Consider the following function prototypes:
int test(int, char, double, int);
double two(double, double);
char three(int, int, char, double);
1. Write a c++ statement that prints the value returned by the function test with the actual parameters 5, 5, 7.3, and 'z'.
2. Write a c++ statement that prints the value returned by the function two with the actual parameters 17.5 and 18.3 respectively.
3. Write a c++ statement that prints the next character returned by the function three. (Use your own actual parameters)

Answers

Answer 1

The three tasks described in the given problem related to function prototypes in C++ are:

1. Write a C++ statement to print the value returned by the function test.

2. Write a C++ statement to print the value returned by the function two.

3. Write a C++ statement to print the next character returned by the function three.

What are the three tasks described in the given problem related to function prototypes in C++?

The problem provides three function prototypes in C++ programming language. The first function 'test' takes four parameters of different data types and returns an integer value.

The second function 'two' takes two double parameters and returns a double value. The third function 'three' takes three parameters of different data types and returns a character value.

To print the value returned by the function 'test' with the actual parameters 5, 5, 7.3, and 'z', we can use the following statement: cout << test(5, 'z', 7.3, 5) << endl;

To print the value returned by the function 'two' with the actual parameters 17.5 and 18.3 respectively, we can use the following statement: cout << two(17.5, 18.3) << endl;

To print the next character returned by the function 'three' with our own actual parameters, we can use the following statement: cout << three(1, 2, 'a', 1.5) << endl; where the actual parameters can be any appropriate values of the respective data types.

Learn more about three tasks

brainly.com/question/29988862

#SPJ11


Related Questions

hypothetically, say that you create a custom waf rule to block all traffic from canada. does that mean that anyone who resides in canada would not be able to access your website? why or why not?

Answers

No, blocking all traffic from Canada does not necessarily mean that anyone who resides in Canada would not be able to access your website.

What is website?

A website is a collection of webpages, images, videos and other digital assets that share a common domain name and are typically hosted on at least one web server. Websites are accessed by typing a URL into a web browser.

This is because while a custom WAF rule can be used to block IP addresses originating from Canada, it is not possible to know whether the user accessing the website is actually located in Canada or not. For example, if someone is traveling to another country but accessing the website from a Canadian IP address, they would be blocked even though they are not actually located in Canada. Furthermore, a user located in Canada could use a VPN to mask their IP address and access the website from a different country, thus bypassing the custom WAF rule. Therefore, blocking all traffic from Canada does not guarantee that users from Canada will be blocked from accessing the website.

To know more about website click-
https://brainly.com/question/28431103
#SPJ4

"please help i have exam
Discuss three phases of social media marketing maturity.

Answers

The three phases of social media marketing maturity are: 1. Foundation Phase 2. Growth Phase 3. Optimization Phase

1. Foundation Phase: In this phase, businesses establish their presence on social media platforms and focus on building a solid foundation for their marketing efforts. They create social media accounts, develop a consistent brand voice, and start engaging with their audience. The primary goal is to increase brand awareness and establish a basic level of social media presence.

2. Growth Phase: During this phase, businesses expand their social media strategies and start leveraging the full potential of social media marketing. They focus on growing their audience, increasing engagement, and driving traffic to their website or physical stores. This phase involves implementing more advanced strategies such as content marketing, influencer partnerships, and targeted advertising campaigns.

3. Optimization Phase: In the optimization phase, businesses refine their social media strategies based on data-driven insights and continuous improvement. They use analytics tools to measure the effectiveness of their campaigns, identify areas for improvement, and optimize their social media content and advertising strategies. This phase emphasizes the importance of data analysis, testing, and ongoing optimization to achieve better results and maximize return on investment.

The three phases of social media marketing maturity represent a progression from establishing a basic presence to achieving strategic growth and continuous optimization. As businesses advance through these phases, they develop a deeper understanding of their target audience, refine their messaging, and refine their tactics to drive meaningful results from their social media marketing efforts.


To learn more about website click here: brainly.com/question/32113821

#SPJ11

Which component of Exploit Guard helps prevent access to internet domains that may host phishing scams, exploits, and other malicious content?
Network protection

Answers

Network protection is the component of Exploit Guard that helps prevent access to internet domains that may host phishing scams, exploits, and other malicious content.

Exploit Guard is a set of advanced security features in Windows that provides enhanced protection against various types of cyber threats. One of its key components is network protection, which acts as a safeguard against accessing malicious internet domains.

When enabled, network protection monitors network traffic and analyzes the URLs or domain names being accessed by applications on a system. It compares these URLs against a list of known malicious domains or blacklists maintained by Microsoft, security organizations, or administrators.

By leveraging real-time threat intelligence and machine learning algorithms, network protection can identify and block attempts to access websites that are known to host phishing scams, exploit kits, malware, or other types of malicious content. This proactive approach helps to prevent users from inadvertently visiting dangerous websites and falling victim to online scams or malware infections.

Network protection operates at the network level, meaning it can block access to malicious domains across various applications and processes on a system. This ensures comprehensive protection, even if an application has vulnerabilities that could be exploited to bypass other security measures.

By actively monitoring and filtering network traffic, Exploit Guard's network protection component helps to create a safer browsing environment for users and mitigate the risks associated with accessing malicious internet domains.

Learn more about  phishing scams

brainly.com/question/32404889

#SPJ11

Having difficulty writing a MATLAB code. I am attempting to write a code to take a user input of angles and generate the weights. Equation I am working from is . I would take the angle and graph that against the weight at the end. This is based on a triangle weighing device, with the reference weight on the left side and an unknown weight on the right side. Wr=1.87939*Wl
The constraints I have are for the range since Wr should not be .5 to 2 times Wl.

Answers

The provided MATLAB code allows the user to input angles, calculates the corresponding weights based on the equation provided, and plots the relationship between the angles and weights.

Here's a MATLAB code that takes user input of angles and generates the corresponding weights using the equation you provided. It also plots the relationship between the angle and the weight at the end.

% Take user input for angles (in degrees)

angles = input("Enter the angles (in degrees), separated by spaces: ");

angles = deg2rad(angles); % Convert angles to radians

% Calculate weights

Wl = 1; % Reference weight on the left side

Wr = 1.87939 * Wl; % Unknown weight on the right side

% Apply the equation for each angle

weights = Wr ./ (cos(angles) - sin(angles));

% Plot the relationship between angles and weights

plot(rad2deg(angles), weights, 'b.-');

xlabel('Angle (degrees)');

ylabel('Weight');

title('Relationship between Angle and Weight');

grid on;

Explanation:

The user is prompted to enter the angles (in degrees) separated by spaces.

The angles are converted to radians using the deg2rad function.

The reference weight on the left side (Wl) is set to 1, and the unknown weight on the right side (Wr) is calculated using the equation you provided.

The equation is applied to each angle to calculate the corresponding weights.

The relationship between angles (in degrees) and weights is plotted using the plot function.

The x-axis is labeled as "Angle (degrees)", the y-axis as "Weight", and the title of the plot is set.

Grid lines are displayed on the plot using grid on.

To know more about MATLAB code visit :

https://brainly.com/question/12950689

#SPJ11

i cracked a school computer screen on purpose and one on accident what will happen now?

Answers

Answer:

You will probably have to pay a fee of replacement, or pay for the whole computer.

Explanation:

Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later date?

Waiting on someone else
In Progress
Not started
Deferred

Answers

Answer:

in progress

Explanation:

it is being answered by the person

How fast or slow a video sequence is
A. Time aperature
B. Length
C. Frame rate
D. Continuous
E. None of these

Answers

Answer:

C. Frame rate

Explanation:

hope this helps

The answer to this is a

A program contains the following function int cube (int num) { return num * num * num; } write a statement that passes the value 4 to this function.

Answers

The statement can be written as " int result = cube(4); ".

What is a function?

A function is a block of reusable codes to perform some tasks. For example, the function in the question is to calculate the cube of a number.

A function can also operate on one or more input values (argument) and return a result. The cube function in the question accepts one input value through its parameter number and the number will be multiplied by itself twice and return the result.

Simply enter the function name, followed by parenthesis, to invoke it (for example, cube()). We can use zero, one, or many values as arguments within the parenthesis (for example, cube(4)).

The function's return output can then be assigned to a variable using the " = " operator (for example, int result = cube(4)).

To learn more about function refer to:

https://brainly.com/question/179886

#SPJ4


What would be the effect if the register contained the following values 10011000

Answers

Answer is
010~2
011~3
000~0

So answer is 230
Answer is:
010~2
011~3
00~0
So answer is 230

Surf the Internet or conduct research in your library to find information about "The Big Four" accounting firms. Create a table of information about each firm and
the services the firm provides.

Answers

"The Big Four" accounting firms are:

PricewaterhouseCoopers (PWC) DeloitteKPMG Ernst & Young.

What does an accounting firm do?

Accounting firms is known to be a firm that aids its clients with a a lot of array of services, such as accounts payable and also receivable, bookkeeping and other forms such as payroll processing.

Note that they also ensure that financial transactions are said to be accurate and legal.

Thus, "The Big Four" accounting firms are:

PricewaterhouseCoopers (PWC) DeloitteKPMG Ernst & Young.

Learn more about accounting firms from

https://brainly.com/question/25568979

#SPJ1

arturo is a new network technician. he wants to use remote desktop protocol (rdp) to connect to a server from his computer. the server is on the other side of the building. his computer is running windows 10. will he be able to make the connection?

Answers

Arturo wants to use remote desktop protocol (RDP) to connect to a server from his computer. He will not be able to make the connection. Because the RDP protocol works only on Linux. The correct option is A.

What is a remote desktop protocol?

A technical standard or protocol called Remote Desktop Protocol (RDP) allows users to access desktop computers from a distance.

RDP is the most widely used protocol for remote desktop software, but other options include Independent Computing Architecture (ICA), virtual network computing (VNC), and others.

Therefore, the correct option is A. No, because the RDP protocol works only on Linux.

To learn more about remote desktop protocol, refer to the link:

https://brainly.com/question/28903876

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A. No, because the RDP protocol works only on Linux.

B. No, because the RDP protocol works only on Mac OSX.

C. Yes, because the RDP protocol has clients that work on the most common operating systems.

D. Yes, because the RDP protocol works only on Windows.

In a mental status exam, the clinician evaluates a client's ________ by observing how well the client speaks and looking for indications of memory or attention difficulties.

Answers

In a mental status exam, the clinician evaluates a client's intellectual functioning by observing how well the client speaks and looking for indications of memory or attention difficulties.

What is Psychology?

This refers to the study of the mind in order to discover the hidden motivations of a person and how it affects interaction.

Hence, we can see that In a mental status exam, the clinician evaluates a client's intellectual functioning by observing how well the client speaks and looking for indications of memory or attention difficulties.

Therefore, the primary thing that is being searched and evaluated in a mental status exam is a client's intellectual functioning

Read more about psychology here:

https://brainly.com/question/12011520

#SPJ1

. The lightness or brightness of a color is the _______.

Answers

Answer: Value

Explanation:

Value is your answer

Selecting the range before you enter data saves time because it confines the movement of the active cell to the selected range.
a. True
b. False

Answers

Selecting the vary before you enter records saves time due to the fact it confines the movement of the energetic cell to the chosen range. The Percent Style can have fewer or more places after the decimal that the default.

A relative telephone reference is a reference based on the relative position of a cellphone that the default setting.

Can you apply formatting before or after you enter facts in a telephone or range?

You can follow formatting before or after you enter facts in a phone or range. What does layout painter do? You can "paint" or copy a cell's structure into other cells. This similar to the use of replica and paste, but instead of copying mobilephone contents, it copies solely the cell's format.

When you type information in a cell and press Enter what cell turns into the active cell?

When you enter facts into a cellphone in Excel, that telephone turns into the energetic cell. The energetic telephone is the one that has the blinking cursor in it. You can move to a specific cellphone by using the arrow keys on your keyboard, or with the aid of clicking in a different mobile with your mouse.

Learn more about Selecting the range before here;

https://brainly.com/question/30624455

#SPJ4

Which of the following groups is NOT located on the Home tab?

A.Paragraph
B.Animations
C.Slides
D.Drawing

Answers

Answer: B. Animations is not found on the Home tab.

The answer is B. The Animations group is not located on the home tab.

If the original analog signal had an absolute bandwidth of 3.4 kHz, what is the null bandwidth of the PCM signal for the polar NRZ signaling case

Answers

The null bandwidth of the PCM signal for the polar NRZ signaling case with an original analog signal absolute bandwidth of 3.4 kHz can be determined using the Nyquist formula. In this case, the Nyquist rate is twice the absolute bandwidth, which is 6.8 kHz. For polar NRZ signaling, the null bandwidth equals the Nyquist rate. Therefore, the null bandwidth of the PCM signal for the polar NRZ signaling case is 6.8 kHz.

To calculate the null bandwidth of the PCM signal for the polar NRZ signaling case, we need to first understand what it means. The null bandwidth is the range of frequencies where the signal power is effectively zero. In other words, it is the range of frequencies that do not contain any significant information about the original signal.
Null Bandwidth = Sampling Rate / 2

For the polar NRZ signaling case, the sampling rate is twice the highest frequency component of the original analog signal. In this case, the absolute bandwidth of the original signal is 3.4 kHz, so the highest frequency component is 1.7 kHz. Therefore, the sampling rate is 2 x 1.7 kHz = 3.4 kHz.
Null Bandwidth = 3.4 kHz / 2 = 1.7 kHz
Therefore, the null bandwidth of the PCM signal for the polar NRZ signaling case is 1.7 kHz. This means that any frequency components above 1.7 kHz are effectively removed from the signal during the PCM encoding process.

To know more about analog visit :-

https://brainly.com/question/30127374

#SPJ11

Which of the following opens when the Labels icon is clicked?

Answers

The option that opens when the labels icon is clicked is: "Envelopes & Labels dialog box & the Labels tab" (Option D)

What is the explanation for the above response?

The function of the Envelopes & Labels dialog box & the Labels tab is to allow the user to create and print labels for various purposes.

The Labels tab provides options for selecting the label manufacturer and product number, as well as specifying the layout and content of the labels. Users can choose from a variety of preset label sizes or create their own custom size.

The dialog box also allows users to add text, images, and barcodes to the labels. Once the labels are created, they can be previewed and printed, making it a useful tool for creating address labels, product labels, and more.

Learn more about labels icon at:

https://brainly.com/question/20713933

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Which of the following opens when the Labels icon is clicked?

Envelopes menu

Labels menu

Envelopes & Labels dialog box 7 the Envelopes tab

Envelopes & Labels dialog box & the Labels tab

How do you calculate the slope for a voltage-current graph?

Answers

Answer:

Choose two points on the line to work from (point C and point D).

Calculate the voltage difference between the two points (the RISE of the slope).

Calculate the current gap between the two points (the RUN of the slope).

Subtract the RISE from the RUN. This is the line's slope.

Explanation:

How do you create a variable with the numeric value 5?

Answers

Answer:

They are declared simply by writing a whole number. For example, the statement x = 5 will store the integer number 5 in the variable x.

I need help with the this assignment in Project STEM, Assignment 7: Calendar?

Answers

The calendar is a system used to organize and keep track of time. It consists of a series of months, each with a specific number of days, and is used to mark important dates such as holidays and events.

The most commonly used calendar is the Gregorian calendar, which has 12 months, with a varying number of days in each month. To keep track of the year, the calendar also has a system of leap years to account for the extra time it takes for the Earth to orbit the sun.The calendar has been used for centuries as a way to organize society and plan events. It is important for individuals to have an understanding of the calendar and how it works to effectively plan their lives and schedules. With the advancement of technology, calendars have become digital and can be easily accessed through smartphones and other electronic devices. understanding the calendar is an important skill for individuals to have in order to effectively manage their time and plan for important events in their lives.

To learn more about system click the link below:

brainly.com/question/18168133

#SPJ4

Classify the following skills: communication, creativity, and independence.

Hard skills
Interpersonal skills
People skills
Soft skills

Answers

Answer:

Communication, creativity, and independence are people skill

Explanation:

Soft skills depict the quality of a person and classify his/her  personality trait or habit.

Communication - Interpersonal skill

Interpersonal skill allows one to interact and communicate with others effortlessly.

Both soft skill and interpersonal skill comes under the umbrella term i.e people skill.

Hence, communication, creativity, and independence are people skill

Answer:

It's not people skills I got it wrong on my test

Explanation:

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

Drag each tile to the correct box. Wesley is formatting a report for a science project in a word processor. Match each formatting tool to its purpose.
Bullets
Line and Paragraph Spacing
Purpose
Format Painter
emphasize key words in each section
Bold
insert a list of apparatus required
increase the distance between the steps for performing an experiment
copy the formatting of a heading and apply it to other headings
Tool

Answers

Answer:

Bullets: insert a list of apparatus required

Line and Paragraph Spacing: increase the distance between the steps for performing an experiment

Bold: emphasize key words in each section

Format Painter: copy the formatting of a heading and apply it to other headings

Answer:

a-2,b-4,c-1,d-3  

Explanation:

anchored data types are similar to arrays used on other languages. true or false?

Answers

False. Anchored data types are not similar to arrays used in other programming languages.

In programming languages, an array is a data structure that allows you to store multiple values of the same data type in a contiguous block of memory. Arrays in other languages provide random access to elements using indices and have predefined sizes.

On the other hand, anchored data types are specific to Ada programming language. They are used to define composite data types that consist of a fixed number of components with different data types. Anchored data types in Ada are defined using the "record" construct and can include various data types, including arrays, records, and scalars.

Know more about Anchored data types here:

https://brainly.com/question/27913992

#SPJ11

Help please

What is an ordered pair?

1. a type of font in Microsoft Word

2. the end of the x-axis on a coordinate grid

3. two numbers that tell the location of a point on a coordinate grid

4. a type of table located in the Table drop-down menu

Answers

Answer:

two numbers that tell the location of a point on a coordinate grid

Explanation:

Answer:

Two numbers that tell the location of a point on a coordinate grid.

Explanation:

An ordered pair would look like this

(0, 4) or (7, 2)

the first number would be on the x-axis and then the second would be on the y-axis

Amit wants to test only certain parts of a program. What symbol should Amit put at the beginning of the lines of code that he does not want to test?

Answers

In python, we use # to comment out code. When you put # in front of a line of code, the computer ignores it and continues like normal.

I hope this helps!

the powerful #

                    ##############

            ###                                    ###

           ###         #            #               ###

         ###                                          ###

           ##          ############    ##

              #######                 ######

                   ##############

Why is cyber security an important part of sending information using digital signals

Answers

Cyber security is an important part of sending information using digital signals. Because it keeps data safe while stored in the cloud and when they are transmitted. Option D is correct.

What are cybersecurity functions?

Analysts in cybersecurity defend an organization's hardware and network infrastructure against hackers and cybercriminals looking to harm them or steal confidential data.

When conveying information via digital signals, cyber security is a crucial component. because it protects data as it is sent and stored in the cloud.

Hence, option D is correct.

To learn more about cybersecurity  refer;

https://brainly.com/question/27560386

#SPJ1

Why is cyber security an important part of sending information using digital signals

What do safeguarding devices do to
protect the worker?

Answers

Safeguarding devices are designed to protect workers from potential hazards and prevent accidents in the workplace. These devices can be physical barriers or electronic systems that are installed on machines or equipment to reduce the risk of injury to workers.

Examples of safeguarding devices include:

Guards: physical barriers that are installed around machinery or equipment to prevent workers from coming into contact with moving parts or hazardous materials.
Interlocks: electronic systems that prevent machines from operating unless all safety requirements are met, such as closing a guard or door.
Presence-sensing devices: electronic systems that detect the presence of workers in hazardous areas and can automatically stop the machine or equipment.
Safety light curtains: electronic devices that use beams of light to detect the presence of workers and can automatically shut down the machine or equipment if the beams are broken.
By using these safeguarding devices, workers can perform their job duties with reduced risk of injury or harm, leading to a safer and more productive workplace

Q2-2) Answer the following two questions for the code given below: public class Square { public static void Main() { int num; string inputString: Console.WriteLine("Enter an integer"); inputString = C

Answers

The code given below is a basic C# program. This program takes an input integer from the user and computes its square. The program then outputs the result. There are two questions we need to answer about this program.

Question 1: What is the purpose of the program?The purpose of the program is to take an input integer from the user, compute its square, and output the result.

Question 2: What is the output of the program for the input 5?To find the output of the program for the input 5, we need to run the program and enter the input value. When we do this, the program computes the square of the input value and outputs the result. Here is what the output looks like:Enter an integer5The square of 5 is 25Therefore, the output of the program for the input 5 is "The square of 5 is 25".The code is given below:public class Square {public static void Main() {int num;string inputString;Console.WriteLine("Enter an integer");inputString = Console.ReadLine();num = Int32.Parse(inputString);Console.WriteLine("The square of " + num + " is " + (num * num));}}

To know more about output  visit:

https://brainly.com/question/14227929

#SPJ11

Remove spoofing from the attack. Repeat the exercise without SYN cookies and observe and explain the effect. What happens

Answers

Spoofing is a cyber attack technique attacker pretends be trusted source by falsifying data, as IP addresses or email addresses, security measures. removing spoofing from the attack conducting exercise without using falsified data.

When repeating the exercise without SYN cookies, the system becomes more susceptible to SYN flood attacks. SYN cookies are a defense mechanism used to prevent SYN flood attacks, which occur when an attacker sends a large number of SYN (synchronize) requests to a server with the intent of overwhelming it and causing a denial of service (DoS). Without SYN cookies, the server would allocate resources for each incoming SYN request, believing they are from legitimate users. As the attacker continues sending SYN requests, the server's resources become depleted, resulting in slow response times or a complete inability to respond to legitimate user requests. removing spoofing from the attack and conducting the exercise without SYN cookies makes the system more vulnerable to SYN flood attacks.

This highlights the importance of implementing security measures like SYN cookies to protect systems from potential cyber attacks. Password cracking is technique attacker the main goal of this kind of assault. When an attacker is aware of the rules, such as the length of the password or if it contains only numbers or alphabetic characters, he can use this technique to break the password.

Learn more about technique attacker here

https://brainly.com/question/13068604

#SPJ11

Other Questions
Which statement best summarizes the motives for the settlement in the southern colonies how many triangles will be in the 5th set of triangles? the sons of liberty, emerging in the stamp act protest, drew their members from the ranks of Ernie makes deposits of 55 at time 0, and x at time 1. The fund grows at a force of interest t = 1000 1 t 4 3 2+t 5 ,t>0. The amount of interest earned from time 1 to time 3 is also X. Calculate X. 15 19 23 27 31 how many bits would you need if you wanted to count up to 1000? Explain. During __________, the central form of team communication, leadership can be shared, goals and purposes can be defined, a team identity can be developed, and innovation can be fostered. Resolve the vector given in the indicated figure into its x component and y component A = 56.7 0 = 120.0 A-0.4-0 (Round to the nearest tenth as needed.) Write a linear inequality to represent the information given. Shanley would like to give $5 gift cards and $8 teddy bears as party favors. Shanley has $144 to spend on party favors. Enter an inequality to find the number of gift cards x and teddy bears y Shanley could purchase. Give one solution to the inequality. In 200 words or more (not including the Honor Code or the prompt), answer the following prompt.PROMPT: Using examples from Andrew Jackson's presidency, such as Indian Removal along with his view on the Constitution or the expansion of voting rights, and determine what type of President Jackson was, good or bad? Hero or Villain? Leader of the people or a tyrant? If there are 651 6th grade students at school, and three out of every seven of them play a sport, how many 6th graders do not play a sport?pls help save me An isosceles triangle has a vertex angle of 70. What is the measure of each base angle? 705520 Herberto wanted to compare the gravity on the Moon to the gravity on Earth. Which statement below is correct?The gravity on Earth is less than the gravity on the Moon.The gravity on Earth is greater than the gravity on the Moon.The gravity on Earth is equal to the gravity on the MoonThe gravity on Earth the same as the gravity on the Moon. Why are my veins poping out of my hands A TV that normally sells for $900 is on sale for 45% off. What is the sale price? 8.The International Space Station is in orbit about 408 km above the surface of Earth. [5 marks] Calculate how many minutes it would take for the ISS to complete one orbit. (r = 6.38 x 10 m, M = 5. A long strip of paper, whose thickness is 0.002 inch, is rolled tightly on a cylinder whose radius is 0.75 inch. This produces a cylinder whose radius is 1.75 inches. Estimate the length of the paper strip. What assumptions did you make? How many grams of Na are in Na2O?. Dont mind the selected answer, I clicked anything. the subject is just Science which diagram illustrates a cause-and-effect relationship on the home front during world war 2 What is a gene and why are they important?