write a program that calculates the total amount of a meal purchased at a restaurant. the program should ask the user to enter the charge for the food, then calculate the amounts of a 18 percent tip and 7 percent sales tax. display each of these amounts and the total.

Answers

Answer 1

The program calculates the total amount of a meal purchased at a restaurant by asking the user for the food charge, adding 18% tip and 7% sales tax, and displaying the food charge, tip, sales tax, and total.

The program starts with a function `calculate_total` that asks the user to input the charge for the food. The tip and sales tax are calculated as a percentage of the food charge.

The total is calculated as the sum of the food charge, tip, and sales tax. Finally, each of these amounts and the total are displayed to the user.

The program may be written in phyton as follows:

def calculate_total():

   food_charge = float(input("Enter the charge for the food: $"))

   tip = food_charge * 0.18

   sales_tax = food_charge * 0.07

   total = food_charge + tip + sales_tax

   print("Food Charge: $%.2f" % food_charge)

   print("Tip (18%): $%.2f" % tip)

   print("Sales Tax (7%): $%.2f" % sales_tax)

   print("Total: $%.2f" % total)

calculate_total()

To learn more about python visit: https://brainly.com/question/28675211

#SPJ4


Related Questions

to simulate the conditions in the fridge, we must pick the parameter a. what do you think the value of a should be?

Answers

The value of a will depend on the specific conditions of the fridge. Generally, a should be set to a value that is close to the average temperature of the fridge, which is usually around 4-5 degrees Celsius.

To simulate the conditions in a standard refrigerator, the parameter a should be set to a value that is close to the average temperature of the fridge, typically around 4-5 degrees Celsius. This value should be adjusted based on the specific conditions of the fridge, such as whether it is a hot day or cold day and how heavily it is used. Additionally, other factors like the size and type of the refrigerator should be considered when determining the appropriate value for the parameter a. It is important to note that the temperature should not be set too low, as this could cause the food inside to freeze and become inedible.

Learn more about refrigerator: https://brainly.com/question/15385545

#SPJ4

what function did the media serve in 2016 in relation to the texas department of family nd protextive services cps

Answers

In relation to the child protective services provided by the Texas Department of Family and Protective Services in 2016, the media served the purpose of setting the agenda and altering public opinion.

What role does the media play in setting public policy?

By addressing societal issues that the nation's political leaders and the general public agree require government attention, the media shapes the public's agenda. People's opinions and conversations about public issues are determined by the media.

What is the media's capacity to bring problems and issues to the public's attention?

The ability of the media to communicate to the general public what is significant is referred to as agenda-setting. The media are able to influence people's perceptions of the relative importance and importance of particular issues by providing different levels of coverage for those issues.

To know more about function visit :-

https://brainly.com/question/15414919

#SPJ4

which media communication type does not require media arbitration in the data link layer?

Answers

Full-duplex communication allows for simultaneous transmission and reception on the medium by both devices. The Data Link layer implies that the media is constantly accessible to both nodes for transmission.

Which media communication method does not call for media arbitration at the data connection layer?

Half-duplex communication happens when both devices can both transmit and receive on the medium but cannot do so simultaneously. Media arbitration is not necessary in full-duplex communication because both devices can send and receive data simultaneously through the medium.

Which media communication type does not require medium?

Wireless communication is often referred to as Unguided Media or Unbounded transmission media. In this mode, no physical media required for the transmission of electromagnetic signals.

To know more about Full-duplex communication  visit :-

https://brainly.com/question/29998337

#SPJ4

an integrated and standard database used in case to provide product and tool integration is called a:

Answers

Product Data Management (PDM) system is a centralized database for managing and storing product data.

A product data management (PDM) system is an integrated and standardized database used to manage and store product data and related information. PDM systems are designed to provide product and tool integration, enabling organizations to manage their product information more efficiently and effectively. The main goal of a PDM system is to provide a centralized repository for product information, including design and engineering data, bills of materials, documentation, and testing data. This information can be easily accessed and shared by different teams and departments within an organization, improving collaboration and reducing the risk of errors and inconsistencies.

PDM systems also help organizations to streamline their product development processes, automate manual tasks, and improve overall product quality. By providing a single source of truth for product information, PDM systems can help organizations to make better-informed decisions, reduce product development times, and improve product innovation.

Learn more about PDM here:

https://brainly.com/question/12972809

#SPJ4

What does a set of permissible values for one or more attributes in a relational database referred to as?

Answers

Row-specific identifier: key. Domain -> a description of the permitted values for an attribute. Each row in a table is uniquely identified by a key. The range of acceptable values for an attribute is known as its domain.

What are the range of acceptable values for each of the attributes known as that attribute?

Its domain refers to the range of acceptable values for each property. Explanation: The data type designated for a column in a database is known as a database domain.

Is the list of permitted data values correct?

Domain refers to the collection of all potential values for a data item. A domain establishes the column layout of a relational table.

To know more about domain visit:-

https://brainly.com/question/29452843

#SPJ4

what type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

Answers

An executable program attached to an email can help a malicious software of the computer virus kind spread by allowing it to replicate itself.

What kind of harmful program can duplicate itself through an executable but cannot stand on its own?

A worm is an independent program that copies itself to infect other computers without any human intervention. Worms are frequently used to carry out a payload—a piece of code designed to harm a system—because of their quick propagation.

Which types of harmful software require hosts in order to spread?

A computer worm is a sort of malware whose main purpose is to continue operating on infected systems while self-replicating and infecting additional machines. To propagate to uninfected systems, a computer worm copies itself.

To know more about computer virus visit :-

https://brainly.com/question/12929805

#SPJ4

which ipv6 header includes fields for the intermediary addresses through which the ipv6 packet should be forwarded

Answers

The ipv6 header is a routing extension that includes fields for the intermediary addresses that the ipv6 packet should be forwarded through.

Which field in an IPv6 packet is utilized by forwarding routers and source network hosts to assign distinct classes or priorities?

Traffic Class field: Nodes that start an IPv6 packet must distinguish between different classes or priorities. This identification is made by the nodes using the Traffic Class field in the IPv6 header. The Traffic Class field serves the same purpose as the packet forwarding routers.

What is the IPv6 extension header's hop-by-hop format?

After the IPv6 basic header, only a hop-by-hop option can be displayed. It ought to be the first extension header if it is utilized. It can't come after another header for the extension. specifies the parameters of packet delivery for the final destination host or intermediate destination devices.

To know more about ipv6 header visit :-

https://brainly.com/question/5441515

#SPJ4

4) Companies are legally required to have one logo that is always used.


True
False

Answers

Companies are legally required to have one logo that is always used is true statement.

What are Logos?

The term "logos" is used in Western philosophy, psychology, and rhetoric to describe the application of logic, reason, inductive reasoning, and deductive reasoning in an argument.

As one of the three principles of rhetoric, Aristotle originally codified the word's usage. This particular application links the word closely to the organization and content of the text. The development of this particular usage has followed the course of western philosophy and rhetoric.

Along with rhema, the word has also been employed in a variety of contexts. Both Plato and Aristotle referred to sentences and propositions as logos and rhema. The term is mostly used in this context in religion.

Therefore, Companies are legally required to have one logo that is always used is true statement.

To learn more about Logos, refer to the link:

https://brainly.com/question/29301948

#SPJ6

Cross peoples father chops just disappear with the advent of manufacturing today some manufacturing jobs are disappearing in favor of digital solutions what parallel can you draw between these two phenomena guns

Answers

Both the disappearance of manual labor jobs in manufacturing and the decline in the use of hand-chopped firewood can be seen as consequences of technological advancements and increased automation.

What is Automation?

Automation refers to the use of technology to perform tasks that would otherwise require human intervention. This can be achieved through the use of machines, software, or algorithms that are designed to perform specific tasks without the need for direct human involvement.

Automation has been widely adopted in industries such as manufacturing, transportation, and finance, as it allows for greater efficiency, speed, and cost savings. However, it can also result in job loss and the need for workers to acquire new skills to adapt to changing job markets.

To learn more about Automation, visit: https://brainly.com/question/28530316

#SPJ1

true or false: the 6to4 system is not subject to misconfigured network nodes, which results in excellent performance.

Answers

False, the 6to4 system is not subject to misconfigured network nodes, which results in excellent performance.

Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to gain access to a system?

In a phishing attack, an attacker masquerades as a reputable entity or person in an email or other communication channel. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions.

What happens when a router receives a packet with TTL of 0?

Then, the packet travels to the next destination on the network. When the TTL count is 0, after the final subtraction, the packet is discarded by the router. This triggers an Internet Control Message Protocol (ICMP) message that's sent back to the originating host.

To know more about network nodes visit :-

https://brainly.com/question/16009226

#SPJ4

False, the 6to4 system is not subject to misconfigured network nodes, which results in excellent performance.

Which of the following types of attacks serves the purpose of masquerading as an authorized user in order to gain access to a system?

In a phishing attack, a perpetrator poses as a trustworthy organisation or person in an email or other form of communication. Malicious links or attachments with a variety of uses are distributed by the attacker using phishing emails.

What occurs when a router receives a packet with a TTL of 0?

The packet then makes its way to the network's subsequent location. After the last subtraction, the packet is discarded by the router if the TTL count is 0. This results in an ICMP message being sent back to the source host.

To know more about network nodes visit :-

brainly.com/question/16009226

#SPJ4

the netstat command indicates that pop3 is in use on a remote server. which port is the remote server most likely using?

Answers

The remote server is most likely using port 110, which is the default port used for POP3 (Post Office Protocol version 3) communication.

What is remote server?

A remote server is a type of server that is hosted off-site and accessed over a network connection. This type of server allows organizations to store, manage and process data in a secure environment away from their local network. Remote servers are used for hosting websites, applications, databases and other services. They also provide a secure and reliable way to store data, which is often critical for business operations. Remote servers are typically maintained by managed service providers, who provide 24/7 monitoring, updates and maintenance.

POP3 is an application layer Internet protocol used to receive emails from a remote mail server. It allows a user to access emails from any device with an Internet connection and download them to their local machine. With POP3, the remote mail server will maintain a copy of the emails until the user has logged off.

To know more about remote server click-
https://brainly.com/question/29032807
#SPJ4

there are six routers between the source and destination host. how many transport processes will be involved?

Answers

Both at the source and the host, there will be two transport procedures. There will be transport operations routers .

How is each TCP segment used by the Internet process?

A TCP segment or a UDP datagram is made up of the application message or fragment that has been wrapped up with the TCP or UDP header. It embeds it within an IP packet's data field.

What role does the router play when it comes to Internet routing?

In order to connect two or more packet-switched networks or subnetworks, a router is used. It has two main purposes: letting several devices to share an Internet connection and controlling traffic between these networks by sending data packets to the correct IP addresses.

To know more about  routers visit :-

https://brainly.com/question/29768017

#SPJ4

Can I use an IF formula in conditional formatting?how to use it?

Answers

One of the methods to achieve Conditional formatting based on a custom formula is using the IF statement. The IF function works on the IF/THEN/ELSE condition syntax.

What is conditional formatting?

Using conditional formatting, it is simple to draw attention to certain values or particular cells. This alters a cell range's appearance to meet a requirement (or criteria). Use conditional formatting to draw attention to cells that have values that match a particular specification. A different option is to format an entire cell range and change the format precisely as the values of the individual cells change.

values for specific cells. Examples include the bottom 10% of scores, dates after this week, and numbers between 50 and 100.

The correlation of values in a cell range. Apply a colour scale so that the hue of the colour in each cell reflects the position of the value on the range, either at the top or bottom.

To know more about conditional formatting, check the link below:

https://brainly.com/question/16014701

#SPJ4

what socket do coffee lake processors use?

Answers

Answer:

Coffee Lake processors use the LGA 1151 socket.

Coffee Lake processors from Intel use the LGA 1151 socket. It's important to note that there are two variants of the LGA 1151 socket: the original version used with 6th and 7th generation processors (Skylake and Kaby Lake).

The revised version used with 8th and 9th generation processors (Coffee Lake and Coffee Lake Refresh). Although the physical socket is the same, there are some differences in chipset compatibility and power delivery between the two versions.

Coffee Lake processors, which were released by Intel, utilize the LGA 1151 socket. However, it is worth noting that there are two different versions of the LGA 1151 socket: LGA 1151v1 and LGA 1151v2. The Coffee Lake CPUs, specifically the 8th and 9th generation processors, require the LGA 1151v2 socket.

Learn more about Coffee Lake processors on:

https://brainly.com/question/30704108

#SPJ6

if you would like to allow your external subcontractors to submit their submittals in procore without giving them full access to the tool, which permission level should you assign them?

Answers

Answer:

standard

Explanation:

alice's computer is not working correctly, and she needs to bypass the os installed on her machine. which should she use to accomplish this? boot sequence input/output manager network manager startup utilities

Answers

To bypass the OS on her machine, Alice should use Startup Utilities, which are tools accessed by booting from an external source to diagnose and repair problems with the OS and hardware.

Alice should use Startup Utilities to bypass the operating system installed on her machine. Startup Utilities are a set of tools and procedures that are used to start and initialize a computer. They can be used to diagnose and repair problems with the operating system, including problems with the boot process. By using Startup Utilities, Alice can bypass the installed operating system(OS) and access the underlying system components and files to diagnose and repair her computer. Options such as boot sequence, input/output manager, and network manager are not directly relevant to bypassing the operating system.

Startup Utilities can include bootable diagnostic tools, such as hardware tests, disk repair utilities, and operating system repair utilities. They are typically accessed by booting the computer from an external source, such as a USB drive, CD/DVD, or network location. By accessing the Startup Utilities, Alice can diagnose problems with the operating system and hardware, and make any necessary repairs to get her computer running correctly again.

Learn more about CD/DVD here:

https://brainly.com/question/12292926

#SPJ4

ASAP Which page layout illustrates the principle of dynamic tension?


the one on the top


both of them


the one on the bottom


neither of them

Answers

The page layout that best illustrates this principle is the one on the top, as it contains elements of both opposition and balance. The correct answer A.

Dynamic tension is an art principle that is based on the idea of creating an image that is in balance but also contains elements of opposition.

The page on the bottom does not display dynamic tension, as all the elements on the page are in harmony with each other and do not create a sense of tension. Neither of the page layouts illustrate dynamic tension.

Learn more about dynamic stress:

https://brainly.com/question/12977661

#SPJ4

consider the following steps: organize the interface using the isd and site map. design interface standards. create an interface design prototype. examine the dfds and use cases to develop use scenarios. what is the second step in the user interface design process?

Answers

The second step in the user interface design process is D. examine the dfds and use cases to develop use scenarios.

In the term of computer and technology, User interface design also known as user interface engineering. User interface generally can be defined as  the design of user interfaces for machines and software. There are several machines that used user interface, such as computers, home appliances, mobile devices, and other electronic devices. User interface has a function  to focus on maximizing usability and the user experience.

Here you can learn more about user interface https://brainly.com/question/15704118

#SPJ4

suppose a programmer wants to store the number of pets a user owns in a variable, numpets. which type of variable should numpets be declared as?

Answers

Including the command password in a shell script will prompt the user to enter a password, which will then be saved in the $password variable.

Declaration of a local float variable. A local variable in Java programming doesn't have a default value. This means that before a value can be used, it must first be explicitly initialized to the local variable. On the other hand, the default value for static and instance variables depends on the data type. For instance, the value of an instance or static int variable is 0. The default value is false if the data type is Boolean. A for construct, a loop construction, is used to process an object list. As long as there are items to process, it continues to be done. We use the cut command to extract useful info from a file rather than cutting columns. In the cut command, tab serves as the fields' default delimiter.

Learn more about A local variable here:

https://brainly.com/question/14325424

#SPJ4

which is true? question 2 options: private members can be accessed by a class user a mutator is also known as a getter method a mutator may change class fields an accessor is also known as a setter method

Answers

Mutator method ds requires that the type of argument it accepts match the type of the variable it is changing.

Unlike mutator methods, which never return a value, accessor methods do. A mutation method sets priority, whereas an accessor method retrieves priority (). This function is present in both the setter and the getter of the Thread class in Java. The Mutator method needs to be declared as a public method. However, Mutator methods have no return type. However, they might take a parameter if the private variable's data type permits it. The private variable is then accessed using the term this, and its value is changed to match the value of the parameter. Java mutator methods reset a private variable's value.  As a result, other classes can change the value of that variable without having direct access to it.

Learn more about Mutator here:

https://brainly.com/question/29979461

#SPJ4

alice encrypts a message using the affine function x-ax (mod 26) for some a. the ciphertext is fap. the third letter of the plaintext is t. find the plaintext.

Answers

The message can be encrypted and decrypted using the affine function. We must determine the modulo 26 arithmetic inverse of "a" in order to decrypt the message.

What is the affine cipher's formula?

In conclusion, the formula y x + y is used to perform affine encryption on the English alphabet using encryption key (, ). (mod 26).

What is the formula for breaking the affine cypher used to encrypt the text?

What is the formula used to decode the text that was encrypted using the affine cypher (where a, b are constants and x is the numerical representation of an encrypted letter). For the purpose of encryption, the affine cypher makes use of linear algebra. For the purpose of decrypting ciphertext it employs the formula a-1(x-b)%26.

To know more about ciphertext visit:-

https://brainly.com/question/30143645

#SPJ4

packaged data models:group of answer choicesallow partial specialization.require customization.cannot be used for most applications.are ready to use right out of the box.

Answers

The relationship between database tables that hold details about packages is displayed by the package data modeling. A package is a group of items that are pre-selected for a fixed price.

What various forms does data modeling take?

Relational, dimensional, and entity-relationship models are the three main categories of data models (E-R). Hierarchical, network, object-oriented, and multi-value are some additional terms that are not commonly used.

What four database packages are an example?

A few examples of several databases include MySQL, SQL Server, MongoDB, Oracle Database, PostgreSQL, Informix, Sybase, etc. DBMSs control these contemporary databases. A database's data can be processed using Structured Query Language, or SQL as it is more often known.

To know more about data modeling visit :-

https://brainly.com/question/14866336

#SPJ4

What is an emerging technology?
A technology that is currently being developed or will be developed within the next few years.
A technology that will be developed for the next generation.
A technology that was recently invented

Answers

Answer:

a technology that is currently being developed or will be developed within

enterprise storage systems typically use fast fibre channel or connections and are scalable so more hard drives can be added as needed up to the maximum system capacity. a. raid b. supersd c. ssd d. iscsi

Answers

Enterprise storage systems often use RAID for scalable data protection, performance and can use fast connections such as Fiber Channel or iSCSI.

RAID (Redundant Array of Inexpensive Disks) is a method of using multiple hard drives to provide data protection, performance, and scalability in an enterprise storage system. Fiber Channel or fast connections are used for communication between the storage system and other parts of the network. Other options such as SSD (Solid State Drive), SuperSD, and iSCSI (Internet Small Computer System Interface) are also used in enterprise storage systems for various purposes.

RAID arrays can be configured in different ways to provide varying levels of data protection and performance, such as RAID 0 for performance, RAID 1 for data protection through mirroring, RAID 5 for data protection through parity, and RAID 6 for double-parity protection. Scalability is achieved by adding more hard drives to the RAID array as needed, up to the maximum system capacity. This allows for growth in data storage needs without the need for a complete system upgrade. Other storage solutions such as SSDs, SuperSDs, and iSCSI offer similar benefits, but may have different trade-offs in terms of performance, cost, and reliability, so it's important to choose the right storage solution based on specific needs and requirements.

Learn more about RAID here:

https://brainly.com/question/13163060

#SPJ4

web sites that continually search the web for information about people with desirable talents and sell access to their database of potential recruits are called .

Answers

Websites that continuously trawl the web for details on people with marketable skills and charge for access to their database of possible hires are known as web crawlers.

Is recruiting still being done as part of succession planning?

The practice of hiring talented individuals and fostering their knowledge, skills, and abilities in order to position them for future leadership positions is known as succession management. Long-term workforce planning is extremely dependent on succession management, particularly now that unemployment is at an all-time low.

Which of the following is an organization's internal source for hiring?

Internal source: Internal sources are people who are already working for the company. Additionally, it covers people who were employed and want to reapply.

To know more about web crawlers visit :-

https://brainly.com/question/9256657

#SPJ4

is icloud terrible? i have some movies i'm trying to download to my pc for editing. it says the network isn't active

Answers

iCloud is a crucial service for Apple users, according to experts. In addition to being practical and simple, it protects your data from hackers attempting to access your iPhone or other devices.

Exists a better iCloud substitute?

For a range of operating systems, including Android, iPhone, Mac, Windows, and Online / Web-based, there are more than 50 iCloud substitutes. Nextcloud, which is open source and free, is the best replacement.

Can I remove my iCloud data?

iCloud backup deletion is not as horrible as it sounds. The following are the key details you need to be aware of: The information you had previously backed up to iCloud will be deleted. Therefore, if you need to set up your You would have to start anew with an iPhone if you want to retrieve data from iCloud.

To know more about iCloud visit:-

https://brainly.com/question/30398117

#SPJ4

to merge results of multicore system in parallel programs, what techniques are usually used to minimize the number of communications among the cores?

Answers

The correct answer is What methods are typically utilised to reduce the amount of communication between cores when combining the results of multicore systems in parallel programmes .

An integrated circuit with two or more processing cores attached for improved performance and lower power consumption is called a multicore processor. Additionally, these processors allow for the more effective parallel processing and multithreading of numerous tasks. A multiprocessor system contains two or more processors, whereas a multicore system has a single processor with numerous execution units called cores. Although multicore processors have less traffic than multiprocessors, multiprocessors are more dependable than multicore processors. A single core can support many threads for parallel computation. The term "multi-Core processing" refers to the distribution of those threads to utilise the various CPU cores.

To learn more about multicore systems click on the link below:

brainly.com/question/24243437

#SPJ4

A customer is traveling to a branch office, and the network administrator provides her with a static IP address for her laptop Which should the customer do to use the static IP address? Run the command "ipconfig configure static" Assign the static IP in network adapter settings Switch the button from dynamic to static on her laptop Disconnect from WiFi and use an Ethernet cable Type the IP address into the browser

Answers

The customer must assign a static IP address in Network Adapt. To obtain a static IP address, contact your ISP (Internet Service Provider) and make a request. Then, under Windows settings, you may modify your usual IP address and configure a static IP address.

What are static IP addresses, and when should they be used in a home network?

Static IP addresses are typically more important when external devices or websites require your IP address to be remembered. VPN or other remote access solutions that trust (whitelist) specific IPs for security reasons are one example. When we don't want to modify the address associated with the device, we use a static IP address. When we wish to update the address and allow other devices to access it, we utilize a dynamic IP address. To modify your printer's IP address, enter its current IP address into a web browser's address bar. Then, on the Network or Settings page, set your printer's network to a static/manual IP address.

Learn more about web browser from here;

https://brainly.com/question/9776568

#SPJ4

What u.s. building can be sent mail using the zip code 20500?

Answers

Although the White House has a ZIP Code of 20500, it is actually located in ZIP Code 20006

What is a zip code?

Postal codes known as ZIP codes are used by the United States Postal Service (USPS). On July 1st, 1963, the basic format was unveiled and it had five digits. The five-digit ZIP Code, a hyphen, and four additional digits that indicated a more precise location made up the expanded ZIP+4 code, which was first introduced in 1983.

The acronym ZIP, which stands for Zone Improvement Project, was chosen to imply that letters are sent more effectively and quickly when the code is used in the postal address (zipping along). The ZIP Code term was first trademarked by the USPS; this registration expired in 1997.

To know more about Zip Code, check the link below:

https://brainly.com/question/23542347

#SPJ4

which duties are the responsibility of a company that is using aws lambda? (choose two.) a. security inside of code b. selection of cpu resources c. patching of operating system d. writing and updating of code e. security of underlying infrastructure

Answers

A. Security inside of code & D. Writing and updating of code, are the responsibility of a company that is using AWS lambda.

What is operating system?

An operating system (OS) is a software program that enables the computer hardware to communicate and operate with the computer software. It allows the user to interact with the computer’s hardware and software, including applications, peripherals, and other systems. It acts as an interface between the user and the computer, providing services such as memory management, application scheduling, user authentication, and security.

This single-board computer is powerful enough to run a full Linux OS, and its low cost makes it an ideal choice for prototyping projects. Additionally, Raspberry Pi is compatible with a variety of open-source security software applications, making it easy to secure a web service running on it.

To know more about operating system click-

https://brainly.com/question/22811693

#SPJ4

Other Questions
12. aj is 10 and the difference is 6, find the numbers. b) A number is greater than another number by 3. If their sum is 33, find the numbers. how much is 0.15% of 12000 ? A ball is thrown from a roof top at an angle of 45 above the horizontal. It hits the ground a few seconds later. At what point during its motion, does the ball have (a) greatest speed. (b) smallest speed. (c) greatest acceleration? Explain Assemble the statements and reasons bill wants to start a restaurant that fuses mexican and thai cuisines. he does not really know if this concept will be viable so he develops a limited menu and has friends and family fill out a questionnaire to gather information. bill is using . speedy shipping company is concerned about the high number of tickets its drivers are receiving. use the data gathered to create a pareto chart. what percent of tickets does the first bar on the left represent? erika wants at least 6 kilograms of apples for a recipe. she picks a 2.56-kilogram bag of red apples, a 1.18 kilogram bag of green apples, and a 2.79 kilogram bag of yellow apples PLEASE HELPPP!!!! 1. Square the binomial (x + y). What is the result?O x + yO x + 2xy + yO x + xy + yO 2x + 2y how does the narator's point of view most influence how events are described in the poem you are performing a whole cell patch clamp recording from a cortical pyramidal neuron. if you set the holding vm to -70 mv, which of the following is most likely? Brian and Bob visit a ski resort. Brian buys 3 full passes and 4 restricted passes. Thetotal cost of his passes is 185. This can be illustrated by the equation 3f + 4r = 185. Bob buys 2 full passes and 3 restricted passes. The total cost of his passes is 130. This can be illustrated by the equation 2f + 3r = 130. Find the cost of a restricted pass and the cost of a full pass. (3 marks)A restricted pass costs A full pass costs Tempo and dynamic markings are usually given in French. True False. Factor #2When dealing with kids a court shouldthink about this:povertyThis is really important because: ?? a 240 g air-track glider is attached to a spring. the glider is pushed in 10.4 cm and released. a student with a stopwatch finds that 8.00 oscillations take 12.0 s . What was the usual pattern when a couple married in China? the cow bos primigenius is bred by humans for meat and milk. it has a smaller brain and larger eyes than closely related wild species of ungulates. these traits most likely arose by . based on information in the passage, it can reasonably be inferred that jim's personality could best be described as Write a letter from Cole to Peter showing his true feelings and thoughts after reading the previous chapters. Which action is an example of the system of checks and balances? could natural selection, at any level of organiza- tion, ever cause the extinction of a population or species?