explain one advantage and two disadvantage of including an instruction such as this in a pipelined processor

Answers

Answer 1

The one advantage and two disadvantages of including an instruction in a pipelined processor are explained below.

The advantage of a pipelined processor is performance improvement, through pipelining it is possible to pump more instructions in order to execute parts of various instructions in parallel. The first disadvantage of a pipelined processor is that it makes things complex in the case of branch forwarding. and the second disadvantage is that it makes concurrency problems related to the influence of several instructions using the same data or waiting for several other instructions to run.

You can learn more about pipelined processor at

https://brainly.com/question/13059382

#SPJ4


Related Questions

you are building a dashboard in tableau. to create a single-layer grid that contains no overlapping elements, which layout should you choose?

Answers

To build a single-layer grid without any overlapping components A tiled layout is an option. The right answer is C.

A layout is what?

Calculating an object's location in space while adhering to numerous computing restrictions is the process of layout. As a part of an application, this functionality may be packaged as a reusable component or library.

A tiled chart layout is a framework for displaying tiled plots in a figure. Each tile has an axis object that can be used to display a plot. The layout can be modified by altering certain property values.

creating a single-layer grid without any overlapping components The layout might be tiled.

So, C is the best choice.

To know more about layout visit:-

https://brainly.com/question/29742034

#SPJ1

which style type helps you navigate in a document when you are using the navigation pane?

Answers

The text or image that you want to appear as a hyperlink should be selected. Input Ctrl+K. You may also choose Link from the shortcut menu by right-clicking the text or image and selecting it.

What does Powerpoint's navigation pane do?

The primary interface for viewing and navigating among all of your database objects is the Navigation Pane, which by default appears on the left side of the Access window. Note Numerous adjustments can be made to the Navigation Pane.

The Navigation pane is which ribbon?

The group of commands on the File tab of the ribbon is known as the Backstage view. Working with database objects is made possible via the Navigation Pane, which is located on the left side of the Access program window.

To know more about navigation pane visit;

https://brainly.com/question/14966390

#SPJ4

what does imma go slide on sum sh mean​

Answers

Answer:

Something inappropriate.

Explanation:

On a Saturday night, you should spend time turning in your homework.

all of the wireless users on the third floor of your building are reporting issues with the network. every 15 minutes, their devices disconnect from the network. within a minute or so they are able to reconnect. what type of attack is most likely underway in this situation?

Answers

Note that where all of the wireless users on the third floor of your building are reporting issues with the network, and every 15 minutes, their devices disconnect from the network, and within a minute or so they are able to reconnect again, the type of attack is most likely underway in this situation is: " Disassociation attack" (Option D)

What is a Disassociation attack?

Note that a disassociation attack is a type of wireless networking attack that involves disrupting or severing the connection between a wireless device and a wireless access point (WAP).

The goal of a hacker with the disassociation attack is to prevent the wireless device from communicating with the WAP, which can prevent the device from accessing the Internet or other network resources.

This type of attack can have serious consequences, such as disrupting business operations, stealing sensitive information, or causing financial losses.

Some ways to ensure the prevention of disassociation attacks are:

to use strong security measures, such as encryption, authentication, and access controls, and to regularly update the firmware and security settings of wireless devices and WAPs.

Learn more about a Disassociation Attack:
https://brainly.com/question/15000254
#SPJ1

Full Question:

All of the wireless users on the third floor of your building are reporting issues with the network. Every 15 minutes, their devices disconnect from the network. Within a minute or so, they are able to reconnect. What type of attack is most likely underway in this situation?

A. WPS attack

B. Downgrade attack

C. Brute force attack

D. Disassociation attack

write the constructor for the array class. 2. write the destructor for the array class. 3. write the overloaded assignment operator for the array class 4. write the copy constructor for the array class. 5. write a display method for the array class to output all the values of the array. 6. write a read method to store values in the array. 7. overload the insertion operator to output the contents of the array. 8. overload the extraction operator to input the contents of the array.

Answers

You could employ the assignment operator your wrote with an array. Not for int, but for the Array class, you overloaded operator.

What is a 'array'?

A data structure called an array consists of a collection of components (properties or variables), each of which is identifiable by an array index or key. An arrays is stored in a way that allows a mathematical expression to determine each element's position given its index tuple.

Why do arrays get used?

When using various parameters of the same type, arrays are employed. It can be described as a collection of identically typed objects. It is more helpful to conceive of it as an array because it is utilized to maintain a variety of information.

To know more about array visit:

https://brainly.com/question/16968729

#SPJ4

A game designer wants to make sure that their game looks good from all angles. What is the game designer striving for?

A.
looping

B.
fluidity

C.
readability

D.
game-feel

Answers

Since a game designer wants to make sure that their game looks good from all angles, the game designer is striving for: D. game-feel.

What is a game development tool?

In Computer technology, game development tool can be defined as a set of specialized software programs that are typically used by game developers or programmers for the design and development of a game, and these include the following:

Modeling toolEmulatorGame engineLevel editorScripting tool

What is a game-feel?

A game-feel is sometimes referred to as game juice and it can be defined as all of the intangible, tactile sensation that is typically experienced when game players interact with games.

Read more on game development here: brainly.com/question/13956559

#SPJ1

Answer:

your answer would be D. Game feel

Explanation:

what is the purpose of using ethernet bonding? (select two.) answer increases network performance provides increased bus speeds enables dual remote access (dra) over a wan link increases read and write operations between the system bus and network adapters provides a failover solution for network adapters

Answers

By connecting National insurance contributions or switch ports together, a variety of physical interconnections to the network can be established. Ethernet bonding offers enhanced results and some fault tolerance.

What purposes does Ethernet serve?

Ethernet remains an widely used type of access point and is employed to communicate devices across a network. Polypropylene is utilized for local networks because of its great speed, security, and dependability in places where it is specifically needed, including company offices, grounds of educational institutions, and hospitals.

How would Ethernet ports function?

Once it hooks in, you insert the other end of the cord into slot on the second phone. The two entities are then connected as a result of this. You can accomplish this from a computer to your router, your router to your modem, your router to your switch, or any other device that includes an Ethernet port.

To know more about Ethernet visit:

https://brainly.com/question/26956118

#SPJ4

you would like to simulate an attack on your network so you can test defense equipment and discover vulnerabilities in order to mitigate risk. which tool would you use to simulate all the packets of an attack? answer etherflood tcpreplay tcpdump wireshark

Answers

Since you would like to simulate an attack on your network so you can test defense equipment and discover vulnerabilities in order to mitigate risk, a tool which you would use to simulate all the packets of an attack is: B. TCPReplay.

What is vulnerability?

In Computer technology, vulnerability can be defined as any form of weakness, flaw, or defect that is found in a computer system, website, network, or software application, which can be exploited by an attacker or a hacker, in order to gain an unauthorized access and privileges to sensitive user data and information that are stored in a computer system.

In Computer technology, a TCPReplay is a network device that is designed and developed to test defense equipment, as well as discovering vulnerabilities in order to mitigate risk.

Read more on vulnerability here: brainly.com/question/17094626

#SPJ1

5.2.7: array initialization. 1) write a single statement to declare an array of ints named myvals with 4 elements each initialized to 10.

Answers

A sequence of constant expressions enclosed in brackets can be used to declare an array of arrays (sometimes known as a "multidimensional" array) after the array declarator: declaring a type specifier [constant-expression] [constant-expression].

How do you declare an array declaration?The array is given a name and the elements' types are mentioned in a "array declaration." It can also specify how many elements are in the array. A variable with array type is regarded as a pointer to the type of the array's elements.Declaration syntax:

declaration-specifiers init-declarator-listopt;

init-declarator-list: init-declarator

init-declarator, init-declarator-list

init-declarator: Declarator

declarator = initializer

Declarative: pointeropt direct-declarator

direct-declarator: /* A function declarator */ direct-declarator [constant-expressionopt]

Constant-expression is optional, hence the syntax has two variations:Variables in an array are defined in the first form. The number of array items is indicated by the constant-expression argument enclose in brackets. If a constant expression is used, it must to be of the integral type and have a value other than zero. Each element has the type specified by the type-specifier, which can be any type except void. Function types are incompatible with array elements.Variables specified elsewhere are declared in the second form. It doesn't include the brackets, just the constant-expression argument. Only arrays that have already been initialized, declared as parameters, or declared as a reference to an array expressly defined elsewhere in the programme can be used in this format.

To Learn more About declare an array refer to:

https://brainly.com/question/26104158

#SPJ4

Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.

Answers

Answer:

pets = []

pet = input('What pet do you have? ')

while pet != 'stop':

   pets.append(pet)

   print('You have one ' + pet + '. Total # of Pets: ' + str(len(pets)))

   pet = input('What pet do you have? ')

you are worried about email spoofing. what can be put throughout an email's header that provides the originating email account or ip address and not a spoofed one?

Answers

X header can be put throughout an email's header that provides the originating email account or IP address and not a spoofed one.

What is IP address?

IP address is defined as a special string of characters used to identify each computer communicating across a network utilizing the Internet Protocol. The codes known as IP addresses allow our computers, servers, phones, cameras, printers, and sensors to communicate with one another.

In spam and phishing assaults, email spoofing is a technique used to deceive people into believing a message came from a source they either know or can trust. Spoofing attacks include the sender changing email headers so that client software displays a bogus sender address that most users take at face value.

Thus, X header can be put throughout an email's header that provides the originating email account or IP address and not a spoofed one.

To learn more about IP address, refer to the link below:

https://brainly.com/question/16011753

#SPJ1

The "shrinking" of time and space as air travel and the electronic media make it easier for people of the world to communicate with one another refers to _____.
the World Wide Web
the global village
e-commerce
social networking

Answers

Answer:

the global village

Explanation:

What type of game allows the user to choose the outcome?

A.
shooter games

B.
choose your own adventure games

C.
single action games

D.
virtual reality games

Answers

B choose your own adventure games

which is the most powerful when a browser is determining how conflicting css styling rules will be applied?

Answers

The order of significance determines how CSS cascades styles sheets. Regulations from the most significant style sheet take precedence when they conflict with rules from other style sheets.

What is CSS styling used for?

To style and layout web pages, CSS (Cascading Style Sheets) is employed. For instance, CSS can be used to change the font, color, size, and spacing of your text, divide it into numerous columns, or add animations and other ornamental elements.

What are the three CSS styling techniques?

There are three ways to include CSS in HTML or XHTML: linked, embedded, and inline. Instead of being included in the HTML page itself, the linked technique stores the CSS in a separate file. The header area of the HTML page houses the CSS when using the embedded technique.

To know more about CSS styling visit;

https://brainly.com/question/27818468

#SPJ4

You need some software for an advanced math class that you are taking. You have the option of locally-installed, the local network hosted, or cloud-based. Considering your own personal circumstances, which would you choose, and why?

Answers

Any software that is stored, controlled, and made accessible through the cloud is simply referred to as "cloud-based software."

What is cloud computing?In layman's terms, cloud computing is a collection of services made available via the internet, or "the cloud." It entails using remote servers to store and access data rather than local hard drives and personal datacenters.Before cloud computing, businesses had to buy and operate their own servers to satisfy business demands. In order to accommodate peak traffic levels and limit the likelihood of disruptions and downtime, this needed purchasing enough server capacity. As a result, a lot of server space was unused. With the aid of modern cloud service providers, businesses can do away with expensive onsite servers, maintenance staff, and other IT resources.

To Learn more About cloud-based software refer to:

https://brainly.com/question/19057393

#SPJ4

State what each extension are stands for:
BAT
COM
XLS
TXT

Answers

The file's extension informs your computer which program created or can open the file and which icon to use.

What are some of the computer extensions?.bat : Batch file.com : MS-DOS command file.txt : Plain text file.xls Microsoft Excel fileExcel Binary File Format is represented by files having the XLS extension.Text, Text File (filename extension), Textile, Tomorrow X Together, and TXT are all examples of TXT."commercial" is abbreviated as ".com." Although most business websites do use this domain, a site doesn't always need to be for profit to use.bat. Microsoft's initial filename extension for batch files.

To learn more about the computer extensions refer to:

https://brainly.com/question/28578338

#SPJ1

11.1.2 Ball and Paddle Code HS JavaScript



Overview

Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.


Add Ball and Paddle

The first step is to add the ball to the center of the screen, and the paddle to the bottom of the screen. The dimensions of the paddle and its offset from the bottom of the screen are already constants in the starter code.


The next step is to get the paddle to move when you move the mouse. The paddle should be centered under the mouse, and should not go offscreen.


Move Paddle, Bounce Ball

The next step is to get the ball to bounce around the screen. We may have done this exact problem before…

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.

Writting the code:

function setupBall(){

ball = new Circle(BALL_RADIUS);

ball.setPosition(getWidth()/2, getHeight()/2);

add(ball);

}

function setupPaddle(){

paddle = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);

paddle.setPosition(getWidth()/2 - paddle.getWidth()/2,

 getHeight() - paddle.getHeight() - PADDLE_OFFSET);

add(paddle);

}

function getColorForRow(rowNum){

rowNum = rowNum % 8;

if(rowNum <= 1){

 return Color.red;

}else if(rowNum > 1 && rowNum <= 3){

 return Color.orange;

}else if(rowNum > 3 && rowNum <= 5){

 return Color.green;

}else{

 return Color.blue;

}

}

function drawBrick(x, y, color){

var brick = new Rectangle(BRICK_WIDTH, BRICK_HEIGHT);

brick.setPosition(x, y);

brick.setColor(color);

add(brick);

}

function drawRow(rowNum, yPos){

var xPos = BRICK_SPACING;

for(var i = 0; i < NUM_BRICKS_PER_ROW; i++){

 drawBrick(xPos, yPos, getColorForRow(rowNum));

 xPos += BRICK_WIDTH + BRICK_SPACING;

}

}

function drawBricks(){

var yPos = BRICK_TOP_OFFSET;

for(var i = 0; i < NUM_ROWS; i++){

 drawRow(i, yPos);

 yPos += BRICK_HEIGHT + BRICK_SPACING;

}

}

function setSpeeds(){

vx = Randomizer.nextInt(2, 7);

if(Randomizer.nextBoolean())

 vx = -vx;

}

function setup(){

drawBricks();

setupPaddle();

setupBall();

setSpeeds();

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

list any two advantages of data sorting​

Answers

Answer:

1 ) it helps arrange all records in a table.

2 ) it is able to deal well with a huge list of items.

Explanation:

there is no additional storage is required .

Klout was hyped as a platform that could track online influence but became inactive. Why?.

Answers

Scalzi, in his CNN Money column, makes a witty remark about Klout practically sucking in data from all social media platforms and "throwing it into an algorithmic pot."

As a result, Peter Hess, Khoros's then-CEO, sent out a message indicating that Klout had finally lost its Klout.

How did Klout went down?

Even though some people took Klout seriously, Andrew Hutchinson writes for a social media website that its critics saw it as "a vanity metric - and like all vanity metrics, it can be gamed, it can be cheated, and thus it's rendered largely useless" .

Lithium Technologies confirmed earlier rumors that it had purchased Klout for about $200 million in March 2014. For businesses to create online communities, Lithium offered the necessary tools. After it combined with Spredfast (a company that specializes in social media marketing, community management, and software), it ceased to exist as a separate entity and was renamed Khoros LLC.

Learn more about Klout

https://brainly.com/question/11383000

#SPJ1

What is the most obvious purpose of games? A. teaching logic B. having fun C. encouraging cooperation D. learning a new skill

Answers

Games typically combine both mental and physical stimulus. Many video games aid in the development of practical skills, provide exercise, or serve other educational, stimulative, or psychological purposes. Thus, option D is correct.

What is the main purpose of games?

While playing games, students can improve their linguistic abilities as well as their social skills and interpersonal interactions. Goals, rules, challenge, and engagement are essential elements of games.

Therefore, it is apparent that games may and ought to be employed as a technique of instruction when teaching languages.

Learn more about games here:

https://brainly.com/question/24662707

#SPJ1

When parameters are passed between the calling code and the called function, parameters and arguments are matched by

Answers

Answer:

Their relative positions in the parameter and argument lists.

what type of subquery is an embedded select expression that returns only one coloumn and no more than one row

Answers

The  type of subquery is an embedded select expression that returns only one coloumn and no more than one row is Single Row Subqueries.

What is Single Row Subqueries?When the outcomes of the outer query depend on a single, ambiguous variable, a single-row subquery is employed. Although the name of this query type is "single-row," it really returns several columns but only one row of results. However, a single-row subquery can only give the outer query one row of results made up of a single column.The minimal salary for the company is the only row that is returned by the inner SQL in the SELECT query below. It then compares the salaries of all the employees using this number and only shows those whose salaries are equal to the minimum wage.

SELECT first_name, salary, department_id

FROM employees

WHERE salary = (SELECT MIN (salary)

 FROM employees);

To learn more about Single Row Subqueries refer to:

https://brainly.com/question/29522983

#SPJ4

What do you press to stop a program that is running in the Scratch Run window?

A.
red square
B.
red hexagon
C.
red circle
D.
red stop sign

Answers

To stop a program that is running in the Scratch Run window press the red hexagon. Thus, the correct option is option D.

What is Scratch?

Create interactive stories, animations, games, music, and art with the help of the free programming language Scratch, which was created by MIT. Scratch also makes it simple to share your works online. You can download Scratch as an app or use it inside a current web browser.

The user drags coding blocks into the program overview section of the Scratch window from the window's code edge to create programs. One such instance is the creation of a cat sprite (image) when beginning a new Scratch program. This image can be programmed to move, talk, or perform other actions. Additionally, any other image, a game, or other program can be created using this cat as the main image.

Learn more about scratch program

https://brainly.com/question/25720264

#SPJ1

Which of the following best defines the testing phase?
1.Administering demographic questionnaires

2.Administering audience panels

3.Where design are shown to real users and they provide feedback on what they think

4.Where surveys are deployed to potential customers regarding purchase trends

Answers

The best definition of the testing phase is Where designs are shown to real users, and they provide feedback on what they think. The correct option is 3.

What is a testing phase?

Quality assurance testing, system integration testing, and user acceptability testing are all part of the testing phase. Quality assurance testing compares methods and rules to those of the customer.

System integration testing examines how a piece of software interacts with other pieces of software.

Therefore, the correct option is 3. Where designs are shown to real users, and they provide feedback on what they think.

To learn more about the testing phase, refer to the link:

https://brainly.com/question/28827927

#SPJ1

PLEASEEE HELPPP !!! What term refers to layers of music that, when played together, enhance the game?


A.

stem


B.

feedback


C.

audio


D.

storytelling

Answers

The term that refers to layers of music that, when played together, enhance the game is option is option C. audio.

What is the name of the musical layers?

The layers of sound in a piece of music are also referred to as texture, and they are identified by their functions. The type of texture employed in a piece of music is referred to by a number of specialist words. Monophonic, homophonic, heterophonic, and polyphonic are some of its examples.

Therefore, in the context of the above,  A sound card on a computer creates an audio signal that may be heard through speakers or headphones and is measured in hertz. An audio file, often known as a sound file, is any digital information that includes speech or music that is saved on and played through a computer.

Learn more about audio from

https://brainly.com/question/26260073
#SPJ1

Ayaan doesn’t like the way that a particular game ended. She feels disappointed and frustrated. What did Ayaan not like about the game? A. the objective B. the outcome C. the rules D. the control method

Answers

She feels disappointed and frustrated. She did not like the outcome of the game. Hence option B is correct.

What is outcome?

Outcome is defined as something that occurs as a direct consequence of an action or procedure. What you want to happen when your action is over should be described in your outcomes.

A game's outcome is its final conclusion, which includes who wins or loses and how the game is resolved. Ayaan's dissatisfaction and annoyance were probably caused by the fact that she was unhappy with how the game ended and the result.

Thus, she feels disappointed and frustrated. She did not like the outcome of the game. Hence option B is correct.

To learn more about outcome, refer to the link below:

https://brainly.com/question/14906567

#SPJ1

how should a security analyst review system generated events for signs of intrusion or other problems on the network?

Answers

A software program called an intrusion detection system (IDS) automates the intrusion detection procedure. Software that combines all the features of an intrusion detection system with the ability to try to thwart potential events is known as an intrusion prevention system (IPS).

What security analyst review system generated events?

Through the client-side injection of malicious scripts, XSS vulnerabilities give attackers the ability to manipulate user interactions with web applications, plan impersonations, and/or launch phishing campaigns.

Therefore, A network intrusion detection system (NIDS) is installed at one or more strategic locations so that it can keep track of all incoming and outgoing traffic between all networked devices.

Learn more about security here:

https://brainly.com/question/16354463

#SPJ1

what function can you use to record the start and end times of a block of code, and then use the difference between the resulting values to determine the elapsed time in seconds?

Answers

The difference in function BetweenTimePeriod() determines how much time has passed between the two periods. Without returning it, the main() method displays the outcome (using call by reference technique).

Block of code: What does that mean?

Block codes are employed in software development to convert methods or software code to particular forms in order to reduce errors inside the code, if any. Block coding has applications in the domains of telecommunication, theory, and coding theory.

How should block code be written?

Add three backticks (') to the editor and then the language or code you want to be in your code block to add a distinct code block or snippet.

To know more about  block of code visit:

https://brainly.com/question/14466244

#SPJ4

true/false: if a whole paragraph is included in a single string, the split() method can be used to obtain a list of the sentences included in the paragraph.

Answers

If a whole paragraph is included in a single string, the split() method can be used to obtain a list of the sentences included in the paragraph is a true statement.

What does the string's split () function do?

A delimited string is split into substrings using the split command. To define zero or more delimiting characters or strings, you can use either a character array or a string array. White-space characters are used to break a string if no delimiting characters are given.

By looking for a pattern, the split() method breaks a String into an ordered list of substrings. It then stores these substrings in an array and returns the array.

Therefore, A string can be divided into a list of substrings using the split method.

Learn more about split() method from

https://brainly.com/question/16746156
#SPJ1

The value of the "all time" total sales created by this projection could be calculated using what excel function?
a. average
b. mean
c. sum
d. count

Answers

The value of the "all time" total sales created by this projection could be calculated using the excel function that is Sum.

The correct option is C

What is the sum function in Excel?

The sum function is used to perform summations in Excel.

The value of the ""all time"" total sales created by this projection could be calculated using the sum function in excel. The sum function adds up all the numbers in a range of cells and returns the result. For example, if the projection data is in cells A1:A10, the formula =SUM(A1:A10) would return the sum of all the values in those cells.

The other functions are not suitable for this task. The average function returns the mean of a set of numbers, which is not the same as the total. The mean function is another name for the average function, so it is also not correct. The count function returns the number of cells that contain numbers, which is not the same as the total either."

Learn more about sum function in Excel at; https://brainly.com/question/20703144

#SPJ4

Other Questions
7. What is the focus of social constructivist theory?a. Influence of environment and self-reflective behaviours.b. Key role of the individual.c. Influence of environment on individual and behaviour.d. Way in which social relationships are constructed. what is the most likely reason for the lower percentages of immigrants entering the united states after 2009? why was lincoln forced to keep replacing his generals during the early yesrs of the civil war? The lengths of the legs of an isosceles right triangle are x and [tex]\sqrt{6x+16}[/tex] a. Find the length of the hypotenuse, in terms of x, in simplest radical formb. Find the length of all three sides of the triangle, in simplest radical form. three boxes of supplies have an average (arithmetic mean) weight of 7 kilograms and a median weight of 9 kilograms. what is the maximum possible weig... What interest will be earned if $9,000 is invest for 4 years at 12% compounded monthly? Round to 2 decimals. A quality inspector visits two factories. She measures statistics for the mass of screwa produced at each factory.- The screws from which factory have grealer mass?Overall, the screws from Factory A have greater mass.- Find the difference in means between the factories:25.1-24.9=0.2Find the ratio of the difference in means to the MAD of Factory A: 0.2/0.2=1 Find the ratio of the difference in means to the MAD of Factory B: 02/0.3}=0.67 Are the screws produced by the two factories substantially different? Data marts can be implemented ____ compared to data warehouses.a. more quicklyb. it depends on the situationc. at the same paced. less quick Maria scored 20 goals in 4 soccer gameslast season. Approximately how manypoints did Maria average per game? at a well child visit, the nurse notes a 9-year-old child to be in the 97th percentile kg weight. which screening measure is most important for the provider to include in this visit? Geometry: Which chord is nearest the center and why? (ASAP!!!) Which of the following is a "compound sentence"? *1 pointPlanning a vacation is complicated and takes a lot of work, but it pays off in the end.Even though it is fun, traveling is very expensive, so you should save up some moneyfirst.Manypeople want to travel the world, because there are so many things to seeYou can travel the world by flying or by taking a boat. Which document is helpful in describing competent and appropriate nursing care in the community?a. Community Health: Standards of Nursingb. Healthy People 2020c. The Joint Commission: The Comprehensive Accreditation Manuald. Public Health Nursing: Scope and Standards of Practice John asks why the last step of Plya's four-step problem solving process, looking back, is necessary since he has already given the answer. What can you tell him?Select all the possible reasons the last step, looking back, is necessary below.A. Looking back allows a student to check that the answer is correct.B. Looking back allows a student to determine the best strategy to find the solution.C. Looking back allows a student to understand the problem.D. Looking back allows a student to check that the answer makes sense in context of the problem. In a manufacturing process, a random sample of 36 bolts has a mean length of 3 inches with a standard deviation of .3 inches. What is the 99 percent confidence interval for the true mean length of the bolt? If adenine makes up 20% of the bases in a DNA double helix, what percent of the bases are guaninea) 60%b) 40%c) 20%d) 30% light from a helium-neon laser is shined on a slid of width .02 nm. describe qualitatively the pattern of light seen on a screen 1 meter away how did the Mesopotamians control the two rivers? Find the measure of the reference angle for a -319 angle. Section 1.2Students in a high school statistics class responded to a survey designed by their teacher. One of the survey questions was "How much sleep did you get last night?" Here is a dotplot of the data:Describe the shape of this distribution.