After completing your analysis of the rating system, you determine that any rating greater than or equal to 3.75 points can be considered a high rating. you also know that chocolate and tea considers a bar to be super dark chocolate if the bar's cocoa percentage is greater than or equal to 80%. you decide to create a new data frame to find out which chocolate bars meet these two conditions. assume the first part of your code is: best trimmed flavors df <- trimmed flavors df %>% you want to apply the filter() function to the variables cocoa.percent and rating. add the code chunk that lets you filter the new data frame for chocolate bars that contain at least 80% cocoa and have a rating of at least 3.75 points.
How many rows does your tibble include?
- 12 - 08
- 20 - 22

Answers

Answer 1

The new data frame for chocolate bars that meet the conditions of having at least 80% cocoa and a rating of at least 3.75 points, we can use the following code:

```
new_df <- df %>%
 filter(cocoa.percent >= 80, rating >= 3.75)
```
This code creates a new data frame called `new_df` that filters the `df` data frame for chocolate bars with cocoa percentages of at least 80% and a rating of at least 3.75 points.

We don't have enough information to determine how many rows the new tibble will include because we don't know the size of the original `df` data frame.

To know more about code visit:-

https://brainly.com/question/17204194

#SPJ11


Related Questions

how many bits would be needed to count all the students in class today

Answers

Answer:

5 bits

Explanation:

Most classes have around 20 student with a 5-bit system goes up to 31 ( 1+2+4+8+16) and a 4-bit system(1+2+4+8) goes up to 15. Bits are the 1s and 0s and so a 5-bit system looks like this: 01001(18).

Which unknown factor affects prices in the financial markets?

Income taxes
Media speculation
Government policy
Trade regulations

Answers

Answer:

There are four major factors that cause both long-term trends and short-term fluctuations. These factors are government, international transactions, speculation and expectation and supply and demand.

Explanation:

Design Questions Requirement 1) Implement a timer with the use of a binary up counter driven by a 1 Hz clock. The timer is activated for a duration of 10 seconds. After 10 seconds has elapsed, it should provide an output signal to the vehicle counter to request it to stop the vehicle counting process. Show the timing diagram in order to verify that it is counting up correctly. [5 Marks] 2) With the use of a binary up counter, implement a vehicle counter that will count the number of vehicles that pass by the sensor placed at the roadside. A short high pulse is produced by the sensor circuit if a vehicle is detected passing by the sensor. A simple button in Logisim can be used to simulate the pulse signal. The pulse signal causes the binary counter to count up. The counter should be able to count to a maximum of 15 vehicles. After it receives the signal from the timer to stop counting, the data related to the total detected vehicles is then displayed. The vehicle count data is in binary value. It is displayed in decimal format by the circuit that you have built in assignment 2. Recall that the assignment 2 circuit show the binary code decimal value with 7 segment display. [5 Marks] Figure 1: Overall system block diagram

Answers

Design Questions Requirement 1)Implementation of a timer using a binary up counter driven by a 1 Hz clock is as follows: The 1 Hz clock frequency is divided by 2^x to obtain a 10-second period for the timer.

To divide the frequency of the clock, a binary up counter is used. For example, a 14-bit binary up counter would count from 0 to 16,384, with an output pulse generated when it reaches its maximum count of 16,383. Since the frequency of the clock is 1 Hz, 16,384 clock cycles correspond to 16,384 seconds, or 273.07 minutes.

The timer signal is input to the vehicle counter to stop the counting process after 10 seconds. In the timing diagram below, the output pulse is shown after the counter reaches its maximum count, indicating the 10-second timing period has elapsed. Requirement

2)The vehicle counter is implemented using a binary up counter that counts up when a high pulse is detected from the sensor circuit. A short high pulse is generated by the sensor circuit when a vehicle is detected passing by the roadside sensor.

The counter is capable of counting up to 15 vehicles, after which it stops counting when a signal is received from the timer. The binary code for the detected vehicle count is then transformed to decimal format, which is displayed on a 7-segment display by the circuit built in Assignment 2. 

To know more about frequency visit:

https://brainly.com/question/29739263

#SPJ11

A collection of wiress connecting the CPU with main memory that is used to identify particular location is called

Answers

Answer:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory. The width of the address bus (that is, the number of wires) determines how many unique memory locations can be addressed.

Explanation:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.

What is CPU?

The electronic equipment that carries out the instructions included in a computer program is known as a central processing unit (CPU), sometimes known as a central processor, main processor, or simply processor.

The CPU executes fundamental mathematical, logical, controlling, and input/output (I/O) activities as directed by the program's instructions. In contrast, specialized processors like graphics processing units and external components like main memory and I/O circuitry (GPUs).

Although CPUs' shape, design, and implementation have evolved throughout time, their basic function has remained mostly same. The arithmetic-logic unit (ALU), which performs arithmetic and logic operations, processor registers.

Therefore, Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.

To learn more about CPU, refer to the link:

https://brainly.com/question/16254036

#SPJ5

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”

Python and using function

Answers

Answer:

def ix(s):

   return s[1:3]=="ix"

Explanation:

Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process

Answers

Answer:

Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process

while you should press f3

Explanation:

beginning on page 96 of the information technology and organizational learning text, the author presents three phases of maturation with technology.

Answers

I apologize for the confusion, but as an AI language model, I don't have direct access to specific books or their page numbers. However, I can provide you with a general understanding

In the field of information technology and organizational learning, the maturation process typically involves the adoption, integration, and eventual mastery of technology within an organization. While I cannot refer to a specific page in the book you mentioned, I can provide a general overview of the three phases based on common industry knowledge:Initiation Phase:In this initial phase, organizations start exploring and experimenting with new technologies. There is a recognition of the potential benefits and opportunities that technology can bring to the organization.The organization may invest in pilot projects or small-scale implementations to evaluate the effectiveness and suitability of the technology.During this phase, there is often a learning curve as employees become familiar with the technology and its capabilities.Implementation Phase:Once the organization decides to move forward with the technology, the implementation phase begins. This involves a more widespread deployment of the technology across different departments or functions.The organization focuses on integrating the technology into existing processes and workflows. This may involve training employees, modifying business processes, and aligning the technology with organizational goals and objectives.The implementation phase may encounter challenges, such as resistance to change, technical issues, or resource constraints. Effective change management practices and support from leadership are crucial during this phase.

learn more about apologize here :

https://brainly.com/question/31108667?

#SPJ11

Demonstrate an understanding of net neutrality (pages 327-328) and how it affects the home, education, and work environment. Your post should contain a reflection of these topics.

Answers

Net neutrality is a principle of the internet that states that all data transmitted over the internet should be treated equally by Internet Service Providers (ISPs).

The home environment is where the debate around net neutrality began, and it is also the most affected environment. Since the home is where the majority of people access the internet, net neutrality can have a significant impact on their internet experience.


Finally, the work environment has also been affected by the net neutrality debate. Companies that rely on the internet to conduct their business may be affected if net neutrality is not respected.


In conclusion, net neutrality is a crucial principle that must be respected to ensure that the internet remains an open and free space where everyone can communicate with each other.

To know more about debate visit:

https://brainly.com/question/13308791

#SPJ11

Crack the secret message: Crrp, Crrp, Crrp Zh’uh jrlqj wr wkh prrq. Li brx zdqw wr wdnh d wuls, Folpe derdug pb urfnhw vkls. (hint: the original letters were shifted,for example if it is shifted by 1 that means Z becomes A , A becomes B, etc. You need to know the number of shifts)

Answers

Answer:

Zoom, Zoom, Zoom We’re going to the moon. If you want to take a trip, Climb aboard my rocket ship.

Explanation:

I got it. This is a caesar cipher with 3 shifts.

state three differences between text data and number data​

Answers

Answer:

Strings contain alphanumeric characters. Even if the string contains numbers, they are treated as text. Think of the example of ZIP codes. Two of the most widely used numeric data types are integers, which consist of whole numbers, and decimals, which are also called floats or doubles.

Answer:

Explanation:

text data can be a mixture of alpha numeric data (has both letters and numbers). This can be in the form of print or speech

number data is just numbers.

16. What statement describes the function of the Address Resolution Protocol?ARP is used to discover the IP address of any host on a different network.ARP is used to discover the IP address of any host on the local network.ARP is used to discover the MAC address of any host on a different network.

Answers

Address Resolution Protocol (ARP) is a protocol used for mapping an Internet Protocol (IP) address to a physical machine address (MAC Address) that is recognized in the local network. It is used to discover the MAC address of any host on the local network.

Address Resolution Protocol (ARP) is a protocol used to map an Internet Protocol (IP) address to a physical machine address, such as a Media Access Control (MAC) address. ARP is used to discover the MAC address of any host on a local area network (LAN) so that data can be sent from one host to another. The IP address is used to identify the host, while the MAC address is used to identify the physical port of the host. ARP operates by broadcasting a request to all hosts on the LAN, asking the host with the specific IP address to identify itself. The host with the specified IP address then responds with its MAC address. This is how ARP resolves the IP address to the MAC address.

learn more about internet here

https://brainly.com/question/10873104

#SPJ4

Javed’s teacher tells him she would like to see him improve his speaking skills in the next debate by including a rhetorical appeal. To be a more effective speaker, what is the best rhetorical appeal for Javed to add?

Answers

The Answer is Option D

Answer:

D - He should add logos, with evidence to support his ideas and link them together

Explanation:

>.<

What is an Array? 20 POINTS!!!
a. the total number of items in the collection

b. how you could order items in the collection (for example, date, price, name, color, and so on)

c. a unique address or location in the collection (for example, page number in an album, shelf on a bookcase, and so on)

d. the type of item being stored in the collection (for example, DC Comics, $1 coins, Pokémon cards, and so on)

Answers

Answer:

I'm about 99% sure it's C: a unique address or location un the collection

Use the Regression tool on the accompanying wedding data, using the wedding cost as the dependent variable and attendance as the independent variable. Complete parts a through c. Click the icon to vie

Answers

The regression tool on the wedding data reveals a positive relationship between attendance and wedding cost. As the attendance increases, the cost of the wedding tends to increase as well.

The regression analysis was conducted using attendance as the independent variable and wedding cost as the dependent variable. The results indicate a positive correlation between these two variables. This means that as the number of attendees at a wedding increases, the overall cost of the wedding tends to be higher.

The positive relationship between attendance and wedding cost can be attributed to various factors. Firstly, a larger number of guests typically requires a larger venue, which can be more expensive to rent. Additionally, more guests may require a greater amount of food and beverages, resulting in higher catering costs. Other aspects such as decorations, entertainment, and favors may also be influenced by the number of attendees, contributing to an overall increase in wedding expenses.

It is important to note that while attendance is a significant factor in determining wedding cost, there are other variables that can also influence the overall expenses. Factors like location, season, wedding theme, and personal preferences of the couple can all play a role in determining the final cost of a wedding.

In conclusion, the regression analysis reveals a positive relationship between attendance and wedding cost. A higher number of attendees is generally associated with higher wedding expenses. However, it is essential to consider other factors as well when estimating the total cost of a wedding.

Learn more about regression tool

brainly.com/question/32117060

#SPJ11

to gain a deeper understanding of a text, students should

Answers

Answer:

Should explain what they learned, be able to explain what is happening in great detail, and if its an informational text, then they should use what they learn and apply it in real life.

Explanation:

Cups gets its directives from its configuration file, which is /etc/cups/__________.

Answers

CUPS (Common Unix Printing System) is a modular printing system that allows computers to communicate with printers and efficiently manage print jobs. CUPS gets its directives from its configuration file, which is located at /etc/cups/cupsd.conf.

This configuration file contains various settings that control how CUPS operates, such as listening addresses, access control, logging, and default print settings. The cupsd.conf file can be edited by system administrators to modify these settings as needed, allowing for customization of the print environment.By using the configuration file, CUPS can be tailored to meet the requirements of different organizations, ensuring smooth print operations and a better user experience. Some common changes made to the cupsd.conf file might include adjusting the LogLevel to monitor printing activity, setting access control rules to restrict user access, or configuring printer sharing for a network.Remember to restart the CUPS service after making any changes to the configuration file for them to take effect.This can be done using the command "sudo systemctl restart cups" on most Linux systems.The /etc/cups/cupsd.conf file is essential for controlling the behavior of the CUPS system, allowing administrators to configure printing settings according to their needs. Make sure to edit this file cautiously, as incorrect configurations can lead to printing issues or service failures.

For such more questions on CUPS

https://brainly.com/question/26941359

#SPJ11

What is the output of this program?

numA = 2
numB = 3
if numA == 2 or numB == 2:
print("yes")
elif numA == 2 and numB == 3:
print("no")
Output:

Answers

The output of this program would be letter b (numB=3) because square 2 equals 82 squares and then you get three

Answer:

out is no

Explanation:

just took the quiz

explain methods that describe how to make forensically sound copies of the digital information.

Answers

Creating forensically sound copies of digital information is crucial in the field of digital forensics to ensure the preservation and integrity of evidence.

Several methods can be employed to achieve this:

1)Bitstream Imaging: This method involves creating an exact sector-by-sector copy of the original digital media, including all data and metadata.

Tools like dd or FTK Imager can be used to capture a bitstream image, which ensures that the copy is an exact replica of the original.

Hash values such as MD5 or SHA-256 can be computed for verification purposes.

2)Write-Blocking: Before making a copy, it is essential to use hardware or software write-blocking techniques to prevent any accidental modification of the original data.

Write-blockers, like Tableau or WiebeTech devices, intercept write commands, allowing read-only access during the imaging process.

3)Validation and Verification: Once the copy is created, it is crucial to validate its integrity.

Hash values generated during the imaging process can be compared with the hash values of the original media to ensure their match.

Additionally, tools like EnCase or Autopsy can perform file-level validation to verify the integrity of individual files within the copy.

4)Chain of Custody: Maintaining a proper chain of custody is essential to establish the integrity and admissibility of digital evidence.

Documenting each step of the imaging process, including who performed the copy, the date and time, and any changes made, ensures that the evidence is legally defensible.

5)Preservation: The forensically sound copy should be stored in a secure and controlled environment to prevent tampering or accidental modification.

Access to the copy should be restricted, and measures like write-protecting or storing it on write-once media, such as write-once DVDs or read-only drives, can enhance its preservation.

For more questions on digital information

https://brainly.com/question/12620232

#SPJ8

sarah, a cso, is using aws in her organization for the first time. where can she find information about prohibited actions on the aws infrastructure?

Answers

Sarah, as a Chief Security Officer (CSO) using AWS for the first time, can find information about prohibited actions on the AWS infrastructure through various sources:

AWS Acceptable Use Policy: Sarah can refer to the AWS Acceptable Use Policy, which outlines the guidelines for using AWS services and infrastructure. It specifies prohibited actions, including activities that violate laws, compromise security, or cause harm to AWS or other customers. AWS Service Terms: Sarah should review the specific terms and conditions associated with the AWS services being used. The AWS Service Terms provide detailed information about the permitted and prohibited actions for each service, including any usage restrictions or limitations. AWS Security Documentation: AWS provides comprehensive security documentation, including best practices, security guidelines, and recommendations. Sarah can access the AWS Security Hub, Security Best Practices, and Security Compliance documents to understand the recommended practices and actions to avoid in order to maintain a secure AWS environment.

Learn more about information here

https://brainly.com/question/29820635

#SPJ11

Check the peripherals that are needed to hear music on your computer.

Check the peripherals that are needed to hear music on your computer.

Answers

Answer:

speaker and sound card

edge 2021

A person with a kinesthetic learning style learns best by
a. reading and writing.
b. moving around and interacting with objects.
c. working with numbers and patterns.
d. independent study.

Answers

B. Moving around and interacting with objects. Is the answer

"A machine is having issues, so the user is responsible for getting the machine serviced. Which stage of the hardware lifecycle does this scenario belong to?"

Answers

Answer:

Maintenance

Explanation:

The maintenance stage of an hardware life-cycle involves the servicing, repair replacement of machine component activities as well as other restorative activities meant to restore the machine to its original state.

The stages of an hardware life-cycle are;

1) Planning for the required hardware

2) Buying or leasing the hardware

3) Hardware installation

4) Maintenance activities, Repair

5) Hardware upgrading

6) Extend

7) Hardware trade in or buyback

8) Disposal of the hardware

What is digital divide

Answers

Explanation:

A digital divide is any uneven distribution in the access to, use of, or impact of information and communications technologies between any number of distinct groups, which can be defined based on social, geographical, or geopolitical criteria, or otherwise.

why we have to maintain the good condition of tools and equipment?​

Answers

Answer:

Construction tools and equipment suffer a lot of wear and tear. Hence, it is important to maintain them regularly. This will help increase the service life as well as the performance of the equipment. Precautionary maintenance of tools and equipment will also help reduce unwanted expenses related to broken or faulty equipment

Explanation:

What are good components to preorder a PC with that are cheep? It would be my first PC by the way.

Answers

Answer:

Good Components

.CPU AMD Threadripper 3960X Amazon

.CPU cooler NZXT Kraken X63 (280mm AIO liquid cooler) Overclockers

.GPU Zotac Gaming GeForce GTX 1660 6GB CCLonline

.Memory 32GB Corsair Dominator Platinum RGB 3200MHz Scan

Explanation:

Would you want a prebuilt? I know a very good prebuilt and custom build company called NZXT. They have very good parts and very good ratings. I know prebuilts are shamed on, but I promise you, one of the NZXT prebuilts are great.

Which situations make use of interactive multimedia and which do not? Amelia is exploring a shopping website looking for clothes or accessories she could give to her sister. Roy is going through a tutorial on his laptop that explains a do-it-yourself project. Jaden is listening to a presentation on early music in his class. Fred is answering an online quiz that requires him to select correct answers. Linear Multimedia Kristen is watching an educational film on her tablet. Non-linear Multimedia​

Answers

The situation that make use of interactive multimedia is Roy is going through a tutorial on his laptop that explains a do-it-yourself project, and that do not is Amelia is exploring a shopping website looking for clothes or accessories she could give to her sister.

What is an interactive multimedia?

Interactive multimedia is a type of interaction in which the user can operate, control, and change the text, image, and picture, and function in a  phone or computer.

Thus, the correct options are A and B.

Learn more about interactive multimedia

https://brainly.com/question/26090715

#SPJ1

The creation of OSHA provided this important right to workers:
a) The right to equal employment opportunities. b) The right to privacy. c) The right to pension benefits. d) The right to a safe and healthful workplace.

Answers

The creation of OSHA provided this important right to workers: d) The right to a safe and healthful workplace.

What is OSHA?

OSHA is simply an abbreviation for occupational safety and health administration that was created under the Occupational Safety and Health Act, so as to develop work-safety standards for workers and providing precautionary measures against all workplace hazards.

Generally, OSHA is an agency of the federal government which is saddled with the following responsibilities of developing work-safety standards for employees and providing precautionary measures against all workplace hazards.

In this context, we can infer and logically deduce that the creation of OSHA provided this important right to workers the right to a safe and healthful workplace.

Read more on OSHA here: brainly.com/question/17199752

#SPJ1

Give at least five (5) practices that you must observe in your classroom.​

Answers

Answer:

Offer second chances/clean slates.

Be resourceful.

Make learning active.

Be an advocate.

Pursue lifelong learning.

Answer:

hi how are you

Explanation:

There is a weird green and black kinda growth on my screen that moves when I squeeze the screen, it also looks kinda like a glitchy thing too,Please help

Answers

LCD stands for Liquid Crystal Display. So yes, what you're seeing is liquid. it's no longer contained where it needs to be.

Other Questions
21. What is a republic? [1 QUESTION 6 12 points Save Answer A compressor used to deliver 2. 10 kg/min of high pressure air requires 8.204 kW to operate. At the compressor inlet, the air is at 100 kPa and 26.85C. The air exits the compressor at 607 kPa and 256.85C. Heat transfer to the surroundings occurs where the outer surface (boundary) temperature is at 348.5C. Determine the rate of entropy production (kW/K) within the compressor if the air is modeled as an ideal gas with variable specific heats. Note: Give your answer to six decimal places. pls answer this question Actually according to key the answer is 3 option but if we calculate we are getting 1st option Whoever gives the correct reason I would really mark them as brainliest a positive five-digit integer is in the form $ab,cba$; where $a$, $b$ and $c$ are each distinct digits. what is the greatest possible value of $ab,cba$ that is divisible by eleven? How can heart rate and respiratory rate be used to determine if someone is lying? Provide a detailed answer. According to the work of Tversky and Kahneman (1987), people are _____ when dealing with potential losses, but are _____ when dealing with potential gains. Workers of the Gilded Age faced dangerous conditions working in factories and on railroads.in hospitals.on farms.in households. Use the continuous compound interest formula to find the indicated value. P = $7,000; r = 5.38%; t = 5 years; A = ? A=$ (Round to two decimal places as needed.) *** PLEASE HELPP!!! ALL YOU HAVE TO DO IS SELECT THE CORRECT ANSWER CHOICE! :) nCardinal Corporation, a calendar year taxpayer, receives dividend income of $250,000 from a corporation in which it holds a 10% interest. Cardinal also recelves interest income of $35,000 from municipal bonds. (The municipality used the proceeds from the bond issue to construct a library.) Cardinal borrowed funds to purchase the municipal bands and pays $20,000 of interest on the loan. Excluding these three items, Cardinal's taxable income is $500,000. Cardinal has $150,000 of accumulated E a P at the end of the prior year, and it paid Federal income taxes of $131,250 during the year, Click here for the Dividend Received Deduction Table. a. After these three items are taken into account, Cardinal Corporation's taxable income is 1 b. Cardinal Corporation's accumulated E B.P at the start of next year is 1 The heat of vaporization of CClF is 289 J/g. What mass of this substance must evaporate to freeze 200. g of water initially at 15C? The heat of fusion of water is 334 J/g, and the specific heat of the liquid is 4.18 J/(g.C) State 3 sf. Which of the following best summarizes the "parallel discovery" that Nick makes at the gas station (paragraph 159)?A. There is a profound difference between Wilson, who is sick, and Tom, who is well.B. Upper-class Tom and working-class Wilson have more in common than they realize.C. Tom knows that Daisy is involved with Gatsby, but Wilson doesn't know Myrtle is involved with Tom.D. Tom and Wilson have each recently discovered that their wives have lives beyond their marriages. 5. Mr. Q's class is having a give-away where his students canreceive 100 classroom credits.He will pull names out of a hatand select two winners. Once astudent wins, they are noteligible to win a second time. Ifthere are 40 total people in theclass, including you and yourbest friend.What is the probability that both you and your best friend get the 100 classroomcredits? (Show work please) Solve the following formula for t.A= J(1 + rt) Graph y+3=5(x-4) please quickly Joey can eat a pound and a half of ribs in 45 minutes. How many minutes would it take Joey to eat five pounds of ribs at the same rate? What process do each of the following rocks need to go through to get from the first rock to the second rock?Sedimentary to Metamorphic: Metamorphic to Igneous: Igneous to Igneous:Metamorphic to Sedimentary:Metamorphic to Metamorphic:Sedimentary to Sedimentary: Sedimentary to Igneous: Igneous to Sedimentary:Igneous to Metamorphic: What sound device is used in the following excerpt from "How the Animals Lost their Tails and Got Them Back Traveling from Philadelphia to Medicine Hat" by Carl Sandburg?When there was a fight and a snag and a wrangle between two families living next door neighbors to each other and this old flongboo was called in to umpire and to say which family was right and which family was wrong, which family started it and which family ought to stop it, he used to say, The best umpire is the one who knows just how far to go and how far not to go. A. repetition B. alliteration C. rhyme D. consonance. What is the Calculate Juan has 3.43. He is buying a paint brush that costs $1.21 to paint a model race car.how much will Juan have after he pays for the paint brush.