What are disadvantages of Java?

Answers

Answer 1

Performance: Java programs may not perform as quickly as programs written in other languages, such as C or C++.

Memory management: Java uses a garbage collector to manage memory, which can cause performance issues if not used properly.

Limited support for low-level programming: Java is a high-level language, which means that it abstracts away many of the details of how a computer operates. This can make it difficult to perform tasks that require direct manipulation of memory or other low-level operations.

Lack of support for some programming paradigms: Java does not support some programming paradigms, such as functional programming, which can be a disadvantage for developers who prefer to use those paradigms.

Complexity: Java can be a complex language to learn and use, especially for developers who are new to programming or who have experience with other languages.


Related Questions

shift registers are capable of shifting binary information to the right only.group of answer choicestruefalse

Answers

Any binary integer may be shifted to the left or the right using binary shifting. Then a 0 is used in place of the void. By demonstrating a binary shift to the left, we can observe this in effect.

A binary shift shifts all the digits in the binary number along to the right and fills the spaces following the shift with 0 to divide a number by two, for example. Bit shifting is a process that moves all the bits in a binary value a certain number of positions to the left or right. When the operand is being utilized as a collection of bits rather than as a whole, bit shifting is employed. The leftmost bit is eliminated as a result of a binary left shift. The remaining pieces all shift one position to the left. The rightmost vacant space will be filled with a 0.

To learn more about binary shifting click the link below:

brainly.com/question/14789125

#SPJ4

maddy wants to implement a camera system but is concerned about the amount of storage space that the video recordings will require. what technology can help with this?

Answers

Maddy wants to install a camera system but worries about how much storage space the recorded videos will use. Technology for motion detection can be useful here.

A change in an object's position in relation to its surroundings or a change in the environment in relation to an object is what is known as motion detection. It can be done using mechanical or electronic techniques. Motion perception is what happens when it happens in living things.

Optical and auditory signals are the two main ways that motion can be detected electrically. For optical detection, laser or infrared technologies may be employed. An infrared disturbance is picked up by a sensor in motion-detection devices like PIR motion detectors. A signal may then trigger an alarm and/or a camera to record a picture or a video of the incident.

Learn more about motion detection here:

https://brainly.com/question/28027581

#SPJ4

When do you not have to cite information you put on your website?

Answers

Answer:

You do not have to cite information you put on your website if the information is considered to be common knowledge. Common knowledge is information that is widely known and accepted by the general public, and does not require a citation because it is not original to the person presenting it.

Examples of common knowledge include well-known facts, such as the date of the Declaration of Independence, the capital of the United States, and the laws of physics. These facts are widely known and accepted, and do not require a citation because they are not original to the person presenting them.

However, if you use information on your website that is not considered to be common knowledge, you must provide a citation. This includes original research, ideas, data, or other information that is not widely known or accepted. By providing a citation, you are giving credit to the original source of the information and allowing others to verify the accuracy of the information.

Overall, you do not have to cite information you put on your website if the information is considered to be common knowledge, but you must provide a citation for any information that is not widely known or accepted.

Topology in networking essentially just means how the computers are interconnected with one another. True or false ?​

Answers

Answer: True

Explanation:

In networking, topology refers to the way in which computers are interconnected with one another. A network topology describes the layout of the connections between devices on a network, and it can have a significant impact on the performance, reliability, and security of the network.

what is the flaw in using lines of code to compare the productivity of functional languages and that of imnperative languages?

Answers

Using lines of code as a measure of productivity is not a reliable way to compare the productivity of functional languages and imperative languages, or any other programming languages for that matter. This is because lines of code is not a consistent measure of the complexity or functionality of a program.

For example, a program written in a functional language might be able to accomplish a certain task using fewer lines of code than a program written in an imperative language, but that doesn't necessarily mean that the functional program is more productive or better in any way. Additionally, the way that lines of code are counted can vary depending on the individual or organization doing the counting, which can make it difficult to compare the productivity of different languages using this metric. It is generally better to use more robust measures of productivity, such as the time it takes to develop and maintain a program, or the number of bugs and other issues that are found in the code.

Learn more about imperative languages, here https://brainly.com/question/16034730

#SPJ4

When using software to digitally create a contact sheet, what is generally the first
thing that you should do?


Oput all downloaded images into one folder

Ogo to File > Automate > Contact Sheet II

Ounder Document, select Create Settings

Oselect the Use Filename as Caption option to label images

Answers

Select Contact Sheet under Tools | Create. Set the contact sheet format options in the section designated for it. Set the Output Settings in the section designated for that purpose. Change or add text as needed on the page. Thus, option B is correct.

What  software to digitally create a contact sheet?

Select File > Automate > Contact Sheet II in Photoshop. (Bridge) Pick an image folder or an individual image file. Select Tools > Photoshop > Contact Sheet II from the Bridge menu.

Therefore, Ogo to File > Automate > Contact Sheet II. Text on the page may need to be changed or added.

Learn more about contact sheet here:

https://brainly.com/question/12104476

#SPJ1

write a method named divide that has two integer parameters the function of the method is to divide the first parameter by the second and return the quotient java

Answers

Using the / operation, divide the dividend by the divisor. With the exception of string, both the dividend and the divisor can be any type, and the outcome will be calculated accordingly.

Using the % operator, find the remaining amount. Program expressions for quotient and remainder calculation: In Java, we can divide the left-hand value by the right-hand value using the division operator (/). Example: int number = 10 / 5. In this little lesson, we'll look at how to convert the output of an integer division operation to a float.

public class QuotientAndRemainder {

    public static void main(String[] args)

   {

       int dividend = 556, divisor = 9;

       int quotient = dividend / divisor;

       int remainder = dividend % divisor;

        System.out.println("The Quotient is = " + quotient);

       System.out.println("The Remainder is = " + remainder);

   }

}

Learn more about operation here-

https://brainly.com/question/28335468

#SPJ4

what two options exist to reduce the number of pages printed when completing a return in blockworks online

Answers

Before you file your return, if you are unhappy with the H&R Block tax preparation software for any reason, H&R Block will refund the full purchase price you paid, less any rebate you may have received for the program, to you from H&R Block or its authorized reseller.

An IRS-approved location for electronically submitting tax returns is H&R Block. Our tax specialists would be pleased to assist you maximize your tax return online if you have any questions or worries about making sure everything is taken care of before filing. Use the same username and password you used to sign up for your H&R Block online account to get a copy of your prior-year return. Simply click the Prior years option in the Taxes section after that. Then, you'll see all the years' worth of tax returns in your account. You won't need to pay the price for tax preparation services up front if you choose H&R Block's return anticipation check.

To learn more about H&R Block click the link below:

brainly.com/question/13682474

#SPJ4

Which of the following is not an inheritance mapping strategies?
a) Table per hierarchy
b) Table per concrete class
c) Table per subclass
d) Table per class

Answers

Answer:

option d

Explanation:

I think it is not an inheritance mapping strategies

which term refers to the science that specifies the design and arrangement of items you use so you interact

Answers

The term that refers to the science that specifies the design and arrangement of items you use so you interact is ergonomics.

Ergonomics, which is defined as the science of adapting a workspace to a user's demands, strives to boost productivity and efficiency while minimizing discomfort.

Consider the height of your desk or the angle of your computer monitor. Consider whether your wrists or eyes are sore at the end of the day from typing. By adapting products to the user and emphasizing good posture to lessen the impact of repetitive actions, an ergonomics expert can prevent the majority of workplace injuries.

The necessity for ergonomics has grown significantly as a result of the usage of computers and quickly evolving technology in the modern workplace. Whether designing a workspace for the business or at home, desks, chairs, monitors, keyboards, and lighting must all be considered.

Know more about ergonomics here:

https://brainly.com/question/29753374

#SPJ4

which of the following is not a part of the 3 essential design that raid technology can take? select one: a. raid level 0(striping) b. raid level 1 (parity) c. raid levels 4/5 (parity based redundancy) d. raid level 1 (mirroring)

Answers

Disk mirroring or disc striping are techniques used in RAID. Mirroring will transfer the same data to many drives. Striped partitions aid in spreading

Which three RAID setups are the most popular?

The level of fault tolerance, read and write speeds, and storage capacity are commonly used to evaluate configurations. Today, a variety of RAID levels, some of which are uncommon, are in use. The RAID configurations RAID 0, RAID 1, RAID 5, RAID 6, and RAID 10 are the most used.

What qualities does RAID Level 1 possess?

Since data is written simultaneously to two locations, RAID 1 requires a minimum of two physical discs. Since the drives are basically mirror duplicates of one another, if one fails, the other

What are RAID controllers' primary responsibilities?

The two main purposes of a RAID controller are to generate redundancy to ensure that data can still be accessed in the event of drive failure and to merge numerous slow or low-capacity storage devices into a single quicker and larger drive so that they may operate as a logical unit.

To know more about Raid visit;

https://brainly.com/question/30036295

#SPJ4

organizations should look for hunt technologies that operate above the kernel level, i.e., closer to the application level. true false

Answers

Open-source software is a well-known example of this type of collaboration because any competent user is able to engage in its development online.

Public confidence in the software is facilitated by the ability to study the code. Development of open-source software might include a variety of viewpoints that go beyond those of a single corporation. According to a 2008 report by the Standish Group, customers are saving around $60 billion annually as a result of the adoption of open-source software models. Similar to how user scripts and custom style sheets allow for websites, open-source code may be used for research and allows knowledgeable users to modify software to suit their own needs before publishing the alteration as a fork for users with similar tastes.

Learn more about software here-

https://brainly.com/question/11973901

#SPJ4

suppose that a load instruction has computed the virtual memory address to be loaded from as 0101100111100010. what cache set will be accessed and what tag value will be placed into the cache?

Answers

Tag value will be placed into the cache is  010010.

Virtual address  =  0101100111100010

The corresponding physical address = 0101100111100010

cache set = 0100 2 = 4  10

Tag = 010010

A cache's main goal is to improve data retrieval performance by minimizing the need to contact the slower storage layer behind it. Contrary to databases, where data is often comprehensive and long-lasting, a cache typically stores a subset of data transiently by sacrificing capacity for speed.

Unless you have a good reason, I generally advise against emptying your cache. The cached data make it possible for your most often visited websites to load more quickly, which is advantageous. It's not like the cache will just keep expanding forever because your browser will occasionally erase old files. Your Android phone's cache is a collection of little data caches that your apps and web browser employ to accelerate performance.

Learn more  about cache here:

https://brainly.com/question/28232012

#SPJ4

the design process in which components are sized and then final assembly is built around the design of the parts is called:

Answers

The design process in which components are sized and then final assembly is built around the design of the parts is called a) bottom up.

In the field of technology, when a product is built in such a manner where the components that will make the product are produced first, and the entire assembly is then assembled to form the complete object or product is referred to as bottom up.

The process of bottom up is efficient as each component of the final product can be designed according to the appropriate size. It also allows the components to be designed to accuracy. Hence, such a design process in which the components are made first and the final product is then assembled is a bottom up.

Although a part of your question is missing, you might be referring to this question:

The design process in which components are sized and then final assembly is built around the design of the parts is called:

a) bottom up

b) bottom down

c) built-in

d) none of the above

To learn more about design, click here:

https://brainly.com/question/411733

#SPJ4

which of the following traverses a significant distance and usually supports very high data throughput? question 11 options: a) lan b) wan c) can d) man

Answers

A traverse that has a significant distance and usually supports very high data throughput is known as the WAN. Thus, the correct option for this question is B.

What is a Traverse?

A traverse may be defined as the process of visiting or touching the elements of the structure and doing something with the data. Traversing is a process in which each element of a data structure is accessed successfully.

A WAN (wide area network) traverses a significant distance and usually supports very high data throughput. A  wide area network (also known as WAN), is a large network of information that is not tied to a single location.

WANs can facilitate communication, the sharing of information, and much more between devices from around the world through a WAN provider.

Therefore, a traverse that has a significant distance and usually supports very high data throughput is known as the WAN. Thus, the correct option for this question is B.

To learn more about WAN, refer to the link:

https://brainly.com/question/1167985

#SPJ1

what are the two types of signals used to communicate a message in a network and how are they different? what device converts one type to the other type?

Answers

Answer:

There are two main types of signals used to communicate a message in a network: analog and digital.

Analog signals are continuous and vary in a smooth, continuous manner. They are typically used in systems that transmit sound or video, and they are well-suited to transmitting information that has a continuous range of values, such as the frequency of a sound wave.

Digital signals, on the other hand, are discrete and consist of a series of discrete values, such as 1s and 0s. They are typically used in systems that transmit data, and they are well-suited to transmitting information that can be represented as a series of discrete values, such as text or numbers.

The device that converts one type of signal to the other is called a modem (short for modulator-demodulator). A modem takes an incoming analog signal and converts it into a digital signal that can be transmitted over a network. It also takes an incoming digital signal and converts it into an analog signal that can be transmitted over a telephone line or other analog communication channel.

Overall, the main difference between analog and digital signals is the way they are represented and transmitted. Analog signals are continuous and vary in a smooth, continuous manner, while digital signals are discrete and consist of a series of discrete values. Modems are used to convert between these two types of signals.

pls award brainliest!

Explanation:

monitor calibration is not enough to ensure total image accuracy through the process. a. evaluation b. manipulation c. output d. input

Answers

Monitor calibration is insufficient to guarantee complete image accuracy during output.

Why does the photograph usually go through the matting process before being framed?

The mat, when used in a frame, prevents the picture from contacting and sticking to the glass. Matting can be completed totally with historical materials, unlike other presenting approaches, and it is simple to undo.

What justifications exist for matting an image?

Artwork can be protected by matting. Unframed art can be handled by artists and collectors without really touching the piece thanks to a mat. A mat enables airflow between the artwork and the glazing substance.

To know more about output visit:-

https://brainly.com/question/14227929

#SPJ4

You have a windows server azure virtual machine named vm1. You need to back up two folders in vm1 by using azure backup. The solution should minimize administrative effort. What should you deploy first?.

Answers

To minimize administrative effort and automate the backup process for two folders in an Azure virtual machine (VM) named "vm1," you should deploy an Azure Backup Server on vm1 first.

What is Azure Backup?

Azure Backup is a cloud-based data backup and recovery service that helps protect your data in the cloud and on-premises. You can use Azure Backup to back up data from various sources, including Azure VMs.

To use Azure Backup to back up data from an Azure VM, you can deploy an Azure Backup Server on the VM. The Azure Backup Server is a lightweight, Azure-based data protection agent that is installed on the VM and used to manage and protect data from the VM. It communicates with the Azure Backup service to transfer data to the Azure Recovery Services vault, where the data is securely stored.

To know more about Azure, visit: https://brainly.com/question/28893603

#SPJ4

your office has a legacy wide-format printer that must be connected to your network. the connection on the printer is an older db-9 serial connection. what is the best option for connecting this legacy device to your corporate network?

Answers

Setting priority for particular types of network data allows QoS to manage and control network resources. Quality of service (QoS) is the term for any system that controls data traffic to lessen packet loss, latency, and jitter on a network. QoS limitations

Which service on a wireless router can be used to give voice priority over other types of network traffic?

QoS involves using tools to modify how the router or switch handles various packets. For instance, we could set up the router to prioritise voice traffic over data traffic.

Which protocol from the list below does a router use to choose the best route between a source and a destination?

DVRP: Distance Vector Routing Protocol

In order to get to a destination network in a specific route, these protocols choose the path with the fewest hops. A distance vector routing protocol is something like RIP, which is dynamic.

To know more about corporate network visit; https://brainly.com/question/29995096

#SPJ4

true or false? adults who have grown up in endemic areas usually have some degree of resistance to severe malaria because of past infections.

Answers

This could be true I believe!

which security model addresses integrity thoguh well-frormed transactions and maintaining internal and external cosistency

Answers

There are three integrity goals covered by the Clark and Wilson approach. It makes use of access control lists along with authentication and permission.

What integrity-related security paradigms are there?

The Biba Model or Biba Integrity Model is a formal state transition system of data security policies created to specify a collection of access control rules in order to maintain data integrity. Data and subjects are grouped or arranged according to how trustworthy they are.

Which of the following models takes data integrity into account?

Kenneth J. Biba created the Biba Model, also known as the Biba Integrity Model, in 1975. It is a formal state transition system of computer security policy that outlines a set of access control guidelines intended to protect data integrity.

To know more about Wilson approach visit :-

https://brainly.com/question/19953951

#SPJ4

if a program is to receive pairs of numbers and terminate when a pair of zero values is entered, which statement is correct?

Answers

WHILE NOT ((number_1 = 0) AND (number_2=0)) This statement is correct because it checks if the two numbers are both equal to 0, and if they are, the program will terminate.

What is program?
A program is a set of instructions or code that is used to carry out a specific task on a computer or other digital device. It is written by a programmer using a programming language, and then compiled into machine code that can be executed by the computer. Programs can range in complexity, from simple one-line programs to complex software systems for managing large databases or simulating complex real-world systems. In addition, programs can be written to interact with users, allowing them to control the program and input data.

The other options are incorrect because they check if one or the other is equal to 0, or if one is equal to 0, which would not result in the program terminating.

To learn more about program
https://brainly.com/question/28569540
#SPJ4

Complete Question:

If a program is to receive pairs of numbers and terminate when a pair of zero values is entered, which statement is correct?
WHILE ((number_1 = 0) AND (number_2=0))
WHILE NOT ((number_1 = 0) OR (number_2=0))
WHILE NOT ((number_1 = 0) AND (number_2=0))
WHILE NOT (number_1 AND number_2=0)


Which option gives the correct chronological order of the milestones in the history of photo sharing?

Answers

Although part of your question is missing, you might be referring to this full question:

Which option gives the correct chronological order of the milestones in the history of photo sharing?

a. launch of photo-finishing website - photo CDs were used to store and distribute photos - launch of Photobucket - launch of Webshot

b. photo CDs were used to store and distribute photos – launch of photo-finishing websites – launch of Webshots - launch of Photobucket

c. launch of photo-finishing website - photo CDs were used to store and distribute photos - launch of Webshot - launch of Photobucket

d. photo CDs were used to store and distribute photos – launch of photo-finishing websites – launch of Photobucket - launch of Webshots

The correct chronological order is option (b) photo CDs were used to store and distribute photos – launch of photo-finishing websites – launch of Webshots - launch of Photobucket

In today's world, individuals from all over the world share millions of images. In order for this to happen, a number of events in the development of sharing photos and videos occurred which resulted in the current effective and efficient photo-sharing methods.

Initially, in 1982, Compact Discs (CDs) were used to save and share photographs. Then, in the mid to late 1990s, websites for online photo sharing were launched. Thirdly, Auralis, Inc. in San Diego, California founded Webshots in 1995. From 1999 to 2012, the company Webshots provided picture-sharing services. Finally, in 2003, Photobucket, the first American picture-uploading and video-hosting service, was launched.

Read more about Photo sharing from:

https://brainly.com/question/9127382

an engineer utilizes digital forensics for information gathering. while doing so, the first focus is counterintelligence. which concepts does the engineer pursue

Answers

Making a copy of the original media is the first and most important guideline in digital forensics. This indicates that you shouldn't perform any analysis or use any tools on the original source media.

The original media must be duplicated, and all tools and analysis must be performed on that. the safe gathering of digital data.

the detection of doubtful data. the investigation of questionable data to ascertain information like origin and content. the delivery of digital evidence to legal tribunals. the application of legal regulations to computer practice in a nation. Terms in this group (10) Digital forensics are used by engineers to obtain data. The foremost priority is counterintelligence while accomplishing this.

Learn more about information here-

https://brainly.com/question/15709585

#SPJ4

tim is working on a change to a web application used by his organization to fix a known bug. what environment should he be working in?

Answers

Note that where Tim is working on a change to a web application used by his organization to fix a known bug, The environment he should be working in is: Test Environment.

What is a Web Application?

Engineers in the IT department work in two contexts. TEST and PRODUCTION. IT engineers create code on a local level. Following the deployment of their code on TEST servers. They do tests on their code. If no issues are found in the test environment, the code is deployed to PROD servers.

A web application is a software that can be accessed using a web browser. Web apps are supplied to users with an active network connection over the World Wide Web.

Some of the most popular advantages of Web applications are:

Allowing numerous users to access the same program version.Web programs do not require installation.Web applications may be accessible across numerous platforms such as a desktop, laptop, or mobile.Multiple browsers can be used to access it.

Learn more about Web Applications:
https://brainly.com/question/8307503
#SPJ1

which is true? a. a program must import java.io.system to use system.out b. system.output.print() only outputs objects of type string c. the output of println() for an object reference includes all data stored in the object d. data written to system.out are placed in a buffer and eventually output

Answers

Data written to System.out are initially stored in a buffer before being output.

What use do Java's System in and System out functions serve?

Similar to how System.out is the console's connected output stream, System.in is its connected input stream. System.in can be forwarded from a shell in the same way as stdin can be in Unix or C terms. Java's static in field is called System.in.

In Java, what does System out Println () mean?

System. out. println() is a Java statement that prints the argument that was supplied to it. Results are shown on the monitor through the println() technique. A method is often called by an objectname.

To know more about  System.out visit :-

https://brainly.com/question/14686510

#SPJ4

Assume that your body mass index (BMI) program calculated a BMI of 20.6. What would be the value of category after this portion of the program was executed? # Determine the weight category. if BMI 39.9: category = "morbidly obese" elif BMI <= 24.9: category = "normal" elif BMI <= 39.9: category = "overweight"
The value of category will be _______.
A) overweight
B) normal
C) underweight
D) morbidly obese

Answers

Assume that your body mass index (BMI) program calculated a BMI of 20.6.  The value of category will be option A) overweight.

What is the body mass index  about?

Body mass index (BMI) is a measure of body fat based on height and weight that applies to adult men and women. It is calculated by dividing a person's weight in kilograms by their height in meters squared.

A BMI of 20.6 falls within the normal weight range, which is a BMI of 18.5 to 24.9. However, based on the given code snippet, if the BMI is 39.9 or greater, the category is "morbidly obese." If the BMI is less than or equal to 24.9, the category is "normal." If the BMI is less than 39.9 but greater than 24.9, the category is "overweight."

Therefore, if the BMI calculated by the program is 20.6, the value of the category will be "overweight."

Learn more about body mass index  from

https://brainly.com/question/10091149

#SPJ1

which of the following can be used to enforce strong credential policies for an organization? a. acceptable use policy b. windows active directory c. windows defender d. windows firewall

Answers

The policy which can be used to enforce strong credential policies for an organization is a. acceptable use policy

An acceptable use policy (AUP) can be defined as a policy or document stipulating constraints and practices that a person must agree to for access to a corporate network, the internet, or any other resources. It is a set of rules applied by the creator, owner, or administrator of a computer network service or website.

This policy is generally an integral part of the framework of information security policies; it is often common practice to ask new users or members of an organization to sign an acceptable use policy before they are given access to its information systems. Therefore it must be concise and clear and at the same time should cover the most important points about what users or members are, and are not allowed to do with the IT systems of a company or organization.

To learn more about the acceptable use policy; click here:

https://brainly.com/question/2625500

#SPJ4

Which combination of options is the keyboard shortcut to access the find dialog box and search a worksheet for particular values? ctrl h ctrl r ctrl f ctrl e

Answers

A hot key is a key or group of keys on a computer keyboard that, when pressed simultaneously, carry out a task (such launching an application) more quickly than a mouse or other input device.

What is the uses of shortcut keys ?

The Find and Replace dialog box, which enables you to look for a specific value in your worksheet and replace it with another value, is opened by pressing the keyboard shortcut Ctrl + F. Additionally, formatting can be found and changed with this shortcut.The function keys and keyboard shortcuts in Word for Windows are discussed in this article.

The Find tab appears in place of the Replace tab when using the CTRL+H keyboard shortcut or the Replace button on the ribbon to open the Find and Replace dialog box.Pressing Ctrl + R will refresh (reload) the current web page in all popular Internet browsers, including Chrome, Edge, Firefox, and Opera.To choose the search box, use Ctrl + E.

To learn more about shortcut key refer to :

https://brainly.in/question/135577

#SPJ4

how many parameters go into the function sum, and how many return values come out of the function sum? def sum(first, second, third): result

Answers

3 parameters are input, and 1 return value is output.

How many return values may a function call have given the number of arguments?

The quantity of arguments in a function call must match the quantity of parameters in the definition of the function, with the exception of functions with variable-length argument lists. This amount may be zero. A single function may have a maximum of 253 arguments (including associated parameters).

Can a function have three inputs?

Although you can define as many parameters as you require, too many parameters will make it difficult to understand and manage your routine. Of course, placing all of those variables in a single struct and giving it to the procedure might work as a workaround using a structured variable.

To know more about parameters visit :-

https://brainly.com/question/14263758

#SPJ4

Other Questions
FILL IN THE BLANK. In times of economic downturn, the fed will engage in ____ monetary policy by ____ bonds. a. contractionary; buying b. contractionary; selling c. expansionary; selling d. expansionary; buying FILL IN THE BLANK. for a population that is not normally distributed, the distribution of the sample means will as the size of the sample increases. A therapist who uses different techniques and theories based on the need of the client and the diagnosis could be referred to as an ___ therapistA) eclecticB) cognitive behavioralC) GestaltD) humanistic what is the original issue price of the bonds? on january 1, 2021, splash city issues $470,000 of 9% bonds, due in 20 years, with interest payab sort the following enzyme according to whether they are used in glycolysis, gluconeogenesis or both. glucose-6- phosphatase, triosephosphate isomerase,hexokinase, pyruvate carboxylase, pyruvate kinase Please Help!You are at a fundraising carnival. You want to play one game and you've narrowed it down to two options, as follows:OPTION 1: Choose a face card (K, Q, J) from a deck of cards. Then, spin an odd number on an 11-part spinner. $5 per play. Grand prize is $150.OPTION 2: Roll two dice with a product greater than 4 and less than 12. Then, choose a numbered card from a deck of cards. $15 per play. Grand prize is $200. Which option will you choose and why? Show your work and explain your thinking. Find a power series representation for the function.f(x) = x8 tan1(x3)f(x) =[infinity] leftparen1.gifrightparen1.gifsum.gifn = 0 (co5) which politician is particularly well known for his steady commitment to environmental issues and for making the film an inconvenient truth? Calculate and then write the reciprocal of your answer.2/43 of the difference of 3 2/15 and 2 5/12 write a nuclear equation to describe the neutron induced fission of pu to form kr and ce. determine how many neutrons are produced in the reaction. The slave trade became a highly regulated business, as each slaving nation sought to license and control its own part. The trade received formal state backing from monarchs and from legislatures, ... In addition, the trade was made possible by the development of modern financial systems. Global trade on such a vast geographic scale involved enormous time lags. Slave ships were away from their home ports for 12 - 18 months at a time, and sugar and tobacco were sold in Europe months after being harvested by slaves. As a result, ship owners and planters were always in need of credit.Which sentence best summarizes the main idea of the source above?A. The transatlantic slave trade was strictly controlled and regulated by ship captains.B. The transatlantic slave trade was regulated and supported by governments.C. The transatlantic slave trade received no financial backing by modern financial systems.D. The transatlantic slave trade took place only in European markets.PLEASE HELP WILL VOTE BRAINLIEST IF CORRECT! A Brazilian bond with a coupon rate of 15% at is initially priced at its face value of R$1,000. At the end of the year, the bond is selling at R$950. During the year, the exchange rate goes from R$1= U.S.$0.75 to R$1= U.S.$0.85. What is the bond's total dollar return during the period? 10% 31.25% 15% 0.53 / 0.53 pts 22.67% which of the following statements about altruism are accurate and which are not? accurate statement(s) altruism can be defined as unselfish behavior that benefits others without regard to consequences for oneself. press space to open basic tendencies toward self-preservation can restrain altruistic action. press space to open only selfless motives are involved in the behavior of altruism. press space to open altruism appears to be a strictly psychological construal and has no neurological underpinnings. press space to open fear of embarrassment can inhibit altruistic action. 400 mg is equal to how many grams When it comes to the use of force, research suggests that college-educated officers are generally: C2H2 + O2 CO2 + H2O what is being reduced and what is being oxidized? during a knee extension exercise there are two forces that are producing torque at the knee joint. one is the quadriceps muscle and the other is the weight at the ankle joint. the quad is capable of producing 500 newtons of force, while the weight at the ankle is 10 kg. the distance from the knee joint to the quad force is 0.05 meters and the distance from the knee joint to the weight is 0.38 meters (these are not the moment arms). the knee is flexed to 125 degrees. draw and calculate the moment arms for each force on the picture below and decide if the joint flexes or extends. the accelerating expansion of the universe is thought to be driven by kinetic energy. dark energy. gravitational potential energy. electric potential energy. thermal energy. Atoms of element B from HCP lattice and those of the element A occupy 2/3 rd of tetrahedral voids. What is the formula of the compound formed by the elements A and B? Write from a pov of a french person about the french vs indian war.I need to write atleast 5 sentances pleasee and thank u!