For this assignment you will write a class called Dog that has the following member variables:
birthyear. An int that holds the dog’s birth year.
breed. A string that holds the breed of dog.
vaccines. A Boolean holding a yes/no value indicating whether the dog is currently on vaccinations. In addition, the class should have the following member functions:
Constructor. The constructor should accept the dog’s birthyear, breed and vaccines as arguments and assign these values to the object’s birthyear, breed and vaccines member variables.
Accessors. Appropriate accessor functions should be created to allow values to be retrieved from an object’s birthyear, breed and vaccines member variables.
Demonstrate the class in a program that creates a Dog object. The user should enter all input. Be sure to include comments throughout your code where appropriate.

Answers

Answer 1

Answer:

import java.util.Scanner;

public class Dog {

   private int birthYear;

   private String breed;

   private boolean isVaccinated;

   // The constructor

  public Dog(int birthYear, String breed, boolean isVaccinated) {

       this.birthYear = birthYear;

       this.breed = breed;

       this.isVaccinated = isVaccinated;

   }

   // The Accesor Methods

   public int getBirthYear() {

       return birthYear;

   }

   public void setBirthYear(int birthYear) {

       this.birthYear = birthYear;

   }

   public String getBreed() {

       return breed;

   }

   public void setBreed(String breed) {

       this.breed = breed;

   }

   public boolean isVaccinated() {

       return isVaccinated;

   }

   public void setVaccinated(boolean vaccinated) {

       isVaccinated = vaccinated;

   }

}

//A program that creates the Dog Object

class DogTest{

   public static void main(String[] args) {

       //Requesting details of the Dog from User

       System.out.println("Enter Dog year of birth");

       Scanner in = new Scanner(System.in);

       int year = in.nextInt();

       System.out.println("Enter Dog breed");

       String breed = in.next();

       System.out.println("Is Dog vaccinated");

       boolean isVaccinated = in.nextBoolean();

       //Creating an Object of the Dog class

       Dog DogOne = new Dog(year, breed, isVaccinated);

       System.out.println("The Dog's Breed is is "+DogOne.getBreed());

   }

}

Explanation:

Create two class Dog and DogTest

Define all the class members in the Dog class (The three variables, constructor and accessor methods)

Create the main method in the DogTest class, create an instance of the Dog class.

Use scanner class to request the attributes of a new Dog


Related Questions

Define a function createPhonebook that accepts three arguments: A list of first names A list of last names A list of phone numbers All three arguments will have the same number of items. createPhonebook should return a dictionary where the keys are full names (first name then last name) and the values are phone numbers. For example: firstNames

Answers

Answer:

def createPhonebook(firsts, lasts, numbers):

   d = {}

   for i in range(len(firsts)):

       k = firsts[i] + " " + lasts[i]

       d[k] = numbers[i]

   

   return d

Explanation:

Create a function named createPhonebook that takes three arguments, firsts, lasts, numbers

Initialize an empty dictionary, d

Create a for loop that iterates the length of the firsts times(Since all the arguments have same length, you may use any of them). Inside the loop, set the key as the item from firsts, a space, and item from lasts (If the name is "Ted" and last name is "Mosby", then the key will be "Ted Mosby"). Set the value of the key as the corresponding item in the numbers list.

When the loop is done, return the d

Draw a 4 bit memory using 4 D-Latches with explanation.

Answers

Answer:

Hey there, I think you can draw this! I believe in you!

Ill assist by describing it with a text representation to guide you!

When the clock signal is high, a D-Latch stores one bit of data (also called level-triggered). It has one output, Q, and two inputs, D (for "data") and CLK (for "clock").

To make a memory with 4 bits, we need to use four D-Latches, each of which stores one bit. We can show this in text form as follows:

D0 ----> D-Latch0 ----> Q0

D1 ----> D-Latch1 ----> Q1

D2 ----> D-Latch2 ----> Q2

D3 ----> D-Latch3 ----> Q3

Each D-Latch (D-Latch0 through D-Latch3) represents one bit of the 4-bit memory. The D inputs of each D-Latch are connected to the data inputs (D0 through D3). The bit of memory that is stored is shown by the output of each D-Latch (Q0–Q3).

To store a 4-bit value, set the data inputs (D0 to D3) to the value you want and set the clock signal (CLK) to high. The value will be saved in the D-Latches, and the 4-bit memory output can be read from Q0 to Q3.

A 4-bit memory can be made by connecting four D-Latches in parallel, with each D-Latch storing one bit. The data inputs (D0–D3) show the 4-bit value that was sent in, and the outputs (Q0–Q3) show the 4-bit value that was stored in the memory.

Hope this helps!

Which of the following allows computers to process human voice commands into written format

Speech Recognition

Text input

Eye tracking

Auditory flashes

Answers

Speech Recognition allows computers to process human voice commands into written format

What is speech recognition?

Speech recognition, also known as automatic speech recognition (ASR), is a technology that converts spoken language into written text or other machine-readable formats. it involves the ability of a computer or electronic device to understand and interpret human speech and transcribe it into written form.

Speech recognition systems  utilize various techniques, including signal processing, statistical modeling, and machine learning algorithms, to analyze and decode spoken language. these systems are designed to recognize and differentiate between different phonetic units, words, and phrases based on the acoustic characteristics of the speech input.

Learn more about Speech Recognition at

https://brainly.com/question/30483623

#SPJ1

Which of the following tactics can reduce the likihood of injury

Answers

The tactics that can reduce the likelihood of injury in persons whether at work, at home or wherever:

The Tactics to reduce injury risks

Wearing protective gear such as helmets, knee pads, and safety goggles.

Maintaining proper body mechanics and using correct lifting techniques.

Regularly participating in physical exercise and strength training to improve overall fitness and coordination.

Following traffic rules and wearing seatbelts while driving or using a bicycle.

Ensuring a safe and well-lit environment to minimize the risk of falls or accidents.

Using safety equipment and following guidelines in sports and recreational activities.

Being aware of potential hazards and taking necessary precautions in the workplace or at home.

Read more about injuries here:

https://brainly.com/question/19573072

#SPJ1

____allow(s) visually impaired users to access magnified content on the screen in relation to other parts of the screen.

Head pointers
Screen magnifiers
Tracking devices
Zoom features

Answers

I think the answer is Screen Magnifiers

Answer: screen magnifiers

Explanation: got it right on edgen

Read an integer value representing a year. Determines if the year is a leap year. Prompts the user to enter another year or quit.

A year is a leap year if −

1. It is evenly divisible by 100
2. If it is divisible by 100, then it should also be divisible by 400
3. Except this, all other years evenly divisible by 4 are leap years.

sample run:
Enter a year (0 to quit): 2024
2024 is a leap year

Enter a year (0 to quit): 1997
1997 is not a leap year

Enter a year (0 to quit):

Answers

The code to verify if an year is a leap year is developed throughout this answer.

Code to verify if the year is a leap year

We are going to develop a C code, hence first we declare the main function, as follows:

int main(){

return 0;

}

Then, we declare the integer variable to store the year, as follows:

int main(){

int year;

return 0;

}

Then the year is read in a loop, until the year read is different of 0.

int main(){

int year;

do{

printf("Enter a year (0 to quit):\n");

scanf("%d", & year);

}while(year != 0);

return 0;

}

Then conditional clauses are inserted to verify if the year number is an acceptable input (non-negative number), and if it is a leap year.

do{

printf("Enter a year (0 to quit):\n");

scanf("%d", & year);

if(year > 0){

//Calculates the remainder of the division by 4.

if(year % 4 == 0){

//If divisible by 4 but not by 100, it is a leap year.

if(year % 100 != 0){

printf("%d is a leap year\n", year);

}

//If divisible by 100, it is only a leap year if divisible by 400 also

else{

if(year%400 == 0){

printf("%d is a leap year\n", year);

}

else{

printf("%d is not a leap year\n", year);

}

}

}

//If not divisible by 4, then it is a not leap year

else{

printf("%d is not a leap year\n", year);

}

}

}while(year != 0);

return 0;

}

Learn more about leap years at https://brainly.com/question/24224214

#SPJ1

Sarah needs to send an email with important documents to her client. Which of the following protocols ensures that the email is secure?
a. S/MIME
b. SSH
c. SHTTP
d. SSL

Answers

If Sarah needs to send an email with important documents to her client, then S/MIME protocols ensures that the email is secure.

What is an email?

Email, also known as e-mail or just "e mail," is a shortened term for electronic mail and refers to data that is stored on a computer and transferred between users via a network.

To put it simply, an email is a message with a possible attachment of text, files, images, or other media that is sent over a network to a specific person or group of people.

Ray Tomlinson sent the very first email in 1971. Tomlinson sent the email to himself as a test message with the subject line "something like QWERTYUIOP." The email was sent to himself, but it was still sent over ARPANET.

Learn more about email

https://brainly.com/question/24688558

#SPJ1

What are the three general methods for delivering content from a server to a client across a network

Answers

Answer:

Answered below.

Explanation:

The three general methods consist of unicasting, broadcasting and multicasting.

Casting implies the transfer of data from one computer (sender) to another (recipient).

Unicasting is the transfer of data from a single sender to a single recipient.

Broadcasting deals with the transfer of data from one sender to many recipients.

Multicasting defines the transfer of data from more than one sender to more than one recipients.

You need to create a field that provides the value "over" or "under" for sales, depending on whether the amount is greater than or equal to 15,000. Which type of function can you write to create this data?

Answers

Since You need to create a field that provides the value "over" or "under" for sales, depending on whether the amount is greater than or equal to 15,000. the type of function that one can use to create this data is conditional function.

What is the type of function?

This function takes a businesses amount as input and checks either it is degree or effective 15,000. If it is, the function returns the strand "over". If it is not, the function returns the string "under".

You can use this function to build a new field in a dataset by asking it for each row of the sales pillar. The harvest of the function each row will be the profit of the new field for that row.

Learn more about function from

https://brainly.com/question/11624077

#SPJ1

which type of computer is used to process large amount of data​

Answers

Answer:

Mainframe Computer

Explanation:

Supercomputers

if you are looking for a different answer, please let me know and i will take a look! i'd love to help you out with any other questions you may have

What does influence mean in this passage i-Ready

Answers

In the context of i-Ready, "influence" refers to the impact or effect that a particular factor or element has on something else. It suggests that the factor or element has the ability to shape or change the outcome or behavior of a given situation or entity.

In the i-Ready program, the term "influence" could be used to describe how various components or aspects of the program affect students' learning outcomes.

For example, the curriculum, instructional methods, and assessments implemented in i-Ready may have an influence on students' academic performance and growth.

The program's adaptive nature, tailored to individual student needs, may influence their progress by providing appropriate challenges and support.

Furthermore, i-Ready may aim to have an influence on teachers' instructional practices by providing data and insights into students' strengths and areas for improvement.

This can help educators make informed decisions and adjust their teaching strategies to better meet their students' needs.

In summary, in the context of i-Ready, "influence" refers to the effect or impact that different elements of the program have on students' learning outcomes and teachers' instructional practices. It signifies the power of these components to shape and mold the educational experiences and achievements of students.

For more such questions element,Click on

https://brainly.com/question/28565733

#SPJ8

how can I order the prices negatively affect other producers of goods and services​

Answers

Scarcity of availability causes producers to either charge
higher prices or to produce more goods and services (like energy
production, cars, paper, etc.)

Which three statements about RSTP edge ports are true? (Choose three.) Group of answer choices If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status. Edge ports can have another switch connected to them as long as the link is operating in full duplex. Edge ports immediately transition to learning mode and then forwarding mode when enabled. Edge ports function similarly to UplinkFast ports. Edge ports should never connect to another switch.

Answers

Answer:

Edge ports should never connect to another switch. If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status.

which of the following events happen first
web 2.0 had evolved
ARPANET was developed
The world wide web was created
Email was invented

Answers

Answer:

Hey! The answer your looking for is ARPANET:)

Explanation:

Answer:

ARPANET was developed

Explanation:

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

Answers

In credentialed scanning, policy compliance plugins give you an advantage  known as option C: Customized auditing.

What does auditing serve to accomplish?

The goal of an audit is to determine if the financial report's information, taken as a whole, accurately depicts the organization's financial situation as of a particular date. For instance, is the balance sheet accurately recording the organization's assets and liabilities?

Therefore since the goal of such a tailored audit, aside from cost and time savings, so, it is to present an objective overall picture of your supplier's organization in all pertinent disciplines, allowing you to better target risk areas and allocate control resources where they are most needed.

Learn more about Customized auditing from

https://brainly.com/question/7890421
#SPJ1

See full question below

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

More accurate results

Safer scanning

Customized auditing

Active scanning

nog
*
24. QUESTION 21:
Peacekeeper text is non-printing text that indicates where you can type.
(2.5 Points)
True
False

Answers

Answer: False

Explanation:

The statement that "Peacekeeper text is non-printing text that indicates where you can type" is false.

The non-printing text which shows where on exam type is referred to as the peaceholder text. It is usually an hint which can be used to fill in the actual text.

5. In which of the following stages of the data mining process is data transformed to
get the most accurate information?
A. Problem definition
B. Data gathering and preparation
C. Model building and evaluation
D. Knowledge deployment
Accompanies: Data Mining Basics

Answers

Answer:B

Explanation: BC I SAID

Brainly not working for me not showing any ads or answers

Answers

Answer:

oof, try reloading the page?

Explanation:

Answer:

You should try logging in out your account

Help me! I’ll mark you brainly and give extra points!

Help me! Ill mark you brainly and give extra points!

Answers

Answer:

52 5,

Explanation:

Users are unable to open files that are not relevant to their jobs. Users can open and view files but are unable to edit them. Users can open, view, and edit files. The bullet points above describe _____. Responses access privileges firewalls network topologies modems

Answers

Answer:

Explanation:

them

Which component of computer is also considered as it Heart ?

Answers

Answer: Central Processor Unit (CPU)

Message: If this was helpful, let me know by giving me a thanks! :)

Answer:

The central processing unit (CPU) is often referred to as the "brain" or "heart" of a computer. The CPU is the component of a computer that carries out the instructions of a computer program by performing basic arithmetic, logical, and input/output operations. It is the most important component of a computer, as it is responsible for executing the majority of the instructions that make up a computer program.

The CPU is typically made up of two main components: the control unit and the arithmetic logic unit (ALU). The control unit fetches instructions from memory and decodes them, while the ALU performs the actual calculations and logical operations specified by the instructions.

In summary, the CPU is considered the "heart" of a computer because it is the component that carries out the instructions of a computer program and performs the majority of the operations that make a computer work.

Assume a fully associative write-back cache with many cache entries that starts empty. Below is sequence of eight memory operations (The address is in square brackets):

Read Mem[300];

Write Mem[100];

Write Mem[100];

Read Mem[200];

Write Mem[200];

Read Mem[100];

Write Mem[100];

Write Mem[100];

Answers

Answer:

Please mark me the brainliest

We can use the following steps to simulate the given sequence of memory operations in a fully associative write-back cache:

Explanation:

1. Read Mem[300]:

  - The cache is empty, so we have a cache miss and bring the block containing Mem[300] into the cache.

  - The block is now in the cache.

 

2. Write Mem[100]:

  - The cache currently only contains a block for Mem[300], so we have a cache miss and bring the block containing Mem[100] into the cache.

  - The block is now in the cache.

  - The value of Mem[100] in the cache is updated with the new value.

 

3. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

  - Note that this write operation is redundant, since the value of Mem[100] was already updated in step 2.

 

4. Read Mem[200]:

  - The block containing Mem[200] is not in the cache, so we have a cache miss and bring the block into the cache.

  - The block is now in the cache.

 

5. Write Mem[200]:

  - The block containing Mem[200] is already in the cache, so we have a cache hit.

  - The value of Mem[200] in the cache is updated with the new value.

 

6. Read Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is not changed.

 

7. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

 

8. Write Mem[100]:

  - The block containing Mem[100] is already in the cache, so we have a cache hit.

  - The value of Mem[100] in the cache is updated with the new value.

  - Note that this write operation is redundant, since the value of Mem[100] was already updated in step 7.

At the end of these operations, the cache contains blocks for Mem[200] and Mem[100], with the value of Mem[200] being the most recent value written to that address. The value of Mem[100] in the cache is the same as the value written in step 8.

Which command provides the source reference on the last page of a document?

A.Citation
B.Endnote
C.Footnote
D.Reference

PLS help

Answers

Answer:

C. Footnote

Explanation:

Linda wants to change the color of the SmartArt that she has used in her spreadsheet. To do so, she clicks on the shape in the SmartArt graphic. She then clicks on the arrow next to Shape Fill under Drawing Tools, on the Format tab, in the Shape Styles group. Linda then selects an option from the menu that appears, and under the Colors Dialog box and Standard, she chooses the color she wants the SmartArt to be and clicks OK. What can the option that she selected from the menu under Shape Fill be

Answers

Answer: Theme colors

Explanation:

Based on the directions, Linda most probably went to the "Theme colors" option as shown in the attachment below. Theme colors enables one to change the color of their smart shape.

It is located in the "Format tab" which is under "Drawing tools" in the more recent Excel versions. Under the format tab it is located in the Shape Styles group as shown below.

Linda wants to change the color of the SmartArt that she has used in her spreadsheet. To do so, she clicks

*IN JAVA*

Write a program whose inputs are four integers, and whose outputs are the maximum and the minimum of the four values.

Ex: If the input is:

12 18 4 9
the output is:

Maximum is 18
Minimum is 4
The program must define and call the following two methods. Define a method named maxNumber that takes four integer parameters and returns an integer representing the maximum of the four integers. Define a method named minNumber that takes four integer parameters and returns an integer representing the minimum of the four integers.
public static int maxNumber(int num1, int num2, int num3, int num4)
public static int minNumber(int num1, int num2, int num3, int num4)

import java.util.Scanner;

public class LabProgram {

/* Define your method here */

public static void main(String[] args) {
/* Type your code here. */
}
}

Answers

The program whose inputs are four integers is illustrated:

#include <iostream>

using namespace std;

int MaxNumber(int a,int b,int c,int d){

int max=a;

if (b > max) {

max = b;}

if(c>max){

max=c;

}

if(d>max){

max=d;

}

return max;

}

int MinNumber(int a,int b,int c,int d){

int min=a;

if(b<min){

min=b;

}

if(c<min){

min=c;

}

if(d<min){

min=d;

}

return min;

}

int main(void){

int a,b,c,d;

cin>>a>>b>>c>>d;

cout<<"Maximum is "<<MaxNumber(a,b,c,d)<<endl;

cout<<"Minimum is "<<MinNumber(a,b,c,d)<<endl;

}

What is Java?

Java is a general-purpose, category, object-oriented programming language with low implementation dependencies.

Java is a popular object-oriented programming language and software platform that powers billions of devices such as notebook computers, mobile devices, gaming consoles, medical devices, and many more. Java's rules and syntax are based on the C and C++ programming languages.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Describe the impact of a company’s culture on its success in a customer-focused business environment. Discuss why each is important.

Answers

The influence of a corporation's  culture cannot be underestimated when it comes to achieving success in a customer-centric commercial landscape.


What is company’s culture

The values, beliefs, norms, and behaviors that constitute a company's culture have a major impact on how its employees engage with customers and prioritize their requirements.

Having a customer-centric mindset means cultivating a culture that places a strong emphasis on satisfying and prioritizing customers' needs and desires, resulting in employees who are aware of the critical role customer satisfaction plays in ensuring success.

Learn more about company’s culture from

https://brainly.com/question/16049983

#SPJ1

HTTP is a formatting (called markup) language used for the Web. Choose the answer. True False​

Answers

Answer:

according to the internet

Explanation:

True

In python, Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non-negative" otherwise.

Answers

I am assuming that user_val is an inputted variable and a whole number (int)...

user_val = int(input("Enter a number: "))

if user_val < 0:

   print("negative")

else:

   print("non-negative")

what does the government payers or insurance carriers perform when an unusual billing pattern has been observed​

Answers

Answer:

Whenever there is an unusual billing government payers or insurance carriers perform routine audits.

Examples of unusual billing patterns include but are not to:

the serial reoccurrence of the same diagnostic code after every visit;the repeated billing of the same procedure.

These audits are performed using, in most cases, computer software applications which are capable of screening transactions to uncover such patterns.

Cheers!

What is the empty space inside the character 'O' called?

Answers

Answer:

In typography, a counter is the area of a letter that is entirely or partially enclosed by a letter form or a symbol (the counter-space/the hole of). The stroke that creates such a space is known as a "bowl".

Other Questions
55 yo M presents with pain in the elbow when he plays tennis. His grip is impaired as a result of the pain. There is tenderness over the lateral epicondyle as well as pain on resisted wrist dorsiflexion (Cozen's test) with the elbow in extension. What the diagnose? Which sentence best describes how electrically charged objects interact? Which types of power would you rely on to implement an important decision quickly?Which types would you consider most valuable for sustaining power over the long term? Everyone help me please!!!!I am needing your answers now,PlzzzzzzIf you answers my questions very good and excalty,I will give you the brainliest.Plzzz,Help me with this!!!!!!!!!!!Im needing your answers now calculate p +3q when p=2 and q=2 HELP!! CAN I PLEASE GET HELP I JUST NEED WHAT X IS ? Somerset Computer Company has been purchasing carrying cases for its portable computers at a purchase price of $57 per unit. The company, which is currently operating below full capacity, charges factory overhead to production at the rate of 44% of direct labor cost. The unit costs to produce comparable carrying cases are expected to be as follows:Direct materials $27Direct labor 17Factory overhead (44% of direct labor) 7.48Total cost per unit $51.48If Somerset Computer Company manufactures the carrying cases, fixed factory overhead costs will not increase and variable factory overhead costs associated with the cases are expected to be 16% of the direct labor costs.Question Content Areaa. Prepare a differential analysis dated April 30 to determine whether the company should make (Alternative 1) or buy (Alternative 2) the carrying case. If required, round your answers to two decimal places. If an amount is zero, enter "0".Differential AnalysisMake Carrying Case (Alt. 1) or Buy Carrying Case (Alt. 2)April 30MakeCarryingCase(Alternative 1) BuyCarryingCase(Alternative 2) DifferentialEffects(Alternative 2)Unit costs: Purchase price $fill in the blank f5728bf69052fef_1 $fill in the blank f5728bf69052fef_2 $fill in the blank f5728bf69052fef_3Direct materials fill in the blank f5728bf69052fef_4 fill in the blank f5728bf69052fef_5 fill in the blank f5728bf69052fef_6Direct labor fill in the blank f5728bf69052fef_7 fill in the blank f5728bf69052fef_8 fill in the blank f5728bf69052fef_9Variable factory overhead fill in the blank f5728bf69052fef_10 fill in the blank f5728bf69052fef_11 fill in the blank f5728bf69052fef_12Fixed factory overhead fill in the blank f5728bf69052fef_13 fill in the blank f5728bf69052fef_14 fill in the blank f5728bf69052fef_15Total unit costs $fill in the blank f5728bf69052fef_16 $fill in the blank f5728bf69052fef_17 $fill in the blank f5728bf69052fef_18Question Content Areab. Assuming there were no better alternative uses for the spare capacity, it would to manufacture the carrying cases. Fixed factory overhead is to this decision. what optional phase of a trial typically involves an issue raised during cross-examination of a witness? Declan invested an amount of money in a savings account that pays compound interest at a rate of 8% per annum.After 14 years there is 14,685.97 in the savings account (rounded to the nearest 1p).How much money did Declan initially invest?Give your answer to the nearest 1. Consider the following set: Q = {x/x is an Odd integer number Greater than 5)Which of the following is True about set Q? 5 is not an element of Q The set Q is written in Set Builder Notation 7 is an element of Q All of the above are True Choose the equation of the horizontal line that passes through the point (2, 3).a. x=2b.x=3c. y=2d. y=3 calculate the value of x in each case. (a) Find the equation of the straight line through (0,7) and (3,1). (b) Find the equation of the line through (4,11) with slope 2. (c) Find a point that lies on both of the lines in (a) and (b). (a) The equation of the straight line through (0,7) and (3,1) is (Type an equation.) susan is a network administrator and is setting up her company's network. in the process to determine an open port on a firewall, she should (5 points) select ethernet, then bluetooth network select wireshark, then save type c:/>exit then close without saving type c:/>nmap then enter a 24-year-old woman with no medical history presents with left wrist pain after a fall. the left extremity is grossly deformed, and the patient reports severe pain. the patient has a blood pressure of 183/100 mm hg. what management is indicated for the patient's elevated blood pressure while awaiting x-rays? can i have help with this please A retailer is considering a 33% off sale on blenders currently priced at $54. The retailer pays $29 per blender from the manufacturer. What is the initial gross margin? A 38 1/25m tower is built on the summit of a mountain that is 784 1/5m above sea level.Then a lighting rod that is 3 4/5m high is built on tp of the tower. How high above sea level is the very top of the lighting rod?I need the answer today before 4:00, No Files please Thank you. Choose the words or phrases that correctly complete the sentence. Two boys are holding onto the ends of a long piece of string, and they move it up and down to make a wave. They begin to move the string faster and faster. When they move the string, the energy (remains the same / increases / decreases) and the frequency (decreases / increases / remains the same). A) increases, increases B) remains the same, remains the same C) decreases, decreases D) increases, decreases 50+100n please awnser thisssssssssssssssssssssssssssssssssssssssssssssssss