax rate.

Once you have the amount of product sales, you can calculate the individual sales taxes by applying the respective rates. For the county sales tax (2%), you would use the formula: County Sales Tax = S x 0.02. Similarly, for the state sales tax (4%), the formula is: State Sales Tax = S x 0.04. The total sales tax is simply the sum of these two.

what are preceded by an ampersand and followed by a semicolon​

Answers

Ampersand codes are preceded with an ampersand, followed by a mnemonic name or their ASCII number and ended with a semicolon.

The Domain Name System (DNS) provides an easy way to remember addresses. Without DNS, how many octets for an Internet Protocol (IP) address would have to be memorized?

Answers

Answer:

Four

Explanation:

The domain name system is a naming database that maps the name people use to locate a website to the IP address that is then used by a computer to locate a website. It is connected to the Internet or a private network.

An IP address is a 32-bit binary number, but it's normally written out as 4 octets in decimal form as it is easier for humans to read.

Based on the information given, the number of octets for an Internet Protocol (IP) address is four.

It should be noted that a domain name system simply means the naming database that's useful in mapping the name that people use to locate a website to the IP address

Also, An IP address is a 32-bit binary number, but it's normally written out as 4 octets. Therefore, the number of Internet Protocol (IP) address that would have to be memorized is four.

Learn more about domain on:

https://brainly.com/question/1369616

the eight bytes in the words y and z. If a byte is the code for a decimal number, output it to the console. Otherwise, simply ignore it and examine the next byte. The program must be a loop. That means that you must write a loop that will execute eight times to examine each byte, output if necessary, and continue. End the program as usual with a syscall 10. After completing the program answer this question: What numbers are output?

Answers

Answer:

See explaination

Explanation:

MIPS PROGRAM :-

.data

y: .word 0x32774b33

z: .word 0x2a276c39

y_prompt: .asciiz "Y= "

z_prompt: .asciiz "Z= "

new_line: .asciiz "\n"

.text

main:

la $s0, y

la $s1, z

li $t0, 8

loop:

beqz $t0, END_OF_LOOP

# checking fo y word

lb $t1, 0($s0)

#checking for whether the byte is decimal or not

li $t2, '0'

bltu $t1, $t2, check_for_z

li $t2, '9'

bltu $t2, $t1, check_for_z

#print new line

li $v0, 4

la $a0, new_line

syscall

#print y prompt

li $v0, 4

la $a0, y_prompt

syscall

#print the value

li $v0, 1

add $a0, $zero, $t1

syscall

check_for_z:

# checking fo z word

lb $t1, 0($s1)

#checking for whether the byte is decimal or not

li $t2, '0'

bltu $t1, $t2, next_element

li $t2, '9'

bltu $t2, $t1, next_element

#print new line

li $v0, 4

la $a0, new_line

syscall

#print y prompt

li $v0, 4

la $a0, z_prompt

syscall

#print the value

li $v0, 1

add $a0, $zero, $t1

syscall

next_element:

addi $s0, $s0, 1

addi $s1, $s1, 1

#decrease the counter

addi $t0, $t0, -1

j loop

END_OF_LOOP:

li $v0,10

syscall

True or false :User intent refers to what the user was trying to accomplish by issuing the query

Answers

The statement regarding user intent is true; it indicates the user's motive behind a search query. User intent is a crucial element in fields such as SEO and helps provide accurate search results based on the user's objective when issuing a query.

The statement 'User intent refers to what the user was trying to accomplish by issuing the query' is true. The concept of user intent is critical in various fields such as search engine optimization (SEO), user experience design, and information retrieval. It is concerned with understanding the goals or objectives a user has in mind when they input a query into a search engine or another kind of system. User intent can be informational, navigational, or transactional, but fundamentally, it suggests that there is a purpose behind the words and phrases that users choose. Understanding user intent is essential for providing relevant and useful responses or results.

It is also related to the concept of truth-value, which refers to the validity of a sentence as being either true or false. For instance, the assertion itself is a sentence with a truth value. In the context of literature, the intent is often debated in terms of the author's intent versus the reader's interpretation, but in the technological realm, user intent usually refers to the direct objectives sought by the person posing the query.

Which character goes at the end of a line of code that starts with if?

Answers

Answer:

Explanation:

tttttttttttt

Susan was recently fired from her executive IT position. You have concerns that she has enough knowledge and expertise to sabotage company documents—and you need to delete her access. However, upon beginning, you find information that should be retained in her user directory for future company needs. Consider the process you would take to ensure that Susan no longer has access and that data is retained. In situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not?

Answers

Answer:

The answer is No, the gains or benefit do not exceed the risk because, even if the data of the user seem very vital, the damage it would have on the long will affect the organisation in a negative way.

Explanation:

From the example given, stating that in situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not

I would say that  NO, the benefits do not outweigh the risk that will be enough to keep the user information because, just as the user data is important, but the damage it would yield or have could affect the organization on the long run.

3. Show the stack with all activation record instances (with all fields), when execution reaches position 1 in the following skeletal program. Assume bigsub is at level 1. 15 pts function bigsub() { var bigl1; function a(flag, ap1) { var al1; function b() { var bl1, bl2; ... a(false, bl2); ... } // end of b ... if (flag) b(); else c(ap1, al1); ... } // end of a function c(cp1, cp2) { function d(dp1, dp2) { var dl1; ... <------------------------1 } // end of d ... d(cp1, cp2); } // end of c ... a(true, bigl1); ... } // end of bigsub The calling sequence for this program for execution to reach d is bigsub calls a a calls b b calls a a calls c c calls d

Answers

To analyze the stack with all activation record instances when execution reaches position 1 (inside function `d`) in the provided program, we need to trace through the sequence of function calls and their respective activation records. Let's break down the steps leading up to this point:

1. Initial Setup:

  - `bigsub()` is the main function being executed.

  - `bigsub()` calls `a(true, bigl1)`.

2. Execution Flow:

  - `bigsub()` calls `a(true, bigl1)`.

  - Inside `a(flag, ap1)`:

    - `flag` is `true`.

    - `a()` then calls `b()`.

 

  - Inside `b()`:

    - `b()` defines local variables `bl1` and `bl2`.

    - `b()` calls `a(false, bl2)`.

  - Back inside `a(flag, ap1)` (after returning from `b()`):

    - Since `flag` is `true`, the `else` block in `a()` is not executed.

    - Therefore, `a()` does not call `c()`.

 

  - `a(true, bigl1)` completes execution.

3. Execution Flow after `a(true, bigl1)`:

  - `bigsub()` resumes execution after `a(true, bigl1)`.

  - No further significant function calls are made before the stack reaches `c(cp1, cp2)`.

4. Execution Reaches `c(cp1, cp2)`:

  - Inside `c(cp1, cp2)`:

    - `c()` defines the function `d(dp1, dp2)`.

    - `c()` then calls `d(cp1, cp2)`.

5. Execution Inside `d(dp1, dp2)` (Position 1):

  - Execution reaches the start of function `d(dp1, dp2)`.

Now, let's summarize the stack and activation records at this point:

- Stack Layout:

 1. `d(dp1, dp2)` activation record (current execution point)

    - Fields: `dp1`, `dp2`, `dl1` (local to `d()`)

 2. `c(cp1, cp2)` activation record

    - Fields: `cp1`, `cp2`

    - Contains function `d(dp1, dp2)` within its scope

 3. `a(flag, ap1)` activation record

    - Fields: `flag`, `ap1`, `al1`

    - Contains the call to `c(cp1, cp2)` within its scope

 4. `bigsub()` activation record

    - No specific fields needed for this context; serves as the outermost scope

- Additional Notes:

 - Each activation record (or stack frame) corresponds to a particular function call instance and contains its local variables and parameters.

 - The scope of each function determines which inner functions and variables are accessible within that context.

 - `d(dp1, dp2)`'s activation record is the current active frame when execution reaches position 1 inside `d()`, and it contains the local variables (`dp1`, `dp2`, `dl1`) defined within `d()`.

The length of a hailstone sequence is the number of terms it contains. For example, the hailstone sequence in example 1 (5, 16, 8, 4, 2, 1) has a length of 6 and the hailstone sequence in example 2 (8, 4, 2, 1) has a length of 4. Write the method hailstoneLength(int n), which returns the length of the hailstone sequence that starts with n. /** Returns the length of a hailstone sequence that starts with n, * as described in part (a). * Precondition: n > 0 */ public static int hailstoneLength(int n)

Answers

Answer:

Following are the program to this question:

#include <iostream> //defining header file

using namespace std;

int hailstoneLength(int n) //defining method hailstoneLength

{

int t=1; //defining integer variable assign  

while(n!=1) //define a loop that checks value is not equal to 1

{

if(n%2==0) // check even number condition

{

n=n/2; // divide the value by 2 and store its remainder value in n

t++; //increment value of t by 1.

}

else

{

n=n*3+1; //calculate and hold value in n  

t++; //increment value of t variable by 1  

}

}

return t; //return value

}

int main() //defining main method

{

int n; //defining integer variable

cout<<"Enter any number: "; //print message

cin>> n; //input value

cout<<hailstoneLength(n); //call method and print its value

return 0;

}

Output:

Enter any number: 3

8

Explanation:

Program description can be given as follows:

In the given C++ language program an integer method "hailstoneLength", is declared, that accepts an integer variable "n" in its parameter. Inside the method, an integer variable t is declared, that assign a value that is 1, in the next line, a while loop is declared, that uses if block to check even condition if number is even it divide by 2 and increment t variable value by 1. If the number is odd it will multiply the value by 3 and add 1 and increment t by 1 then it will go to if block to check value again. when value of n is not equal to 1 it will return t variable value. In the main method, an integer variable "n" is used that call the method and print its return value.

When a Python program is reading a file, the data is input as plain ASCII characters in a string. What is the following code doing assuming a file is opened with file object inputFile? r_in = inputFile.readline() t = 0 while r_in != '': r = r_in.rstrip('\n') r_list = r.split('|') n = float(r_list[2]) t += n r_in = inputFile.readline()

Answers

Answer:

The given python code mainly add values.

Explanation:

In the given python code, a r_in variable is defined, that reads a file in the next line, a while loop is declared, inside the loop "r_in" variable is used that provides slicing in the code.

In this code, in the file, each line is the format in field 1 and field 2. The code puts its fields into the list first and then converts into the last dimension to the numerical type before applying to a sum.

Write a program that asks the user to input a set of floating-point values. When the user enters a value that is not a number, give the user a second chance to enter the value. After two chances, quit reading input. Add all correctly specified values and print the sum when the user is done entering data. Use exception handling to detect improper inputs.

Answers

Answer:

Check the explanation

Explanation:

// include the necessary packages

import java.io.*;

import java.util.*;

// Declare a class

public class DataReader

{

// Start the main method.

public static void main(String[] args)

{

// create the object of scanner class.

Scanner scan = new Scanner(System.in);

// Declare variables.

boolean done = false;

boolean done1 = false;

float sum = 0;

double v;

int count = 0;

// start the while loop

while (!done1)

{

// start the do while loop

do

{

// prompt the user to enter the value.

System.out.println("Value:");

// start the try block

try

{

// input number

v = scan.nextDouble();

// calculate the sum

sum = (float) (sum + v);

}

// start the catch block

catch (Exception nfe)

{

// input a character variable(\n)

String ch = scan.nextLine();

// display the statement.

System.out.println(

"Input Error. Try again.");

// count the value.

count++;

break;

}

}

// end do while loop

while (!done);

// Check whether the value of count

// greater than 2 or not.

if (count >= 2)

{

// display the statement on console.

System.out.println("Sum: " + sum);

done1 = true;

}

}

}

}

Sample Output:

Value:

12

Value:

12

Value:

ten

Input Error. Try again.

Value:

5

Value:

nine

Input Error. Try again.

Sum: 29.0

Answer:

See Explaination for program code

Explanation:

Code below

import java.io.*;

import java.util.*;

// Declare a class

public class DataReader

{

// Start the main method.

public static void main(String[] args)

{

// create the object of scanner class.

Scanner scan = new Scanner(System.in);

// Declare variables.

boolean done = false;

boolean done1 = false;

float sum = 0;

double v;

int count = 0;

// start the while loop

while (!done1)

{

// start the do while loop

do

{

// prompt the user to enter the value.

System.out.println("Value:");

// start the try block

try

{

// input number

v = scan.nextDouble();

// calculate the sum

sum = (float) (sum + v);

}

// start the catch block

catch (Exception nfe)

{

// input a character variable(\n)

String ch = scan.nextLine();

// display the statement.

System.out.println(

"Input Error. Try again.");

// count the value.

count++;

break;

}

}

// end do while loop

while (!done);

// Check whether the value of count

// greater than 2 or not.

if (count >= 2)

{

// display the statement on console.

System.out.println("Sum: " + sum);

done1 = true;

}

}

}

}

Assume that we have seeded a program with 5 defects before testing. After the test, 20 defects were detected, of which, 2 are from the seeded defects and 18 are real, non-seeded defects. We know there are 3 more seeded defects remaining in the software. Assuming a linear relationship, what is the estimated real, non-seeded defects that may still be remaining in the program

Answers

Answer:

see explaination

Explanation:

Given that we have;

Defects before testing = Defects planted = 5

Defects after testing = 20

Seeded defects found = 2

Real, non seeded defects = 18

Hence, Total number of defects = (defects planted / seeded defects found) * real, non seeded defects = (5/2)*18 = 45

Therefore, Estimated number of real defects still present = estimated total number of defects - number of real, non seeded defects found = 45-18 = 27

Modify class fraction to keep track of the number of the objects currently in memory Let the user input a denominator, and then generate all combinations of two such fractions that are between 0 and 1, and multiply them together. Create fractions and arrays dynamically based on the user input. Only positive fractions. No need to reduce. No vectors allowed. The well-formatted ou

Answers

Answer:

See explaination

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

int main() {

int dem,i,j;

cout<<"Enter denominator value"<<endl;

cin>>dem;

int** arr=new int*[dem];

for(i=0;i<dem;i++)

{

if(i!=0)

cout<<setw(5)<<i<<"/"<<dem;

cout<<"\t";

}

cout<<endl;

for(i=1;i<dem;i++)

{ cout<<setw(5)<<i<<"/"<<dem<<"\t";

arr[i] = new int[dem];

for(j=1;j<dem;j++)

{

cout<<setw(5)<<i*j<<"/"<<dem<<"\t";

}

cout<<endl;

}

return 0;

}

Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to different modules of your network design. Document whether you will use public or private addressing for each module. Document whether you will use manual or dynamic addressing for each module. Specify where (if anywhere) route summarization will occur.

Answers

Answer:

Given that: Design scenario - page 197 has a continuation of the chapter 1 design scenario for ElectroMyCycle

Explanation:

See attached image

Final answer:

An IP addressing scheme for ElectroMyCycle involves using private addresses for internal networks with a combination of manual and dynamic addressing, public addresses for the DMZ, and route summarization at the router connecting to the ISP.

Explanation:

To design an IP addressing scheme for ElectroMyCycle, one must consider both the size of the network and the security requirements. The following is a tentative plan:

Headquarters: Use private addressing (e.g., 192.168.1.0/24) because these IP addresses do not need to be routable to the Internet. Dynamic addressing through DHCP can be applied here for ease of management.

Production Facility: Use a separate block of private addresses (e.g., 192.168.2.0/24) and manual addressing for fixed assets like servers, while dynamic addressing can be used for employee devices.

Sales Offices: Smaller subnets of private addresses (e.g., 192.168.3.0/28) with dynamic addressing would be appropriate.

DMZ (Demilitarized Zone): This area, which contains public-facing servers, should use public IP addresses for accessibility from the Internet. Manual addressing is recommended for these critical assets.

Route summarization can occur at the router connecting the headquarters to the ISP, summarizing the multiple private subnets into a single entry in the routing table to simplify the routing process and reduce overhead.

In the lab, you discovered that the server you scanned (10.20.1.2) was vulnerable to the WannaCry ransomeware attack. What ports are affected and what are the recommended remediations? Why is it important to perform penetration testing on networks and individual servers?

Answers

Answer:

Check the explanation

Explanation:

If Zenmap SYN scan did not work in your lab, then that means the application could not locate the network you were attempting to scan, i.e. 10.20.1.0/24. Recall that in Section 2.

Part 2. You added a Route for 10.20.1.0 to be routed via the 172.30.0.1 gateway. That route you added to communicate with the 10.20.1.0 network is a temporary route and will be replaced each time.

Write a program that reads the contents of the two files into two separate lists. The user should be able to enter a boy’s name, a girl’s name, or both, and the application will display messages indicating whether the names were among the most popular.

Answers

Answer:

Check Explanation.

Explanation:

A programming language is used by engineers, technologists, scientists or someone that learnt about programming languages and they use these programming languages to give instructions to a system. There are many types for instance, c++, python, Java and many more.

So, the solution to the question above is given below;

#define the lists

boyNames=[]

girlNames=[]

#open the text file BoyNames.txt

with open('BoyNames.txt','r') as rd_b_fl:

boyNames=rd_b_fl.readlines()

boyNames=[name.strip().lower() for name in boyNames]

#open the text file GirlNames.txt

with open('GirlNames.txt','r') as rd_b_fl:

girlNames=rd_b_fl.readlines()

girlNames=[name.strip().lower() for name in girlNames]

#print the message to prompt for name

print('Enter a name to see if it is a popular girls or boys name.')

while True:

#prompt and read the name

name=input('\nEnter a name to check, or \"stop\" to stop: ').lower()

# if the input is stop, then exit from the program

if name=='stop':

break

# If the girl name exits in the file,then return 1

g_count=girlNames.count(name)

# if return value greater than 0, then print message

if g_count>0:

print(name.title()+" is a popular girls name and is ranked "

+str(girlNames.index(name)+1))

# if return value greater than 0, then print message

#"Not popular name"

else:

print(name.title()+" is not a popular girls name")

## If the boy name exits in the file,then return 1

b_count=boyNames.count(name)

if b_count>0:

print(name.title()+" is a popular boys name and is ranked "

+str(boyNames.index(name)+1))

# if return value greater than 0, then print message

#"Not popular name"

else:

print(name.title()+" is not a popular boys name")

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). c

Answers

Final answer:

A program can calculate the estimated monthly mortgage using the formula (currentPrice * 0.051) / 12 and determine the percentage change in house prices to analyze market trends.

Explanation:

Sites like Zillow provide summaries of house prices to give accurate estimates of home values. When writing a program to output a summary of the current price, last month's price, and the estimated monthly mortgage, one can use the formula provided in the question to calculate the mortgage. The estimated monthly mortgage is computed using the formula (currentPrice * 0.051) / 12. It's also important to note that the percentage change in house prices is an important metric when analyzing real estate data, which can be computed as [(current price - last month's price) / last month's price] * 100. This will help in understanding the real estate market trends.

Write a loop to print 10 to 90 inclusive (this means it should include both the

10 and 90), 10 per line.

Use

Expected Output

mov

10 11 12 13 14 15 16 17 18 19

20 21 22 23 24 25 26 27 28 29

30 31 32 33 34 35 36 37 38 39

40 41 42 43 44 45 46 47 48 49

50 51 52 53 54 55 56 57 58 59

60 61 62 63 64 65 66 67 68 69

70 71 72 73 74 75 76 77 78 79

80 81 82 83 84 85 86 87 88 89

90

Answers

Answer:

The loop in cpp language is as follows.

for(int n=10; n<=90; n++)

{

cout<<n<<" ";

count = count+1;

if(count==10)

{

cout<<""<<endl;

count=0;

}

}

Explanation:

1. The expected output is obtained using for loop.

2. The loop variable, n is initialized to the starting value of 10.

3. The variable n is incremented by 1 at a time, until n reaches the final value of 90.

4. Every value of n beginning from 10 is displayed folllowed by a space.

5. When 10 numbers are printed, a new line is inserted so that every line shows only 10 numbers.

6. This is achieved by using an integer variable, count.

7. The variable count is initialized to 0.

8. After every number is displayed, count is incremented by 1.

9. When the value of count reaches 10, a new line is inserted and the variable count is initialized to 0 again. This is done inside if statement.

10. The program using the above loop is shown below along with the output.

PROGRAM

#include <stdio.h>

#include <iostream>

using namespace std;

int main()

{

   int count=0;

   for(int n=10; n<=90; n++)

   {

       cout<<n<<" ";

       count = count+1;

       if(count==10)

       {

           cout<<""<<endl;

           count=0;

       }

       

   }

   return 0;

}  

OUTPUT

10 11 12 13 14 15 16 17 18 19  

20 21 22 23 24 25 26 27 28 29  

30 31 32 33 34 35 36 37 38 39  

40 41 42 43 44 45 46 47 48 49  

50 51 52 53 54 55 56 57 58 59  

60 61 62 63 64 65 66 67 68 69  

70 71 72 73 74 75 76 77 78 79  

80 81 82 83 84 85 86 87 88 89  

90

1. In the above program, the variable count is initialized inside main() but outside for loop.

2. The program ends with a return statement since main() has return type of integer.

3. In cpp language, use of class is not mandatory.

Arrays enable the representation of a number of similar items (in terms of their datatypes). They represent these items in an ordered list. Consider the features of arrays and respond to the following: In what programming situations would the use of an array be beneficial? What situations would not warrant the use of an array? Provide an example explaining why? Imagine a programming structure that would deal with these problems. What characteristics should the structure possess? Research the concept of class ArrayList in Java. Describe the advantage of using the ArrayList class over an array. Also discuss in what circumstances you should use one over the other. Please use examples to justify your answers.

Answers

Answer:

Check the explanation

Explanation:

When there is a need to initialize a lot of element of same data types,tht time we use arrays.

We have to use array  whenever it involves simple programs and cases,

dx:saving age of 100 childrans of sametype

When all the ele,ents are of different data type,we hould not use arrays,even when we initialize at runtime,we dont need arrays.i.e when size is not fixed

Linked list can be used instead of arrays

ArrayList:It provides methods for creating, searching, manipulating, and sorting arrays, thereby serving as the base class for all arrays in the common language runtime.

Advantages:

Readymade properties availaible ,so lot of writing and remembering the code can be avoided.

Provide the reference for other arrays

Helps in faster execution

Design a program that will take an unsorted list of names and use the Insertion Sort algorithm to sort them. The program then asks the user to enter names to see if they are on the list. The program will use the recursive Binary Search algorithm to see if the name is in the list. The search should be enclosed in a loop so that the user can ask for names until they enter the sentinel value 'quit'

Answers

Answer:

Check the explanation

Explanation:

Program:

from modules import binSearch

from modules import insertionSort

unsort_list=['Paul', 'Aaron', 'Jacob', 'James', 'Bill', 'Sara', 'Cathy', 'Barbara', 'Amy', 'Jill']

print("The list of unsorted items are given below")

for i in unsort_list:

print(i)

insertionSort(unsort_list)

print("The list of sorted items are given below")

for i in unsort_list:

print(i)

while True:

userInput=raw_input("Enter the search string or quit to exit.. ")

if userInput == "quit":

print("quitting...")

break

else:

if binSearch(unsort_list, 0, len(unsort_list), userInput) != False:

print("%s was found." %userInput)

else:

print("%s was not found" %userInput)

USER> cat modules.py

def insertionSort(listarray):

"""This api in this module sorts the list in insertion sort algorithm"""

length=len(listarray)

currentIndex =1

while currentIndex < length:

index=currentIndex

placeFoundFlag=False

while index > 0 and placeFoundFlag == False:

if listarray[index] < listarray[index-1]:

temp=listarray[index-1]

listarray[index-1]=listarray[index]

listarray[index]=temp

index=index-1

else:

placeFoundFlag=True

currentIndex=currentIndex+1

def binSearch (listarray, init, lisLen, searchString):

"""This api in thie module search the given string from a given list"""

#check the starting position for the list array

if lisLen >= init:

#find the center point to start the search

mid = init + int((lisLen - init)/2)

#check if the string matches with the mid point index

if listarray[mid] == searchString:

return listarray[mid]

#now we will search recursively the left half of the array

elif listarray[mid] > searchString :

return binSearch(listarray, init, mid-1, searchString)

#now we will search recursively the right half of the array

else:

return binSearch(listarray, mid+1, lisLen, searchString)

else:

#string now found, return False

return False

Output:

The list of unsorted items are given below

Paul

Aaron

Jacob

James

Bill

Sara

Cathy

Barbara

Amy

Jill

The list of sorted items are given below

Aaron

Amy

Barbara

Bill

Cathy

Jacob

James

Jill

Paul

Sara

Enter the search string or quit to exit.. Amy

Amy was found.

Enter the search string or quit to exit.. AAron

AAron was not found

Enter the search string or quit to exit.. James

James was found.

Enter the search string or quit to exit.. Irvinf

Irvinf was not found

Enter the search string or quit to exit.. quit

quitting...

Kindly check the code output below.

Answer:

See explaination for program code

Explanation:

Code below:

def insertion_sort(names_list):

"""

function to sort name list using insertion sort

"""

for i in range(1, len(names_list)):

val = names_list[i]

temp = i

while temp > 0 and names_list[temp-1] > val:

names_list[temp] = names_list[temp-1]

temp = temp-1

names_list[temp] = val

def recursive_binary_search(names_list, left, right, search):

"""

function to search name in given list

"""

if right >= left:

# getting mid value

mid_index = int(left + (right - left)/2)

# comparing case insensitive name

if names_list[mid_index].lower() == search.lower():

# returning true if name found

return True

# shifting right left value as per comparing

elif names_list[mid_index].lower() > search.lower():

# calling function resursively

return recursive_binary_search(names_list, left, mid_index-1, search)

else:

return recursive_binary_search(names_list, mid_index+1, right, search)

else:

return False

def main():

# TODO: please feel free to add more name in below list

names = [

"Rakesh",

"Rahul",

"Amit",

"Gunjan",

"Alisha",

"Roy",

"Amrita"

]

print("sorting names....")

insertion_sort(names)

print("names sorted..")

while 1:

name = input("Enter name to search or quit to exit: ")

if name.lower() == 'quit':

break

# searhing name and based on result printing output

result = recursive_binary_search(names, 0, len(names)-1, name)

if result:

print("Name %s found in list" % name)

else:

print("Name %s not found in list" % name)

4.24 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Quit", "quit", or "q" for the line of text. Ex: If the input is:

Answers

The program that takes in a line of text as input, and outputs that line of text in reverse is given in the explanation part below.

What is programming?

The implementation of logic to facilitate specified computing operations and functionality is known as programming.

It occurs in one or more languages that vary according to application, domain, and programming model.

The goal of programming is to find a set of instructions that will automate the execution of a task that may be as complex as an operating system on a computer, mostly to solve a specific problem.

import java.util.Scanner;

public class LabProgram

{

public static void main(String[] args)

{

Scanner in = new Scanner(System.in);

String line;

while (true)

{

line = in.nextLine();

if (line.equals("quit") || line.equals("Quit") || line.equals("q")) break;

for (int i = 0; i < line.length(); i++) {

System.out.print(line.charAt(line.length() - i - 1));

}

System.out.println();

}

}

}

Thus, above mentioned is the program for the given scenario.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ5

in c Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. The output of the program is every word in the list that contains the character at least once. Assume at least one word in the list will contain the given character. Assume that the list will always contain less than 20 words. Each word will always contain less than 10 characters and no spaces.

Answers

Answer:

see explaination

Explanation:

//Include required header file.

#include <stdio.h>

//Define the function isWordContainChar() having the

//required parameters.

int isWordContainChar(char* req_word, char search_char)

{

//Declare required variable.

int i;

//Start a for loop to traverse the string given in

//the function parameter.

for(i = 0; req_word[i] != '\0' ; i++)

{

//If the current character in the gievn word is

//matched with the character which needs to be

//found in the word, then return 1.

if(req_word[i] == search_char)

{

return 1;

}

}

//Otherwise, return 0.

return 0;

}

//Start the execution of the main() method.

int main(void)

{

//Declare the required variables.

int num_words, index, word_index;

char str_word[20][10];

char searchCharacter;

//Prompt the user to enter the number of words.

scanf("%d", &num_words);

//Prompt the user to enter the required words using a

//for loop and store them into an array.

for(index = 0; index < num_words; index++)

{

scanf("%s", str_word[index]);

}

//Prompt the user to enter a required character which

//needs to be found in a word.

scanf(" %c", &searchCharacter);

//Traverse the words stored in the array using a for

//loop.

for(index = 0; index < num_words; index++)

{

//Call the function isWordContainChar() with

//required arguments in rach iteration and if the

//value returned by this function is not 0, then

//display the current string in the array.

if(isWordContainChar(str_word[index],

searchCharacter) != 0)

{

printf("%s\n", str_word[index]);

}

}

return 0;

}

Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?


To be a digital media coordinator, Claire needs a bachelor’s degree in (psychology, public relations, finance) , digital media, or a related field. She also needs to have knowledge of (computer programming, computer coding, search engine optimization) and emerging digital technologies.

Answers

To pursue a career as a Digital Media Coordinator, Claire should have a bachelor's degree in a relevant field.

Claire should have a good understanding of emerging digital technologies and trends. This includes staying up-to-date with the latest developments in digital media platforms, social media, and online advertising. Familiarity with digital marketing techniques and tools is essential.

Claire should be able to analyze digital media data and performance metrics. This includes using tools like Analytics to measure the effectiveness of digital campaigns and make data-driven decisions. Strong written and verbal communication skills are important for creating and conveying digital media content effectively. Claire may be responsible for writing web content, social media posts, or email campaigns.

Learn more about Digital Media Coordinator, here:

https://brainly.com/question/24032108

#SPJ3

Final answer:

Claire needs a bachelor's degree in public relations or a related field, knowledge of SEO, and practical experience in strategic communication. She should highlight her communication experiences and skills such as content creation and media planning. Starting as a communication technician can lead to more advanced roles.

Explanation:

To pursue a career as a digital media coordinator, Claire should ideally have a bachelor’s degree in public relations, digital media, or a related field such as marketing or communication studies. It is also essential for her to possess knowledge of search engine optimization (SEO) and stay updated on emerging digital technologies. Practical experience, whether through internships, work placements, or personal projects, is highly valued in this field; not only do they demonstrate Claire's skill set, but also her understanding of the practical aspects of strategic communication.

Claire should emphasize her communication major experience and any hands-on involvement she had with social media campaigns, event planning, or creating digital content. These experiences could range from managing social media accounts for a student organization to participating in a campaign focus group. Highlighting skills such as content creation, analytics, audience engagement, and media planning in her cover letter and application materials will be beneficial.

Starting as a communication technician could be a stepping stone in Claire's career, eventually leading up to a managerial role in public relations or advertising. To stay competitive and prepared for job opportunities, Claire should also consider developing a comprehensive portfolio that showcases her skills in business communication and strategic planning.

9-9. Your computer sends a DNS request message to your local DNS server. After an unusually long time, your computer receives a DNS response message that the host name in your request message does not exist. This is a host you use every day. a) List problems that may have happened and comment on their likelihood in broad terms like low. Give an explanation for your rating. (Draw the picture.)

Answers

Answer:

The three major problem, which arise there are as follows:

Internet issues, server issues, and server down.

Explanation:

All the issues can be described as follows:

Internet issues may occur due to censure, cyber warfare, catastrophic events, efforts on the part of police and security utilities. It may also be known as the underwater communications, in which cable breakdowns cause disruptions to large parts. A power failure is also the most frequent cause of server failure. If you don't even have a backup generator, storms, natural catastrophes, and statewide power failures may shut your server off. It may be overloaded, that can trigger device crashes. Essentially, it's when too many users access the server simultaneously.

Final answer:

DNS issues could range from typos, an outdated or corrupted DNS cache, problems with the local DNS server, or issues with the host itself, each with varying likelihoods.

Explanation:

When your computer sends a DNS request and receives a response that the host name does not exist despite it being a commonly used host, several problems could be at play. One potential issue is a typo in the host name entered which is highly unlikely if the host is frequently visited and the URL was autofilled. Another issue could be that the DNS cache is outdated or corrupted; this is more common and clearing the cache could resolve this problem. Additionally, the local DNS server might be experiencing problems, such as being overwhelmed with requests or having a configuration issue which could be a moderate likelihood. Finally, the host itself may be experiencing issues, such as having moved to a new server or the domain name having expired, though this is less likely if no prior indication of such a change was given.

Which of the following statements are true?All the methods in HashSet are inherited from the Collection interface.All the methods in Set are inherited from the Collection interface.All the concrete classes of Collection have at least two constructors. One is the no-arg constructor that constructs an empty collection. The other constructs instances from a collection.All the methods in LinkedHashSet are inherited from the Collection interface.All the methods in TreeSet are inherited from the Collection interface.

Answers

Answer:

All the methods in HashSet are inherited from the Collection interface.

All the methods in LinkedHashSet are inherited from the Collection interface.

All the methods in Set are inherited from the Collection interface.

Explanation:

These listed statements are true;

1. All the methods in HashSet are inherited from the Collection interface. True

2. All the methods in LinkedHashSet are inherited from the Collection interface. This is also true

3. All the methods in Set are inherited from the Collection interface. Also this statement is true.

Final answer:

The methods in HashSet, Set, LinkedHashSet, and TreeSet are all inherited from the Collection interface. Not all concrete classes of Collection have at least two constructors, not all of them. It's generally the interfaces that inherit from Collection.

Explanation:

The following are true regarding the described Java Collection Framework elements:

All the methods in HashSet are inherited from the Collection interface. This is true because HashSet implements the Set interface, which in turn extends the Collection interface. Therefore, HashSet has all the methods inherited from the Collection interface.All the methods in Set are inherited from the Collection interface. The Set interface extends the Collection interface in Java, meaning all the methods declared in Collection interface are available in Set, thus this statement is true.All concrete classes of Collection have at least two constructors. Not all concrete classes in the Collection Framework have two constructors. For example, Queue implementations typically only have a no-arg constructor, making this statement false.All the methods in LinkedHashSet are inherited from the Collection interface. LinkedHashSet is a subclass of HashSet, which in turn is a Set, so all methods in LinkedHashSet are inherited from the Collection interface.All the methods in TreeSet are inherited from the Collection interface. TreeSet implements the SortedSet interface, which extends Set that in turn extends Collection, thus all methods from Collection are available, making this statement true.

Learn more about Java Collection Framework here:

https://brainly.com/question/32088746

#SPJ3

Write a menu-driven program for a user to store information about the media collection they own. This requires using an array of struct type called Media. Every element in the array represents one media item in a person's collection. Represent the information as an array of structs that needs to able to hold up to 100 media entries. However, the actual number of entries is probably much smaller so the program needs to keep track of how many actual entries are in the collection.

Answers

Answer:

Check Explanation and attachment.

Explanation:

Since the site does not allow me to submit my work(for you to easily copy and paste it), I will post some additional attachments.  

Please, note that there is category, unique ID, description for each media item.

#include <stdio.h>

#include <string.h>

struct Media {

int id;

int year;

char title[250];

char description[250];

char category[50];

};

void show_menu();

void add_item(struct Media arr[], int *c);

void print_all(struct Media arr[], int c);

void print_category(struct Media arr[], int c);

void delete_entry(struct Media arr[], int *c);

int main() {

struct Media collection[100];

int ch, count = 0;

// loop until user wants to quit

while (1) {

show_menu(); // display the menu

printf("Enter your choice: ");

scanf("%d", &ch);

if (ch == 1)

add_item(collection, &count);

else if (ch == 2)

print_all(collection, count);

else if (ch == 3)

print_category(collection, count);

else if (ch == 4)

delete_entry(collection, &count);

else if (ch == 0)

break;

else

printf("Invalid choice. Try again!\n");

}

return 0;

}

void show_menu() {

printf("1. Add a media item to the collection\n");

printf("2. Print all media in the collection\n");

printf("3. Print all media in a given category\n");

printf("4. Delete an entry\n");

printf("0. Quit\n");

}

void add_item(struct Media arr[], int *cnt) {

CHALLENGE ACTIVITY 7.3.1: Functions: Factoring out a unit-conversion calculation. Write a function so that the main() code below can be replaced by the simpler code that calls function MphAndMinutesToMiles(). Original main(): int main() { double milesPerHour; double minutesTraveled; double hoursTraveled; double milesTraveled; cin >> milesPerHour; cin >> minutesTraveled; hoursTraveled

Answers

The function so that the main() code below can be replaced by the simpler code is given below.

We are given that;

The functions

Now,

The main() code can then be simplified as:

int main() {

  double milesPerHour;

  double minutesTraveled;

  double milesTraveled;

  cin >> milesPerHour;

  cin >> minutesTraveled;

  milesTraveled = MphAndMinutesToMiles(milesPerHour, minutesTraveled);

  cout << "Miles: " << milesTraveled << endl;

  return 0;

}

To learn more about coding visit;

https://brainly.com/question/17204194

#SPJ6

Final answer:

The student needs to write a function that converts speed from miles per hour and minutes traveled into miles, which involves programming and applying unit conversions. The MphAndMinutesToMiles() function calculates hours from minutes and then computes distance by multiplying with the provided speed.

Explanation:

The question involves creating a function to facilitate conversion of speed from miles per hour (mph) and travel time in minutes to the distance traveled in miles. This relates primarily to the field of Computers and Technology, particularly in the area of programming and software development, where such a function can be implemented in a variety of programming languages. The student is in college, as the task involves writing a function, which is a concept usually introduced at that level. The task requires understanding of unit conversions and how to apply them within a program.

Write the Function for MphAndMinutesToMiles:

To convert the main code to use the function MphAndMinutesToMiles(), begin by considering the basic formula for distance, which is speed multiplied by time. Since time is given in minutes, it needs to be converted to hours to match the units of miles per hour. This can be done by dividing the minutes by 60. Once the time is in hours, multiplying by the miles per hour speed will give the distance in miles.

The function might look something like:

  double MphAndMinutesToMiles(double mph, double minutes) {
      double hours = minutes / 60.0;
      return mph * hours;
  }

In the main program, you could then get the miles traveled by just calling:

  milesTraveled = MphAndMinutesToMiles(milesPerHour, minutesTraveled);

Other Questions
Mutations that neither benefit nor harm the organism haveffect on the organism's survival.a positivea negativean aggressivea neutral Which statement is correct regarding the measurements of the parallelogram?On a coordinate plane, a parallelogram has points (16, 4), (10, 1), (2, 1), (8, 4).The base is 6 and the height is 3, so the area is 6 (3) = 18 square units.The base is 8 and the height is 3, so the area is 8 (3) = 24 square units.The base is 8 and the height is 4, so the area is 8 (4) = 32 square units.The base is 8 and the height is 6, so the area is 8 (6) = 48 square units. what are the pros and cons for netting How are organism in the domains bacteria and archaea similarA. They contain protistsB. They are unicellularC. They contain nucleiD. They are eukaryotes Ali gives acting all her time and energy. OsubjectO subject complementO direct objectO indirect objectO object of a preposition there are 300 student and teachers at a sports event.Grade k to 2 is students: 137 Grade 3 to 5 students: 145 Teachers: ? what is the percentage of teachers at the sports event. A liquid flows down an inclined plane surface in a steady, full developed laminar film of thickness h. Simplify the Navier-Stokes equations to model this flow field. Obtain expressions for the liquid velocity profile, the shear stress distribution, the volumetric flow rate, and the average velocity. Calculate the volumetric flow rate in a film of water h = 1 mm thick, flowing on a surface b = 1 m wide, inclined at 15 degrees to the horizontal. CompuCorp CEO Saran Reiner has blatantly ignored boththe letter and the spirit of the law with his refusal toprovide incentives to employees who use alternativemeans of transportation to get to and from work.Mr. Reiner believes that this law does notapply to his company because CompuCorp employs lessthan the required 2,500 employees mandated by the law.Which transition would fit in the blank in order to most effectively link claimsto counterclaims?A. SimilarlyB. For exampleC. HoweverD. On the other hand A gopher has dug holes in opposite corners of a rectangular yard. One length of the yard is 8 meters and the distance between the gopher's holes is 10 meters. How wide is the yard? Vitamins are food.True OR False Vasco Company purchased equipment on January 1, 2001 at a purchase price of $50,000. Vasco paid $2,500 in shipping costs on the new machine and $500 on insurance on the new machine while in transit. Vasco has determined that the sum-of-the-years digits method is the appropriate depreciation method and estimates the useful life of the equipment to be 6 years and the residual value to be $5,000. On January 1, 2003, the estimate of the useful life was changed to be a total of 10 years, and the estimate of residual value was changed to $1,000. Determine the amount of depreciation expense 3.Explain body shift in SL and when would you use it? (Be detailed) Plz help me with this How does hydrosphere interact with geosphere? How does an interactive image of a volcano help you to understand the process of a volcano eruption? A. It will help you remember the information since it is interactive.B. It can help you visualize. C. It can show you how the structural changes of each volcano can change how the volcano erupts.D. all of these The specific heat of a liquid x is 2.09 cal/gc. A sample amount of grams of this liquid at 101 k is heated to 225 k. the liquid absorbs 5.23 kcals. what is the sample of liquid in grams? (round off decimal in the answer to nearest tenths) I seriously have no idea how to do these, plz help :( Picture 2 has an image of an eagle landing on the moon. Which statement from the Passage does this image most strongly CONTRADICT? NASA was aware of the international controversy that might occur...." "Congress amended the agency's appropriations bill to prevent... (NASA) from placing flags of other nations...." The committee was Instructed to select symbolic activities that would not jeopardize crew safety...." *... outer space... is not subject to national appropriation by claim of sovereignty...." 14 H+ + 6 Fe2+ + Cr2O72- . 2 Cr3+ + 6 Fe3+ + 7 H2O This reaction is used in thetitration of an iron solution. What is the concentration of the iron solution if it takes 45.20 mLof 0.1000 M Cr2O72- solution to titrate 50.00 mL of an acidified iron solution?a.0.5424 Mb.0.1000 Mc.1.085 Md.0.4520 Me.0.2712 M When you send mail via the post office, you have an 80% chance that it isdelivered to the correct location. (Use this information to answer questions #3 &#4 below.)Your answer Steam Workshop Downloader