) For a direct-mapped cache design with a 32-bit address, the following bits of the address are used to access the cache. Tag Index Offset 31-10 9-5 4-0 a. What is the cache block size (in words)

Answers

Answer 1

Considering the description above, the cache block size (in words) is 2 words.

What is Cache block size?

Cache block size is generally known as pieces of memory that can be 4, 8, 16, or 32 KiBs in size.

The storage array's controller arranges cache block sizes.

Cache block size in this case

In this case, we have the index as 5 bits(9-5+1), and therefore the cache has 2^5 = 32 entries.

Block size = 2^5= 32bytes

Therefore, since one word is usually 16 bit, this is a 2 words.

32 bytes / 16bits = 2 words.

Hence, in this case, it is concluded that the correct answer is 2 words.

Learn more about Bytes and Bits here: https://brainly.com/question/24727087


Related Questions

What would be an ideal scenario for using edge computing solutions?

Answers

An ideal scenario for using edge computing solutions will be a school computer lab with workstations connected to a local network. The correct option is C.

What is edge computing?

The most typical places to find edge computing are in the transportation, industrial, energy, and even retail sectors.

The performant and scalable implementation model used by Akamai ensures that data and computation are not constrained by latency problems, which can negatively affect digital experiences.

Thanks to EdgeWorkers and EdgeKV, development teams can now focus on creating cutting-edge services and manage Akamai as code as a part of their digital infrastructure.

Thus, the correct option is C.

For more details regarding edge computing, visit:

https://brainly.com/question/28256857

#SPJ1

The _______ allows you to quickly access features such as formatting, charts, tables, and totals

Answers

Answer:

The Quick Analysis toolbar allows you to quickly access features such as formatting, charts, tables, and totals

Need an answer in Python

Write a program for. checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Answers

Using the knowledge in computational language in python it is possible to write a code that checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Writting the code:

def conjunction(p, q):

    return p and q

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = conjunction(p, q)

        print(p, q, a)

def exclusive_disjunction(p, q):

    return (p and not q) or (not p and q)

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = exclusive_disjunction(p, q)

        print(p, q, a)

See more about python at brainly.com/question/18502436

#SPJ1

Need an answer in PythonWrite a program for. checking the truth of the statement (X Y Z) = X Y Z for

In Microsoft windows which of the following typically happens by default when I file is double clicked

Answers

Answer:

when a file is double clicked it opens so you can see the file.

Explanation:

how do social media platform affect the social skills of your children ​

Answers

Answer:

Poor Impersonal Skills :(

Explanation:

Kids who spend their whole day on social media platforms may consider their virtual relation as a substitute for real ones. like cmon man

This may deteriorate the behavioral habits of kids Really dangerous

BUT Social media cqan also give kids more opportunities to communicate and practice social skills.  so ye

RFID can be used for all of the following applications except:_________.
A. Access control
B. Access point repeater
C. Asset management
D. Automated payment

Answers

Answer:

B. Access point repeater

Explanation:

RFID can be used for all of the listed applications except for Access point repeater. This is because Radio Frequency Identification is a technology, which includes wireless data capture and transaction processing for both short and long-range applications. Usually tracking, tracing, accessing, and managing information. It can unfortunately not be used for repeating the same RFID signal or any access point for that matter.

Which four of the following are true about fair use?

Which four of the following are true about fair use?

Answers

D,C,B

Should be the correct answers. I'm not the best when it comes to copyright but I believe those are correct.

Communication competence is defined as “the ability to effectively and appropriately interact in any given situation.” How can you demonstrate you are a competent communicator in the virtual classroom or the workplace?

Answers

One must show that one can communicate in a clear, considerate, and professional manner in order to pass the review.

What is communication competence?

The capacity to accomplish communication goals in a socially acceptable way is known as communicative competence. It comprises the capability to choose and apply abilities that are appropriate and effective in the relevant situation. It is organized and goal-oriented.

Presentation, active listening, nonverbal communication, and offering and receiving feedback, among other things, are some of the most crucial communication skills for any work.

Therefore, one must show that one can communicate in a clear, considerate, and professional manner in order to pass the review.

To learn more about communication competence, refer to the link:

https://brainly.com/question/29797967

#SPJ1

Java Fundamental

Step 1:

Ask the user to enter the clock speed (in Megahertz) of their graphics card (GPU). This is an indicator of how fast their graphics card is.

Step 2:

Ask the user to enter the clock speed (in Megahertz*) of their processor (CPU). This is an indicator of how fast their processor is.

Step 3:

Ask the user to enter the number of cores that their processor (CPU) has. The more cores a processor has, the more work it can do.

Step 4:

Output the following text: "Computer Hardware Graphics Quality Recommendation Tool"

Step 5:

Display the following output (See sample Input and Output below):

- The GPU clock speed
- The CPU clock speed
- The number of cores

Sample Input and Output (user input is in bold) - The output of your program should match the formatting and spacing exactly as shown.

Please enter the clock speed (in Megahertz) of your graphics card: 1000

Please enter the clock speed (in Megahertz) of your processor: 3000

Please enter the number of cores of your processor: 2


Computer Hardware Graphics Quality Recommendation Tool

GPU Clock Speed: 1000.0 MHz

CPU Clock Speed: 3000.0 MHz

Number of cores: 2

Answers

The law for this would look commodity like this

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);  

The final law would look commodity like this ;  

public class ComputerHardwareTool{  public static void main( String() args){  

Scanner input =  new Scanner(System.in);

(" Please enter the  timer speed( in Megahertz) of your plates card");  

int gpuClockSpeed = input.nextInt();

(" Please enter the  timer speed( in Megahertz) of your processor");  

int cpuClockSpeed = input.nextInt();

(" Please enter the number of cores of your processor");  

int numCores = input.nextInt();

(" Computer Hardware Graphics Quality Recommendation Tool");

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);}}    

Java is an object- acquainted programming language that is generally used in software development. It's designed to be platform-independent, allowing it to run on any system that has a Java Virtual Machine installed.  

Step 1 Ask the  user to enter the  timer speed( in Megahertz) of their plates card( GPU). This is an  indicator of how presto their plates card is. To do this, you will need to use the Scanner class to read in the  user's input. The law for this would look commodity like this  

Scanner input =  new Scanner(System.in);

System.out.print(" Please enter the  timer speed( in Megahertz) of your plates card");

int gpuClockSpeed = input.nextInt();  

Step 2 Ask the  user to enter the  timer speed( in Megahertz *) of their processor( CPU). This is an  indicator of how presto their processor is. The law for this would look commodity like this (" Please enter the  timer speed( in Megahertz) of your processor"); int cpuClockSpeed = input.nextInt();  

Step 3 Ask the  user to enter the number of cores that their processor( CPU) has. The  farther cores a processor has, the  farther work it can do. The law for this would look commodity like this (" Please enter the number of cores of your processor");

int numCores = input.nextInt();

Step 4 Affair the following  text" Computer Hardware Graphics Quality Recommendation Tool". The law for this would look commodity like this (" Computer Hardware Graphics Quality Recommendation Tool");  

Step 5 Display the preceding affair( See sample Input and Affair below)-

The GPU  timer speed- The CPU  timer speed- The number of cores

The law for this would look commodity like this (" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);

The final law would look commodity like this ;

public class ComputerHardwareTool{  public static void main( String() args){  

Scanner input =  new Scanner(System.in);

(" Please enter the  timer speed( in Megahertz) of your plates card");  

int gpuClockSpeed = input.nextInt();

(" Please enter the  timer speed( in Megahertz) of your processor");  

int cpuClockSpeed = input.nextInt();

(" Please enter the number of cores of your processor");  

int numCores = input.nextInt();

(" Computer Hardware Graphics Quality Recommendation Tool");

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);}}

For more such questions on String, click on:

https://brainly.com/question/24994188

#SPJ8

This is the building which spy uses for information transmission.
He use the opened and closed windows for encoding the secret password. The code he
uses is ASCII. What is the password? HELPPPPP

Answers

Based on the given question that a spy stays in a building and transmits information using the opened and closed windows for encoding the secret password which he uses in ASCII, the password is 01.

Step by step explanations

Step 1

In digital electronics, the information is processed in form of binary data either 0 or 1.

This binary data 0 or 1 is known as Bit. To turn on the switch binary data used is 1 and binary data 0 is used for the turn off.

A byte is a combination of 4 bits. Here only the switch is turned on and turned off. Hence, the system processed the information in terms of the Bit.

What is ASCII?

This refers to the acronym that means American Standard Code for Information Interchange and is a character encoding standard for electronic communication.

Read more about ASCII here:

https://brainly.com/question/13143401

#SPJ1

answered
How would you measure user satisfaction with a registration program at a college or university? What are the important features that would make students and faculty satisfied with the system?

Answers

Answer:

You could think about this in several ways with several approaches.

- Survey

- User testing in groups

- On the actual registration program, 3 questions pop up

With general open ended questions and by talking to users

Explanation:

- Demographics

- Ask them what they like about the registration program

- What they use the registration for

- What they would do to improve it

what number am i. i am less than 10 i am not a multiple of 2 i am a coposite

Answers

Answer: 9 is less than 10, it is odd (not a multiple of 2), and it is composite (since it has factors other than 1 and itself, namely 3). Therefore, the answer is 9.

The answer is nine because if you write all the numbers that are under ten you can see that 2, 4, 6, and, 8 are multiples of 2 so you can’t do that so then you gotta see which ones are composite which is nine because 1, 5, and 7 don’t have any more factors than for example 7 and 1.

Cleo is working in Excel and encounters a word that she would like Excel to ignore permanently for all workbooks. Which of the following options should she select?

Ignore Once
Ignore All
Add to Dictionary
AutoCorrect

ANSWER IS C Add to Dictionary

Answers

Answer:

ignore all

Explanation:

The answer is ignore all not add to dictionary

Answer:

C

Explanation:

its C dont listen to anyone else i got you

save(course): add the course to the array. findbyprefix(prefix): return an array of all course objects whose prefix match the parameter. (hint: use the filter() method) updatebyid(id, course): update the course object in the array whose id matches the parameter. the function returns true if the operation is successful, otherwise it returns false. removebyid(id): remove the course object in the array whose id matches the parameter. the function returns true if the operation is successful, otherwise it returns false. (hint: use the splice() method for removing elements from an array)

Answers

save(): adds object to array.

findByPrefix(): returns array of objects with same prefix.

updateById(): updates object with matching id.

removeById(): removes object with matching id.

What is array?

The save(course) function is used to add a course object to an array. This course object can contain any information related to a course such as the name, code, credits, and description.

This function is useful for quickly finding courses with a particular prefix, such as courses in a particular subject area.

Therefore, save(): adds object to array.

findByPrefix(): returns array of objects with same prefix.

updateById(): updates object with matching id.

removeById(): removes object with matching id.

Learn more about subject area on:

https://brainly.com/question/11300276

#SPJ1

What method is used in the following line of code to associate clicking the left button with the event handler "clickSingle"?

widget._____(' ', clickSingle)


eventHandler
eventHandler

attach
attach

connect
connect

bind

Answers

Answer:

Bind

Explanation:

widget.bind('<Button-1>', clickSingle)

So, I have strict parents & need help, if u don’t know how to fix this after u read it, leave. I don’t want u getting points for nothing I’m deleting ur answer if u do it for points. Anyways, I want to get Spotify on my phone, but it says “Enter the password for (my email)”. How do I sign back into it if I don’t know the password. My dad has the password, but I don’t want to get in trouble for stealing his phone to fix mine. Please help, I’ll give the brainliest!

Answers

Well if you forgot your password you can click "Forgot Password" at the bottom and it should ask you some questions and send you an email with the password

You can click forget password and it will email a link to re-set your password. Or you can always ask someone to help you login.

List the five component of information system

Answers

Answer:

hardware, software, database, network and people

To connect to devices in another country, you would need to connect to a
WAN
MAN
LAN
PAN

Answers

Answer:

WAN

Explanation:

wide area network

Answer:

To connect to devices in another country, you would need to connect to a WAN

Explanation:

WAN stands for A wide area network which can connect to other countries and broad ranges.

ans as fast as u can important

Answers

1) User-generated content :

User-generated content, also referred to as UGC or consumer-generated content, is unique content created by customers specifically for a brand and shared on social media or through other channels. UGC can take many different forms, such as pictures, movies, reviews, a recommendation, or even a podcast.

2)Open Chrome on your Android device.

Reopen the tab.

Tap Settings next to "Discover." Switch on or off.

3)The speed at which the content on your page loads is referred to as page speed.

Site speed, which is the page speed for a representative sample of page views on a site, is frequently mistaken for page speed. Page speed can be measured in terms of "time to first byte" or "page load time," which measures how long it takes for a page to fully display its content.

Hence I believe i have answered all questions

To know more on page speed follow this link

https://brainly.com/question/26339742

#SPJ9

Which type of cluster does NOT belong? a. Density-based b. Shared-Property c. Prototype-based d. Hierarchical-based

Answers

Answer:

b. Prototype-based

Explanation:

In clustering, certain methods are used to identify groups. This identifies groups of similar objects in a multivariate sets of data which is collected from different fields.

Shared-property clusters shares some property.

Hierarchical cluster builds a hierarchy.

Density-based identifies clusters in a data. While the prototype based sents observation to nearest prototype.

Question 18 of 20:
Select the best answer for the question.
18. Illegally downloading media such as music or movies is called
O A. plagiarism.
OB. harassment.
OC. bullying.
D. piracy.

Answers

Answer:

A is the answer

Explanation:

we don't have to bully some one if they are not nice or their skin colour

Automated implementation of an application's build, test, and deployment process is called as _____________________.

Answers

Answer:

Deployment pipeline.

Explanation:

Automated implementation of an application's build, test, and deployment process is called as deployment pipeline.

Generally, the main components of the deployment pipeline are the; build automation, test automation and deployment automation.

The main purpose why software engineers use the deployment pipeline is to enable them avoid any waste in the software development process, and to avail them the opportunity to give a rapid feedback to the production team during deployment of the software application. This ultimately implies that it involves the process of picking up a code from version control and presenting it to the end users of the software application in an automated manner.

Since, it is done automatically it helps to mitigate human errors and to meet customer's requirements.

If a device has obtained an IP address using Link Local, which IP configuration would be within its subnet?

Answers

Answer:

If a device has obtained an IP address using Link Local, its IP configuration will be within the 169.254.0.0/16 subnet.

Explanation:

The Internet Engineering Task Force (IETF) has reserved the IPv4 address block 169.254 if a device received an IP address. 0.0/16

A link-local address is a unicast network address that is valid only for communications within the subnetwork to which the host is linked. Link-local addresses are typically issued automatically by a method known as stateless address autoconfiguration or link-local address autoconfiguration,[1] sometimes known as automatic private IP addressing (APIPA) or auto-IP. As a result, routers do not forward packets that have link-local source or destination addresses. IPv4 link-local addresses are assigned from the address block 169.254.0.0/16.

The Address Resolution Protocol (ARP) is used to convert between Layer 2 MAC addresses and Layer 3 IP addresses.ARP resolves IP addresses to MAC addresses by requesting, "Who owns the IP address 192.168.2.140, please inform me?" They are assigned from the block that may be configured inside its subnet.ARP resolves IP addresses to MAC addresses by requesting, "Who owns the IP address 192.168.2.140, please inform me?" They are assigned from the block that may be configured inside its subnet .ARP resolves IP addresses to MAC addresses by requesting, "Who owns the IP address 192.168.2.140, please inform me?" They are assigned from the block that may be configured inside its subnet.

ARP resolves IP addresses to MAC addresses by requesting, "Who owns the IP address 192.168.2.140, please inform me?" They are assigned from the block that may be configured inside its subnet.

Can i get any information on this website i'd like to know what its for ?
https://www.torsearch.org/

Answers

Explanation: torsearch.org is a safe search engine mainly used for dark wed purposes. It does not track your location nor give any personal information.

Select the correct answer from each drop-down menu. What data types can you suggest for the given scenario? Adja is working in a program for the school grading system. She needs to use a(n) (First drop down) to store the name of the student and a(n) array of (Second drop down) to store all the grade of each subject of each student.
Options for the first drop down are- A. Integer, B.String, C.Character.
Options for the second drop down are- A.Floats, B.Character, C.String.

Answers

Based on the given scenarios, the data types that would be best suited for each is:

C. Character.A. Floats

What is a Data Type?

This refers to the particular type of data item that is used in order to define values that can be taken or used in a programming language.

Hence, it can be seen that based on the fact that Adja is working in a program for the school grading system, she would need to use a character to store the name of the student and a float to store all the grades of each subject of each student because they are in decimals.

With this in mind, one can see that the answers have been provided above.,

In lieu of this, the correct answer to the given question that have been given above are character and floats.

Read more about data types here:

https://brainly.com/question/179886

#SPJ1

Answer:

A- String

B- Character

Using do while loop,write a program that will input numbers and display the count of odd numbers.(c++ programming)
Output:
Enter a number:30,17,22,9,14
Odd numbers found:2
Even numbers found:3

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   // Declare variables to store the number input by the user and the count of odd and even numbers

   int number, oddCount = 0, evenCount = 0;

   // Use a do-while loop to input numbers until the user enters a negative number

   do

   {

       cout << "Enter a number: ";

       cin >> number;

       // Increment the count of odd numbers if the input number is odd

       if (number % 2 == 1)

       {

           oddCount++;

       }

       // Increment the count of even numbers if the input number is even

       else if (number % 2 == 0)

       {

           evenCount++;

       }

   }

   while (number >= 0);

   // Print the count of odd and even numbers

   cout << "Odd numbers found: " << oddCount << endl;

   cout << "Even numbers found: " << evenCount << endl;

   return 0;

}

Explanation:

This program will prompt the user to enter a number, and it will continue to input numbers until the user enters a negative number. For each number that is input, the program will increment the count of odd numbers if the number is odd, or the count of even numbers if the number is even. Finally, the program will print the count of odd and even numbers.

Here is an example of the output you would see if you ran this program:

Enter a number: 30

Enter a number: 17

Enter a number: 22

Enter a number: 9

Enter a number: 14

Enter a number: -5

Odd numbers found: 2

Even numbers found: 3

Help me out PLZ Cuz just just just just help

Help me out PLZ Cuz just just just just help

Answers

For the first question, its the 1st and 3rd

For the second it is b

Answer:

1 and 3

and B

Explanation:

is the answers

find HTML CODE FOR THIS

find HTML CODE FOR THIS

Answers

The HTML code for the above is given as follows

<table>

 <tr>

   <th>Country</th>

   <th>Year</th>

   <th>Population (In Crores)</th>

 </tr>

 <tr>

   <td rowspan="3">India</td>  

   <td>1998</td>

   <td>85</td>

 </tr>

 <tr>

   <td>1999</td>

   <td>90</td>

 </tr>

 <tr>

   <td>2000</td>

   <td>100</td>

 </tr>

 <tr>

   <td rowspan="3">USA</td>  

   <td>1998</td>

   <td>30</td>

 </tr>

 <tr>

   <td>1999</td>

   <td>35</td>

 </tr>

 <tr>

   <td>2000</td>

   <td>40</td>

 </tr>

 <tr>

   <td rowspan="3">UK</td>  

   <td>1998</td>

   <td>25</td>

 </tr>

 <tr>

   <td>1999</td>

   <td>30</td>

 </tr>

 <tr>

   <td>2000</td>

   <td>35</td>

 </tr>

</table>

Why are HTML Codes Important?

HTML codes   are important because theydefine the structure and content of webpages.

They provide   a standardized way to format and present information, including text,images, links, and multimedia.

HTML   codes allow web browsers to interpretand render web content, enabling users to access and navigate websites effectively.

Learn more about HTML Codes:
https://brainly.com/question/4056554
#SPJ1

superclass in python explanation

Answers

Answer:

The class from which a class inherits is called the parent or superclass. A class which inherits from a superclass is called a subclass, also called heir class or child class. Superclasses are sometimes called ancestors as well. There exists a hierarchical relationship between classes. It's similar to relationships or categorizations that we know from real life. Think about vehicles, for example. Bikes, cars, buses and trucks are vehicles. Pick-ups, vans, sports cars, convertibles and estate cars are all cars and by being cars they are vehicles as well. We could implement a vehicle class in Python, which might have methods like accelerate and brake. Cars, Buses and Trucks and Bikes can be implemented as subclasses which will inherit these methods from vehicle.

Explanation:

The class from which a class inherits is called the parent or superclass. A class which inherits from a superclass is called a subclass, also called heir class or child class. Superclasses are sometimes called ancestors as well. There exists a hierarchical relationship between classes. It's similar to relationships or categorizations that we know from real life. Think about vehicles, for example. Bikes, cars, buses and trucks are vehicles. Pick-ups, vans, sports cars, convertibles and estate cars are all cars and by being cars they are vehicles as well. We could implement a vehicle class in Python, which might have methods like accelerate and brake. Cars, Buses and Trucks and Bikes can be implemented as subclasses which will inherit these methods from vehicle.

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.

Answers

Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.

Writting the code:

Assume the variable s is a String

and index is an int

an if-else statement that assigns 100 to index

if the value of s would come between "mortgage" and "mortuary" in the dictionary

Otherwise, assign 0 to index

is

if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)

{

   index = 100;

}

else

{

   index = 0;

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to
Other Questions
Who was declared the winner of the most expensive senate race this year, where spending reached nearly $375 million?. Solve the equation:X/4 - 16 = (-32) The most significant and costly initiative of the federal government under President Dwight EisenhowerinvolvedA. a nuclear energy program.B. the space program.C. a federal highway system.D. a national healthcare system.E. a large tax cut. What is an additional gelatinous layer that surrounds the other wall layers called? Describe the hair cells - what type of receptors are they ? Whatrole do they play in transduction and equilibrium . (11) If goods X and Y are substitues, which of the following could (11)_______be the value of the cross-price elasticity between X and Y-0.5-5neither a), nor b)both a) and b)(12) A 6% increase in the price of tea causes a 12% increase (12): Din the demand for coffee. The cross elasticity of demand for coffee withrespect to the price of tea is:a) -0.5b) 0.5c) -2.0d) 2.0(13) All of the following statements are correct except: (13)_______Marketing mix comprises product, price, promotion, and place.Market intelligence is an important facilitating function that makes possible the smooth performance of the agro-food supply chain.Standardization and transportation are facilitating functions.Speculative middlemen buy and sell products with the major goal of profiting from short-term price fluctuations.(14) All of the following statements are incorrect except: (14)_______Farm sector is not part of the food marketing system.The relationship between farmers and food marketing firms is only competitive and not complementary.Competition plays a key role in fostering pricing efficiency.Livestock commission firms receive their income from merchandising livestock products.(15) All of the following statements are correct except: 15)_______(a) Economies of scale brought by specialization is one reason why middlemen exist.(b) Allocative efficiency is only possible in perfectly competitive markets.(c) The standardization function helps achieve productive and allocative efficiencies.(d) Agent middlemen provide market knowledge to buyers and sellers and benefit from short-run price fluctuations. what are the four most common categories of outside the vehicle distractions Write a program that achieves the concept of thread using extends of thread or implements runnable then achieve synchronize for one function What term is associated with chemostat growth of microorganisms under conditions in which the dilution rate exceeds the maximum growth rate of the organism in that medium?. A train leaves at 14.54 and arrives at its destination at 15.47. If the train travelled 66 km, what was it's average speed in km/h? Give your answer rounded to 1 dp. step by step explanation the user should be able to select a flight from a suggested flights and put them in the cart . if the user clicks on the "display cart" button, you should display the information of the flights ( flightid, origin, destination, departure date, departure time, arrival date, arrival time, price) that are in the cart. you should also display the total price for the cart. 5. Shelly spent $15.73 at the mall. Her sister Kelly spent $7.92. How much more did Shelly spend than Kelly? Answer using number line Glucose molecules bond together in a process known as dehydration synthesis. What happens in this process?. Part b calculate the perimeter of each quadrilateral and the ratio of the perimeters. round your answers to the hundredths place. why do you think that the plague spread so quickly? If Y is the midpoint of AB, find B given A(3,5) and Y(-2,3) Suppose that for a certain experiment P(A)=0.33 and P(B) = 0.29. If A and B are mutually exclusive events, find P(AUB). 03 O B.52 C. 38O D. 31 y=3x+4 postive or negitive Multiply: (x 4)(x + 5) Will mark brain list. plz answer