PLease don't copy I need new code

c++

The acronym for a given string is formed by combining the first letters from a series of words, as in this example: "self contained underwater breathing apparatus" ==> "SCUBA".

Your program generates and displays the acronyms for each of the strings in a data file named “acronym.dat”.

The output of your program should be of the following format:

Self contained underwater breathing apparatus ==> SCUBA

White anglo saxon protestant ==> WASP

……

North Atlantic Treaty Organization ==> NATO

The strings in the data file may have mixed upper and lower letters. You may assume that no hyphen and underscore, and no punctuation marks is present in the data file. The acronyms generated should all be in upper case letters. Your program output should have the exact format as shown above.

You are required to write a value-returning function to convert one line of characters into its corresponding acronym. This function needs to be called within a loop that reads lines of characters from the data file one line at a time, and performs the acronym conversion.

acrynom.data

Self contained underwater breathing apparatus
White anglo saxon protestant
North Atlantic Treaty Organization
Defense Advanced Research Projects Agency
Laugh Out Loud
By the way
Best Friends Forever
I Love You
In my humble opinion
Oh my god
Wicked Evil Grin
Wish you were here
National Science Foundation
National Institute Health

#include
using namespace std;

int main() {


return 0;
}

describe/define each variable used in that module. Variable names must be descriptive. Separate variable definitions from variable descriptions. Use the following form for this description: variable declared; // variable description in English sentence(s)

Properly indent all code according to descriptions given in “Indent C Programs” (http://www.cs.arizona.edu/~mccann/indent_c.html). You must be consistent in the number of spaces used for indentation.

• To improve readability, use a moderate amount of white space, i.e., insert blank lines between blocks of code, and between different modules/functions.

• Comments need to be written for each logically related block of code. This include a while or for loop, a if decision statement, a switch statement, a group of statements that compute a value, a block of code that read in user data, a group of statements that displays output, etc.

4. For each user defined function, comments need to be written above the function describing:

o What does this function do?

o What are the expected input values?

o What are the expected return values?

Answers

Answer 1

Using knowledge of computational language in C++ it is possible to write a function that "self contained underwater breathing apparatus"SCUBA". In this program generates and displays the acronyms for each of the strings in a data file named.

Writting in C++

#include<iostream>

#include<fstream>

#include<string>

using namespace std;

// Your program is required to have at least one user-define function.

// This function takes one string as input and returns the acronym corresponding to that string.

string getAcronym(string str){

string message = "";

if(str[0]>='a' && str[0]<='z')

message += str[0]-32;

else

message = str[0];

for(int i=1; i<str.length()-1; i++)

{

if(str[i-1]==' '){

if(str[i]>='a' && str[i]<='z')

message += str[i]-32;

else

message += str[i];

}

}

return message;

}

// Write a C++ program named acronym.cc

int main(){

// Your program generates and displays the acronyms for each of the strings in a data file named

See more about C++ at brainly.com/question/19705654

#SPJ1

PLease Don't Copy I Need New Codec++The Acronym For A Given String Is Formed By Combining The First Letters

Related Questions

technology?
OA. Analyzing computer systems to protect computer networks from
cyber threats
OB. Planning, creating, testing, and maintaining applications used by
devices
OC. Planning, creating, testing, and maintaining physical computer
systems
OD. Analyzing organizational operations to find opportunities for
improvement

Answers

Answer:

D. Analyzing organizational operations to find opportunities for

improvement

Explanation:

It is option D because you are improving a device for a better future use, better technology.

Hope it helps!

Answer:

A. Analyzing computer systems to protect computer networks from

cyber threats

Explanation:

Edit the following statement so it uses the constant named YEAR:

newAge = currentAge + (2050 − currentYear);

Answers

Using the knowledge in computational language in C++ it is possible to write a code that will calculate the age of someone through the difference of years.

Writing code in C++ has:

#include <iostream>

using namespace std;

int main()

{

//Declare variables

int myCurrentAge=29;

int myNewAge;

const int YEAR = 2050; //Declare constant YEAR=2050

int currentYear=2014;

myNewAge=myCurrentAge+(YEAR-currentYear); //calculate new age

cout<<"My Current Age is "<<myCurrentAge<<endl;

cout<<"I will be "<<myNewAge<<" in "<<YEAR<<"."<<endl; //display values on console

return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

choose the 3 correct statements for the code below

Answers

The correct statements are:

An object of the ActivationLayer class has a name attribute.print(FCLayer(42)) prints FullyConnectedLayer.When creating an object of the BaseLayer class, the name argument must be given.What is Coding?

The term Computer coding is known to be seen as a kind of a tool that is often use in computer programming languages and it helps to give computers and machines a number of instructions on the things that need to be done or performed.

Note that in the code, the The correct statements are:

An object of the ActivationLayer class has a name attribute.print(FCLayer(42)) prints FullyConnectedLayer.When creating an object of the BaseLayer class, the name argument must be given.

See full question below

Choose the 3 correct statements for the code below.

An object of the ActivationLayer class has a name attribute.

An object of the BaseLayer class has a size attribute.

print(FCLayer(42)) prints FullyConnectedLayer.

When creating an object of the ActivationLayer class, the size argument must be given.

When creating an object of the BaseLayer class, the name argument must be given.

Learn more about Coding from

https://brainly.com/question/22654163

#SPJ1

Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s:

Diameter (2 × radius)
Circumference (diameter × π)
Surface area (4 × π × radius2)
Volume (4/3 × π × radius3)

Answers

The program is an illustration of a sequential program.

Sequential programs are programs that do not require conditions

The program

The program written in Python is as follows:

radius = float(input("Radius: "))

diameter = 2 * radius

circumference = diameter * 3.14

surfaceArea = 4 * 3.14 * radius**2

volume = (4.0/3) * 3.14 * radius**3

print(diameter)

print(circumference)

print(surfaceArea)

print(volume)

Read more about Python programs at:

https://brainly.com/question/13246781


#SPJ1

While conducting routine maintenance, you discover a network server that needs to
be replaced fairly soon. The server must be shut down during the replacement, which
will affect office operations. The office manager asks for an update.
What should you say?

Answers

Answer:

tell the truth and make other people aware of what is going on inorder for them to also be hands on deck and come up with solutions to also help solve the problem

What is the name of data that is stored in memory?

Answers

Answer:

Persistent Data

Explanation:

Data in which is stored in your memory is called Persistent Data! :)

Answer:  Random access memory (RAM)

Explanation:

You need to design an online login form in which users have to type their name and password to log into an application. The password can be a combination of numbers and letters. Which data type is most suitable for a password field?
The

data type is most suitable to define a password field.

Answers

The string data type is most suited for password fields.

What is the string data type?

A string data type is often used in programming to specify that a field can contain any sequence of characters such as a combination of numbers and letters which may be repeated. A typical string data type could also contain a maximum limit of characters.

You can learn more from a similar question about string data types here https://brainly.com/question/5871492

#SPJ1

Scientist Galileo Galilei used the
telescope
to observe the stars and planets. This same tool has allowed modern
astronomers
to see objects that are billions of light years from Earth. This tool also detects things such as

Answers

Scientist Galileo Galilei used the telescope to observe the stars and planets.

What was the story of Scientist Galileo Galilei?

Galileo was a natural philosopher, astronomer, and mathematician who made major contributions to the creation of the scientific method and the disciplines of motion, astronomy, and strength of materials.

He also made ground-breaking telescopic discoveries, such as the discovery of Jupiter's four biggest moons.

Hence the correct option is A

Learn more about Scientist Galileo Galilei:

https://brainly.com/question/12024475

#SPJ1

A spherical buoy may be

Answers

A spherical buoy may be lettered rather than being numbered.

What is a spherical buoy?

A spherical buoy can be defined as a type of buoy of which the larger part of the superstructure or the upper part of the body that has a spherical shape and it's distinctively lettered.

In this context, we can infer and logically deduce that a spherical buoy may be lettered and it is usually anchored in a swimming pool to mark the course for swimmers and triathletes.

Read more on buoy here: https://brainly.com/question/14931928

#SPJ1

What tool does a programmer use to produce Python source code?

Answers

Answer:

Cog is a simple code generation tool written in Python. We use it or its results every day in the production of Kubi. Kubi is a collaboration system embodied in a handful of different products.

5 reasons why application programs are temporarily stored in main memory

Answers

The reasons why application programs are temporarily stored in main memory are:

So that they CPU can have access to it easily. Because the main memory is one that is byte-addressable and it is one that CPU can use.

Why does operating system application software kept in the memory of the computer?

RAM (Random Access Memory) and other application programs are said to be kept  there because:

So that one can easily have access to it.So it can quickly transmit  or to reached by the device's processor. RAM is said to be main memory in a computer.

Therefore, The reasons why application programs are temporarily stored in main memory are:

So that they CPU can have access to it easily. Because the main memory is one that is byte-addressable and it is one that CPU can use.

Learn more about application programs from

https://brainly.com/question/1538272

#SPJ1

What do I need a computer for? In other words, what are the types of tasks you need to use the computer for? For example:

.search the internet
.type assignments
. etc

Answers

Answer:

Adding Local User Accounts To Off-Campus Computers. ...

Adding AD User Accounts To On-Campus Computers. ...

Connecting Your Computer Cables. ...

Installing Software Using Microsoft Software Center. ...

Scan To Email. ...


What is application software used for?

A. To make certain tasks easier for the computer user
B. To help computer users fill out employment applications
C. To help computer users apply their knowledge in new ways
D. To make certain tasks more challenging for the computer user

Answers

Answer: c

Explanation:

Identify suitable hardware components that will meet your requirements. Be reasonably specific. For example:

. a good processor such as an Intel i5 or i7 (or equivalent)
.enough RAM for amateur audio or video editing, approximately 16 or 32 GB or more if budget allows
.etc

Answers

A  suitable hardware components that will meet the requirements given below is  HP ENVY 17t laptop.

What is the specification about?

HP ENVY x360 15t laptop is known to be one that has a 3-sided micro-edge FHD display and its specification includes:

NVIDIA GeForce MX250 graphics cards About 1TB SSD space16GB RAMCost about $ 600-1500 dollars.

Therefore, A  suitable hardware components that will meet the requirements given below is  HP ENVY 17t laptop.

Learn more about hardware from

https://brainly.com/question/24231393

#SPJ1

More than 700 people in the United States have been infected with monkeypox virus American vector: the epidemic is spreading like a snowball.

Answers

An epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.

What is snowball spread of virus?

An epidemic is said to be spreading like a snowball if  it is said to be moving at a rate.

Note that in the case of monkey virus, the epidemic that is spreading like a snowball is one that is that is moving in a gradual or seasonal rate.

Learn more about epidemic  from

https://brainly.com/question/15452937

#SPJ1

how to implement fibonacci series in assembly language in ripes

Answers

Answer:

thanks so many times but you have the same one that you

The example of the implementation in RISC-V assembly language using Ripes:

What is the  fibonacci series

assembly

.data

result: .asciiz "Fibonacci Series: "

.text

.globl main

main:

 # Initialize registers

 li a0, 0     # F(0)

 li a1, 1     # F(1)

 li t0, 10    # Number of Fibonacci series elements to generate (adjust as needed)

 

 # Print the initial message

 la a5, result

 li a4, 20    # Length of the message

 li a7, 4     # Print system call

 ecall

 

 # Generate and print the Fibonacci series

 li t1, 2     # Loop counter starts at 2 (F(0) and F(1) already initialized)

loop:

 add t2, a0, a1   # Calculate the current Fibonacci number

 mv a0, a1        # Move previous number (F(n-1)) to a0

 mv a1, t2        # Move current number (F(n)) to a1

 # Print the Fibonacci number

 li a7, 1         # Print integer system call

 ecall

 addi t1, t1, 1   # Increment the loop counter

 blt t1, t0, loop # Loop until desired number of Fibonacci series elements

 # Exit program

 li a7, 10        # Exit system call

 ecall

Read more about  fibonacci series here:

https://brainly.com/question/29764204

#SPJ2

Given a list of numbers, find the correct function to find the sum of the squares of only the positive elements.


sqsum1
sqsum2
sqsum3
sqsum4
sqsum5

Answers

Answer:

sqsum4

Explanation:

So to raise a number to a power in python, you can use the ** operation, which is usually confused with the ^, which is an operation, but it is not for raising numbers to a power. It is the xor bit operation, which if you don't know at the moment, it's fine, since it's not necessary for this. each of these lists uses a generation comprehension which is generally defined as: (x for x in object if condition) with the if condition being optional, but in this case it's necessary. If it's a bit confusing, you can define a generator using a function so it's a bit more spread out:

def generator(object):

   for x in object:

       if condition:

           yield x

Although in this instance were going to be performing some operation on x, which in this case is squaring it. So let's just look at the two functions that use the **, since they should be the only options that will be correct.

sqsum1(nums):

   This function does square x, except it uses incorrect syntax. The condition should come after the for loop. Python likely wont tell you this, because it may think you're trying to do something else. You can do one line if statements like this: a if condition else b, which will return a if the condition is true, and b if it isn't. So it may think that you're trying to do this one line if statement, and say that you're missing an else. The function could even implement in this way: x**2 if x > 0 else 0 for x in nums. This way if the x is negative it counts as 0, or in other words isn't counted towards the sum. But without this fix, the function will raise a syntax error

sqsum4(nums):

   This will square each number in x only if the current element "x" is greater than 0, or in other words positive. And then it returns the sum. So this function returns the expected output

Identify the correctly constructed ALTER TABLE statement to add a UNIQUE constraint to the column customer_number with the constraint name customer_number_unique on the table called 'customer'.

Answers

ALTER TABLE customer ADD CONSTRAINT customer_number_unique UNIQUE (customer_number);

Use the following sentence, for instance, to add a unique constraint to the customer table's fname and lname columns: Change the customer table to add a unique constraint (lname, fname);

What ALTER TABLE statement to add a UNIQUE constraint?

When using an ALTER TABLE query in SQL Server, the following syntax is used to create a unique constraint: (Column 1, Column 2,…, Column n) ALTER TABLE name ADD CONSTRAINT constraint name UNIQUE; table name

Each value in a column is guaranteed to be unique by the UNIQUE constraint.A column or collection of columns' uniqueness is ensured by the UNIQUE and PRIMARY KEY requirements. A UNIQUE constraint comes with a PRIMARY KEY constraint by default.

Therefore, ALTER TABLE customer ADD CONSTRAINT customer_number_unique (customer_number);

Learn more about unique constraint here:

https://brainly.com/question/8986046

#SPJ2

Describe how PDF provides output that is consistent across different types of devices, including printers and monitors of various resolutions.
Describe the format for storing, laying out, and managing the objects on a page. Explain the advantages to the use of this format over other formats, such as that used by HTML.
Explain how PDF manages the many different type fonts that might be found in a document.
How does PDF manage bitmap images? Object images?
Explain how PDF differs from PostScript.
Describe at least three major limitations that PDF places on the end user of a PDF document.

Answers

The way PDF provides output that is consistent in all format is that when a given document is saved in a pdf format it is one that cannot be changed unless it is converted to the format that you want it to be, making it consistent with others.

What is output intent in PDF?

An output intent is known to be the last destination device a person need to use to reproduce the color in the PDF, e.g.  the use of separations printing device.

Note that, The way PDF provides output that is consistent in all format is that when a given document is saved in a pdf format it is one that cannot be changed unless it is converted to the format that you want it to be, making it consistent with others.

Learn more about PDF from

https://brainly.com/question/14703121

#SPJ1

functions can also be called

Answers

Answer:

Explanation:

procedure or subroutine

or in maths, functions are called maps or mappings.

Answer:

it can be called function key which do functional works in computer

Select 3 true statements about Python class.
If a class inherits from multiple classes, the order of inheritance does not matter.

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.

A class attribute exists as a unique object regardless of how many instances of the class are.

A class attribute can be used without an instance of that class.

Properties whose names start with _ (e.g. _name) are private properties and cannot be accessed outside of the corresponding class.

Answers

The true statements about Python class are:

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.A class attribute exists as a unique object regardless of how many instances of the class are.A class attribute can be used without an instance of that class.

Can Python class inherit from multiple classes?

Yes, A class is one that can be gotten from more than one base class in Python. This is known to be multiple inheritance.

Note that The true statements about Python class are:

(In Python 3 or higher) If no class is inherited, it implicitly inherits the object class.A class attribute exists as a unique object regardless of how many instances of the class are.A class attribute can be used without an instance of that class.

Learn more about Python class from

https://brainly.com/question/26497128

#SPJ1

Why is haptic feedback important?

Answers

[tex]\huge\underline{\red{A}\green{n}\blue{s}\purple{w}\pink{e}\orange{r} →}[/tex]

Haptic feedback is used to engage more of the user's senses to provide a deeper and more immersive experience. Products that offer haptic feedback, such as some game controllers, often provide different kinds of sensations to correspond with different visual and audio stimuli.

Explanation:

Hope it helps you !!

A company is looking for an employee to help organize customer information for the sales team. Which computer field includes this job?
A.
Security analysis
B.
Database support
C.
Systems analysis
D.
Network support

Answers

Answer:

A

Explanation:

security organises the customer's info online and in person for the sales team.

Answer: B DEFINITELY

Explanation:  DATABASE WOULD BE FOR SALES TO KEEP TRACK OF SALES AND LEDGERS, DEBITS, ADDRESSES, NOTES ON CUSTOMER, WHAT THEY BOUGHT, WHEN, WHAT YEAR, IS THERE A WARRANTY?

DATA BASE KEEPS ALL THEIR DEALINGS ORGANIZED AND UP TO DATE.

A binary floating-poi Select 3 true statements about Python primitive types.
32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)
The int type in Python3 cannot represent a number greater than 2^31-1.
A binary floating-point method is used to represent fractions in binary numbers.
The decimal number 0.1 cannot be expressed without error in binary floating-point format.
The float type in Python3 can represent decimal 0.1 without error.nt method is used to represent fractions in binary numbers

Answers

The true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.

What are  Python primitive types?

The  Python primitive types is known to be made up of four primitive data types which are:

Integer.Float.String.Boolean.

Note that The true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ1

what is computer programming?​

Answers

Designing and building a computer program. Computer programmers write,modify, and test code

How many types of Robots are there ?

Can you please Write them down.​

Answers

Answer:

There are 6.

Explanation:

1) Polar

2) Delta

3) Cartesian

4) SCARA

5) Cylindrical

6) Vertically articulated

The most common types of robots are

-Autonomous mobile robots (AMRs)

-Automated guided vehicles (AGVs)

-Robotic arms

-Humanoid robots

-Hybrids

-Cobots

Hope this helps :)

functions of memory card​

Answers

Answer:

store data

Explanation:

it is secondary storage device


ii) Explain how space and time overheads arise from use of paging, and how the
Translation Lookaside Buffer (TLB) mitigates the time overheads.

Answers

Answer:

A translation lookaside buffer (TLB) is a memory cache that is used to reduce the time taken to access a user memory location.[1] It is a part of the chip's memory-management unit (MMU). The TLB stores the recent translations of virtual memory to physical memory and can be called an address-translation cache. A TLB may reside between the CPU and the CPU cache, between CPU cache and the main memory or between the different levels of the multi-level cache. The majority of desktop, laptop, and server processors include one or more TLBS in the memory-management hardware, and it is nearly always present in any processor that utilizes paged or segmented virtual memory.

Space and time overheads arise from use of paging, and how the Translation Lookaside Buffer (TLB) mitigates the time overheads contains the most recent jvm to memory address translations.

What is Translation Lookaside Buffer?

A computer cache called a translation lookaside buffer (TLB) is employed to speed up the process of accessing memory locations. t is a component of the program memory on the semiconductor. Here between the CPU and also the CPU cache, here between PC and the primary storage, or among several layers of the multi-level cache are possible locations for a TLB.

Four or maybe more TLBSs are often present throughout the storage circuitry of desk, portable, and server CPUs, and they are almost always featured in computers that use paged or split memory management.

Learn more about Translation Lookaside Buffer, here:

https://brainly.com/question/13013952

#SPJ2

Need in JAVA!!!!
Given a line of text as input, output the number of characters excluding spaces, periods, exclamation points, or commas.


Ex: If the input is:


Listen, Mr. Jones, calm down.

the output is:


21

Note: Account for all characters that aren't spaces, periods, exclamation points, or commas (Ex: "r", "2", "?").

Answers

The number of characters in the given code is 151 chars

What is a Character?

This refers to the single visual object that is used in computing to represent a text, symbol, or number.

Hence, we can see that we are asked to state the number of characters in the given code, excluding spaces, periods, exclamation points, or commas and the number is 151.

Note that the single and multi-line comments were NOT included.

Read more about java programming here:

https://brainly.com/question/26952414

#SPJ1

in quickbooks online what are the areas the client needs assessment tool focuses on to help gather information needed to select the right quickbooks subscription for a client

Answers

The areas client needs assessment tool focuses on are the areas of "what, when, who, and how" to gather the right needed to select the right QuickBooks Online subscription for a client.

What is an assessment tool?

A method or technique of comparing statistics to decide how a great deal someone is aware of and whether or not this know-how aligns with the larger image of an idea or framework is known as an assessment tool. Assessment strategies range primarily based totally on context and purpose.

Hence, In this context,  it is concluded that the Client Needs Assessment tool focuses on the areas of "what, when, who, and how" to gather the right needed to select the right QuickBooks Online subscription for a client.

learn more about assessment tools:

https://brainly.com/question/10580916

#SPJ1

Other Questions
Preventive stress management has three parts: primary, secondary, and tertiary. What part would you be acting on if you gave one of your employees permission to set his or her own goals and develop a schedule to accomplish them? Find the value of x and y (2^x+y 2^x-y) =(16,1) in order pair Several hours after your last meal, declining blood glucose levels stimulate release of the hormone ________, which stimulates glycogenolysis, lipolysis and fat mobilization, and gluconeogenesis. a group of 4 numbers have an average of 15, three of the numbers are 18,11 and 25. what is the other number?? Sciencetist classify rocks into three different types.What is the main basis for the classification system they chose? Rewrite x - 10x = 4 so that the left side is a perfect square trinomial.x - 10x -4 = 0x - 10x + 25 = 4x 10x + 25 = 29x. - 10x + 10 = 14 How tall is the tower? What types of Functions will left endpoint lead to an under approximation and right endpoints lead to and over approximation?What types of Functions will left endpoint lead to an over approximation and right endpoints lead to and under approximation? pls help 10 points for whoever helps In triangle TUV Y is the centroid if YW=9 find TY On a coordinate plane, triangle R S T has points (0, 4), (0, negative 2), and (3, negative 2).RST is dilated with the rule DT,1/3 (x, y), where the center of dilation is T(3, 2). The distance between the x-coordinates of R and T is.The distance between the y-coordinates of R and T is.R' isfrom T, so the coordinates of R' are. How is energy produced during nuclear fusion?A. Small nuclei merge and form a larger nucleus, and mass isconverted into energy.B. Particles change from one type of nucleon into another type ofnucleon, and energy is released.OC. A large nucleus splits apart into two or more smaller nuclei, andmass is converted into energy.D. A nucleus in an excited state moves into a state of lower energy,releasing energy in the process.SUBMIT Ram says to Gita,"I will tell my story to you and your friend myself ."change into indirect speech All of the following were motives for the Crusades except a. the desire to gain riches and land. b. to allow the pope to assume the leadership in liberating the Holy Land. c. the aim to increase religious toleration between Muslims and Christians. d. religious fervor. e. the desire for military adventure. Taco bell is reportedly testing a new menu item that features tostada toppings on a:. In the late 1990s and early 2000s, many large U.S. corporations were found to have engaged in massive financial frauds. Many of these frauds were perpetrated by the CEOs and other senior officers. In response, Congress enacted the ____________. If f(x) = -x-2 and g (x) =x^2, what is (g^0f)(-6)? Please answer all parts as I know the answers but need the work to go with them. Thus, I believe the below answers are correct. Thank you! HELPPPPPPPP: A car stero that regularly sells for $109 is in sale at a 15% discount. How much is the discount? The _____ theory of education argues that a college degree credibly _____ to potential employers that you are intelligent, hardworking, and able to complete assignments.