Write code using the range function to add up the series 7, 14, 21, 28, 35,. 70 and print the resulting sum.

Answers

Answer 1

#declare variable to hold sum

sum=0

#loop from 7 to 70 by incrementing 7 each time using range function

for i in range(7,71,7):

sum+=i

#peint sum

print(sum)

In Python, how do you determine a list's range?

The list of even numbers in the input range will be returned by the range() function. The values will be increased by 2 and will produce even numbers until stop-2 because the range() function's parameters are start = 2, stop = 20, and step = 2.

What formula is employed for range?

Briefly stated, we have the following formula: Values at the extremes make up the range. The data set 4, 6, 10, 15, 18, for instance, has a range of 18-4 = 14, a maximum of 18, a minimum of 4, and a minimum of 4.

To know more about variable visit :-

https://brainly.com/question/17344045

#SPJ4


Related Questions

candice is discussing internet fraud with a colleague. she is trying to explain the most common types of fraud. what is the term for the most common type of internet investment fraud?

Answers

The most common type of internet investment fraud, The Nigerian fraud.

When making investing selections, many investors consult the internet and social media. Even though using these internet resources might assist investors greatly, they can also be a prime target for crooks. Criminals are nimble in their adoption of new technologies, and the Internet is no exception.

Without investing a lot of time or money, the Internet is a helpful tool for reaching a large audience. A social media platform, website, or online message can efficiently reach a big number of people. It can often be difficult for investors to determine the difference between fact and fiction because it is simple for scammers to make their messages seem authentic and convincing. Research the "opportunity" before supplying your phone number and email information if an investment campaign piques your interest internet investment fraud.

Learn more about internet investment fraud here:

https://brainly.com/question/14298414

#SPJ4

after roasting a rack lamb, it registers an internal temperature of 140 degrees. after letting it rest for several minutes it registers an internal temperature of 145 degrees. this is an example of

Answers

A rack of lamb that has been roasted reaches an internal temperature of 140 degrees. Its interior temperature is 145 degrees after being left to rest for a while. This is a prime instance of carryover cooking.

Is the CPU on your computer running too hot? Overheating may be the cause if your computer starts to shut down on its own, lock up, or run slowly when performing demanding tasks, especially during the sweltering summer heat. While you overclock your PC's processor, it's important to monitor CPU temperature as well; after all, you don't want to unintentionally push the performance pedal too far when you're boosting your expensive Intel Core i9-12900KS or AMD Ryzen 5800X3D. It's never fun to melt one of the top CPUs available. Additionally, keeping your chip cool will require more attention than ever because next-generation Ryzen 7000 processors are pushing the boundaries of power efficiency.

Learn more about temperature here:

https://brainly.com/question/14542626

#SPJ4

what technique should be used to remove items from an isolation unit? double-bagging technique double-bagging technique double-knotting technique double-knotting technique double-sealing technique

Answers

Double-bagging technique should be used to remove items from an isolation unit.

In many hospitals, dirty linens and waste items from isolation patient rooms or clinical laboratories are routinely double-bagged to decrease the risk of hospital staff handling them later becoming contaminated on the bag's exterior. No research have looked at the potential benefits, if any, of double-bagging. 42 patients were placed in contact isolation, and we randomly chose whether to carry the waste and linens from their rooms in single or double bags. The surface was quantitatively cultivated in two areas close to the knot shortly after a single (or double) bag had been placed outside the patient's room; over the course of two months, 209 bags were cultured. Staphylococcus aureus (3%–5%), enteric gram-negative bacilli (6%–7%), or both could cause surface contamination.

Know more about areas here:

https://brainly.com/question/1167985

#SPJ4

TRUE/FALSE. a raid 3 array uses distributed data and distributed parity in a manner similar to a raid 5 array.

Answers

False. A RAID 3 array does not use distributed data or distributed parity like a RAID 5 array. Instead, data is striped across multiple disks and the parity information is stored on a dedicated disk.

Differences Between RAID 3 and RAID 5 Arrays

RAID 3 is a type of RAID (Redundant Array of Independent Disks) designed to improve the performance of a single disk system by striping the data across multiple disks.

Data is stored in blocks that are broken up into stripes and written across multiple disks. To provide redundancy in case of disk failure, a dedicated parity disk is used to store parity information. This parity disk is used to recreate the data on the failed disk.

RAID 3 does not use distributed data or distributed parity like a RAID 5 array. Instead, the data is striped across multiple disks and the parity information is stored on a dedicated disk. RAID 3 is a good choice for applications that require high performance and data security, such as streaming media.

Learn more about Database: https://brainly.com/question/518894

#SPJ4

Once a computer. is installed, the attacker can gain full access to the a. worm b. botnet c. zombie d. rootkit

Answers

Once a computer is installed, the attacker can gain full access to the (Option D.) rootkit.

A rootkit is a type of malicious software designed to gain root access to a computer and allow an attacker to control the system remotely. It can be used to gain full access to the computer, including data and applications.

Dangers of Rootkits: Gaining Full Access to a Computer

Once a computer is infected with a rootkit, the attacker has full access to the system. They can use the rootkit to gain access to the administrator account, allowing them to control and monitor the system remotely. With this access, the attacker can view and modify data and applications on the computer, delete files, and even use the computer to launch attacks on other systems. Rootkits are very difficult to detect and remove, so it is important to practice good cybersecurity to protect against them.

Learn more about software: https://brainly.com/question/25480553

#SPJ4

which hardware device is found at the data-link layer of the osi, and is responsible for passing data between ports?

Answers

A network bridge hardware device is found at the data-link layer of the osi, and is responsible for passing data between ports.

A network bridge is a computer networking tool that unifies various communication networks or network segments into a single, aggregate network. Network bridging is the term for this activity. Bridging and routing are different. Bridging joins two separate networks as if they were a single network, whereas routing allows several networks to communicate independently while remaining separate. Bridging is carried out in the data link layer of the OSI model (layer 2). The system is referred to as a wireless bridge if one or more of the bridged network's parts are wireless.

The three basic categories of network bridging technologies are learning or transparent bridging, multiport bridging, and simple bridging.

Know more about network bridge here:

https://brainly.com/question/10920464

#SPJ4

in an interview, you are asked to differentiate between data protection and data privacy. how should you differentiate between data protection and data privacy?
a. data protection involves unauthorized data acces, while data privacy secures data against authorized acces
b. data protection data against unauthorized acces, while data privacy scures data against authorized acces
c. data protection secures data against authorized acces, while data privacy involves unauthorized data acces
d. data protection involves securing data against unauthorized acces, while data privacy is concerned with authorized data acces

Answers

Answer: b. data protection data against unauthorized acces, while data privacy scures data against authorized acces

Explanation:

Data protection is the practice of safeguarding important information from unauthorized access, use, disclosure, disruption, or destruction. It typically involves implementing a number of technical and organizational measures to protect data from unauthorized access or attack. These measures can include things like encryption, access controls, and firewalls.

Data privacy, on the other hand, is concerned with the handling and management of personal data in a way that respects an individual's right to privacy. It involves ensuring that personal data is collected and processed fairly, transparently, and in accordance with the law. Data privacy is important because it helps to protect individuals' personal information and prevent it from being used without their consent or knowledge.

Option d is the correct answer because it accurately describes the relationship between data protection and data privacy. Data protection involves securing data against unauthorized access, while data privacy is concerned with authorized data access and the handling of personal data in a way that respects an individual's right to privacy.

after a judgment is entered in favor of the plaintiff, what may the plaintiff seek if the defendant refuses to pay?

Answers

If the defendant doesn't pay after the plaintiff wins a judgement, the plaintiff may file a writ of reimbursement.

When an employee's paycheck is garnished, the employer often gets a writ of garnishment, which the business or agency needs in order to deduct the amount from each paycheck. Generally, based on the specifics of the instrument, the employer must accept and give the company the required amounts.

Garnishments are issued by collection agencies or other organisations that need a court order to legally seize a person's assets. Typically, this has an impact on the debtor's wages or commissions from the business. However, the creditor may also be able to purchase other assets like a second house, a car, or real estate investments. The employer will get a Writ of Garnishment from the collections agent requiring them to make the required transfer of monies.

Learn more about Writ here:

https://brainly.com/question/15488649

#SPJ

isten
Dria is sending files to be printed on a printing press from a program like Adobe InDesign. Which files should Dria
include to ensure proper printing of all items?

Select all that apply.

- native InDesign file
- IDML file
- low resolution, watermarked -images
- placeholder text
- Linked images

Answers

Printing of the highest caliber is crucial for branding, marketing, and other company endeavors. In actuality, they are crucial to a company's success. A company's branding is their opportunity to make the best first impression; high-quality printing will not be disregarded. Thus option A, D,E is correct.

What ensure proper printing of all items?

The most common unit of measurement for print quality is DPI, which is quite similar to how pixels are defined in terms of digital images and even screen resolution.

Therefore,  DPI is the same as a printer's capacity to duplicate the quantity of pixels or the resolution of the original picture.

Learn more about printing here:

https://brainly.com/question/29851169

#SPJ1

d013: after running a study, some material properties, loads and fixtures were modified. what needs to be done to reflect this change on the results?

Answers

To reflect this change on the results just Re-mesh the model and re-run the study.

What does the engineering term mesh mean?

Meshwork is the process of approximating the geometry of a digital model by creating polygons or polyhedra that connect in a network of lines and points using computer software. To split the model into cells for simulation analysis or to produce a digital model, meshing is frequently used.

Briefing:

The value of a material's various moduli changes with material modification, and modifications to fixtures also affect the loading stress at each point.

The model will display the updated fixtures and loads, but the analysis results won't change if we don't run it again. So, after changing a material, fixture, or load, the research must be run again.

To know more about fixtures visit:

https://brainly.com/question/28430942?referrer=searchResults

#SPJ1

what argument can be used with the chmod command to add read permission and remove write permission for a group on a file?

Answers

In order to grant read-only access and revoke write access for a group on a file, use the chmod command's g+r-w parameter.

What command would provide the group the ability to write while removing read access for others?

The chmod command can be used to modify file and directory permissions (change mode). By modifying the read, write, and execute permissions, the owner of a file can alter the permissions for a user (u), group (g), or other users (o).

chmod 644: What does it mean?

The owner of the file has read and write access, whereas group members and other users on the system only have read access. This is indicated by permissions of 644, which are read-only.

To know more about chmod visit :-

https://brainly.com/question/12222577

#SPJ4

an enterprise moves away from manual configuration methods, making changes by editing centralized configuration files. which answers list an issue solved by using a version control system with those centralized files? (choose two answers.)

Answers

Finding out which engineer made a change to the main configuration file on a specific day and time. the capacity to identify precisely what modifications were made to the configuration file over time.

How is manual configuration defined?

One proxy address for each transfer protocol and a list of domain names that the proxies shouldn't be utilized for define a manual configuration, in general.

In SCCM, what does client push installation mean?

Client installation launches immediately on machines that the site discovers when client push installation is configured for a site. When the site's specified boundaries are organized into a boundary group, this approach is only applicable to that boundary group.

To know more about control system  visit :-

https://brainly.com/question/30009188

#SPJ4

recursion is the only viable approach to determining if a string is a palindrome. group of answer choices true false

Answers

Since an empty has no length, there is no sequence. This is due to the definition of a palindrome, which is a word or phrase that reads the same both forward and backward.

Your logic is flawed if the function you define returns true for an empty string. Unless they constitute a word, single letters are also not palindromes. "A" and I are two examples of one-word palindromes. Since they do not constitute a word, at least not an English word, I do not believe that the letters e, o, or u, or any other letter in the alphabet, are palindromes. However, I could be mistaken. Of course, that would be pushing it for the majority of class tasks because you would actually have to compare your answers to a word dictionary.

Learn more about function here-

https://brainly.com/question/28939774

#SPJ4

refer to the exhibit. jack is on the external web server and would like to access the internal web server. what type of nat should router administrator configure? a. static nat b. dynamic nat c. dhcp nat d. dynamic pat e. static pat f. dhcp pat

Answers

NAT preserves IP addresses that are legitimately registered and stops their depletion. Security for network address translation. By concealing the device's IP address from the public network, even when sending and receiving traffic, NAT enables users to surf the internet more securely and privately.

Is NAT equivalent to a VPN?

Network address translation, or VPN NAT, is a function offered by VPN. IKE and IPSec are used before addresses are translated in VPN NAT, unlike classical NAT. Refer to this subject to find out more.

To know more about NAT visit;

https://brainly.com/question/28340750

#SPJ4

when presentation logic, application logic, and data access logic are on the client and not the server, we call this?

Answers

The client computer in a client-server network is in charge of the display logic.

What distinguishes a client from a server?

A server is an example of software or hardware that offers its clients a particular service. All network users use a variety of servers, including web servers, domain name servers, and mail servers. A user software that connects to a server to access a service is referred to as a client.

What functions do clients and servers perform?

Client-server refers to a relationship between programs that work together in an application, where clients request services and servers fulfill those requests.

To know more about server visit:-

https://brainly.com/question/14617109

#SPJ4

ow does the apa ethics code define a multiple relationship? when do multiple relationships occur? give two examples of situations encompassing multiple relationships.

Answers

1) acting in another capacity with that person, 2) dating someone who is either closely related to or associated with the person with whom the psychologist has the professional relationship.

A psychologist is a specialist in the field of psychology who studies behavior as well as mental states, perceptions, cognitive, emotional, and social processes. Their work frequently entails investigation, observation, and interpretation of how people interact with one another and their circumstances.

A psychology bachelor's degree is typically followed by a psychology master's degree or Ph.D. However, depending on the jurisdiction, some psychologists with additional training may be licensed to prescribe medications; qualification requirements may differ from a bachelor's degree and a master's degree. Unlike psychiatric physicians and psychiatric nurse practitioners, psychologists typically cannot prescribe medication.

Unlike psychiatrists, who frequently lack training in psychological testing, psychologists undergo significant training in psychological testing, scoring, interpretation, and reporting. Additionally educated in, psychologists frequently focus on.

Learn more about  psychologist here:

https://brainly.com/question/9528486

#SPJ4

what is the minimum number of connections that would need to be removed from the network in order for device a to not be able to communicate with device f?

Answers

In big environments, this is problematic and could lead to inconsistent routing. Network latency and connectivity fees are completely unknown to RIP.

How is network fault tolerance achieved?

Each hardware component is duplexed to achieve fault tolerance at the hardware level. A disk is mirror. The outputs of several processors are lockstepped together and checked for accuracy.

What transpires when a new gadget is online?

The device has a driver assigned to it. The gadget is given an IP address, or Internet Protocol address. The gadget receives a packet number. The device has a Web site assigned to it.

To know more about Network latency visit:-

https://brainly.com/question/27960115

#SPJ4

john is currently out for a business trip but requires access to his machine back in the office for a specific file. john uses a process that will allow him to access his machine through the internet. what is this method of connection called?

Answers

John connects to his computer using a Remote Desktop Connection so that he can access it online.

How do I connect my PC to the Internet?

Wires, cables, radio waves, and other forms of networking infrastructure are used to link computers to the Internet and one another. All information received via the Internet is converted into "bits," or pulses of light or electricity, which are then analyzed by the computer receiving the data.

Which technique of accessing the Internet utilizes telephone lines and is constantly available?

Asymmetric Digital Subscriber Line, or ADSL, is a technology that enables high-bandwidth, quick data transmission over already-existing copper wire telephone lines to homes and businesses.

To know more about Remote Desktop visit :-

https://brainly.com/question/28054491

#SPJ4

Designing a website for a new nonprofit organization is an example of _______

a competition
community service
a professional development organization
a conference

Answers

Designing a website for a new nonprofit organization is an example of a professional development organization.

How to design a Website?Design of Websites Learn about all the Wix website creation and design options. Templates for websites Explore 800+ professionally designed templates to find the best one for you. the latest in web development On Velo's open development platform, create web applications.Making your own website sounds fairly difficult, don't you think? becoming an expert with layout and positioning, as well as navigating all the necessary tools.In fact, constructing a website doesn't require any special intelligence, and that's exactly what we're going to assist you with in this simple instruction. Let's walk you through some creative freedom in web design:defining the goal and approach of your websitelooking into current web design trendsselecting a platformChoosing your

To learn more about design a Website  refer to:

https://brainly.com/question/14447396

#SPJ1

Answer:

B. Community Service

Explanation:

a small message that appears when the cursor is placed over a command button to identify its function is called:

Answers

When the cursor has been placed more than a command button to determine its purpose, a brief message called Tooltip.

What is cursor?
A cursor is a visual indicator used in computer systems to show the location where data is entered or retrieved. The cursor can be moved to different locations on the screen, allowing the user to enter or retrieve data from various locations. Cursors are usually used in combination with a pointing device, such as a mouse, trackball, or touchpad. The cursor is also used to indicate where characters on the screen are to be inserted, or to highlight a selection of text. It also serves as a visual indicator of the current state of the system, such as when typing or when an application is busy. Cursors can be moved around the screen using the mouse, trackball, or touchpad, or using the arrow keys on the keyboard. Cursors are also used to indicate selection in menu or list boxes, or to show where the user is currently working. Cursors are an important part of the user interface and can help improve the overall user experience.

To learn more about cursor
https://brainly.com/question/13174417
#SPJ1

the electronic, two-way communication that allows users to share information, content, ideas, and messages to create a customizable experience is known as

Answers

Social media: Two-way electronic communication that enables users to share content, ideas, and messages to build a personalized experience.

What are some instances of direct and digital marketing?

Digital marketing includes a variety of direct marketing techniques, including the use of social media, email newsletters, landing pages, SEO tactics, and sponsored content.

Which type of advertising is most effective at sustaining interest in a well-liked product at its mature stage?

rising interest in the current product Which type of advertising is most effective at sustaining interest in a well-liked product at its mature stage advertisement for reminders. Travel agency Wanderlust Tours is preparing for its upcoming advertising campaign.

To know more about electronic communication visit:-

https://brainly.com/question/28868359

#SPJ4

you are writing a program that processes postfix expressions. what would be the best data structure to use for this purpose? array queue tree stack

Answers

We transform the expression into postfix or prefix in order to make it simple to evaluate it using a stack, so overcoming this inefficiency.

What situations call for postfix expression?In the design of a compiler, postfix notations can be used to generate intermediate code. Machines can parse prefix and postfix notations more quickly. Operator precedence is never in doubt when using prefix and postfix notation. Left-right associativity is not a problem.An operator is inserted after the operands in a postfix expression, which consists of operators and operands. This indicates that in a postfix expression, the operator comes after the operands.We transform the expression into postfix or prefix in order to make it simple to evaluate it using a stack, so overcoming this inefficiency.    

To learn more about Postfix notations refer to:

https://brainly.com/question/24215080

#SPJ4

in full binary search tree every internal node has exactly two children. if there are 100 leaf nodes in the tree, how many internal nodes are there in the tree?

Answers

Each internal node has exactly two children in a full binary search tree. In a tree with 100 leaf nodes, there are 99 interior nodes as well.

An ordered or sorted binary tree, also known as a binary search tree (BST) in computer science, is a rooted binary tree data structure in which each internal node's key is larger than all the keys in its left subtree and less than all the keys in its right subtree. The binary search tree's height directly relates to how time-consuming its operations are.

Binary search trees enable binary search for quick item searching, addition, and removal. Since each comparison in a BST skip around half of the remaining tree, the lookup efficiency is proportional to that of a binary logarithm. In the 1960s, it was developed to address the issue.

Learn more about binary search tree here:

https://brainly.com/question/13152677

#SPJ4

the end result of a user needs assessment project that recommends the purchase, modification, upgrade, or building new technology is called a .

Answers

Deliverable is the end result of a user needs assessment project that recommends the purchase, modification, upgrade, or building of new technology.

Deliverable simply refers to a project plan's final outcome, such as a software product, prepared document, or asset that can be presented to clients, customers, or end users. Delivery should be finished in every way.

It is a component of the project's output that falls within its procedure or scope. The deliverables are tangible, quantifiable, and have a deadline. Deliverables are simply supplied to clients or customers and satisfy deadlines that are often established and developed throughout project planning. While milestones are often deliverables, this is not always the case.

To know more about software product click on the below link:

https://brainly.com/question/1410106

#SPJ4

Complete the sentence.
Privacy is about having
blank
our personal data.

Answers

Privacy is about having control over our personal data.

Answer:

Privacy is about keeping our personal information

___confidential___

Explanation:

Correct on Edge2023

I know this is a different question on the quiz, but it's hard to find answers to these sometimes, so I hope this makes your day a little bit easier. Happy learning!

assume that chessboard has been declared to be a two-dimensional array of strings. write a statement that instantiates an 8x8 array of strings and assign it to chessboard.

Answers

The following statement helps in instantiating an 8 x 8 array of strings

chessboard = new String[8][8];

What is instantiation in programming?

Confoundingly, the object that is instantiated from a class in the OOP language Java is referred to as a class rather than an object. To put it another way, a class in Java is instantiated to produce a particular class that is also an executable file that can run on a computer.

A statement in java is instantiated used a single line like the initialization so for the given problem there is a two dimensional array need which can be represented by using [][], where the array is of 8, so assigning the variable to the chessboard which gives the following result

chessboard = new String[8][8]

Thus chessboard = new String[8][8] is the instantiation needed

To know more on arrays follow this link:

https://brainly.com/question/28061186

#SPJ4

which allocates a new string carid, which is large enough to store the strings carmodel, carmake, and an additional character?

Answers

When allocating memory for a string, add 1 for the terminating null character after counting the characters (using strlen, for example).

A function like strncpy doesn't always add the null character; functions like scanf and strcpy usually do. For instance, in order to duplicate string s, we would need to determine its length: strlen(s) = int len; Create a variable that links to that location in memory, then allocate the same amount of space plus one for the terminator: malloc((len + 1) * sizeof(char)); char *s2; The aim is to use C# to translate a string into a character array. First, gather the string. Create a character array that is the same length as the string in step 2. Step 3 is to cross the string.

Learn more about function here-

https://brainly.com/question/28939774

#SPJ4

he ease with which parts can be replaced or evaluated is question content area bottom part 1 a. testability. b. repeatability. c. functionality. d. serviceability.

Answers

Option B is correct. Testability is the simplicity with which components can be changed, examined, or assessed.

This chapter's goal is to give a general overview of several quality models. It will also examine what quality is by highlighting some well-known quality experts and their perspectives on quality (which in some cases actually results in a more or less formal quality model). The chapter's organization is as follows: We must first attempt to define the notion of quality, along with many others, before we can explore the subject of quality and quality models. This chapter's goal is to give a general overview of several quality models.

Learn more about organization here-

https://brainly.com/question/1615955

#SPJ4

listen to exam instructions you want to be able to identify the services running on a set of servers on your network. which tool would best give you the information you need?

Answers

Nmap, which stands for Network Mapper, is a free and open source program used for port scanning, vulnerability analysis, and, obviously, network mapping.

In order to track traffic to and from all networked devices, network intrusion detection systems (NIDS) are installed at one or more strategically placed locations inside the network. It analyzes the traffic that is being sent throughout the entire subnet and compares it to a database of known attacks. theHarvester theHarvester is a passive intelligence gathering program that is employed to compile data from many open sources. Using a variety of open data sources, the tool collects emails, names, subdomains, IP addresses, and URLs.

Learn more about network here-

https://brainly.com/question/13399915

#SPJ4

_______ involves adjusting prices according to someone’s online buying habits.

Answers

Answer:

Dynamic pricing

Explanation:

Dynamic pricing involves adjusting prices according to someone’s online buying habits.

Other Questions
Accounts receivable have been grouped into the following states:State 1: PaidState 2: Bad debtState 3: 030 days oldState 4: 3160 days oldSixty percent of all new bills are paid before they are 30 days old. The remainder go to state 4. Seventy percent of all 30-day-old bills are paid before they become 60 days old. If not paid, they are permanently classified as bad debts. What is the probability that an account in state 4 will be in bad debt?0.30.120.70.8 TRUE/FALSE. body fat redistributes with aging, and both men and women typically have an increase in internal fat as they move through middle adulthood and into older adulthood. james' physician orders laboratory testing to assess his gfr. his gfr is 31 ml/min per 1.73 m 2 . james' kidney disease would be classified as stage . A 40.0-kilogram child exerts a 100.-newton force on a 50.0-kilogram object. the magnitude of the force that the object exerts on the child is: ________ the study of the distribution of plants and animals, the diverse spatial patterns they create, and the physical and biological processes that produce earth's species richness is called Which of the following Supreme Court decisions based on the 13th Amendment was intended to address the situation of a particular racial group?A. The decision drawing a distinction between involuntary servitude and duty.B. The decision holding that all citizens shall have the same right to make and enforce contracts.C. The decision stating that those convicted of a crime can be forced to work.D. The decision striking down laws forcing a person to work for another in order to satisfy a debt. How many grams are in 0.500 mol Co? Lines CD and DE are tangent to circle A shown below:Lines CD and DE are tangent to circle A and intersect at point D. Arc CE measures 126 degrees. Point B lies on circle A.If Arc CE is 126, what is the measure of CDE? (4 points)1266311754 FILL IN THE BLANK. the energy released during [ select ] reactions can be used to drive [ select ] reactions, and this is called [ select ] reactions. He director of publication ue Mac OS X Snow Leopard and ha been working on o many project for the pat ix month that he han't had time to perform maintenance tak. She want to pend ome time tomorrow morning on thee tak. What maintenance tak do you recommend? 15. A 5.0 g coin sliding to the right at 25.0 cm/s makes an elastic head-on collision with a 15.0 g coin that is initially at rest. After the collision, the 5.0 g coin moves to the left at 12.5 cm/s. Find the final velocity of the other coin. (12.5 cm/s, Right) you have a small home network connected to the internet using an rg-6 cable. you need to move the router connecting the network to the internet, but can't find any rg-6 cable. what roman legal concept is evident in legal proceedings in the united states today? 17) an important factor for locating new manufacturing plants is: a) proximity to customers. b) location of competitors. c) proximity to markets. d) favorable labor climate. in which case did the supreme court rule that police do not need to show reasonable suspicion to search a parolee? what did magendie learn from his experiment involving the dogs and nitrogen? group of answer choices nitrogen is nonessential in the diet nitrogen is essential in the diet peptides are essential in the diet peptides are nonessential in the diet DNA technology is used to find cures for genetic diseases such as Huntington's disease. Which ofthese best explains the use of DNA technology in curing genetic diseases with gene therapy?a. uses medicines to alter the genetic makeup of faulty genesb. removes the faulty gene and replaces it with a working geneC. causes mutation in faulty genes by exposing them to high-cnergy radiationd. removes the faulty gene from the body without replacing it with another gene Find the lengths of the hypotenuses (x) of the triangle whose legs are given1) 9cm,12cm The collective bargaining agreement taking place with the Riverdale Fire Fighters Union involves the Fire Superintendent and five people representing all of the firefighters. These individuals are part of the ______.bargaining structure chlorofluorocarbons: select one: a. react to destroy ozone. b. are beneficial for the environment. c. react to produce ozone. d. combine with dust particles to form aerosols that cool the earth.