Need in JAVA!!!!
Given a line of text as input, output the number of characters excluding spaces, periods, exclamation points, or commas.


Ex: If the input is:


Listen, Mr. Jones, calm down.

the output is:


21

Note: Account for all characters that aren't spaces, periods, exclamation points, or commas (Ex: "r", "2", "?").

Need In JAVA!!!!Given A Line Of Text As Input, Output The Number Of Characters Excluding Spaces, Periods,

Answers

Answer 1

The number of characters in the given code is 151 chars

What is a Character?

This refers to the single visual object that is used in computing to represent a text, symbol, or number.

Hence, we can see that we are asked to state the number of characters in the given code, excluding spaces, periods, exclamation points, or commas and the number is 151.

Note that the single and multi-line comments were NOT included.

Read more about java programming here:

https://brainly.com/question/26952414

#SPJ1


Related Questions

What tool does a programmer use to produce Python source code?

Answers

Answer:

Cog is a simple code generation tool written in Python. We use it or its results every day in the production of Kubi. Kubi is a collaboration system embodied in a handful of different products.

Edit the following statement so it uses the constant named YEAR:

newAge = currentAge + (2050 − currentYear);

Answers

Using the knowledge in computational language in C++ it is possible to write a code that will calculate the age of someone through the difference of years.

Writing code in C++ has:

#include <iostream>

using namespace std;

int main()

{

//Declare variables

int myCurrentAge=29;

int myNewAge;

const int YEAR = 2050; //Declare constant YEAR=2050

int currentYear=2014;

myNewAge=myCurrentAge+(YEAR-currentYear); //calculate new age

cout<<"My Current Age is "<<myCurrentAge<<endl;

cout<<"I will be "<<myNewAge<<" in "<<YEAR<<"."<<endl; //display values on console

return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

More than 700 people in the United States have been infected with monkeypox virus American vector: the epidemic is spreading like a snowball.

Answers

An epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.

What is snowball spread of virus?

An epidemic is said to be spreading like a snowball if  it is said to be moving at a rate.

Note that in the case of monkey virus, the epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.

Learn more about epidemic  from

https://brainly.com/question/15452937

#SPJ1

Select 3 true statements about Python class.
If a class inherits from multiple classes, the order of inheritance does not matter.

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.

A class attribute exists as a unique object regardless of how many instances of the class are.

A class attribute can be used without an instance of that class.

Properties whose names start with _ (e.g. _name) are private properties and cannot be accessed outside of the corresponding class.

Answers

The true statements about Python class are:

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.A class attribute exists as a unique object regardless of how many instances of the class are.A class attribute can be used without an instance of that class.

Can Python class inherit from multiple classes?

Yes, A class is one that can be gotten from more than one base class in Python. This is known to be multiple inheritance.

Note that The true statements about Python class are:

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.A class attribute exists as a unique object regardless of how many instances of the class are.A class attribute can be used without an instance of that class.

Learn more about Python class from

https://brainly.com/question/26497128

#SPJ1

Which is a graphical tool used to represent task duration but not sequence?
A. CPM
B. Network Diagram
C. Pert
D. Gantt

Answers

CPM is a graphical tool used to represent task duration but not sequence.

What is the CPM used for?

The critical path method (CPM) is known to be a method  where a person identify tasks that that are essential for project completion and know its scheduling flexibilities.

Therefore, CPM is a graphical tool used to represent task duration but not sequence.

Learn more about graphical tool from

https://brainly.com/question/12980786

#SPJ1

choose the 3 correct statements for the code below

Answers

The correct statements are:

An object of the ActivationLayer class has a name attribute.print(FCLayer(42)) prints FullyConnectedLayer.When creating an object of the BaseLayer class, the name argument must be given.What is Coding?

The term Computer coding is known to be seen as a kind of a tool that is often use in computer programming languages and it helps to give computers and machines a number of instructions on the things that need to be done or performed.

Note that in the code, the The correct statements are:

An object of the ActivationLayer class has a name attribute.print(FCLayer(42)) prints FullyConnectedLayer.When creating an object of the BaseLayer class, the name argument must be given.

See full question below

Choose the 3 correct statements for the code below.

An object of the ActivationLayer class has a name attribute.

An object of the BaseLayer class has a size attribute.

print(FCLayer(42)) prints FullyConnectedLayer.

When creating an object of the ActivationLayer class, the size argument must be given.

When creating an object of the BaseLayer class, the name argument must be given.

Learn more about Coding from

https://brainly.com/question/22654163

#SPJ1

While conducting routine maintenance, you discover a network server that needs to
be replaced fairly soon. The server must be shut down during the replacement, which
will affect office operations. The office manager asks for an update.
What should you say?

Answers

Answer:

tell the truth and make other people aware of what is going on inorder for them to also be hands on deck and come up with solutions to also help solve the problem

technology?
OA. Analyzing computer systems to protect computer networks from
cyber threats
OB. Planning, creating, testing, and maintaining applications used by
devices
OC. Planning, creating, testing, and maintaining physical computer
systems
OD. Analyzing organizational operations to find opportunities for
improvement

Answers

Answer:

D. Analyzing organizational operations to find opportunities for

improvement

Explanation:

It is option D because you are improving a device for a better future use, better technology.

Hope it helps!

Answer:

A. Analyzing computer systems to protect computer networks from

cyber threats

Explanation:

A binary floating-poi Select 3 true statements about Python primitive types.
32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)
The int type in Python3 cannot represent a number greater than 2^31-1.
A binary floating-point method is used to represent fractions in binary numbers.
The decimal number 0.1 cannot be expressed without error in binary floating-point format.
The float type in Python3 can represent decimal 0.1 without error.nt method is used to represent fractions in binary numbers

Answers

The true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.

What are  Python primitive types?

The  Python primitive types is known to be made up of four primitive data types which are:

Integer.Float.String.Boolean.

Note that The true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ1

A company is looking for an employee to help organize customer information for the sales team. Which computer field includes this job?
A.
Security analysis
B.
Database support
C.
Systems analysis
D.
Network support

Answers

Answer:

A

Explanation:

security organises the customer's info online and in person for the sales team.

Answer: B DEFINITELY

Explanation:  DATABASE WOULD BE FOR SALES TO KEEP TRACK OF SALES AND LEDGERS, DEBITS, ADDRESSES, NOTES ON CUSTOMER, WHAT THEY BOUGHT, WHEN, WHAT YEAR, IS THERE A WARRANTY?

DATA BASE KEEPS ALL THEIR DEALINGS ORGANIZED AND UP TO DATE.

60. a. b. C. d. Which of the following is NOT an operating system? Linux Microsoft Vista Microsoft Word Mac Os X​

Answers

Answer:

Microsoft word

Explanation:

Microsoft word is an a application used in document creation, learning, teaching, note making, card designs etc.

It is an application in a computer and not ann Os (operating system).

A screen capture is a digital image of your screen, as if you took a picture of it with a camera. For instance, you might want to take a screen capture if an error message occurs and you want a Technical Support person to see exactly what's on the screen. You can create a screen capture using the Snipping Tool, an accessory designed to capture whole screens or portions of screens. To open the Snipping Tool, click the Start button on the Windows taskbar, type "sni", then click the Snipping Tool when it appears in the left panel. On the Snipping Tool toolbar, click New, then drag the pointer on the screen to select the area of the screen you want to capture. When you release the mouse button, the screen capture opens in the Snipping Tool window, and you can save, copy, or send it in an email. In Word, Excel, and PowerPoint 2016, you can capture screens or portions of screens and insert them in the current document using the Screenshot button in the Illustrations group on the Insert tab. Alternatively, you can create a screen capture by pressing [PitScn]. (Keyboards differ, but you may find the [PrtScn] button in or near your keyboard's function keys.) Pressing this key places a digital image. of your screen in the Windows temporary storage area known as the Clipboard. Open the document where you want the screen capture appear, click the Home tab on the Ribbon (if necessary), then​

Answers

The given narration talks about the different means of taking a screen capture on a Windows environment.

What is a Screen Capture?

This refers to the process where the content of a screen is captured in a digital image form that is saved in the Documents of the computer as a screenshot.

Hence, we can see that the author mentioned the various ways of using the snipping tool to capture whole or part screens and the precise procedure on how to do it.

Read more about screen capture here:

https://brainly.com/question/22654940

#SPJ1

What is the name of data that is stored in memory?

Answers

Answer:

Persistent Data

Explanation:

Data in which is stored in your memory is called Persistent Data! :)

Answer:  Random access memory (RAM)

Explanation:

what is computer programming?​

Answers

Designing and building a computer program. Computer programmers write,modify, and test code

Identify suitable hardware components that will meet your requirements. Be reasonably specific. For example:

. a good processor such as an Intel i5 or i7 (or equivalent)
.enough RAM for amateur audio or video editing, approximately 16 or 32 GB or more if budget allows
.etc

Answers

A  suitable hardware components that will meet the requirements given below is  HP ENVY 17t laptop.

What is the specification about?

HP ENVY x360 15t laptop is known to be one that has a 3-sided micro-edge FHD display and its specification includes:

NVIDIA GeForce MX250 graphics cards About 1TB SSD space16GB RAMCost about $ 600-1500 dollars.

Therefore, A  suitable hardware components that will meet the requirements given below is  HP ENVY 17t laptop.

Learn more about hardware from

https://brainly.com/question/24231393

#SPJ1

Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s:

Diameter (2 × radius)
Circumference (diameter × π)
Surface area (4 × π × radius2)
Volume (4/3 × π × radius3)

Answers

The program is an illustration of a sequential program.

Sequential programs are programs that do not require conditions

The program

The program written in Python is as follows:

radius = float(input("Radius: "))

diameter = 2 * radius

circumference = diameter * 3.14

surfaceArea = 4 * 3.14 * radius**2

volume = (4.0/3) * 3.14 * radius**3

print(diameter)

print(circumference)

print(surfaceArea)

print(volume)

Read more about Python programs at:

https://brainly.com/question/13246781


#SPJ1

What do I need a computer for? In other words, what are the types of tasks you need to use the computer for? For example:

.search the internet
.type assignments
. etc

Answers

Answer:

Adding Local User Accounts To Off-Campus Computers. ...

Adding AD User Accounts To On-Campus Computers. ...

Connecting Your Computer Cables. ...

Installing Software Using Microsoft Software Center. ...

Scan To Email. ...

Given the data model, what would a CROSS JOIN
joining the genre table and the instrument table represent?

genre table:
genre_id
name
genre_instrument table:
genre_instrument_id
genre id
instrument_id
instrument table:
instrument id
name

Answers

Every combination of each genre with each instrument, even those that are not represented in the genre_instrument table

Explanation:

The CROSS JOIN clause creates a combination of every row from two or more different tables. Determining the number of results in a result set for a CROSS JOIN is as simple as the product of the number of records in each table. 

Even those that are not included in the genre instrument table, every conceivable pairing of a given genre and instrument.

What is a CROSS JOIN?

The Cartesian product of the rows from the joined tables is what the CROSS JOIN returns. In other words, rows that combine every row from the first table with every row from the second table will be generated.

Even those that are not included in the genre instrument table, every conceivable pairing of a given genre and instrument

Each row from two or more tables is combined using the CROSS JOIN clause. The product of the number of records in each table can be used to calculate the number of results in a result set for a CROSS JOIN.

Thus, this representation can be done.

For more details regarding cross join, visit:

https://brainly.com/question/28160914

#SPJ2

Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the constraint name customer_number_unique on the table called 'customer'.

Answers

ALTER TABLE customer ADD CONSTRAINT customer_number_unique UNIQUE (customer_number);

Use the following sentence, for instance, to add a unique constraint to the customer table's fname and lname columns: Change the customer table to add a unique constraint (lname, fname);

What ALTER TABLE statement to add a UNIQUE constraint?

When using an ALTER TABLE query in SQL Server, the following syntax is used to create a unique constraint: (Column 1, Column 2,…, Column n) ALTER TABLE name ADD CONSTRAINT constraint name UNIQUE; table name

Each value in a column is guaranteed to be unique by the UNIQUE constraint.A column or collection of columns' uniqueness is ensured by the UNIQUE and PRIMARY KEY requirements. A UNIQUE constraint comes with a PRIMARY KEY constraint by default.

Therefore, ALTER TABLE customer ADD CONSTRAINT customer_number_unique (customer_number);

Learn more about unique constraint here:

https://brainly.com/question/8986046

#SPJ2


ii) Explain how space and time overheads arise from use of paging, and how the
Translation Lookaside Buffer (TLB) mitigates the time overheads.

Answers

Answer:

A translation lookaside buffer (TLB) is a memory cache that is used to reduce the time taken to access a user memory location.[1] It is a part of the chip's memory-management unit (MMU). The TLB stores the recent translations of virtual memory to physical memory and can be called an address-translation cache. A TLB may reside between the CPU and the CPU cache, between CPU cache and the main memory or between the different levels of the multi-level cache. The majority of desktop, laptop, and server processors include one or more TLBS in the memory-management hardware, and it is nearly always present in any processor that utilizes paged or segmented virtual memory.

Space and time overheads arise from use of paging, and how the Translation Lookaside Buffer (TLB) mitigates the time overheads contains the most recent jvm to memory address translations.

What is Translation Lookaside Buffer?

A computer cache called a translation lookaside buffer (TLB) is employed to speed up the process of accessing memory locations. t is a component of the program memory on the semiconductor. Here between the CPU and also the CPU cache, here between PC and the primary storage, or among several layers of the multi-level cache are possible locations for a TLB.

Four or maybe more TLBSs are often present throughout the storage circuitry of desk, portable, and server CPUs, and they are almost always featured in computers that use paged or split memory management.

Learn more about Translation Lookaside Buffer, here:

https://brainly.com/question/13013952

#SPJ2

How many types of Robots are there ?

Can you please Write them down.​

Answers

Answer:

There are 6.

Explanation:

1) Polar

2) Delta

3) Cartesian

4) SCARA

5) Cylindrical

6) Vertically articulated

The most common types of robots are

-Autonomous mobile robots (AMRs)

-Automated guided vehicles (AGVs)

-Robotic arms

-Humanoid robots

-Hybrids

-Cobots

Hope this helps :)

Scientist Galileo Galilei used the
telescope
to observe the stars and planets. This same tool has allowed modern
astronomers
to see objects that are billions of light years from Earth. This tool also detects things such as

Answers

Scientist Galileo Galilei used the telescope to observe the stars and planets.

What was the story of Scientist Galileo Galilei?

Galileo was a natural philosopher, astronomer, and mathematician who made major contributions to the creation of the scientific method and the disciplines of motion, astronomy, and strength of materials.

He also made ground-breaking telescopic discoveries, such as the discovery of Jupiter's four biggest moons.

Hence the correct option is A

Learn more about Scientist Galileo Galilei:

https://brainly.com/question/12024475

#SPJ1

Try using the index method yourself now! Using the index method, find out the position of "x" in "supercalifragilisticexpialidocious" in python

Answers

To use the index method to  find out the position of "x" in "supercalifragilisticexpialidocious", you would execute the following code:

word = "supercalifragilisticexpialidocious"

print(word.index("x"))

How to use the index method in Python?

This is used to return the first position of the occurrence of a specific value and if the value is not found, an exception is raised.

Therefore, to write in python, you would write out the syntax of the word, and then add the print command with the index of the word you want to find as listed above.

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1


What is application software used for?

A. To make certain tasks easier for the computer user
B. To help computer users fill out employment applications
C. To help computer users apply their knowledge in new ways
D. To make certain tasks more challenging for the computer user

Answers

Answer: c

Explanation:

5 reasons why application programs are temporarily stored in main memory

Answers

The reasons why application programs are temporarily stored in main memory are:

So that they CPU can have access to it easily. Because the main memory is one that is byte-addressable and it is one that CPU can use.

Why does operating system application software kept in the memory of the computer?

RAM (Random Access Memory) and other application programs are said to be kept  there because:

So that one can easily have access to it.So it can quickly transmit  or to reached by the device's processor. RAM is said to be main memory in a computer.

Therefore, The reasons why application programs are temporarily stored in main memory are:

So that they CPU can have access to it easily. Because the main memory is one that is byte-addressable and it is one that CPU can use.

Learn more about application programs from

https://brainly.com/question/1538272

#SPJ1

in quickbooks online what are the areas the client needs assessment tool focuses on to help gather information needed to select the right quickbooks subscription for a client

Answers

The areas client needs assessment tool focuses on are the areas of "what, when, who, and how" to gather the right needed to select the right QuickBooks Online subscription for a client.

What is an assessment tool?

A method or technique of comparing statistics to decide how a great deal someone is aware of and whether or not this know-how aligns with the larger image of an idea or framework is known as an assessment tool. Assessment strategies range primarily based totally on context and purpose.

Hence, In this context,  it is concluded that the Client Needs Assessment tool focuses on the areas of "what, when, who, and how" to gather the right needed to select the right QuickBooks Online subscription for a client.

learn more about assessment tools:

https://brainly.com/question/10580916

#SPJ1

functions can also be called

Answers

Answer:

Explanation:

procedure or subroutine

or in maths, functions are called maps or mappings.

Answer:

it can be called function key which do functional works in computer

how to implement fibonacci series in assembly language in ripes

Answers

Answer:

thanks so many times but you have the same one that you

The example of the implementation in RISC-V assembly language using Ripes:

What is the  fibonacci series

assembly

.data

result: .asciiz "Fibonacci Series: "

.text

.globl main

main:

 # Initialize registers

 li a0, 0     # F(0)

 li a1, 1     # F(1)

 li t0, 10    # Number of Fibonacci series elements to generate (adjust as needed)

 

 # Print the initial message

 la a5, result

 li a4, 20    # Length of the message

 li a7, 4     # Print system call

 ecall

 

 # Generate and print the Fibonacci series

 li t1, 2     # Loop counter starts at 2 (F(0) and F(1) already initialized)

loop:

 add t2, a0, a1   # Calculate the current Fibonacci number

 mv a0, a1        # Move previous number (F(n-1)) to a0

 mv a1, t2        # Move current number (F(n)) to a1

 # Print the Fibonacci number

 li a7, 1         # Print integer system call

 ecall

 addi t1, t1, 1   # Increment the loop counter

 blt t1, t0, loop # Loop until desired number of Fibonacci series elements

 # Exit program

 li a7, 10        # Exit system call

 ecall

Read more about  fibonacci series here:

https://brainly.com/question/29764204

#SPJ2

Installing a program is the process of

Answers

Installing a program is the process of  getting a given program ready for execution.

What is program installation?

Installation is known to be the setup of any computer program and it is made up of device drivers and plugins.

Note that it is said to be an act that entails the making of any program ready for execution as it used some specific configuration of a software or hardware.

Learn more about program installation from

https://brainly.com/question/1538272

#SPJ1

given a list of integers. find the size of the list

Answers

The size of a list of integers can be found using python as follows;

size = len(list1)

How to find the size of a list using python?

The size of a list can be found using the len() function in python.

According to the question, the list is an integer.

Therefore, let's use an example below:

list1 = [1, 2, 1, 3, 6, 7, 8, 9, 4, 7, 8, 6, 4]

size = len(list1)

print(size)

Therefore,  the size of a list of integers can be found using the len() function in python.

learn more on python here: https://brainly.com/question/14989942

#SPJ1

Other Questions
If athletes are experiencing reinjury anxiety or feelings of self-doubt about being able to play again, which psychosocial strategy can they use as part of a pre performance routine The function of the root hair plexus is to ________. The function of the root hair plexus is to ________. serve as a source for new epidermal cells for hair growth after the resting stage has passed bind the hair root to the dermis allow the hair to assist in touch sensation cause apocrine gland secretion into the hair follicle Unbiased cash flow forecasts are often difficult to obtain due to ________, which, despite causing higher projected cash flows, can also increase effort, commitment, and persistence from employees. Your elderly neighbor places a bag of corn kernels on your doorstep each morning. The first day, the bag contained 1 kernel of corn, the second day it contained 2 kernelsof corn, 4 kernels of corn the third day, and so on. Each kernel of corn weighs 0.06 grams. How many kernels of corn will be in the bag on the 22nd day? For the reaction, Cl2(g)+3F2(g)2ClF3(g) , determine the rate of change of ClF3 if the concentration of F2 decreases from 0.950 M to 0.865 M over 15 seconds. Consider the following scenario describing the residents of Charlestown: The list pairs resident's ages with their zip codes.Does this scenario represent a function? 8.35 A shopper buys a $100 coat on sale for 20% off. An additional $5 is taken off the sale price by using a discount coupon. A sales tax of 8% is paid on the final selling price. What is the total amount the shopper pays for the coat? Shawn will pay Craig with a negotiable instrument, and Shawn plans to involve a third party in that process. What instrument should he use Can abc agents arrest an individual for criminal violations of the laws pertaining to alcoholic beverages?. Can someone help me with question 3 please. Please make sure you actually answer the question and not type something that isn't regarding the question. Select the correct text in the passage.Which detail most refines the idea that Sandra Cisneros embraces that she can tell more than just her story?(8) When I wrote Mango Street, in the beginning it was as a memoir with the intent of writing something that was just mine.that no one could tell me was wrong. That's how it began.(9) By the time I finished it, I was working in a school in a Latino community in Chicago-a very poor, alternative high school. Istarted writing stories of my students' lives and weaving it into this neighborhood from my past.(10) During that period, when I had my face in the dust and didn't know what to do in this 50-student school with no moneyand minimum wage-chalk I had to bring to class, girls and boys whose lives were so difficult, lives that no head of statecould ever imagine-I was really frustrated as a high school teacher as to how to save their lives. The only thing I could dowas to write about them and try to find some consolation before sleeping. These stories were written from that veryhelpless state. I think when we're most face-in-the-dust impotent, and we put ourselves at service to others, that's when wereally are channeled to light. I think that's why the book is a success. I wasn't thinking of the reader, or that the book is goingto be published. None of that. I think the less you can think about the reader, and the more you work on behalf of others. Ireally believe that it puts you in a state of grace. Read the memoir carefully then answer the question.Nights and DragonsFrom the memoir of author Abigail Prynne1I sit at my desk listening to thunder growl outside my window. Flashes of light burst through the darkness, and wind races past my window. The thrilling combination of sight and sound conjures up visions of dragons roaring proudly, breathing fire, and soaring across the midnight sky. Dragons first fascinated me when I was a little girl. They have followed me ever since. The magnificent creatures appeared in storybooks I read in the library, paintings I saw in museums, movies I watched in the theater, and the dreams I had in my sleep. By the time I was thirteen, one question consumed me. I wanted to know if dragons ever existed, so I set out on a quest for facts.2As I started my research, I discovered many skeptics. Scientists presented evidence to show why dragons could notand did notexist. They explained that it would be impossible for dragons to fly because they would be too big. They laughed at the idea of dragons breathing fire. They pointed out that no other animal has ever done this. They said that if dragons had lived, someone would have found remains somewhere in the world. No bones about it, there were plenty of logical explanations. It would have been easy for me to accept that the only place dragons ever existed was in the imaginations of those who believed.3I could have given up, but I thought about my grandmother. She always told me that "people who believe that science is the answer to everything are missing out on everything else." With her words in mind, I searched some more. There were many facts that hinted that dragons may not be fictional. I noticed that cultures across the world all described dragons in similar ways. This was odd because they had no way to communicate with each other. I found dragons mentioned in more than just stories. They appeared in old legal papers, in the travel logs of Marco Polo, and in the Bible. I saw that the Chinese calendar uses a different animal each year. Dragons are included along with eleven real animals. I began to believe it was a real possibility that all of these people were talking about a creature that actually existed.4With renewed hope that there was some truth to the legends, I looked for new research. I found that some experts disagreed with popular arguments against dragons. They suggested that a dragon could have four stomachs like a cow. If it created stomach gases like birds, it might create enough to lift itself off the ground. This would give it the ability to fly. If it forced out air when diving toward the earth, it might release gases which could ignite into flame. When the animal died, the stomachs would release strong acids that would dissolve its dead body over time. Biologists backed up these ideas with sketches and models based on known animals. Not everyone agreed with these ideas, but many of the things we accept about dinosaurs and other extinct species started the same way.5I doubt we will ever truly know whether dragons existed. There may always be two sides to the fiery debate. Some will say the stories come from active imaginations. Some will believe with all their hearts that the legendary creatures roamed our ancient world. I don't know for certain which side to believe, but the sound and fury of a night like this makes me smile. It rekindles my childhood dreams and keeps the exciting possibility alive.In paragraph 5, the author discusses two sides to the dragon debate. Which statement best summarizes the ideas in the paragraph? The author implicitly states that she believes that dragons once existed. The author explicitly states that she believes that dragons once existed. The author implicitly states that she believes that dragons did not exist. The author explicitly states that she believes that dragons did not exist. use what you have learned about historical conflicts to craft a set of guidelines thats articulate when and how the United States should intervene in conflicts around the world. present these guidelines in the form of a proposal to a congressional committee Please help? Ive been stuck on this question alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 (5 points) alle Mbawah : Attempt 1 How does a bystander become an advocate ? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 ( 5 points )what is the ans The equation y minus 1 = negative 7 (x minus 3). is written in point-slope form. What is the y-intercept of the line? 4 2 20 22 What is the term to describe colors that are equally spaced from each other in the color wheel?Colors such as orange, violet, and green, which are equally spaced from each other on the color wheel are called a The question is down belowalso I home school and have permission to post this question Determine the number of possible solutions for a triangle with b = 37, a = 32, and b = 27. Which of these sentences uses an idiom incorrectly?It was then that we decided to call it a day and stop working. John said that he could care less if he doesnt get the job.Lisa is the kind of person who will stick with you through thick and thin.Rich reminded me that it takes two to tango when I complained about our latest argument.