Write your own printArray() function found in Processing for the Arduino. For simplicity, you can limit printArray() to integer arrays and you will also pass the size of the array to your function. For example, given the following code:

int terps[5] = {7, 9, 12, 1, 46};
void printArray(int arrayToPrint[], int arraySize) { // YOUR CODE HERE }
void setup()
{ // put your setup code here, to run once:
Serial.begin(9600);
}
void loop() {
// put your main code here, to run repeatedly:
printArray(terps,sizeof(terps)/sizeof(int)); delay(1000);
}

You should repeatedly see the following in the serial monitor:

[0]: 7
[1]: 9
[2]: 12
[3]: 1
[4]: 46

Answers

Answer 1

Answer:

Follows are the method definition to this question:

void printArray(int arrayToPrint[], int arraySize) //defining a method printArray that accepts two array in its parameters

{

for (int j = 0; j < arraySize; j++)//defining for loop print Serial numbers

{

Serial.print("[");//use print method to print square bracket

Serial.print(j);//use print method to print Serial numbers

Serial.print("]: ");//use print method to print square bracket

Serial.println(arrayToPrint[j]);//printing array value

}

}

Explanation:

In the above code, a method "printArray" is declared that holds two arrays "arrayToPrint and arraySize" as a parameter, and inside the method is used for loop to print the values.

In the loop, first, it uses the square bracket to print the serial number and in the last step, it prints array values.


Related Questions

. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?

Answers

Explanation:

d answer

gzjxubejeiizbtozueg

the _ and _ services help us to keep in touch with our family and friends

Answers

Answer:

Internet and communication technology

Which of the following algorithms is the same as the flowchart shown below?
Start
mylum - RANDOM(1,10)
false
DISPLAY("Done
DISPLAY()
O Amylum - RANDOM (1, 19)
IF (byllum > 8)
(
DISPLAY("Done")
ELSE
(
DISPLAY(myNum)
}
OB. myllum - RANDOM(1, 18)
REPEAT UNTIL (byllum > 8)
{
DISPLAY(myNum)
myllum - RANDOM(1,18)
}
DISPLAY("Done")
Octylum - RANDOM(1, 18)
IF (myllum < 8)
{
DISPLAY("Done")
ELSE
{
DISPLAY(myllum)
)
O D. myllum - RANDOM(1, 18)
REPEAT UNTIL (myNun > 8)
{
DISPLAY("Done")
DISPLAY(byllum)

Answers

Answer:

choice b

Explanation:

The algorithms are the same as the flowchart shown below is myllum - RANDOM(1, 18), REPEAT UNTIL (byllum > 8) { DISPLAY(myNum)myllum - RANDOM(1,18)} DISPLAY("Done"). The correct option is B.

What is an algorithm?

The definition of algorithms in computer science. An algorithm is a list of instructions used in computer science to solve problems or carry out activities based on knowledge of potential solutions.

Think of a "black box," or a container where nobody can see what is occurring within. The box accepts our input and produces the output we require, but the process by which input is transformed into the intended output—and which we may need to understand—is an ALGORITHM.

Therefore, the correct option is B. myllum - RANDOM(1, 18)REPEAT UNTIL (byllum > 8){DISPLAY(myNum)myllum - RANDOM(1,18)}DISPLAY("Done").

To learn more about an algorithm, refer to the link:

https://brainly.com/question/22984934

#SPJ5

full meaning of ENDVAC

Answers

Answer:

EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.

Explanation:

Here is the full meaning

Hello! So I have been practising some coding, however, there seems to be an error in my code. I have been trying to figure out what is wrong, however, I just can't seem to find it. There is no syntax error but, there seems to be a problem with my input. I am currently using repl.it and I am making a calculator. I would input something like "multiply" however, the calculator would only square. I have tried changing the variables but it just keeps coming back to the first "if" statement. I would appreciate some help.

Answers

Answer:

You OR expressions are wrong.

Explanation:

Rather than writing:

  if method == "Square" or "square":

You should write:

  if method == "Square" or method == "square":

The expression should evaluate to something that is true or false.

In the above case, the expression is method == "Square" or method == "square" which can are actually two sub-expressions with an or in between them:

subexpr1 or subexpr2

each of the sub-expressions should evaluate to true or false.

method == "Square" is one of those sub-expressions.

That is how an expression is broken down by the compiler.

TIP: If you would add method = method.lower() right after the input, you could simplify all the if statements by removing the uppercase variants.

Use EBNF notation to describe the syntax of the following language constructs.
A. A Java return statement, which could be either a return keyword followed by a semicolon, or a return keyword followed an expression then followed by a semicolon. Assume the grammar for expression has been defined as expr-> e
B. A Python return statement, either a return keyword, or return one or more expressions separated by comma.
C. Based on your syntax definition in (b), is return x+y; a valid Python return statement?

Answers

Answer:

Following are the description to the given points:

Explanation:

To resolve basic design restrictions, EBNF has also been developed.This principle was its lack of support can identify repeatings easily. It implies that popular BNF models, like the description of a sequence of replicable elements, are complicated and rely on contra intuitive logical math.

To set a list of words divided by commas (e.g. john, coffee, logic) for instance, we would like to say something like "a list is a word accompanied by a few commas or terms." Through EBNF, they may say so. However, there have been no "many" alternatives in the standard BNF format. So, to describe something such as "a list is a term or a number accompanied by a pair with notation and script," you have to say the same thing. Which functions, although it is difficult, as it specifies a variety of lists instead of a specific list.

Essentially, "john, coffee, logic is John's list, accompanied by coffees or, and logic" would be the earlier link.  That's why in Option (a):

The return statement in Java is:

return ('”‘ (~[“] | ” [”e‘])*);

In option (c), it is the valid statement.

Write a SELECT statement that returns one row for each customer that has orders with these columns: The email_address from the Customers table

A count of the number of orders

The total amount for each order

(Hint: First, subtract the discount amount from the price. Then, multiply by the quantity.) Return only those rows where the customer has more than 1 order. Sort the result set in descending sequence by the total amount . Hint: You will join three tables together. Returns 3rows of data.

Questions done up until #4: https://pastebin.com/LwSKknPi

all questions before and after:

Write a SELECT statement that returns these columns:

The count of the number of orders in the Orders table

The sum of the tax_amount columns in the Orders table

Returns 1 row of data.

Write a SELECT statement that returns one row for each category that has products with these columns:

The category_name column from the Categories table

The count of the products in the Products table

The list price of the most expensive product in the Products table

Sort the result set so the category with the most products appears first.

Hint: You will join two tables together. Returns 3 rows of data.

Write a SELECT statement that returns one row for each customer that has orders with these columns:

The email_address column from the Customers table

The sum of the item price in the Order_Items table multiplied by the quantity in the Order_Items table

The sum of the discount amount column in the Order_Items table multiplied by the quantity in the Order_Items table

Sort the result set in descending sequence by the item price total for each customer.

Hint: You will join three tables together. Returns 7 rows of data.

Modify the solution to exercise 4 so it only counts and totals line items that have an item_price value that’s greater than 400. Returns 2 rows of data.

Write a SELECT statement that answers this question: What is the total amount ordered for each product? Return these columns:

The product name from the Products table

The total amount for each product in the Order_Items (Hint: You can calculate the total amount by subtracting the discount amount from the item price and then multiplying it by the quantity)

Use the WITH ROLLUP operator to include a row that gives the grand total.

Hint: You will join two tables together. Returns 10 rows of data.

Write a SELECT statement that answers this question: Which customers have ordered more than one product? Return these columns:

The email address from the Customers table

The count of distinct products from the customer’s orders

Hint: You will join three tables together. . Returns 3 rows of

Answers

Answer:

Please find the attachment files of the queries:

Explanation:

In the all queries the select statement is used that selects the defined columns and use the function like sum, join, orderby, and groupby to perform the various operations, in which the sum is used to add columns or rows values, join is used for joining two or more tables, and orderby is used for return the table into ascending or descending order, and groupby is used for the count the value, calculate average and perform other operation and gives its return value.

starting a computer or computer embedded devices is called ​

Answers

Answer:

Booting

Explanation:

starting a computer is called booting. In addition restarting is known as rebooting.

can anyone teach me the basics of lua scripts 50 points
like how do i tell lua to move a object or send me a prompt asking me to do something

Answers

Answer:

are you talking about about a game, or coding?

Write a SELECT statement that returns three columns: VendorName from Vendors table, DefaultAccount No from Vendors table, AccountDescription from Invoice table. The result set should have one row for each vendor, with the account number and account description for that vendor’s default account number. Sort the result set by AccountDescription, then by VendorName

Answers

Answer:

SELECT VendorName, InvoiceNumber, InvoiceDate,

InvoiceTotal - PaymentTotal - CreditTotal AS Balance

FROM Vendors JOIN Invoices

ON Vendors.VendorID = Invoices.VendorID

WHERE InvoiceTotal - PaymentTotal - CreditTotal > 0

ORDER BY VendorName;

Answer:

C

Explanation:

list out various computer generation long with their basic characteristic ​

Answers

Answer:

1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ... 1956 – 1963: Second Generation – Transistors. ... 1964 – 1971: Third Generation – Integrated Circuits. ... 1972 – 2010: Fourth Generation – Microprocessors

Explanation:

there are 4 generations ok

please mark me as brainlist

You are asked to write a program that prompts the user for the size of two integer arrays, user input for the size must not exceed 50, you must validate this. We will use these arrays to represent our sets. These arrays will be randomly populated in the range that is 1 through double the size of the array. So if the array is of size 20, you will randomly populate it with values in the range 1-40 inclusive.

Answers

Answer:

In Java:

import java.util.*;

public class MyClass{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 System.out.print("Length of array 1: ");

 int lent1 = input.nextInt();

 while(lent1 <= 0 || lent1 > 50){

     System.out.print("Length of array 1: ");

     lent1 = input.nextInt();

 }

 int[] array1 = new int[lent1];

 System.out.print("Length of array 2: ");

 int lent2 = input.nextInt();

 while(lent2 <= 0 || lent2 > 50){

     System.out.print("Length of array 2: ");

     lent2 = input.nextInt();

 }

 int[] array2 = new int[lent2];

 for(int i =0;i<lent1;i++){

     array1[i] = (int)(Math.random() * (lent1*2) + 1);

 }

 for(int i =0;i<lent2;i++){

     array2[i] = (int)(Math.random() * (lent2*2) + 1);

 }

 System.out.print("Array 1: ");

 for(int i =0;i<lent1;i++){

     System.out.print(array1[i]+" ");

 }

 System.out.println("Array 2: ");

 for(int i =0;i<lent2;i++){

     System.out.print(array2[i]+" ");

 }

}

}

Explanation:

This prompts the user for length of the first array

 System.out.print("Length of array 1: ");

This declares and gets input for the length of the first array

 int lent1 = input.nextInt();

This validates the length of first array

 while(lent1 <= 0 || lent1 > 50){

     System.out.print("Length of array 1: ");

     lent1 = input.nextInt();  }

This declares the first array

 int[] array1 = new int[lent1];

This prompts the user for length of the second array

 System.out.print("Length of array 2: ");

This declares and gets input for the length of the second array

 int lent2 = input.nextInt();

This validates the length of the second array

 while(lent2 <= 0 || lent2 > 50){

     System.out.print("Length of array 2: ");

     lent2 = input.nextInt();  }

This declares the second array

 int[] array2 = new int[lent2];

The following generates random integers between 1 and lent1*2 to array 1

 for(int i =0;i<lent1;i++){

     array1[i] = (int)(Math.random() * (lent1*2) + 1);  }

The following generates random integers between 1 and lent2*2 to array 2

 for(int i =0;i<lent2;i++){

     array2[i] = (int)(Math.random() * (lent2*2) + 1);  }

This prints the header Array 1

 System.out.print("Array 1: ");

The following iteration prints the content of the first array

for(int i =0;i<lent1;i++){

     System.out.print(array1[i]+" ");

 }

This prints the header Array 2

 System.out.println("Array 2: ");

The following iteration prints the content of the second array

 for(int i =0;i<lent2;i++){

     System.out.print(array2[i]+" ");

 }

What does the abbreviation JPEG stand for?
A. Japanese Photographic Examination Group
B. Joint Photo Examination Group
C. Joint Photographic Expert Group
D. Jefferson Photo Exclusive Group
E. Jacket Photo Extension Group

Answers

Answer:

c) giant photographic experts group

Answer:

C

Explanation:

(often seen with its file extension stands for

"Joint Photographic Experts Group",


Name the eight areas in which computers are used.
1.
2.
3.
4.
5.
6.
7
8.
s Review (Page 121​

Answers

Answer:

pakistan

india

usa

china

uk

afghanistan

iran

iraq

israel

1, How can technology serve to promote or restrict human rights? [2 points]

Answers

Answer:

Examples of how technology can be used as a powerful tool for human rights are ever expanding. Newer technologies such as artificial intelligence, automation, and blockchain have the potential to make significant positive contributions to the promotion and protection of human rights.

I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?

Answers

Yes u need more brackets

Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==

In Linux, users are internally represented using a unique number called user ID or uid.

a. True
b. False

Answers

Answer:

a. True

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

In Linux, users are internally represented using a unique number called user ID or UID. Thus, this unique number serves as an internal identifier in the Linux Kernel and as such determines what system resources may be accessible to each user. Oftentimes, these unique numbers are not put into use but rather a name is linked with the number and are used instead.

Also, users can be organized logically into a group and are represented uniquely with a group ID or GID, which serves as a global identifier for the users.

when working with smart which tab would provide the ability to change the shape or size of the smart art shapes

Answers

It doesn’t change shape

Answer:

B) Format

Explanation:

Q3: Create a class called Employee that includes three instance variables—a first name (typeString), a last name (type String) and a monthly salary (double). Provide a constructor that initializesthe three instance variables. Provide a set and a get method for each instance variable. If the monthly salary is not positive, do not set its value. {Do not write a full program, only a class}

Answers

Answer:

Follows are the code to the given question:

public class Employee //defining a class Employee

{

String first_name,last_name;

Double monthly_salary;

Employee(String first_name,String last_name,Double monthly_salary)

{

   this first_name=f_name// initialize value in first_name

   this last_name = l_name; // initialize value in the last_name

    this monthly_salary = m_salary; // initialize value in the monthly_salary

if (monthly_salary < 0.0)//use if to check monthly_salary is positive

           monthly_salary = 0.0;//set value 0

}

void setfirst_name (String f_name)//defining set method to store first_name

{

first_name = f_name; //holding the value of first_name

}  

public String getfirst_name ()//defining get method to return first_name

{

return first_name;//return first_name

}  

public void setlast_name (String l_name)//defining set method to store last_name

{

last_name = l_name; // holding the value of the last_name

}

public String getlast_name ()//defining get method to return last_name

{

return last_name;//return last_name

}  

public void setmonthly_salary(double m_salary)//defining set method to store monthly_salary

{

monthly_salary = m_salary; // holding the value of the monthly_salary

}

public double getmonthly_salary ()//defining get method to return monthly_salary

{

return monthly_salary;//return monthly_salary  

}

}

Explanation:

In this code, a class "Employee" is declared that defines two string variables  "first_name,last_name", and one double variable "monthly_salary". In the next step, a parameterized constructor is defined that stores the value into the variable, and use if block to check "monthly_salary" is a positive. It also uses the getter and setter method to hold and return its value.  

   

Implement the function permutations() that takes a list lst as input and returns a list of all permutations of lst (so the returned value is a list of lists). Do this recursively as follows: If the input list lst is of size 1 or 0, just return a list containing list lst. Otherwise, make a recursive call on the sublist l[1:] to obtain the list of all permutations of all elements of lst except the first element l[0]. Then, for each such permutation (i.e., list) perm, generate permutations of lst by inserting lst[0] into all possible positions of perm.

>>> permutations([1, 2])

[[1, 2], [2, 1]]

>>> permutations([1, 2, 3])

[[1, 2, 3], [2, 1, 3], [2, 3, 1], [1, 3, 2], [3, 1, 2], [3, 2, 1]]

>>> permutations([1, 2, 3, 4])

[[1, 2, 3, 4], [2, 1, 3, 4], [2, 3, 1, 4], [2, 3, 4, 1],

[1, 3, 2, 4], [3, 1, 2, 4], [3, 2, 1, 4], [3, 2, 4, 1],

[1, 3, 4, 2], [3, 1, 4, 2], [3, 4, 1, 2], [3, 4, 2, 1],

[1, 2, 4, 3], [2, 1, 4, 3], [2, 4, 1, 3], [2, 4, 3, 1],

[1, 4, 2, 3], [4, 1, 2, 3], [4, 2, 1, 3], [4, 2, 3, 1],

[1, 4, 3, 2], [4, 1, 3, 2], [4, 3, 1, 2], [4, 3, 2, 1]]

Answers

Answer:

def permutations(myList: list)-> list:  

   if len(myList) <= 1:  

       return [myList]  

   perm = []  

   for i in range(len(myList)):  

      item = myList[i]  

      seglists = myList[:i] + myList[i+1:]  

      for num in permutations(seglists):  

          perm.append([item] + num)  

   return perm

 

data = [1,2,3]  

result = permutations(data)  

print(result)

Explanation:

The program defines a python function that returns the list of permutations. The program checks if the length of the input list is less than or equal to one. The function declaration identifies the input and output as lists.

The for loop iterate through the list and the permutations are saved in an empty list in the next loop statement. At the end of the program, the list of lists is returned.

The components of hardware include:
A) Monitor, CPU, Disk Drives, Printer, Keyboard/Mouse
B) Monitor, CPU, Disk Drives, Touch Screen, Keyboard/Mouse
C) Monitor, CPU, Software, Printer, Keyboard/Mouse
D) None of the above

Answers

Answer:

A

Explanation:

Monitor, CPU, Disk Drives, Printer, Keyboard/mouse

Answer:

B.monitor,cpu,disk drives,touch screen,keyboard/Mouse

Do you think it's easier to be mean online than offline? why?

Answers

Answer:

Yes because on online we can talk all we want and they don't know us irl so it's funny lol

Explanation:

Consider the security of a mobile device you use
(a) Explain how transitive trust applies to your use of an operating system on a
mobile device (e.g. smartphone). Then, explain how an attacker can exploit this
transitive trust to violate the CIA properties of the software and data on your
device

Answers

Answer:

keep it private

Explanation:

Cole has to edit and resize hundreds of photographs for a website. Which Adobe

software program would be the best choice to complete this task?

a.) Animate b.) Dreamweaver c.) Illustrator d.) Photoshop​

Answers

D.) Photoshop

Hope this helped, have a great day

Lets say if my computer shut down every 10 minutes. What can you do to solve the problem. Hint: Use these word in you answer: handy man, restart, shut down, call, and thank you.

Answers

Answer:

You should restart your computer

Answer:

You could call a handy man to take a look at your computer if you are having drastic issues. You could also restart or shut down you computer a few times because it might need a massive update. You might need to call the company  you bought your computer from and ask about what to do when that problem is happening. Thank you for reading my answer!

Explanation:

I think these answers make since.

It is important to create a strong password because it will

let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus

Answers

Keeps your private information safe and secure...
PLP 2021

What are the three types of networks?
A) Internet, PowerPoint, Excel
B) Internet, LAD, WAN
C) Internet, WAN, LAN
D) None of the above

Answers

Answer:

Local Area Network (LAN)

Metropolitan Area Network (MAN)

Wide area network (WAN)

(So C, I'm pretty sure.)

Answer:

LAN,MAN,WAN

Explanation:

are the three types of network

Write code to take two words from the user. The program should convert these to lower case, then compare them: printing a positive number if string1 appears after string2 alphabetically, a negative number if string1 appears before string2 alphabetically and zero if the two strings are identical. Make sure your program does not produce any additional numerical output other than this number or it may not be graded correctly.

Answers

Answer:

Use compareTo.

Explanation:

import java.util.Scanner;

public class U2_L3_Activity_Three{

 public static void main(String[] args){

   Scanner scan = new Scanner(System.in);

   System.out.println("Enter first word: ");

   String word1 = scan.nextLine();

   System.out.println("Enter second word: ");

   String word2 = scan.nextLine();

//I had to make the string all lowercase or all uppercase for when I did this

   word1 = word1.toLowerCase();

   word2 = word2.toLowerCase();

   System.out.println("Result: " + word1.compareTo(word2));

 }

}

Following are the program to converting string value into lowercase and compare with an input string value.

Program Explanation:

Import package.Defining a class Dat.Inside the class defining the main method, and in the method, two string variable "string1, string2" is declared.After input, the value a "toLowerCase" method is used that converts string value into lower case.  After converting value into the lower case a "compareTo" method is used that compares value and prints its value.

Program:

import java.util.*;//import package for input  

public class Dat //defining a Dat

{

public static void main(String[] ax)//main method

{

String string1 ,string2; //defining String variable

Scanner sc = new Scanner(System.in);//creating Scanner class object to input value

System.out.println("Enter values: ");//print message

string1= sc.next();//input value

string2= sc.next();//input value

string1= string1.toLowerCase();//convert string value into LowerCase  

string2 = string2.toLowerCase();//convert string value into LowerCase

System.out.println("Result: " + string1.compareTo(string2));//using compareTo method

}

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/15706308

We are supposed to go to the concert tomorrow, but it has been raining for three days straight. I just know that we won’t be able to go.

7. What is the author’s tone? ​

Answers

Its the worried tone

Hope this helps!

There Will Come Soft Rains is a warning story about nuclear war and how, in the end, technology won't keep us safe. In response to the atomic bombings of Hiroshima and Nagasaki, Bradbury penned the tale.

What author’s worried tone indicate about rain?

Ray Bradbury wrote the classic science fiction short tale “There Will Come Soft Rains” in 1950. The narrative is narrated in a detached, emotionless tone, as though the events that are taking place are a normal part of everyday life.

The story's meaning can be found in the story's complete lack of human beings, not even corpses.

Soft rain rays will appear in the short story. Bradbury creates a disorganized, somewhat post-apocalyptic atmosphere. To better understand the zeitgeist of the world, he employs a variety of literary techniques.

Therefore, It's the worried tone author’s.

Learn more about author’s here:

https://brainly.com/question/1308695

#SPJ5

Write a print statement that uses an f-string to output $5,242.83

Answers

Answer:

print("${:,.2f}".format(5242.83))

Explanation:

Given

$5,242.83

Required

Use an f string to output the above

The syntax of an f-string to format a number in that regard is: "${:,.2f}".format(number)

$ means that a dollar sign be printed before the required number

., means that the number be separated with commas

2f means that the number be presented in 2 decimal places

So:

"${:,.2f}".format(number) becomes

"${:,.2f}".format(5242.83)

In a print statement, the full instruction is:

print("${:,.2f}".format(5242.83))

Other Questions
Question 9 of 10What is the product of the following numbers? Use a scientific calculator tofind the answer.5.56 x 104 x 2.43 x 106A. 2.23 x 10-2OB. 1.97 x 101C. 1.35 1020OD. 1.35 x 101 How many 5 card hands are possible with a 52-card deck? Which verb pair best completes this sentence?Te ________ para la clase de baile? Con quin ________? A. inscribimos, hablamos B. inscrib, habl C. inscribiste, hablaste D. inscribi, habl The scores of 10 students on a history test are 85, 79, 65, 72, 86, 66, 90, 98, 78, and 76. Which box plot represents the given data?. 2y = 6x + 4y = -2x + 2find x and y How do I Create a table in form? How did Romanticism impact the world? How do you say bored in Korean? A rectangle has a width of 15 cm and a length of 25 cm. What is the perimeter of the rectangle?A. 50 cmB. 75 cmC. 100 cmD. 125 cm Choose the correct sentence. a) Amish cant have a long hair b) Ive just heard a very interesting news c) Theres always a terrible traffic in Los Angeles d) Its best not to take too much luggage How did Homer and the Iliad and the Odyssey influence Greek culture? The number of CD's sold since April 8 at a music store can bemodeled by the function N(d) = 12d +35 and the price perCD can be modeled by P(d) = 0.3d2 - d+5, where d isthe number of days since April 8.of revenueAccording to this model, what is the total amount of revgenerated by the store's CD sales on April 18? A.tukuyin Ang pang-uri at Ang inilarawan into.isulat Ang tamang sagot sa iyong kuwaderno 1.maliit lamang Ang Isla ng Batanes subalit napaka sarap maglakbay dito What is the importance of being financially responsible? The price of a technology stock has risen to $9.62 today. Yesterday's price was $9.55. Find the percentage increase. Round your answer to the nearest tenth of a percent. Two motors m1 and m2 are controlled by three sensors s1,s2 and s3 one motor s2 is to run any time all three sensors are on the other motor is to run whenever sensor s2 or s1 but not both are on and s3 is off for all sensor combinations where m1 is on m2 is to be off except when all three sensors are off and then both motors must remain off. Design a logic circuit for this problem and all steps eliminate the parameter t to find a Cartesian equation for:x=t2y=2+3tx=Ay2+By+CWhere A=________ B=__________ and C=________ The United States' annexation of Hawaii was associated with which type of policy? (3 points)imperialismIsolationisminterventionismIndustrialization If you had a business and wanted to capitalize on your information about the population age distribution for the United States, what would you sell and why? What business in Nigeria? A business in Germany? 100 POINTS! PLEASE HELPGiven that one of the factors is (x-5), which graph represents the polynomial function?y=-x^4 +6x^3 +11x^2 -60x -100