Write a client program ClientSorting2 and in the main() method: 1. Write a modified version of the selection sort algorithm (SelectionSorter()) that sorts an array of 23 strings (alphabetically) rather than one of integer values. Print the array before it is sorted in the main() method, then after it is sorted in SelectionSorter().

Answers

Answer 1

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

 public static void SelectionSorter(String[] my_array){

     System.out.print("\nAfter sort: ");

     for (int ind=0; ind < 22; ind++ ){

         int min = ind;

         for (int k=ind+1; k < 23; k++ )

         if (my_array[k].compareTo(my_array[min] ) < 0 ){ min = k;  }

         String temp = my_array[ind];

         my_array[ind] = my_array[min];

         my_array[min] = temp;    }

   for (int j=0; j < 23; j++){   System.out.print(my_array[j]+" ");}

    }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 String [] myarray = new String [23];

 for(int i= 0;i<23;i++){ myarray[i] = input.nextLine();  }

 System.out.print("Before sort: ");

 for ( int j=0; j < 23; j++ ){        System.out.print(myarray[j]+" ");    }

 SelectionSorter(myarray);

}

}

Explanation:

This defines the function

 public static void SelectionSorter(String[] my_array){

This prints the header for After sort

     System.out.print("\nAfter sort: ");

This iterates through the array

     for (int ind=0; ind < 22; ind++ ){

This initializes the minimum index to the current index

         int min = ind;

This iterates from current index to the last index of the array

         for (int k=ind+1; k < 23; k++ )

This compares the current array element with another

         if (my_array[k].compareTo(my_array[min] ) < 0 ){ min = k;  }

If the next array element is smaller than the current, the elements are swapped

         String temp = my_array[ind];

         my_array[ind] = my_array[min];

         my_array[min] = temp;    }

This iterates through the sorted array and print each array element

   for (int j=0; j < 23; j++){   System.out.print(my_array[j]+" ");}

    }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This declares the array

 String [] myarray = new String [23];

This gets input for the array elements

 for(int i= 0;i<23;i++){ myarray[i] = input.nextLine();  }

This prints the header Before sort

 System.out.print("Before sort: ");

This iterates through the array elements and print them unsorted

 for ( int j=0; j < 23; j++ ){        System.out.print(myarray[j]+" ");    }

This calls the function to sort the array

 SelectionSorter(myarray);

}

}


Related Questions

Christopher was looking at the TV while getting feedback on his opinion essay. What should he do differently? Don't get feedback from a trusted adult. Finish watching his TV show. Make sure the trusted adult likes the show on TV, too. Turn off the TV and face the person who is speaking.

Answers

Answer:

Turn off the TV and face the person who is speaking.

Which of the following does cloud computing allow users to do? Check all of the boxes that apply.

access data from anywhere with an Internet connection

store pictures and music

store data

have a unique address for their computer

Answers

Answer:

a b c

Explanation:

there just right

Answer: a b c d

Explanation edge 2023

“What is an example of the vocabulary word foreshadow?” This question could be a
a.
Potential question
c.
Flashcards question
b.
Vocabulary definition
d.
Both A and C


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

D) Both A and C

Explanation:

Answer:

D

Explanation:

You are helping a friend in college with his network connection. He would like a high speed connection between his computers so he can play Super Blast with others. In this lab, your task is to complete the following: Choose an appropriate router that will provide security and the fastest local connection. Connect the router to both computers and to the dorm internet connection. Request new TCP/IP information from the router on both computers. Configure Windows Firewall on both computers. Turn on Windows Firewall for both the Private and the Public network profiles. Add an exception for the SuperBlast program only for the Private network profile.

Answers

Solution :

Set up the router as follows:

On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet [tex]$100/1000TX$[/tex] router with the firewall to the Workspace.

Connection of the router as follows:

Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a [tex]$LAN$[/tex] port on the router. Above the Dorm-[tex]$PC2$[/tex] computer, select [tex]$\text{back}$[/tex] to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag the connector to the [tex]$LAN$[/tex] port on the computer. In the Selected Component window, drag the other connector to a [tex]$LAN$[/tex] port on the router. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag a connector to the [tex]$WAN$[/tex] port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.

Provide power to the router as follows:

On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.

Request new [tex]$TCP/IP$[/tex] information from the router for Dorm-PC as follows:

On the [tex]$\text{Dorm-PC}$[/tex] monitor, select Click to view [tex]$\text{Windows 10}$[/tex].In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter [tex]$\text{ipconfig}$[/tex] /renew and press [tex]$\text{Enter}$[/tex] to request new [tex]$TCP/IP$[/tex] information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.

Configure Windows Firewall on [tex]$\text{Dorm-PC}$[/tex] as follows:

In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.

what does ICT stand for?​

Answers

Information Communication Technology

ICT stands for 'Information Communication Technology'. Everyday usage of digital technology includes when you use a computer, tablet or mobile phone, send email, browse the internet, make a video call - these are all examples of using basic ICT skills and technology to communicate.

Information Communication Technology

Explain why microcomputers are installed with TCP/IP protocols?​

Answers

Answer:

microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet

If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total number of free electrons that pass through at a point at the power supply terminals​

Answers

Answer:

Q=It

and

p=IV

Given, v=9V P= 7W

I=P/V

I =7/9

Also, time(t) from 9am to 12pm is 3hrs

Converting into sec =3×3600

t=10800

Q= 7/9 ×10800

Q =8400C

Project Description:
In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Department.
Instructions:
For the purpose of grading the project you are required to perform the following tasks:
Step Instructions Points Possible
1. Start Excel. Download and open the file named go16_xl_ch03_grader_3g_hw.xlsx. 0.000
2. In the Expenses worksheet, calculate row totals for each Expense item in the range F5:F9. Calculate column totals for each quarter and for the Annual Total in the range B10:F10. 8.000
3. In cell G5, construct a formula to calculate the Percent of Total by dividing the Annual Total for Salaries and Benefits by the Annual Total for Totals by Quarter. Use absolute cell references as necessary, format the result in Percent Style, and then Center. Fill the formula down through cell G9. 12.000
4. Use a 3-D Pie chart to chart the Annual Total for each item. Move the chart to a new sheet and then name the sheet Annual Expenses Chart. 8.000
5. For the Chart Title, type Summary of Annual Expenses and format the chart title using WordArt Style Fill - Blue, Accent 1, Shadow. Change the Chart Title font size to 28. 6.000
6. Remove the Legend from the chart and then add Data Labels formatted so that only the Category Name and Percentage display positioned in the Center. Change the Data Labels font size to 12, and apply Bold and Italic. 8.000
7. Format the Data Series using a 3-D Format effect. Change the Top bevel and Bottom bevel to Circle. Set the Top bevel Width and Height to 50 pt and then set the Bottom bevel Width and Height to 256 pt. Change the Material to the Standard Effect Metal.
Note, the bevel name may be Round, depending on the version of Office used. 4.000
8. Display the Series Options, and then set the Angle of first slice to 125 so that the Salaries and Benefits slice is in the front of the pie. Select the Salaries and Benefits slice, and then explode the slice 10%. Change the Fill Color of the Salaries and Benefits slice to a Solid fill using Green, Accent 6, Lighter 40%. 4.000
9. Format the Chart Area by applying a Gradient fill using the Preset gradients Light Gradient – Accent 4 (fourth column, first row). Format the Border of the Chart Area by adding a Solid line border using Gold, Accent 4 and a 5 pt Width. 6.000
10. Display the Page Setup dialog box, and then for this chart sheet, insert a custom footer in the left section with the file name. 4.000

Answers

Answer:

pelo o que diz na database é que você n é ser humano normal por perguntar isso!!

reasons why users attach speakers to their computer

Answers

Answer:

To listen to sounds or voices because maybe the computer doesn't have its own speakers

explain the different type of shift register counter ​

Answers

Answer:

Shift registers are also used as counters. There are two types of counters based on the type of output from right most D flip-flop is connected to the serial input. Those are Ring counter and Johnson Ring counter.

There are two types of shift register counters. They are given below:

Ring counter.Johnson ring counter.

What do you mean by Shift register counter?

The shift register counter may be defined as a sequence of a specific number of core registers that are significantly interconnected to one another in order to provide a clock-driven data shift.

A shift register is a set of f FFs that can be connected within the series and the stored data can be moved in the registers sequentially as per the command or instruction is given.

They are also utilized as counters. The type of shift register counter is based on the output from the D flip-flop which is connected to the serial input from the rightmost side.

Therefore, the two types of shift register counters are well mentioned above.

To learn more about Shift register, refer to the link:

https://brainly.com/question/14096550

#SPJ6

c program that calculates the summation of integers from one to N. Allow the user to input an integer, then pass that number to a function that will calculate the sum of all integers up to N. For example, if the user inputs the number 5, then the function will return the sum 1 2 3 4 5. Allow the user to enter multiple integers, calling the function for each number. Use a sentinel value or similar method to terminate user input.

Answers

Answer:

Answered below.

Explanation:

#include <studio.h>

#include<conio.h>

void main(){

int I = 0;

int sumOfNumbers = 0;

int number;

printf("Input an integer: ");

("%d", &sumOfNumbers);

//Loop over while adding numbers

while(I <= number){

sumOfNumbers = sumOfNumbers + I;

I++;

}

printf("\n Sum of N numbers is: %d", sumOfNumbers);

getch();

}

what is a computer and what is the work of it​

Answers

Answer:

A computer is an electronic machine that processes information. It is an information processor. It takes data, stores it, and then gives the result or answer.

It is a machine composed of hardare and software componests to be manually ised or atonomosly used.

Hope this helps!

Answer:

A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.

Create a function that returns a dictionary containing the number of upper and lower case characters in a string (e.g. {'lower': 8, 'upper': 2}). Ignore whitespace characters. Your function should be able to handle an empty string, though.

Answers

Answer:

Explanation:

The following is written in Python and takes in the input string, then loops through it counting all of the upper and lower case letters and adds it to the dictionary.

string = input("input string: ")

upper_case = 0

lower_case = 0

for char in string:

   if char.isupper() == True:

       upper_case += 1

   elif char == ' ':

       pass

   else:

       lower_case += 1

letter_dict = {'upper_case': upper_case, 'lower_case': lower_case}

what is digital literacy? describe three examples of digital literacy skills

Answers

Digital literacy means having the skills you need to live, learn, and work in a society where communication and access to information is increasingly through digital technologies like internet platforms, social media, and mobile device

Examples of Digital Literacy skills:

What is digital literacy?

ICT proficiency.

Information literacy.

Digital scholarship.

Communications and collaborations.

Digital learning.

Digital identity.

You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable - age.

Answers

Answer:

666

Explanation:

You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable

In the reverse outlining technique, which of the following techniques is involved in assessing the structure of the new outline? Select one.

Question 3 options:

Discovering content that should be deleted, added, or rearranged


Identifying confusing sentences that mischaracterize the content


Incorporating various forms of advanced organizers, such as headings or bulleted lists


Identifying citations or paraphrases that are improperly formatted

Answers

In the reverse outlining technique, the technique involved in assessing the structure of the new outline is incorporating various forms of advanced organizers, such as headings or bulleted lists

The correct answer to the given question is option C.

Reverse outlining is a revision strategy that helps writers evaluate the organization and coherence of their written work. It involves creating an outline based on an existing draft and then analyzing the outline to assess the structure and flow of the content.

By examining the outline, writers can identify sections or points that may need to be deleted if they are irrelevant or repetitive. They can also determine areas where additional content should be added to provide clarity or support their arguments. Additionally, the outline allows writers to assess the order and sequence of their ideas and make necessary rearrangements to improve the overall structure of the piece.

While identifying confusing sentences that mischaracterize the content, incorporating advanced organizers, or identifying improperly formatted citations or paraphrases are important aspects of the writing and revising process, they are not specifically involved in assessing the structure of the new outline in the reverse outlining technique. The focus of reverse outlining is primarily on evaluating the organization and coherence of the content.

For more such questions on technique, click on:

https://brainly.com/question/12601776

#SPJ8

What are the two functions in C that allow a programmer to randomly move the file cursor within a file stream, thus enabling random access. Please write down the names of the two functions and separate them by a comma only. As an example, assume the two functions are abc, and abe, you will write down your answer as abc,abe

Answers

Answer:

seekp(),tellp()

Explanation:

The two functions in c ++ that allow a programmer to randomly move the file cursor within a file stream are : seekp(),tellp()

The functions place cursor in file stream and also access the values

Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a pair containing the minimum and maximum value. Require that the array elements implement the Measurable interface of Section 10.1.2.

Answers

Answer:

Explanation:

The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.

 public static T minmax(ArrayList<T> mylist) {

       T min = new T();

       T max = new T();

       for (int x = 0; x < mylist.size(); x++) {

           if (mylist.get(x) > max) {

               max = mylist.get(x);

           } else if (mylist.get(x) < min) {

               min = mylist.get(x);

           }

       }

       

       return (min, max);

   }

In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link

Answers

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

(3) reasons why users attach speakers to their computer

Answers

Explanation

1.we connected speakers with computers for listening voices or sound . because the computer has not their own speaker.

2.Speakers are popular output devices used with computer systems.

3.Speakers are one of the most common output devices used with computer systems

arrange the following numbers from the highest to the lowest. ⅔,-7,0. no file or photo​

Answers

Answer:

2/3, 0, -7

Explanation:

Implement a class Clock whose getHours and getMinutes methods return the current time at your location. (Call java.time.LocalTime.now().toString() and extract the time from that string.) Also provide a getTime method that returns a string with the hours and minutes by calling the getHours and getMinutes methods. Provide a subclass WorldClock whose constructor accepts a time offset. For example, if you live in California, a new WorldClock(3) should show the time in New York, three time zones ahead. Which methods did you override

Answers

Answer:

Explanation:

The following code was written in Java. It uses the LocalTime import to detect the current time. Then it creates a getHours, getMinutes, and getTime method to correctly print out only the hours and minutes in a simple format. Then it does the same for the WorldClock subclass which takes in the time offset as an int parameter and adds that to the hours in your own timezone.

class Clock {

   public String getHours() {

       String hours = java.time.LocalTime.now().toString().substring(0,2);

       return hours;

   }

   public String getMinutes() {

       String min = java.time.LocalTime.now().toString().substring(3,5);

       return min;

   }

   public String getTime() {

       String time = getHours() + ":" + getMinutes();

       return time;

   }

}

class WorldClock extends Clock {

   int timeZone = 0;

   public WorldClock(int timeZone) {

       super();

       this.timeZone = timeZone;

   }

   public String getHours() {

       String hours = String.valueOf(Integer.parseInt(super.getHours()) + 3);

       return hours;

   }

   public String getTime() {

       String time = getHours() + ":" + super.getMinutes();

       return time;

   }

}

class Test {

   public static void main(final String[] args) {

       Clock myClock = new Clock();

       System.out.println("My Time: " + myClock.getTime());

       WorldClock worldClock = new WorldClock(3);

       System.out.println("My Time + 3: " + worldClock.getTime());

   }

}

If D3=30 and D4=20, what is the result of the function
=IF(D4 D3, D3-D4, "FULL")?
0-10
O Unknown
O 10
O Full

Answers

Answer:

c. 10

Explanation:

Given

[tex]D3 = 30[/tex]

[tex]D4 = 20[/tex]

Required

The result of: [tex]=IF(D4 < D3,D3-D4,"FULL")[/tex]

First, the condition D4 < D3 is tested.

[tex]D4 < D3 = 20 < 30[/tex]

Since 20 < 30, then:

[tex]D4 < D3 = True[/tex]

The condition is true, so:

D3 - D4 will be executed.

[tex]D3 - D4 = 30 - 20[/tex]

[tex]D3 - D4 = 10[/tex]

Hence, the result of the function is 10

What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How might some of these strategies be useful to a computer programmer working on a CPU scheduler?

Answers

Answer:

Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."

Explanation:

The strategies that you use for confronting a complex problem are:

First, define the issue.Use your inner eyes to visualize the issue. Break the problem into little pieces

Why are problem-solving strategies vital?

Solving problems involves the act of making the right choices. It is known to be a good and  effective way of problem-solving as one can get a good result from it.

Conclusively, by using the strategies give above, a computer programmer working on a CPU scheduler can be able to find out the issues that needs to be handled, where the problem is coming from and then solve it.

Learn more about CPU from

https://brainly.com/question/474553

A _______ is one typed character.
-gigabyte
-byte
-megabyte
-kilobyte
-terabyte

Answers

A bite byte bight beight

In a multimedia presentation, when might voice-over be a better choice than placing the text on the screen?
when you have very little to say
when your audience is bored
when you have a lot to say
when you don’t want to write

Answers

Um, it is quite the battle between C and D, but knowing school they probably think D is lazy, so my final answer is C. Sorry if I'm wrong <3

In a multimedia presentation, the option that might be the voice-over  when you have a lot to say.

What is multimedia presentation?

A multimedia presentation is known to be a presentation where a person is said to often stand by themselves to present information via slides, video, etc.

In a multimedia presentation, the option that might be in the case of voice-over is when you have a lot to say as it is better to put it in a video format.

Learn more about multimedia from

https://brainly.com/question/24138353

#SPJ2

NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number

Answers

Answer:

The answer is D

Explanation:

     

Create another method: getFactorial(int num) that calculates a Product of same numbers, that Sum does for summing them up. (1,2,3 ... num) Make sure you use FOR loop in it, and make sure that you pass a number such as 4, or 5, or 6, or 7 that you get from a Scanner, and then send it as a parameter while calling getFactorial(...) method from main().

Answers

Answer:

The program in Java is as follows;

import java.util.*;

public class Main{

public static int getFactorial(int num){

    int fact = 1;

    for(int i =1;i<=num;i++){

        fact*=i;

    }

    return fact;

}

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 System.out.print("Number: ");

 int num = input.nextInt();  

 System.out.println(num+"! = "+getFactorial(num)); }}

Explanation:

The method begins here

public static int getFactorial(int num){

This initializes the factorial to 1

    int fact = 1;

This iterates through each digit of the number

    for(int i =1;i<=num;i++){

Each of the digits are then multiplied together

        fact*=i;     }

This returns the calculated factorial

    return fact; }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This prompts the user for number

 System.out.print("Number: ");

This gets input from the user

 int num = input.nextInt();  

This passes the number to the function and also print the factorial

 System.out.println(num+"! = "+getFactorial(num)); }}

what is subnetting. what does subnetting mean

Answers

Answer:

Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.

Explanation:

Write a program that replaces words in a sentence. The input begins with word replacement pairs (original and replacement). The next line of input is the sentence where any word on the original list is replaced. Ex: If the input is: automobile car manufacturer maker children kids The automobile manufacturer recommends car seats for children if the automobile doesn't already have one.

Answers

Answer:

In Python:

toreplace = input("Word and replacement: ")

sentence = input("Sentence: ")

wordsplit = toreplace.split(" ")

for i in range(0,len(wordsplit),2):

   sentence = sentence.replace(wordsplit[i], wordsplit[i+1])

print(sentence)

Explanation:

This gets each word and replacement from the user

toreplace = input("Word and replacement: ")

This gets the sentence from the user

sentence = input("Sentence: ")

This splits the word and replacement using split()

wordsplit = toreplace.split(" ")

This iterates through the split words

for i in range(0,len(wordsplit),2):

Each word is then replaced by its replacement in the sentence

   sentence = sentence.replace(wordsplit[i], wordsplit[i+1])

This prints the new sentence

print(sentence)

Other Questions
Suppose we are given the following yield curve (all rates expressed in annual compounding) Term 1 year Rate() 3.6 3.8 3.6 3 year Suppose a 11.5% 3-year bond is trading at 116.69 (assume antial coupons). Find the spread. Answer in basis points expressed to the nearest basis point) Find the 3 year per yield, assuming the zero-coupon year curve is as follows: All rates are expressed in annual compounding in this question) (2) Maturity your year year Fate . 11.1% 12.4% Which of the following individuals is true-breeding for all traits? A. RrYY B. RRYy C. RRYY D. RrYy ellus Corporation. All Rights Reserved. The was part of Stalins secret police force. Tonsils are lymphatic organs located in the... A. armpits.B. bones.C. throat.D. ribs. A protein kinase is an enzyme that functions in which of the following ways?a. by activating a Gprotein b.by serving asa receptor for various signal molecules c.by adding a phosphate group to activate or inactivate other proteinsd.by serving asa second messenger molecule bioflix activity: mechanisms of evolution -- which mechanism? In paragraph 4, Jackson compares the removal of Native Americans to the expansion of white settlement in America (and possibly to European immigration to the New World). What logical fallacyor false reasoninglies in this comparison? A password is required to log into a system that only recognizes numbers and letters of the alphabet (not case sensitive). You want to create a password using 5 numbers or letters, but cannot reuse any of them. How many different passwords are possible? You are assigned to a clinical rotation in an outpatient...You are assigned to a clinical rotation in an outpatient chemotherapy center. You are working with a nurse who will administer chemotherapy to a group of patients that day. One of your assigned patients is a 25-year-old man who has been diagnosed with leukemia. He has the following questions:1. "Why do they keep changing my medication? It seems like every time I come back to the doctor after a round of chemo has ended, they change what they give me." How would you best respond?2. "What are the side effects of chemotherapy?" How would you respond? A lie detector is known to be 4/5 reliable when the person is guilty and 9/10 reliable when the person is innocent. If a suspect is chosen from a group of suspects of which only 1/100 have ever committed a crime, and the test indicates that the person is guilty, what is the probability that he is guilty? acronym questions will brainlist if correct (no scams or i will report)Angel ____ un amigo muy bueno. ___muy atltico y ____ inteligente. Adems ____ sincero y simptico. Casi siempre _____ de buen humor. Pero hoy no. Al contrario, _____ de mal humor. ____ muy cansado y tiene dolor de cabeza. ____enfermo. Tiene la gripe. ____ en casa. ____en cama.La casa de Angel ___ en la calle 60. La calle 60 ___ en West New York. West New York no ____ en Nueva York. ____ en Nueva Jersey. Pero la familia de Angel no ____ de West New York. Sus padres ____ de Cuba y sus abuelos ___ de Espaa. Ellos ___ de Galicia, una regin en el noroeste de Espaa. Galicia ___ en la costa del Atlntico y del mar Cantbrico. Angel tiene una familia internacional.Pero ahora todos ____ en West New York y____ contentos. Muchas familias en West New York____ de ascendencia cubana. El apartamento de la familia de Angel ____ muy bonito. ____ en el tercer piso y tiene una vista magnfica de la ciudad de Nueva York.Word bank:es, esta, estan, son A Jellyfish is an example of which of the following?a.vertebratec.annelidb.invertebrated.none of the abovePlease select the best answer from the choices providedABCD Kai's mom gave him $25 to spend at the book fair. Kai wants to buy as many books as he can. Thecost of each book is $3. He also wants to buy one poster for $2. Write an inequality to show howmany books he can buy. Highlight your inequality in green. Then,solve the inequality A dramatic change in the ________ was the introduction of thestakeholder model as a construct for business ethics decisions.Multiple Choice1960s1980s2000s1950s Managerial accountingTime left 0:26:15 9 d Tex's Manufacturing Company can make 100 units of a necessary component part with the following costs. Direct Materials f $120,000 Direct Labor 29,000 Variable Overhead 54,000 Fi If Country A is an agricultural country and Country B has many cities and factories, it would make sense forO both countries to set up car manufacturing plants.Country A to specialize in growing corn while Country B specializes in making cars. WCountry A to specialize in making cars while Country B specializes in growing corn.both countries to compete in growing more corn. Question 3 1 points Ehsan contributed a building at $22.500 and a land valued at $60,000. The journal entry to record this transaction for the partnership is OA Ehsan, Capital 89,100 Building 22,500 L Please hurryyyyy !!!! What's the slope and y intercept of 4y = 2x - 12 An estate distributes an asset to its sole Income beneficiary. The distribution was not a specific bequest. The basis of the asset to the estate is $1,000, and the assel's fair market value is $5,000. Distributable net income of the estate is $9,500. No other distributions are made, nor was an election made by the fiduciary with respect to this distribution. 10. The basis of the asset to the beneficiary after the distribution is: a. $1,000. b. $4,000. c. $5,000. d. $9,500. A historical example of is when communities used cocoa beans or cowrie shells as a kind of money. O commodity money O M3 O fiat money