I need help with creating a code for defining if a number i an Armtrong or not
on code h

Answers

Answer 1

A number is said to be Armstrong if the sum of its digits raised to the power of three equals the number itself. For instance, the number 371 is an Armstrong number as 3**3 + 7**3 + 1**3 = 371

I don't know how to receive my Armstrong number.

Armstrong numbers are numbers that are identical to themselves when the various digits of the number are added together to form a cube. Because 153 = 13+53+33, it is an Armstrong number. Expected Results: The Armstrong number is 153.

The inventor of the Armstrong number?

American electrical engineer and inventor Edwin Howard Armstrong (December 18, 1890 – February 1, 1954) created the superheterodyne receiver system and FM (frequency modulation) radio.

To know more about armtrong number visit:

https://brainly.com/question/29556551

#SPJ4


Related Questions

Which of the following correctly initializes an array arr to contain four elements each with value 0 ? int[] arr = (, 0, 0, 0); 11 int[] arr = new int[4]; III int[] arr = new int[4]: for (int i = 0; i < arr.length; i++) arr[i] = 0 (A) I only (B) III only (C) I and III only (D) II and Ill only (E) I, II, and III 2 Consider the following code segment. int total 3; inte) values - {8. 6. 4, -2); total + values[totall: total + values[total]; System.out.println(total); What is printed as a result of executing the code segment? (A) 0 (B) 1 (C) 3 (D) 7 (E) 16 3 Consider the following code segment. int[] arr=(-6,2,-5,3,8,10,-12,9); for (int k=0: k arr.length; k++) if (arr[k] > O&G arr[k]2= 0) System.out.print (arx[k] + " "); What will be printed as a result of executing the code segment? (A) 2389 (B) -6 2 8 10-12 (C) 28 10-12 (D) 2810 (E) 23 8 10 9

Answers

The following correctly initializes an array to contain four elements each each with value 0 is I, II and III. 2) Output is 7 and 3) code segment will be printed as a result will be 2, 8, 10, optionD is correct.

The array can be initialized as

1-  An array can also be initialized during declaration. ( as in I )

2- In Initializing an array without assigning values, the default value of each element is zero. ( as in II )

3- An array can be initialized by setting each value of an element to zero by looping the length of the array. ( as in III)

I. It creates an array of 4 elements. The default value of int in java is Zero.

II. It also creates an array of 4 elements and manually initialized all the values to 0.

III. It creates an array of 4 elements. and uses a loop to manually initialized all the values to 0.

2) Output is 7 i.e Option(D).

total =total+values[total]; => total = 3+values[3];

=> total=3+(-2) => total=3-2 =>total=1.

total =total+values[total] =>total =1+values[1]

=>total= 1+6 =>total =7.

3)Option(D) i.e 2 8 10.

In If condition it is checking whether the element in the array is Positive and also it is divided by 2 with 0 reminder.

So from array positive numbers are 2,3,8,10,9. from these positive numbers Number dived by 2 or Multiples of is 2,8,10.

So output is 2,8,10.

To learn more about code segment

https://brainly.com/question/20063766

#SPJ4

no actual traffic passes through a passive sensor; it only monitors copies of the traffic. true or false

Answers

No actual traffic passes through a passive sensor; it only monitors copies of the traffic is the true statement.

What is a passive sensor?

Passive sensors are remote sensing devices that gauge naturally occurring energy. Energy can only be detected by passive sensors when the energy is present naturally. This can only happen when the sun is shining on the Earth, and this applies to all reflected energy.

A passive sensor merely "listens" to what is going on. Examples comprise: a sensor that can determine whether a light is shining on it. an infrared sensor that measures an object's temperature.

Thus, it is the true statement.

For more information about passive sensor, click here:

https://brainly.com/question/29738927

#SPJ1

The Cisco PIX line of products is best described as which of the following? Select one: a. PC with firewall installed b. software firewall c. firewall appliance

Answers

Keeping monitoring of and filtering incoming and outgoing network traffic in line with previously established security standards for an organization is the function of a firewall.

Keeping monitoring of and filtering incoming and outgoing network traffic in line with previously established security standards for an organization is the function of a firewall, a network security technology. A firewall is essentially the wall separating a private internal network from the public Internet at its most fundamental level. Firewalls are tools for network security that prevent unauthorized access to a network. It could be a hardware or software component that filters the incoming and outgoing traffic within a private network in accordance with a set of criteria in order to identify and halt cyber-attacks. Both professional and personal settings use firewalls.

Learn more about Firewall here:

https://brainly.com/question/30006064

#SPJ4

A firewall's job is to maintain monitoring and filtering of incoming and outgoing network traffic in accordance with previously defined security criteria for an organisation.

A firewall is a network security system that maintains monitoring and filtering of incoming and outgoing network traffic in accordance with previously defined security criteria for an organisation. At its most basic level, a firewall is essentially the wall separating a private internal network from the open Internet.

Network security mechanisms called firewalls guard against illegal access to a network. In order to recognize and stop cyberattacks, a hardware or software component that filters the incoming and outgoing traffic within a private network in accordance with a set of criteria may be used. both expertly and personal settings use firewalls.

To know more about firewalls, refer:

brainly.com/question/30006064

#SPJ4

Software designed specifically for a highly specialized industry is called ____.
O Horizontal market software
O Mass-market software
O Vertical market software
O Industry standard software

Answers

Vertical market software is specifically created for a highly specialized industry.

Software for vertical markets: What is it?

Software designed for a particular industry, set of applications, or customer is known as vertical market software. This is distinct from software for the horizontal market, which can be used across numerous industries.

Who employs software for vertical markets?

Software created for specialized applications or for a particular clientele is therefore referred to as vertical market software. Because they are only used by a particular set of people, banking, investment, and real estate software packages are all examples of vertical market software applications.

To know more about Vertical market software visit :-

https://brainly.com/question/29992362

#SPJ4

The data _____ component of a database management system (DBMS) is used to add, delete, modify, and retrieve records from a database

Answers

The data manipulation component of a database management system is used to add, retrieve, delete, and modify records from a database.

Database Management Systems (DBMS) are referred as to software systems that store, retrieve, and execute data queries. A database management system acts as a bridge between an end-user and a database, allowing users to create, edit, read, and remove data in the database. The data manipulation is the underlying component that a database management system uses to add, retrieve, delete, and modify records from a database.

You can learn more about database management system at

https://brainly.com/question/24027204

#SPJ4

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are: 1) The year must be divisible by 4 2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400 Some example leap years are 1600, 1712, and 2016. Define a function called OutputLeapYear that takes an integer as a parameter, representing a year, and output whether the year is a leap year or not. Then, write a main program that reads a year from a user, calls function OutputLeapYear() with the input as argument to determines whether that year is a leap year. coral code

Answers

The function OutputLeapYear() takes an integer as a parameter, representing a year, and prints whether the year is a leap year or not. The main program reads a year from the user, calls the OutputLeapYear() function with the input as an argument to determine whether that year is a leap year.

What is meant by coral code? Coral code, also known as CSS (Cascading Style Sheets), is a coding language used to create a visual presentation of webpages. It is used to design the layout, colors, and fonts of a website. CSS helps to create a unified look and style across a web page and website by controlling the overall presentation of the HTML elements. It allows web developers to easily style web pages without having to write complex HTML code. CSS is often used to create responsive websites, ensuring the website looks good on all devices and screen sizes. It can also be used to create animations, transitions and interactive elements on a website. In short, Coral code is a powerful and versatile language used to create visually appealing and interactive webpages.

To learn more about coral code refer to:

https://brainly.com/question/27921913

#SPJ4

A user is experiencing issues synchronizing a smartphone. The user is able to connect to individual services, but each requires a different password. Which of the following needs to be configured to allow the user to access web services securely with a unique password?
A. SIM
B. SMB
C. SSL
D. SSO

Answers

SSO must be configured to allow users to securely access web services using a unique password.

What is SSO?SSO is a technology that combines multiple application login screens into a single one. SSO allows a user to access all of their SaaS applications by entering their login credentials (username, password, etc.) once on a single page.Single sign-on is an authentication scheme that allows a user to log in to multiple related but independent software systems using a single ID. True single sign-on enables users to log in once and access services without having to re-enter authentication credentials.Single sign-on (SSO) is becoming an increasingly useful tool for businesses all over the world. It enables all of their employees, partners, and customers to gain access to the applications and services they require using a single set of credentials.

To learn more about SSO refer to :

https://brainly.com/question/13741908

#SPJ4

The file management program incorporated into recent versions of Windows is ____.
a. WinZip
b. StuffIt
c. Disk Cleanup
d. File Explorer

Answers

File Explorer is the file management application built into more recent iterations of Windows.

Simply put, what is File Explorer?

File Explorer, formerly Windows Explorer, is a file manager program that comes preinstalled with versions of the Microsoft Windows operating system starting with Windows 95. For accessing the file systems, it offers a graphical user interface.

Why do I need WinZip, and what is it?

WinZip is a Windows software that enables you to archive and compress data for more effective distribution or storage. The previous applications PKZIP and PKUNZIP, which were often used in the DOS operating system, have been replaced by the more powerful and user-friendly WinZip.

To learn more about File Explorer visit:

brainly.com/question/28902151

#SPJ1

When the positive integers with exactly three positive divisors are listed in ascending order, what is the fifth number listed

Answers

The first number will be an even square and the others wll be odd.

4 = 3 divisors; 9  = 3 divisors; 25 = 3 divisors; 49 = 3 divisors; 121 = 3 divisors.

How can I determine the amount of positive divisors?

Exhaustive trial division is the simplest approach for calculating divisors. The set of positive divisors for an integer n is made up of those that divide evenly when we divide it by each of the integers 1, 2, 3,..., n. This is how we get the positive divisors for an integer n.

What is the quick method for calculating a number's divisors?

The following formula can be used to determine how many powers of prime numbers n can have as its total divisors. When N=paqbrc. The total number of divisors is then equal to (a+1)(b+1)(c+1).

To know more about integers visit

brainly.com/question/15276410

#SPJ4

Which of the following statements is true of content delivery networks (CDNs)?
A) They reduce access costs by delivering data faster.
B) They distribute data on different servers without any data replication.
C) They use geographic proximity as the factor to decide which server should deliver a requested content.
D) They use predetermined servers to deliver content to each location irrespective of traffic changes.

Answers

Answer:

A

Explanation:

CDNs (content delivery network) are known for their reliable delivery speed. CDNs can still replicate data and not take proximity nor specific server states into account. Therefore, it is option A.

In Hyper-V, an _____ virtual switch, allows the host to communicate with the virtual machines connected to the switch.

Answers

Virtual machines (VMs) may connect online with one another, the host operating system, and external networks thanks to Hyper-V virtual switches.

What does Hyper-virtual V's switch mean?

When you install the Hyper-V server role, Hyper-V Manager makes the software-based layer-2 Ethernet network switch known as Hyper-V Virtual Switch available.

How can virtual COM ports on a Hyper-V host computer connect with one another?

Using the Serial over Ethernet Connector method (in Windows or Linux) is one of the simplest ways to connect a COM port in a virtual machine. With the help of the program Serial to Ethernet Connector, you can access COM in VirtualBox, Hyper-V, and VMware environments.

To know more about Virtual machines visit:-

https://brainly.com/question/29535108

#SPJ4

You're using a Linux distribution that uses RPM for package management. Which command would you use to check to see if the httpd package, the Apache HTTP Server package, is installed

Answers

The command line command yum list installed httpd will check to see if the Apache HTTP Server package is installed on a Linux distribution that uses RPM for package management.

In Linux, what do yum and RPM mean?

For Linux distributions based on Red Hat, two package management systems were developed: RPM and YUM. A collection of tools called a package management system is used to automate the installation, updating, and removal of packages. The fundamental functional differences between the two package managers outweigh their similarities.

What do Linux's APT and yum stand for?

Popular package management programs designed for Debian-based and Red Hat-based Linux distributions, respectively, include APT and YUM. The two package managers are among of the most widely used and simple to use tools for package management.

To know more about HTTP visit :-

https://brainly.com/question/13155990

#SPJ4

during cpr, when there are four rescuers present, which of the following ventilation devices would be best for ventilating a patient

Answers

The best device for ventilating a patient with four rescuers present is a bag-valve-mask (BVM) device. This device is used to deliver positive pressure ventilation to a patient and can be operated by one rescuer, while the other three provide chest compressions.

Using a Bag-Valve-Mask Device for Ventilating a Patient with Four Rescuers Present During CPR

A bag-valve-mask (BVM) device is the best device for delivering positive pressure ventilation to a patient when four rescuers are present. This device is operated by one rescuer, while the other three rescuers provide chest compressions. The BVM device is a handheld device that consists of a face mask, a bag, and a valve that allows for the rescuer to manually control the flow of air from the bag to the patient. The device is used to deliver breaths to the patient during CPR, allowing for oxygen to enter the lungs and helping to maintain blood flow to the rest of the body.

Learn more about CPR: https://brainly.com/question/3725035

#SPJ4

LANs, WANs, and MANs all provide users with an accessible and reliable network infrastructure. Which of the below are the most important network differentiating dimensions? Reliability and timing Confidentiality and performance Security and cost Cost and performance

Answers

Performance and price what features distinguish networks the most? Timing and dependability Performance and confidentiality Cost and safety Performance and price.

LAN MAN WAN: What is it?

An office building, a school, or a home may have a local area network (LAN) that links a number of nearby computers. A state, province, or country, for example, can be covered by a wide area network (WAN).

Which four types of wireless communication networks are under the Metropolitan Area Network (MAN) umbrella?

Performance and confidentiality Cost and safety Performance and price. There are four different types of wireless networks, each with a specific purpose: wireless local area networks, wireless metropolitan area networks, wireless personal area networks, and wireless wide area networks.

To know more about LANs visit :-

https://brainly.com/question/13247301

#SPJ4

What is the connection between the olive branch in the eagle's talons and America's intentions for the space program?

Answers

Because the olive branch represents America's goal that space exploration will foster global peace and cooperation, there is a relationship between the eagle's talons and the country's intentions for its space program.

What link exists between the olive branch held in the eagle's talons?

The power of peace and battle are symbolized by the olive branch and the arrows held in the eagle's claws. The olive branch is constantly in the eagle's line of sight as a symbol of our country's wish for peace while also indicating that it is prepared to defend itself.

What relationship does the olive branch have to anything?

The olive branch is a representation of peace and victory that is linked to ancient Greek traditions and related with supplication to deities and powerful individuals.

To know more about olive branch visit :-

https://brainly.com/question/2997080

#SPJ4

WILL GIVE BRAINLIEST!!!

assume numpy array is an integer array and has already been filled with values. fill in the blanks to write a for loop that computes and output the sum of all the elements inside numpy array. when you fill in the blanks, do not put extra empty spaces anywhere is=ndei the code i.e for line x = y+3, dont write as x= y +3

Answers

Answer:

import numpy as np

# import the numpy library

arr = np.array([...])

# create a numpy array with some elements

sum = 0

# initialize a variable to store the sum of elements

for element in arr:

   sum += element

   # iterate over each element in the array and add it to the sum variable

print(sum)

# output the final sum of all elements in the array

Which of the following increases or decreases how crisp the objects in a photo appear?
a. brightness
b. sharpness
c. crispness
d. contrast

Answers

the answer is b. sharpness

Which loop(s) would happen after another loop of movement?

Answers

The loop(s) that would happen after another loop of movement differs.

What is the  loop of movement?

In the above case, It is difficult to accurately answer this question without having more context.

Loops in programming are used to execute a block of code multiple times, and the specific order in which they are executed can depend on a variety of factors, such as the structure of the code, the values of variables, and the conditions specified within the loop.

Without more information about the specific loops in question, it is not possible to determine which loop(s) would happen after another loop of movement.

Learn more about loop from

https://brainly.com/question/19344465

#SPJ1

Which of the following is a good practice when you are installing a new device?
A) reinitialize the kernel
B) check for a new driver
C) recompile the installed driver
D) always use the driver supplied by the OS

Answers

Check for a new driver Correct option no.(B), as the device Drivers enable a computer's connection to hardware components such as a keyboard, mouse, monitor, and others.

The proper device driver installation on your computer is crucial, so why is that?

The function of device drivers, To connect and communicate with particular devices, a computer needs device drivers. They specify the communication channels and processes the computer's operating system and applications can use to request services from the device.

What is the first thing you must verify before installing software?

Make that your computer complies with the application, game, or utility's system requirements before you attempt to install it. How to install a program is typically described in the manual or a README file.

To know more about hardware components visit :-

https://brainly.com/question/30214389

#SPJ4

What are the five elements that are needed to create a connected world or a network?

Answers

Categories, providers, access technologies, protocols, and convergence.

What are the five networking components that make up a connected world?

Hardware, software, wireless or wired transmission media, network topology, & communications protocols are some of the elements of a network architecture.

What makes IPTV unique?

Personalization, minimal bandwidth usage, and device support are all features of IPTV.Users can access an accessible and dependable network infrastructure through LANs, WANs, and MANs.

To know more about networking visit:

https://brainly.com/question/15002514

#SPJ4

The comparison of the present state of a system to its baseline is known as what?
Question 4 options:
a. Baseline reporting
b. Compliance reporting
c. Baseline assessment
d. Compliance review

Answers

Baseline reporting is the process of comparing the current state of a system to its baseline.

What is the name for a network that is purposefully vulnerable?

A honeynet is a network that has been intentionally set up with flaws and is hosted on a phony server to draw in hackers. The main goal is to simulate assaults in order to test network security.

What alternative term would you use to describe a security weakness?

A security vulnerability is a weak point, fault, or mistake discovered in a security system that could be used by a threat agent to penetrate a protected network.

To know more about Baseline visit :-

https://brainly.com/question/30193816

#SPJ4

If your current path is /home/cindy/Pictures/Canada, and you want to change to the Alaska directory, which of the following commands can you use?
cd ~/Pictures/Alaska
cd ../Alaska
cd /Pictures/Alaska
cd /home/cindy/Pictures/Alaska

Answers

The command you can use to change to the Alaska directory is cd /home/cindy/Pictures/Alaska.

The cd command stands for "change directory", and is used to navigate through folders and directories. The ~ is shorthand for the home directory, in this case /home/cindy, and the .. is shorthand for the parent directory, which in this case would be the Pictures directory. Therefore, the only command that will take you directly to the Alaska directory is cd /home/cindy/Pictures/Alaska.

The syntax used is cd &#60;destination&#62;, where <destination> can be a relative or absolute path. For example, cd .. will move up one directory, and cd /home/user/Documents will move to the Documents directory.

Learn more about CD comand:

https://brainly.com/question/29023424

#SPJ4

Farouk uses his computer to break into Global Financial Center's computer.Farouk is a
A) hacker.
B) phisher.
C) worm.
D) virus.

Answers

Answer:

hacker

Explanation:

Refer to Exhibit: Which access controls list allows only TCP traffic with a destination port range of 22-443, excluding port 80

Answers

Access Control List (ACL) 1 allows only TCP traffic with a destination port range of 22-443, excluding port 80

Which access control list disallows all other communication other than TCP traffic with a destination port range of 80 through 243?The access controls list that allows only TCP traffic with a destination port range of 22-443, excluding port 80, is an access control list (ACL) that uses network layer filtering.This type of ACL is configured to filter traffic based on its source or destination IP address, port numbers, or protocol. In this case, the ACL will be configured to explicitly deny any TCP traffic with a destination port of 80, while allowing only TCP traffic with a destination port range of 22-443.This ACL will be applied to the router or firewall and can be configured using access control entries (ACEs).Each ACE will specify the source and destination IP address, port numbers, and protocol.The ACEs will also specify whether to allow or deny the traffic.This type of ACL will provide a high level of security by limiting the type of traffic that can pass through the network.

To learn more about Access Control List (ACL) 1 refer to:

https://brainly.com/question/29830414

#SPJ4

is the process by which state of the art technologies are inserted continously into the weapon systems

Answers

"Investigate technology insertion" is one of the level 3 practices to mitigate the risk of obsolescence when there is a high opportunity to enhance supportability or reduce total cost of ownership. This practice, also referred to as technology transition.

Technology insertion is the process of incorporating new or improved technology into a military system to enhance its performance, supportability, or reduce its total cost of ownership. This practice is a proactive measure that aims to mitigate the risk of obsolescence by ensuring that the system remains current and relevant throughout its lifecycle.

Technology insertion can take many forms, such as upgrading hardware components, incorporating new software features, or replacing outdated subsystems. It is often a multi-step process that involves identifying potential technologies, conducting technology assessments, and evaluating the cost and benefits of incorporating the new technology.

The missing part in the question is shown below.

Level 3 Practices to mitigate the risk of obsolescence

when there is a high opportunity to enhance supportability or reduce total cost of ownership (proactive activities which may require additional program funding), are:

• Implement circuit design guidelines

• Produce behavioral VHDL [very high-speed integrated

circuit hardware description language] model

• Conduct technology assessment

• Implement electronic data interchange

• Investigate technology insertion. Also referred to as

technology transition, this is the process of applying

critical technology in military systems to provide an effective weapon and support system—in the quantity

and quality needed by the warfighter to carry out assigned missions and at the best value.

Learn more about here mitigation here https://brainly.com/question/24058385

#SPJ4

A computer can still operate without which of the following? cpu ram os gpu lan

Answers

A computer can still operate without a LAN connection. It can still function correctly when not connected to a local area network or the internet, as long as you have already installed all the necessary software and drivers. Without a LAN connection, the computer will not be able to access other devices or the internet.

the ____ function is used to interchange the contents of two string variables.
a. iterator
b. swap
c. change
d. traverse

Answers

Answer:

b. swap

Explanation:

running apps in which mode ensures that a poorly written app does not affect system stability?

Answers

Running apps in user mode makes guarantee that a bad app won't have an impact on system stability.

What do the terms OS kernel and user mode mean?

The user mode and kernel mode of a CPU on a computer running Windows are two distinct operating systems. Depending on the type of code it is running, the processor alternates between the two modes. User mode is used for applications, and kernel mode is used for the essential parts of the operating system.

What are some user mode examples?

A computer program is in user mode when it is executing. Word processing software, PowerPoint, viewing a PDF file, and internet browsing are a few examples. The computer is operating in user mode because they are application programs.

To learn more about user mode visit:

brainly.com/question/13383370

#SPJ1

Which of the following statements is true of geographic top-level domains (TLDs)?
Select one:
a. They are used by the organizations that provide information services.
b. They are used to promote business and tourism.
c. They are limited to members of a defined community.
d. They are owned by corporations to control use of their brands.

Answers

They are employed in the marketing of commerce and travel. Whichever of the following is accurate about geographic top-level domains (TLDs).

Do top-level domains include TLD?

After the root domain in the Internet's hierarchical Domain Name System, a top-level domain (TLD) is one of the domains at the highest level. In the name space's root zone, top-level domain names are deployed.

What do TLD names for top-level domains mean?

A top-level domain (TLD) sits after the root zone in the DNS hierarchy as the first stop. A TLD, or top-level domain, is the part of a domain name that comes after the last dot. The TLD for "gobgle.com," for instance, is ".com." ' and are a few additional well-known TLDs.

To know more about top-level domains visit :-

https://brainly.com/question/28041008

#SPJ4

Python ch5
Write the code to call the function named send_signal. There are no parameters for this function.send_signal()
Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to standard output a single line consisting of 5 periods (".").
def printDottedLine():
print(".....")
Write the code to call a function whose name is send_number. There is one argument for this function, which is an int. Send 5 as an argument to the function.send_number(5)
Write the code to call a function named send_variable and that expects a single int parameter.

Answers

The code to call the function name send_signal() is given below.

In Python, how can you call any function without any arguments?

In these circumstances, we can call the function using default arguments without providing the values again for parameter values.Python allows us to accomplish this by using the = sign and the default value.

send_signal().

def printDottedLine():

print(".....")

def printDottedLine():

print(".....")

send_number(5)

send_variable(x);

To know more about Python visit:

https://brainly.com/question/13437928

#SPJ4

Other Questions
The Barker family just left the local pet store with Lucky, their new family dog. The pet store owner told the Barker family that for the next 6 months, Lucky would grow at an average rate of 9 pounds per month. Currently, Lucky is 2 months old and weighs 3 pounds. Age, in months 2 3 4 5 6 7 8 Weight, in pounds 3 at 2 months old Part A: Complete the given table that represents Lucky's current weight, in pounds, as a function of his age, in months. Part B: Graph the data in the table from Part A. Be sure to label the graph and all data points. Part C: Create a linear model that represents the Lucky's current weight, in pounds, as a function of his age, in months. Part D: If Lucky continues to grow at the rate of 9 pounds per month beyond the expected six months, how much will Lucky weigh by the time he is one year old? Why would Web citation 1 be a more useful source of evidence for an essay about the effects of violent video games onyoung people than Web citation 2?Because Web citation 1 (2005) was published more recently than Web citation 2 (1996) it would more likely be used by scientists whoare less interested in the long-lasting effects of video game use.Because Web citation 1 was published outside the U.S. and is cited by a company whose mission is to accelerate the world'sresearch it is a more favorable source than Web citation 2 which is cited from an online library with a goal of providing world accessto scientists's files.Both are cited in an online open encyclopedia (Wikipedia) article about the California law designed to fine video game vendors;however, Web citation 1 includes an excerpt from the full article while Web citation 2 includes only a summary of the article.Web citation 1 contains information that reviews the physical effects of playing video games while Web citation 2 is limited to theeffects on users' self-esteem.NEXT QUESTIONASK FOR HELPTURN IT IN what is the mole fraction of ethanol c2h5oh in an aqueous solution in which the ethanol concentration is 4.6 molal Why are tax policies that cut taxes called trickle-down economics?1. because the benefits are supposed to filter down to workers2. because the benefits become less pronounced at every level3. because the benefits are intended to help only the wealthy4. because the benefits quickly cause a positive effec Marlena is putting together a focus group to obtain feedback on the new juice product her company plans to launch next year. A focus group is a type of research. (Qualitative or Quantitative) write a linear equation that passes through the points (2,-7) and (4,-9) and has a slope "-5" Which step in photosynthesis does not need light? PLEASE ANSWER ASAP IF YOU CAN!!! This is due soonWhen should you use the title of the original text as the title of a found poem?when you cannot think of a different title for the poemwhen the original title suggests something newwhen no lines in the found poem sound like a titlewhen the original title sounds like the title of a poem Write a system of equations modeling the given conditions. Then solve the system by the substitution method and find the two numbers. The sum of two numbers is 71. One number is 27 more than the other. Find the numbers. D Let x be the smaller number and y be the larger number. Write an equation that represents the fact that the sum of the numbers is 71. =71 (Simplify your answer.) Suppose that consumers become more pessimistic about the economy. This causes the price level to decrease as represented by the GDP deflator dropping to 98. Nominal GDP also decreases to $28,000. What is real GDP What effect would cyanide have on the electron transport chain ? What is the symbol for and in logic? A patient presents with malaise, a fever, and joint pain. If a systemic lupus erythematosus (SLE) diagnosis is being considered, which additional assessments should the nurse perform If the actual yielsd of a reaction is 50 g and the theoretical yield is 60 g. What is the percent yield. What is the relationship between the Center of the Star, the Student section, and the Reasons section of Andrea's North Star? Please explain in two to three complete sentences Kelsie works at a bicycle shop as a salesperson. She records the number of bicycles she sells daily. Here is the probability distribution of B = the number of bicycles Kelsie sells on a randomly selected day, and T the time she spends filling out daily sales reports. 2 B = # of bicycles sold T = time (minutes) Probability 40 20 10 0. 05 0. 15 0. 50 0. 30 a) Calculate E(B) b) Calculate the mean time she spends filling out daily reports. c) Calculate the standard deviation for both random variables Iready diagnostic this is an ela diagnpostic help pls Each week Sara's science teacher gives a 15-point quiz.Her current scores are shown in the table.What is Sara's mean quiz score? a carpenter is building a ramp as shown in the diagram. what is mt 1. How did geography impact the conflicts that developed in North America?