can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and communications facilities to organizations and individual users.

A)Global Communication


B)Social Media Platform


C)Internet


D)Technological Advancement

Answers

Answer 1

Answer:

Internet

Explanation:

just took the test and got A


Related Questions

Which of these can be sorted with a bubble sort?

['red', 'blue', 'green', 7]

{41:5,32:10, 20: 234}

​[7, 10, 2.5, 1.566]

[1, 2.5, 'book']

Answers

C because a bubble sort only compares numbers

Answer:

C

Explanation:

ed 2021

____________________________ and _________________________ are 2 negative impacts of the internet on businesses.

A)Unlimited Availability and Low Confidence in the business


B)Competition and Poor Impersonality


C)Competition and Unlimited Availability


D)Low Confidence in the business and Improved Communication

Answers

Answer:

i no you its me remember and the answer is b.

Explanation:

if there was no technological advancement what would be our society like​

Answers

Answer:

WHAT SOCIETY?!

Every night we'd still be squatting in caves, hunched around campfires, waiting for the leopards to pick us off....

It's hard to have a society when your means of communication are nearly zero and therefore can't sustain the dialogue necessary to develop the shared values needed to form a society.

In the rapid application development (RAD) model, the _____ phase focuses on program and application development tasks similar to the SDLC.A) requirements planningB) user designC) constructionD) cutover

Answers

Answer:

C) construction

Explanation:

Rapid application development abbreviated RAD is an agile software development strategy that reduces time spent on planning so that prototype development takes priority and project turnaround time is greatly reduced consequently. There are four phases in rapid application development :

requirements planning, user design, construction, cutover

The construction phase is the third stage in rapid application development. This stage builds on the progress of the previous stages- the requirements planning stage and user design stage- to go ahead to finalize the application development which has been agreed on through iterations and communication between developer and client in the user design stage. In other words, this stage basically takes the ideas, prototypes and beta products from the previous stages and makes it into a real final product. The rationale or perks behind this is that other problems such as what product would do or look like or any changes or modifications have been worked out in previous stages thereby speeding up development in this stage.

When would it be necessary to edit the information shown on an electronic business card?

Answers

Answer:

It's D dear

Explanation:

Answer:

D. to show only relevant information to people inside your organization

Explanation:

hope this helps :)

Write a method named printGPA that takes in as a parameter a Scanner to read in user input, and calculates a student's grade point average. The user will type in input containing the student's name, then a number of scores, followed by that many integer scores. Then, the method will print out the average of all grades entered. Here are two example dialogues: Enter a student name: Maria Enter the number of courses: 5 Course 1 Grade: 72 Course 2 Grade: 91 Course 3 Grade: 84 Course 4 Grade: 89 Course 5 Grade: 78 Maria's grade is 82.8 Enter a student name: Jordan Enter the number of courses: 4 Course 1 Grade: 86 Course 2 Grade: 71 Course 3 Grade: 62 Course 4 Grade: 90 Jordan's grade is 77.25

Answers

import java.util.Scanner;

public class JavaApplication40 {

   public static  void printGPA(Scanner scan){

       System.out.println("Enter a student name:");

       String name = scan.nextLine();

       System.out.println("Enter the number of courses:");

       int courses = scan.nextInt();

       double total = 0;

       for (int i = 1; i <= courses; i++){

           System.out.println("Course "+i+" Grade:");

           double grade = scan.nextDouble();

           total += grade;

       }

       System.out.println(name+"'s grade is "+(total/courses));

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       printGPA(scan);

   }

   

}

I hope this helps!

13 List five examples of functionality that can be added when using express
cards?

Answers

Answer:

This Answer Was Pasted Over From ayushisingh5

Explanation:

ExpressCards can connect a variety of devices to a computer including mobile broadband modems (sometimes called connect cards), IEEE 1394 (FireWire) connectors, USB connectors, Ethernet network ports, Serial ATA storage devices, solid-state drives, external enclosures for desktop-size PCI Express graphics cards and ...

A server process in Host B has a welcoming socket at port 977. What will trigger the server process to create a connection socket?

Answers

Answer:

Explanation:

This connection socket will be created when Host B receives a TCP SYN segment that contains the destination port number 977. This means that there is data that is trying to enter through that port number, as a welcoming socket this destination is available and when data requests access through it the OS creates a connection socket using Host B in order to allow access to the TCP SYN segment.

Using a for loop, write a function lastfirst() that takes a list of strings as a parameter. Each string in the list has the format 'Last, First' where Last is a last name and First is a first name. You should assume that there are no spaces between the last name and the comma and that there are an arbitrary number of spaces between the comma and the first name. The function lastfirst() returns a list containing two sub lists. The first sub list is a list of all the first names and the second sub list is a list of all the last names. The following shows how the function would be called on two example parameters:>>> lastfirst(['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])[['Evelyn', 'Tom', 'Elvis', 'Gordon'], ['Lulis', 'Jones', 'Presley', 'Sumner']]>>> lastfirst(['Ford, Harrison', 'Hepburn, Katharine', 'Tracy, Spencer'])[['Harrison', 'Katharine', 'Spencer'], ['Ford', 'Hepburn', 'Tracy']]

Answers

def lastfirst(lst):

   newlst = []

   newlst1=[]

   for x in lst:

       w = x.split(",")

       newlst.append(w[1].strip())

       newlst1.append(w[0].strip())

   newlst2 = [newlst], [newlst1]

   return newlst2

lst1 = (['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])

print(lastfirst(lst1))

I hope this helps!

Help Quick Please!!!!

Ann sent out a business letter three weeks ago, hoping to increase sales. However, she has not seen an increase. She thinks that making the communication more impressive will increase the business. Ann should _____.

Answers

Ann should make flyers and but then put in local spots where lots of people go

The art element line is a moving point.


True or False

Answers

i’m pretty sure the answer is true

The string expression strVar.____________________ starts at index pos, replaces the next n characters of strVar with all the characters of str.

Answers

Answer:

strVar.replace(pos, n, str);

Explanation:

The strVar.replace() is a javascript function of searching and replacing a string for a defined value, whereby it finds and returns a new string where the defined values are replaced.

For example: to return a string where "Trump" is replaced with "Biden":

We have

var str = "Welcome Trump!";

var res = str.replace("Trump", "Biden", str);

Hence, in this case, the correct answer is strVar.replace(pos, n, str);

An important communication principle states ""prepare before you communicate."" How should this preparation manifest itself in the early work that you do? What work products might result as a consequence of early preparation?

Answers

Answer:

Planning is very important before communicating a product to others.

Explanation:

We should always prepare well about what we are going to communicate to others. We should know the topic properly or know about the product before we speak about it in front of others. We should understand the concept of the product before we communicate it to others.

Planning is also an important before going to speak or communicate.

Before communicating a product to others, we should prepare :

1. We should very well understand the concept of the product also its scope. The scope will provide product team with the destinations.

2. We should keep in mind to involve the valuable customers in our plannings.They defines the priorities of the product.

3. We should recognize that the planning is highly iterative.

4. We should do a market research or study or the business domain that the product will address.

5. We should understand the different stakeholders and their requirements and be open to negotiations.

It is vital to prepare in every communication as your success  depends on it. One can prepare by researching on the area we want to talk about and practicing one's speech.

Why do we need to prepare in communication?

The success one has in communicating is said to be a skill that is often used in a lot of field of work.

Conclusively, It is vital that a person do  prepare to communicate well when they have been given the opportunity to do so and this involves a lot of research and practice.

Learn more about preparation of manifest  from

https://brainly.com/question/13524298

Assume that you want two C# or C++ programs to share some data. You can write the first program so that it writes it's output to a file, and then write the second program so that it reads the data from this file. However this process can be difficult and time consuming, especially if you don't know how to program in C# or C++. What feature of the UNIX/Linux shell can you use to simplify the process of sharing data between programs?

Answers

Certain ways exist to simplify the process of data sharing between programs.some of these ways are;

A) When there are two programs that are not running at the same time,then the pipes or the sockets won't be able to work as their buffers would not be able to hold large files because they are small.

Looking at this scenerio,shared memory can be used.

The Sysv IPC shared memory API, POSIX shared the memory API or rather files on a tmpfs system of files can actually be used for shared memory operations.

B) Another possible solution can be named file. Instead of using an unnamed and shell pipeline,a name pipeline them uses the file system.

However,it can be treated with the use of mkfifo() or mknod() commands and then two separate programs or also processes can as well access the pipe by making use of the name of the pipe.

But one process(program) can actually open the pipe but as a reader for reading purposes and the other for writing purposes as a writer.

Help very please??????

Answers

Answer:

Z = 100

C = 200

School = "Emirates American School"

print(Z,C,School)

x = 5

y = 5

output = (x == y)

print(output)

txt = "I study at {}"

print(txt.format(School))

print(School.upper())

The page-replacement policy means that pages are not placed to make more space. A. True B. False

Answers

Answer:

B. False

Explanation:

A page-replacement policy can be defined as a set of algorithm that instructs the operating systems on what memory page is to be swapped, paged out or written to disk in order to allocate more memory as they're required by various active processes during virtual memory management.

Some of the algorithms or techniques used by the operating system for page-replacement policy are;

1. Last In First Out (LIFO).

2. First In First Out (FIFO).

3. Least Recently Used (LRU).

4. Least Frequently Used (LFU).

5. Optimal (OPT or MIN).

Hence, the page-replacement policy means that pages are placed to make more space and to minimize the total number of page that would be missing.

The answer to this question is false.

This is due to the fact that the page-replacement policy helps to decide the pages of memory that needs to be paged out or swapped out.

This becomes necessary at a time when it is necessary for the allocation of a memory page.

It helps the operating system to know the memory space that can be moved out in order to know what space can be made available for the current page.

Read more on https://brainly.in/question/7169703

Crowdsourcing is not only used for relatively simple tasks such as designing a Web site or designing a case for a smartphone. Today, it is increasingly being used in more complex designs as well. Precyse Technologies provides supply-chain products and solutions that assist organizations in tracking their inventories using RFID technology. It was having difficulty improving the performance and battery life of a particular RFID device; there were not adequate internal resources to tackle the problem. So, Precyse asked InnoCentive, a crowdsourcing provider, for assistance, believing that crowdsourcing would provide quick access to a worldwide talent pool and a higher return on investment (ROI). Ultimately, the company received more than 300 ideas from global experts for solving its problem. It narrowed the pool down to three finalists, from which a winner was chosen. The whole process took approximately four months, and Precyse estimated that it saved the company $250,000. 1. What are some typical applications of crowdsourcing? 2. What are some advantages of crowdsourcing? 3. How could crowdsourcing reduce the systems design cost and are there certain problems you would not want to use crowdsourcing to solve?

Answers

1) SOME APPLICATIONS OF CROWD SOURCING ARE;

- MARKETING STRATEGY; There is finalizing of marketing strategies by firms and this is based on the crowd sourcing ideas.

- THOUGHT LEADERSHIP; There has been catering to crowdsourcing for high level thought leadership by many firms and this is done in various fields such as Human resources.

- DESIGNING; Designing is very common for crowdsourcing and this is seen where a bunch of talent pool is being used for the purpose of designing websites,applications and as well as other prototypes.

SOME OF THE ADVANTAGES OF CROWDSOURCING ARE;

- An individual can actually save lots of costs,this is because they don't need to hire a permanent resource and this resource can be quite expensive.

- Another advantage of crowdsourcing is that one can actually get services and idea from pool of professionals that are far talented across the world.

- It also play a role in obtaining of ideas from a group of people and this can go a way in shortening the resolution process, therefore saving time.

CROWDSOURCING HELPS IN GETTING IDEAS AND SERVICES FROM A WIDER POOL OF PROFESSIONALS THAT ARE TALENTED,So;

Lots of time are being saved when there is actually a large talent pool.

This then translates into shorter span in the system design process and it also results in the saving of costs.

However,a firm don't necessarily need to hire permanent resources for critical inputs I'm the design process and this also results in saving of costs s well.

People are known to be using Crowdsourcing. The applications of crowdsourcing is often done so as to gather information or work product.

This helps to gather or seeks money to aid individuals, charities, or for one to start a business. The advantages of crowdsourcing are cost savings, speed, etc.

Crowdsourcing is known to help man to remove the various costs due to  functioning as a pay-per-task model.

A well managed crowdsourcing can be used to pay workforce.

Learn more about Crowdsourcing from

https://brainly.com/question/6983872

For python, Write a function named getResults that accepts radius of a sphere and returns the volume and surface area. Call this function with radius = 3.5 , and display results in one decimal format.
volume = 4/3 * pi * r ^ 3
Surface Area = 4pi * r ^ 2

Answers

import math

def getResults(r):

   return "Volume = {}\nSurface Area = {}".format(round((4/3)*math.pi*(r**3),1), round((4*math.pi)*(r**2),1))

print(getResults(3.5))

I hope this helps!

Internet routing:_________. A. precomputes the most efficient route and uses it to ensure rapid packet delivery. B. broadcasts all packets to all hosts so the recipient will be sure to see its traffic. C. makes routing decisions one at a time as a packet crosses individual networks. D. uses port numbers to optimize the transmission of streaming media.

Answers

Answer:

A. precomputes the most efficient route and uses it to ensure rapid packet delivery.

Explanation:

In simple words, what Internet routing means is a process where a router decides which path data packets should follow that are more efficient in delivering the packets across computers.

For example, we can liken the process to the duties of a tour guide in a museum or large building in directing visiting guests who came to explore the museum.

A program that will ring a bell six times is what kind of program?
A. Edited
B. Iterative
C. Selection
D. Sequence

Answers

Answer:

D

Explanation:

because it is a sequence it does more than one thing

Answer:

B

Explanation:

I took the test

Given six memory partitions of 300 KB, 600 KB, 350 KB, 200 KB, 750 KB, and 125 KB (in order). The memory allocation algorithm that is used to place processes of size 115 KB, 500 KB, 358 KB, 200 KB, and 375 KB in the following order is the _______________.

Answers

Answer:

The memory allocation algorithm that is used to place the processes given is the First Fit Algorithm

Explanation:

The First Fit Management Algorithm works by ensuring that the pointer keeps track of all the free spaces in the memory and accepts and executes all instructions to allocate a memory block to the coming process as long as it is big enough to hold the size of the process.

For example, the First Fit algorithm will allocate the processes in the first block that fits (that is, if it can fit the memory bock in the queue, then the process will be store)

It will work as follows (recall that the memory partitions are in order and must remain so):

A) 115 KB is stored in 300KB block, leaving the following free spaces (185KB, 600KB, 350KB, 200KB, 750KB, 125KB), next

B) 500 KB is store in a 600KB block leaving the following free spaces (185 KB, 100  KB, 350 KB, 200 KB, 750 KB, 125 KB), next  

C) 358 KB is stored in 750KB block, leaving the following free spaces (185KB, 100KB, 350KB, 200KB, 392KB, 125KB)  next

D) 200 KB is stored in 350KB block, leaving the following free spaces (185 KB, 100 KB, 150KB, 200KB, 392KB, 125KB)  next

E) 375KB is stored in 392KB block leaving (185KB, 100KB, 150KB,  200KB, 17KB, 125KB)

One of the demerits of this Algorithm is that, as shown above, memory is not maximized. It however is one of the easiest algorithms amongst all the other memory allocation processes.

Cheers

Given main(), complete the Car class (in file Car.java) with methods to set and get the purchase price of a car (setPurchasePrice(), getPurchasePrice()), and to output the car's information (printInfo()).
Ex: If the input is:_______.
2011
18000
2018

Answers

Answer:

Explanation:

This a java code for a car and can be written as follows:

public class Car {

   private int modelYear;

   private int purchasePrice;

   private int currentValue;

   public int getModelYear() {

       return modelYear;

   }

   public void setModelYear(int modelYear) {

       this.modelYear = modelYear;

   }

   public int getPurchasePrice() {

       return purchasePrice;

   }

   public void setPurchasePrice(int purchasePrice) {

       this.purchasePrice = purchasePrice;

   }

   public int getCurrentValue() {

       return currentValue;

   }

   public void calcCurrentValue(int year) {

       int age = year - modelYear;

       currentValue = (int) Math.round(purchasePrice * Math.pow(0.85, age));

   }

   public void printInfo() {

       System.out.println("Car's information:");

       System.out.println("   Model year: " + modelYear);

       System.out.println("   Purchase price: " + purchasePrice);

       System.out.println("   Current value: " + currentValue);

   }

}

you are packing a mobile phone containing a lithium ion battery and you get a prompt on the screen to put a lithium ion label on the box. You have run out of such labels and have only lithium metal labels left. what should you do?

Answers

Answer:

Do not use such labels because they may be misleading and are unethical.

Explanation:

Note, there is a big difference in design between the two terms or labels. Lithium metal batteries are non-rechargeable batteries. In other words, they cannot be recharged after they run down. For example, most watches, calculators, or car keys are made of lithium metal batteries.

While Lithium-ion batteries (or Li-ion batteries) are rechargeable batteries , and they are commonly used by mobile phones, laptops, and other gadgets.

Therefore, with such differences in mind, it may be very misleading when someone in possession of the mobile phone sees the lithium metal labels; then thinks the battery is non-rechargeable.

There are different instructions that comes with labeling, lithium metal label  is quite different from Lithium-ion labels and as such one cannot use one for the order.

What one should you do is to never use the lithium metal labels in place of  Lithium-ion labels. It is better to go and get the required label. If not found, the mobile phone should not be packaged for transport.

One has to comply with the regulations regarding batteries and the packaging of lithium batteries.

Lithium Metal Batteries  are known as primary battery. That is, they are non-rechargeable. They are said to have lithium metal or lithium compounds in them.

They have high energy density than other lithium batteries.   They can be found in Watches , Calculators etc.

Lithium-ion batteries are known to be  secondary battery. That is, they are said to be rechargeable in nature. They can be found  in Mobile phones, Laptops etc.

When shipped, any packages that has lithium-ion batteries must be labeled with  UN3480  or UN3481.

When shipped, any packages that has lithium metal batteries must be labeled  with UN3090  or UN3091.

Learn more about Batteries from

https://brainly.com/question/24876978

a good look of a web page depends upon?​

Answers

Answer: See explanation

Explanation:

• Font size: The font size used matters a lot in order to enhance readability. The ideal font size should be 16 pixel for the main body text. This is vital in order to help enhance readability. It should be noted that a don't size that is lower or higher than that can lead to challenges with readability.

• Graphics and animation: Using of exciting graphics and animations on a website can help in giving the web page a good look, help in grabbing the attention of the user, and also increase engagement.

• Use of colours: The color chosen also helps to give a web page a good look. It should be noted that when choosing colors, it is ideal to choose two or at most three colors to use for a web page. Mixing different colors or using very bright colors is typically a turn off.

Which role will grant a delegate read-only access to a particular workspace within a user’s Outlook mailbox?
Author
Editor
Contributor
Reviewer

Answers

The role that will grant a delegate read-only access to a particular workspace within a user's Outlook mailbox is the "Reviewer" role.

In Outlook, delegates are individuals who are granted permission to access and manage another user's mailbox on their behalf. When assigning delegate permissions, different roles can be assigned to control the level of access the delegate has.

The "Reviewer" role specifically provides read-only access to the specified workspace within the user's mailbox. Delegates with this role can view the content, including emails, calendar events, and other items, but they cannot make any changes or modifications.

On the other hand, the "Author" role grants read and write access, allowing delegates to create, modify, and delete items within the designated workspace. The "Editor" role also provides read and write access but includes additional privileges such as creating subfolders and managing permissions.

The "Contributor" role allows delegates to create items within the workspace, but they cannot view items created by others. It provides a limited level of access compared to the "Reviewer" role.

Therefore, if a delegate needs read-only access to a particular workspace within a user's Outlook mailbox, the "Reviewer" role should be assigned.

For more questions on Reviewer, click on:

https://brainly.com/question/30517194

#SPJ8

If an app asks for a user's age, it may be because the app requires a user to be over a certain age to use some of the services it provides. Write a function called checkAge that takes one parameter of type String. The function should try to convert this parameter into an Int value and then check if the user is over 18 years old. If he/she is old enough, print "Welcome!", otherwise print "Sorry, but you aren't old enough to use our app." If the String parameter cannot be converted into an Int value, print "Sorry, something went wrong. Can you please re-enter your age?" Call the function and pass in userInputAge below as the single parameter. Then call the function and pass in a string that can be converted to an integer.
Go back and update your function to return the age as an integer. Will your function always return a value? Make sure your return type accurately reflects this. Call the function and print the return value.
func checkage(age: String)->Int?
{
if let age_type = Int(age)
{
if age_type > 18 {
return "Welcome!"
}
else if age_type < 18 {
return"Sorry, but you aren't old enough to use our app."
}
}
else {
return "Sorry, something went wrong. Can you please re-enter your age?"
}
return age_type
}

Answers

Answer and Explanation:

Here the programming language swift is being used. There is a slight error in the program shown above:

var userInputAge=9

func checkage(age: String)->int?

{

if let age_type = Int(age)

{

if age_type > 18 {

return "Welcome!"

}

else if age_type < 18 {

return"Sorry, but you aren't old enough to use our app."

}

}

else {

return "Sorry, something went wrong. Can you please re-enter your age?"

}

return age_type

}

The program should be revised :

func checkage(age: int?)->String

{

if let age_type = Int(age)

{

if age_type > 18 {

return "Welcome!"

}

else if age_type < 18 {

return"Sorry, but you aren't old enough to use our app."

}

}

else {

return "Sorry, something went wrong. Can you please re-enter your age?"

}

return age_type

}

We call the functions :

checkage(userInputAge)

checkage("15")

Note: we revised the program for errors in the first line of the code where the int optional parameter(int?) was supposed to be used instead of the String parameter in the function. We then called the function using the userInputAge variable defined as the parameter and then we now also used a String as the parameter for calling the function the second time.

Answer:

def checkage(age: "String")->int:

   if age >= 18:

       return "Welcome!"

   return "Sorry, but you aren't old enough to use our app."

   

for _ in iter(list,0):

   myage = int(input("Please enter your age: "))

   if myage is int(myage):

       result = checkage(myage)

       print(result)

       break

   print("Sorry, something went wrong. Enter integer value as age.")

   

Explanation:

The python code above lets the user input the age value for continuous comparison. If the age is an integer, it checks to know if the age is greater than 18 or not. If yes, it returns "Welcome!" else "Sorry, but you aren't old enough to use our app". But if the age is not an integer, it displays the message "Sorry, something went wrong. Can you please re-enter your age?" then prompts the user again for the age.

Note: the ': "String" ' and "->int" is for documentation purposes. They are used to describe the type of parameters (for later) and return value (the former).

Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents and structure. Close the file, but do not make any changes to the document.

Answers

Answer:Use your editor to open the tny_july_txt.html and tny_timer_txt.js files from the ... 3 Take some time to study the content and structure of the file, paying close ... the nextJuly4() function, insert a function named showClock() that has no parameters. ... Declare a variable named thisDay that stores a Date object containing the ...

Explanation:

Internet entities (routers, switches, DNS servers, Web servers, user end systems, and so on) often need to communicate securely. Give three specific example pairs of Internet entities that may want secure communication.

Answers

Answer: See explanation

Explanation:

A secure connection simply means when there's encryption of a connection through the use of security protocols so that data flowing between the nodew can be secured.

Examples of Internet entities that may want secure communication include:

i. Two routers

ii. Our laptop and web server.

iii. Connection that exists between two DNS name servers.

anyone know how to fix black screen of death on computer​

Answers

Answer:

you asked a question so you must have fixed it

Explanation:

logic

The four smallest numbers (40 points) Write an ANNA assembly program (smallest_four.ac) that finds the four smallest numbers entered by the user. Initially, the program continually asks the user to enter numbers. As soon as a negative value is entered, compute which numbers are the top four (smallest) numbers. For instance, if the user entered 2, 6, 7, 6, 5, 7, 6, 17, 15 -1; the program should print 2, 5, 6, 6 (the four smallest numbers in the sequence). If the user enters a negative number at the beginning, print 0. If the user enters four or fewer numbers, print all the numbers as output.
Notes:
• The goal of this problem is to exercise storing, retrieving, and scanning the numbers stored in memory. Therefore, a solution where you keep track of the smallest four numbers in registers as the numbers are entered is not acceptable. Such a solution will receive a maximum of 15 points for this problem.
• Do not keep track of everything in the input loop. You will need to store all numbers entered by the user in memory.
• Store all numbers entered into a growing array. • Note that The array should be the last item in your data section so it can grow as large as necessary.
• You may assume there is enough memory to hold all numbers entered by the user.

Answers

Answer:

the answer is -25

Explanation:

Other Questions
Which of the following is the origin for the triceps brachii?A. The tuberosity below the glenoid cavity of the scapula. B. The lateral surface of the humerus. C. The medial surface of the humerus.D. All of the above any good business plan ideas my business will be something to do with tie Dye Which pronoun(s) best complete(s) the sentence?Everyone gavereport to the manager.O A.his or hertheir The line y6=2(x+4) passes through which point? A. (4,6) B. (4,6) C. (4,6) D. (2,6)show how u got it please lol Answer the following question in 3-4 complete sentences.A plasma television.How has digital technology changed television? Why is it an improvement? Pls help me here...I really need it what is n in a hexagon A small chunk of wax floats if placed in water. If huge piece of wax that is as heavy as acar, is placed in water, it will Please help me, This is the only question I dont understand pleas help me I would really appreciate it thank you! What major event led the U.S. to join the Spanish-American War? Who did the U.S. support during the war? What did the U.S. gain after winning the war? Which statement best describes the graphed function?A. The function has a relative maximum at (-2,4) and a relative minimum at (2,-4).B. The function has a relative minimum at (-2,4) and a relative maximum at (2,-4).C. The function has an absolute maximum at (-2,4) and an absolute minimum at (2,-4).D. The function has an absolute minimum at (-2,4) and an absolute maximum at (2,-4). I need help ASAP!!!!!Write the equation of the line in slope intercept form that has the given slope and the y-intercept 4). m=2;y-intercept is -65). m= -1; y-intercept is 36). m= -1/3; y-intercept is -1 Need help urgent please!!! The price of a television was reduced $250 to $200. By the percentage was the price of the television reduced?A. 20%B. 25% C. 80%D. 50%please help I'm not good at math!! Pocahontas opens a savings account with $640 dollars that earns 3.9% interest per year not compounded. How much money to the nearest penny will Pocahontas have in 8 years Drag the tiles to the correct locations. Each tile can be used more than once, but not all tiles will be used. One or more locations willremain empty.Nitrosyl fluoride has the chemical formula NOF. Nitrogen has five valence electrons, oxygen has six, and fluorine has seven. Complete theLewis structure for this covalent compound. Can someone please help me 1) What would be another way to name plane M?(picture attached) A. plane KJH B. plane J C.plane HJG D.plane GJN after 1min I will post a question for brainlist what is the role of the medical professional in the beginning an exercise program