Hiram rhodes revels was a key figure during the reconstruction era because.

Answers

Answer 1

Answer:

he was the first African-American elected to a seat in the U.S. Congress

Explanation:

Hiram Rhodes Revels was a Republican U.S. Senator and from this position,  Hiram Revels of was the first African American member of the United States Senate, he was devoted to service.

Hiram Rhodes Revels proved to be a voice of moderation during Reconstruction, and favored granting full amnesty to former Confederates as long as they swore an oath of loyalty to the United States.


Related Questions

Which of the following shows the assignment of a string to a variable? Select 3 options.

answer = input("How old are you? ")

answer = "23"

answer = '23'

answer = 23

answer = (23)

Answers

Answer:

23, (23)

Explanation:

Answer:

⬇️

Explanation:

answer = "23"

answer = input("How old are you? ")

answer = '23'

correct on edg. 2021

escribe how loops in paths can be detected in bgp?

Answers

In BGP, loops in paths can be detected through the use of loop detection mechanisms such as the loop detection algorithm.

This algorithm detects loops by examining the AS path attribute of BGP updates and identifying any AS numbers that appear multiple times in the path. If a loop is detected, the update is rejected and not propagated further. Additionally, BGP routers can also use the "split-horizon" rule to prevent loops by not advertising updates received from one neighbor back to the same neighbor.  Hi! To detect loops in paths within the Border Gateway Protocol (BGP), the system uses the AS_PATH attribute. When a BGP router receives a route advertisement, it checks the AS_PATH for its own Autonomous System (AS) number. If it finds its AS number already in the path, this indicates a loop has been detected, and the router will discard the route to prevent further propagation of the loop

To learn more about mechanisms click on the link below:

brainly.com/question/20885658

#SPJ11.

In BGP, loops in paths can be detected through the use of loop detection mechanisms such as the loop detection algorithm.

This algorithm detects loops by examining the AS path attribute of BGP updates and identifying any AS numbers that appear multiple times in the path. If a loop is detected, the update is rejected and not propagated further. Additionally, BGP routers can also use the "split-horizon" rule to prevent loops by not advertising updates received from one neighbor back to the same neighbor.  Hi! To detect loops in paths within the Border Gateway Protocol (BGP), the system uses the AS_PATH attribute. When a BGP router receives a route advertisement, it checks the AS_PATH for its own Autonomous System (AS) number. If it finds its AS number already in the path, this indicates a loop has been detected, and the router will discard the route to prevent further propagation of the loop

To learn more about mechanisms click on the link below:

brainly.com/question/20885658

#SPJ11.

Which of the following tripeptides carries a net positive charge at pH7.0 ? I. Gln-Val-Ser II. Ala-Thr-Asn III. Pro-lle-Leu IV. Leu-Lys-Gly V. Arg-Glu-Met

Answers

The tripeptide that carries a net positive charge at pH 7.0 is Leu-Lys-Gly (IV).

At pH 7.0, the carboxyl group of glutamic acid (Glu) in Arg-Glu-Met (V) and the carboxyl group of aspartic acid (Asp) in Ala-Thr-Asn (II) are deprotonated, resulting in a net negative charge. On the other hand, the side chain of lysine (Lys) in Leu-Lys-Gly (IV) has an amino group that can accept a proton at pH 7.0, resulting in a net positive charge. Therefore, out of the options given, Leu-Lys-Gly (IV) is the tripeptide that carries a net positive charge at pH 7.0.

Here is a summary:

- Gln-Val-Ser (I) does not contain any charged amino acids and therefore does not carry a net positive charge at pH 7.0.

- Ala-Thr-Asn (II) contains aspartic acid (Asp), which has a deprotonated carboxyl group and carries a net negative charge at pH 7.0.

- Pro-Ile-Leu (III) does not contain any charged amino acids and therefore does not carry a net positive charge at pH 7.0.

- Leu-Lys-Gly (IV) contains lysine (Lys), which has an amino group that can accept a proton at pH 7.0, resulting in a net positive charge.

- Arg-Glu-Met (V) contains glutamic acid (Glu), which has a deprotonated carboxyl group and carries a net negative charge at pH 7.0

So, the answer is option IV

Learn more about tripeptide at:

https://brainly.com/question/31827580

#SPJ11

give me facts on john john son

Answers

Answer: Story -

In 1951, John H. Johnson was selected as Young Man of the Year by the United States Chamber of Commerce. He was the first African-American to receive such honor. In 1966, he received Spingarn Medal by the National Association for the Advancement of Colored People for his contributions in the area of race relations.

Born -  

January 19, 1918, Arkansas City, AR

Died -

August 8, 2005, Chicago, IL

Spouse -

Eunice W. Johnson

(married at 1941–2005)

Children -

Linda Johnson Rice, John Harold Johnson

Explanation:

Joe always misspells the word calendar. He types the word as calender but the correct spelling appears on the document. Which feature of the word processor corrects this word?

Answers

Answer:

Auto correct feature

Explanation:

It corrects word written wrongly automatically

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

Which component of Exploit Guard helps prevent access to internet domains that may host phishing scams, exploits, and other malicious content?
Network protection

Answers

Network protection is the component of Exploit Guard that helps prevent access to internet domains that may host phishing scams, exploits, and other malicious content.

Exploit Guard is a set of advanced security features in Windows that provides enhanced protection against various types of cyber threats. One of its key components is network protection, which acts as a safeguard against accessing malicious internet domains.

When enabled, network protection monitors network traffic and analyzes the URLs or domain names being accessed by applications on a system. It compares these URLs against a list of known malicious domains or blacklists maintained by Microsoft, security organizations, or administrators.

By leveraging real-time threat intelligence and machine learning algorithms, network protection can identify and block attempts to access websites that are known to host phishing scams, exploit kits, malware, or other types of malicious content. This proactive approach helps to prevent users from inadvertently visiting dangerous websites and falling victim to online scams or malware infections.

Network protection operates at the network level, meaning it can block access to malicious domains across various applications and processes on a system. This ensures comprehensive protection, even if an application has vulnerabilities that could be exploited to bypass other security measures.

By actively monitoring and filtering network traffic, Exploit Guard's network protection component helps to create a safer browsing environment for users and mitigate the risks associated with accessing malicious internet domains.

Learn more about  phishing scams

brainly.com/question/32404889

#SPJ11

what is an electronic device that manipulates information, or "data"​

Answers

Answer:

Computer

Explanation:

A computer is a very functional electronic device that has been helping people since decades ago. It has so many functions including the manipulation of data. It means the computer can control volumes of data on its own. Such manipulation means that it can store data in several locations and recover them. It also operates by processing data in a very quick manner.

photo editing software, desktop publishing, email and word processing software is most likely to be used by:
a) law enforcement officers
b) musicians
c)mass media personnel
d)medical personnel

Answers

Answer:

c) mass media personnel

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. System softwares.

II. Utility softwares.

Photo editing software, desktop publishing, email and word processing software is most likely to be used by a mass media personnel because he or she deals with the creation of various documents such as images, texts, multimedia files etc.

Which is an example of intrinsic motivation?

allowing time to do an after-school activity once studying is done
asking the teacher for extra credit to improve a test score
doing extra studying beyond what is needed to score well on the test
working for the goal of getting straight A’s on a report card

Answers

Answer:

a

Explanation:

because once your done studying it motivates you to do more educational activities in my opinion

Answer:

c

Explanation:

Help please, it would be much appreciated!

Help please, it would be much appreciated!

Answers

Answer:

Explanation:

ihave no idea

Which web source citations are formatted according to MLA guidelines? Check all that apply.
“Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies.” Karimi, Faith. CNN. Turner Broadcasting. 5 Dec. 2013. Web. 1 Mar. 2014.
“Nelson Mandela Biography.” Bio.com. A&E Television Networks, n.d. Web. 28 Feb. 2014.
Hallengren, Anders. “Nelson Mandela and the Rainbow of Culture.” Nobel Prize. Nobel Media, n.d. Web. 1 Mar. 2014.
“Nelson Mandela, Champion of Freedom.” History. The History Channel. Web. 1 Mar. 2014.
“The Long Walk is Over.” The Economist. The Economist Newspaper, 5 Dec. 2013. Web. 1 Mar. 2014.

Answers

The citation that is formatted according to MLA guidelines is:
“Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies.” Karimi, Faith. CNN. Turner Broadcasting. 5 Dec. 2013. Web. 1 Mar. 2014.

What is Apartheid?
Apartheid was a system of institutional racial segregation and discrimination that was implemented in South Africa from 1948 to the early 1990s. It was a policy of the government that aimed to maintain white minority rule and power by segregating people of different races, and denying non-whites their basic rights and freedoms.

This citation follows the basic MLA format for citing a web source. It includes the following elements:

Author's name: Karimi, Faith.Title of the article: "Nelson Mandela, Anti-Apartheid Icon and Father of Modern South Africa, Dies."Name of the website: CNN.Name of the publisher: Turner Broadcasting.Date of publication: 5 Dec. 2013.Medium of publication: Web.Date of access: 1 Mar. 2014.

None of the other citations are formatted according to MLA guidelines because they either have missing or incorrect elements. For example, the citation for "Nelson Mandela Biography" does not include the date of publication, and the citation for "Nelson Mandela and the Rainbow of Culture" does not include the name of the publisher. The citation for "Nelson Mandela, Champion of Freedom" does not include the date of publication or the name of the publisher. The citation for "The Long Walk is Over" includes the date of publication, but it does not include the name of the publisher, and the title is not italicized.

To know more about citation visit:
https://brainly.com/question/29885383
#SPJ1

_____ is a set of rules that access uses to ensure that the data between related tables is valid

Answers

The set of rules that Access uses to ensure that the data between related tables is valid is called "referential integrity".

Referential integrity is a feature in Microsoft Access that ensures that relationships between tables are maintained correctly. It prevents orphaned records (records in a related table that have no matching records in the primary table) and ensures that data is consistent between related tables. Referential integrity is enforced through a set of rules that specify how the tables are related and how data should be entered, updated, and deleted.

In Microsoft Access, referential integrity is a powerful tool that ensures the integrity of the data stored in related tables. It is a set of rules that Access uses to ensure that data between related tables is valid and consistent. Referential integrity is enforced through a series of relationships between tables that are defined by primary keys and foreign keys. A primary key is a unique identifier for a record in a table, while a foreign key is a field in a table that refers to the primary key in another table. When a relationship is established between two tables, Access uses referential integrity rules to ensure that data entered into the related tables is consistent.

To know more about Microsoft Access visit :-

https://brainly.com/question/17959855

#SPJ11

Which range function creates the following list of numbers?

21 25 29 33 37 41

Group of answer choices

range(21, 44, 4)

range(21, 41)

range(21, 41, 4)

range(21, 44)

Answers

Note that the range function that creates the following list of numbers is:  range(21, 44, 4) (Option A)

What is the rationale for the above response?

The rationale for the above response is that the range function generates a sequence of numbers from a starting value to an ending value with a specific step size.

The list of numbers, "21 25 29 33 37 41", starts from 21 and increments by 4 until it reaches 44. Therefore, range(21, 44, 4) would generate this sequence of numbers.

The first argument is the starting value, the second argument is the ending value, and the third argument is the step size, which in this case is 4.

Learn more about  range function:

https://brainly.com/question/29145252

#SPJ1

What are the types of text?

Answers

Answer: there are two main text types, factual and literary. Within these are many more narrowly defined text types. Factual text types include such types as factual description, recount, or persuasive. Literary text types include such types as poetry, narrative or personal response.

Answer:

Description sequeninstruction process cause-and-effect compare contrast problem and solution

Explanation:

there just soooo many types of texts bit theses are sum

Write in Python

11.3

Write in Python11.3

Answers

Answer:

A simple program of the Person and Customer classes in Python

class Person:

   def __init__(self, name, address, telephone_number):

       self.name = name

       self.address = address

       self.telephone_number = telephone_number

class Customer(Person):

   def __init__(self, name, address, telephone_number, customer_number, mailing_list):

       super().__init__(name, address, telephone_number)

       self.customer_number = customer_number

       self.mailing_list = mailing_list

# Creating an instance of the Customer class

customer1 = Customer("John Doe", "123 Main St", "555-1234", "C12345", True)

# Accessing attributes of the customer

print("Customer Name:", customer1.name)

print("Customer Address:", customer1.address)

print("Customer Telephone Number:", customer1.telephone_number)

print("Customer Number:", customer1.customer_number)

print("Wants to be on Mailing List:", customer1.mailing_list)

Explanation:

In this example, the Person class is the base class, and the Customer class is a subclass of Person. The Person class has data attributes for a person's name, address, and telephone number. The Customer class extends the Person class and adds two additional data attributes: customer_number and mailing_list.

The __init__ method is used to initialize the attributes of each class. The super().__init__() call in the Customer class ensures that the attributes from the Person class are also initialized properly.

Finally, an instance of the Customer class (customer1) is created and its attributes are accessed and printed in a simple program.

What is the difference between special purpose software and customized software​

Answers

The choice of a specific software product model depends on your business specs. General-purpose solutions cover a set of the most common functions. The tailor-made one allows you to stand out for the individual approach for business processes and tasks.Jul 27, 2020

Answer:

im trying to do a challenge because this kid deleted all my answers      

Explanation:

write a loop that counts the number of lowercase characters in the string referenced by my_string
write in python

Answers

Answer:

Here's an example Python code that uses a loop to count the number of lowercase characters in a string:

my_string = "The quick BROWN fox JUMPS over the lazy dog"

# Initialize a count variable to keep track of lowercase characters

count = 0

# Loop through each character in the string

for char in my_string:

   # Check if the character is lowercase

   if char.islower():

       # Increment the count if it is lowercase

       count += 1

# Print the total count of lowercase characters

print("The number of lowercase characters in the string is:", count)

In this example, we start with a string "The quick BROWN fox JUMPS over the lazy dog" and we want to count the number of lowercase characters in the string. We initialize a count variable to zero and then loop through each character in the string. For each character, we check if it is lowercase using the islower() method. If the character is lowercase, we increment the count by 1. Finally, we print out the total count of lowercase characters in the string, which is 20 in this case.

how do you award a brainliest

Answers

Answer: Usually there has to be 2 answers. When you go to the answers on your question there should be a outlined crown or something like that, then you click that.

Mike needs to write the primary objectives of a project in a project plan. In which section should he write them?
A.
scope
B.
overview
C.
baselines
D.
schedule

The answer is B.) overview

Answers

D because you are always supposed to use your schedule

Answer:B

Explanation: yes

Which range of cells represents the Lookup Table for finding which award each student received? Which lookup function would you use to fill C2:C7? What is your lookup value for student C?.

Answers

To find award of each student recieved we use VLOOKUP function.

What is VLOOKUP Function ?

VLOOKUP stated as 'Vertical Lookup' is a simplest functional form that makes excel to search a certain value in the column ie. Table Array in order to return values from different columns in that same row.

We use VLOOKUP when we need to find values in table or a range by given row.

Learn more about VLOOKUP here :https://brainly.com/question/14042837

Answer: First one is A (E7:F12)

              Second one is Vlookup

              Third one is 6

Explanation:

Just did the class in Alt Ed, sorry im late

how important are operating system in our devices?​

Answers

Answer:

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language. An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.

(Hope this helps, please mark as brainiest <3.)

here is a 32-bit pattern: 0x00fab132. this pattern is to be stored in main memory using bytes at addresses 0x10000000, 0x10000001, 0x10000002, and 0x10000003. on a little endian processor, what bit pattern is contained in address 0x10000000?

Answers

If it used big-endian byte order instead, the byte pattern would be stored in reverse order.

How we can use bit pattern is contained in address 0x10000000?

On a little-endian processor, the least significant byte of a multi-byte value is stored at the lowest memory address. Therefore, in this case, the least significant byte of the 32-bit pattern, which is "\(32\)" in hexadecimal or "00110010" in binary, will be stored at the lowest address \(0x10000000\).

To convert the pattern into little-endian byte order, we simply need to reverse the byte order. So the pattern becomes: \(0x32b1fa00\). This value can be split into four bytes:

Byte 0 (address \(0x10000000\)): \(0x32\)Byte 1 (address \(0x10000001\)): \(0xb1\)Byte 2 (address \(0x10000002\)): \(0xfa\)Byte 3 (address \(0x10000003\)): \(0x00\)

Therefore, the bit pattern contained in address \(0x10000000\) is \(00110010\), which represents the value \(50\) in decimal.

Note that this assumes that the processor uses little-endian byte order for storing multi-byte values.

Learn more about byte pattern

brainly.com/question/14673567

#SPJ11

Write a split_check function that returns the amount that each diner must pay to cover the cost of the meal. the function has 4 parameters:

Answers

The function has 4 parameters:

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

  tip = bill * tip_percentage

  tax = bill * tax_percentage

  total = bill + tip + tax  

  return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

Create a function named split check that takes four parameters, bill, persons, tax percentage and tip percentage (last two values are optional) (last two parameters are optional)

Use the percentages to compute the tip and tax inside the function. Add the bill, the tip, and the tax to get the final amount. The cost per person is then calculated by dividing the amount by the number of people.

Learn more about parameters:

https://brainly.com/question/28249912

#SPJ4

suppose a classification tree model you are using produces a split with two terminal nodes with the same label. why do you think this happened? what is the interpretation you give to the result? is there any method(s) you know of that can address the issue?

Answers

The methods that produces split with two terminal nodes with the same label by tree model are-

Calculate the variance of each child node for each split.As the weighted average variance of the child nodes, calculate the variance of each split.The split with the smallest variance should be chosen.Repeat steps 1-3 until all nodes are entirely homogenous.

What are nodes?Node is an electronic device. It is the Physical components that can send, receive or forward data.Computer is an electronics devices and also have ability to send, receive or forward data. so this is the reason that, we can say computer is a node in computer network.

Know more about nodes click here:

https://brainly.com/question/13992507

#SPJ4





The concept of vertical farming allows agriculture to occur when there is not enough___Available .

Answers

Answer:

land

Explanation:

Vertical farming is a modern method of farming or growing crops and vegetation. It allows growing of crops in stacked layers which is vertical. The crops are grown in a well equipment controlled-environment set up.

Vertical farming is done where there is fewer land resources as well as water resources. The main is to increase the crop yield with a very less use of land resources. But it requires more energy than the conventional energy.

A level 2 cache is focused on supporting what kind of locality?
a. Temporal Locality
b. Dimensional Locality
c. Web Locality
d. Spatial Locality

Answers

A level 2 cache is a memory component that is placed between the CPU and the main memory, with the aim of increasing the speed of data access for the CPU. It is designed to support a specific type of locality, which is known as spatial locality. Spatial locality refers to the tendency of a CPU to access data that is located in close proximity to the data that it has recently accessed.

In other words, if the CPU accesses a particular memory location, it is likely to access nearby memory locations in the near future. Level 2 caches are focused on supporting spatial locality because they are designed to store recently accessed data and data that is located near to the recently accessed data. By doing so, the level 2 cache reduces the amount of time it takes for the CPU to access frequently used data, which can lead to significant improvements in overall system performance. This is achieved by placing the level 2 cache close to the CPU, which allows for faster data access times than would be possible with the main memory alone. In summary, a level 2 cache is focused on supporting spatial locality, which is the tendency of a CPU to access data that is located in close proximity to recently accessed data. By storing frequently used data and data that is located near to recently accessed data, the level 2 cache can improve system performance by reducing the amount of time it takes for the CPU to access frequently used data.

Learn more about memory here

https://brainly.com/question/28483224

#SPJ11

T/F: windows cannot open this program because it has been prevented by a software restriction policy

Answers

The statement is true, if a program displays the error message "Windows cannot open this program because it has been prevented by a software restriction policy," it indicates that the program is blocked from running due to a software restriction policy.

When Windows displays the error message stating that a program cannot be opened due to a software restriction policy, it means that the program has been restricted from running by a security policy enforced by the system administrator or by a Group Policy setting. Software restriction policies are a security feature in Windows that allow administrators to control which programs can run on a computer or within a network. These policies are implemented to prevent the execution of unauthorized or potentially malicious software that may pose a security risk.

When a program is blocked by a software restriction policy, it means that the program's executable file or its associated file extensions have been explicitly disallowed from running on the system. This restriction is typically enforced through policies defined at the group or system level, and it applies to all users on the affected computer or network. To resolve this issue, the system administrator or the policy settings need to be modified to allow the program to run. Alternatively, users can seek assistance from their IT department or system administrator to adjust the software restriction policies to permit the execution of the desired program.

Learn more about network here: https://brainly.com/question/30456221

#SPJ11

You have copied the data highlighted in the dotted box. What would be the result if you did PASTE command at the selected cell ?

Answers

Answer:

The data would be copied over to the new box

Explanation:

this text command defines how text will appear

Answers

In programming, the text command is not a specific command, but rather a term used to refer to a wide range of commands and functions that manipulate or display text.

What is a text command?

Text commands may include functions for formatting, searching, replacing, and displaying text within a program or on a screen. These commands may be used in a variety of programming languages, including C, as you mentioned.

In C, for example, there are many standard library functions that can be used to work with text. Some of the most commonly used functions for working with text in C include:

printf(): used to display formatted text on the screen or in a file

scanf(): used to read formatted text from the keyboard or a file

strcpy(): used to copy one string of text to another

strcmp(): used to compare two strings of text to determine if they are equal

strlen(): used to determine the length of a string of text

Overall, text commands are a crucial part of programming and are used extensively in applications that involve working with text data.

Learn more about text on:

https://brainly.com/question/20169296

#SPJ1

Other Questions
A parallel plate capacitor using a dielectric material having a dielectric constant of 2.5 has a plate separation of 1-mm. If another material having a dielectric constant of 4.0 is used and the capacitance is to be unchanged, what must be the new spacing between the plates? Williams's poem "The Red Wheelbarrow" relies on:A. Extensive detail to communicate its main idea.B. A rigid rhyme scheme to enhance its meaning.C. Vivid imagery with limited detailed explanation.D. A series of paradoxical statements.E. A formal poetic form. increased usage of social media reduces the habit of reading in youngsters.Write an article for your school magazine on 'The importance of Reading'. Emphasise the needs to promote reading suggesting suitable measures. Two different liquids are poured into a jar until it is half full. The jar is then sealed shut and shaken. The liquids undergo a chemical reaction that releases thermal energy and alsoemits a new gas into the far. The new gas increases the pressure inside the jar. After the far is sealed, it is an example of an) Deniz is playing a game of rock-paper-scissors with Phil. The loser of the game will pay the winner $ 100 $100dollar sign, 100. In the game of rock-paper-scissors, each player chooses either rock, paper, or scissors simultaneously. A winner is decided by the following rules: rock beats scissors, scissors beats paper, and paper beats rock. If both players make the same choice, then the game is a tie. Deniz is trying to decide whether to play rock or paper. Based on previous games, she knows that Phil will make his choice according to the probabilities in the table below. What are Deniz's expected winnings if she chooses rock? Round your answer to the nearest dollar. $ $dollar sign What are Deniz's expected winnings if she chooses paper? Round your answer to the nearest dollar. $ $dollar sign If Deniz wants the best payoff in the long run, she should choose . Phils choice Probability Rock 50 % 50%50, percent Paper 20 % 20%20, percent Scissors 30 % 30%30, percent Please help me friendsss? Need help asap this affects my grade This graph represents the relationship between the growth of a plant and the amount of time that has passed since the plant was planted.Based on the data in the graph, which statement is true?The plant grows 8 inches in 6 weeks.The plant grows 3 inches in 6 weeks.The plant grows 6 inches in 8 weeks.The plant grows 4 inches in 3 weeks. WSYR is a television station that has 25 thirty-second advertising slots during each evening. The station is now selling advertising for the first few days in November. They could sell all the slots now for $4,000 each, but because November 7 will be an election day, the station may be able to sell slots to political candidates at the last minute for a price of $10,000 each. Any slots not sold in advance and not sold at the last minute will be used for station specific advertisements, which do not bring in any revenue. To help make this decision, WSYRs sales force has created the following probability distribution for last minute slot sales based on past data: Demand 9 10 11 12 13 14 15 16 17 18 Probability 0.05 0.10 0.15 0.20 0.15 0.10 0.10 0.05 0.05 0.05 Questions: 1. How many slots should WSYR protect? How many slots should they sell in advance? 2. Suppose that if a slot is not sold in advance and is not sold at the last minute, it may be used for a promotional message worth $1,500. How many slots should WSYR sell in advance? What is the reaction force when baseball catcher catches and stops a baseball? 59+55+854+456+456+7894 Is anyone able to help me with this question:A rectangle with sides 4 cm and 6 cm has the same diagonal as a square.What is the length of the side of the square.Give your answer as a surd. Unanswered Question Homework unawered H10 Cr-10; + Cr Match the following for the above reaction Drage on the right-b What is being oxidized? What is being reduced? Cding Apent Oxidation half rea eli ate one-third of a pie on friday, one-fourth of the pie on saturday, and the final 50 ounces of the pie on sunday. how many ounces of pie did eli eat on saturday Last month, Lloyd's Systems analyzed the project whose cash flows are shown below. However, before the decision to accept or reject the project, the Federal Reserve took actions that changed interest rates and therefore the firm's WACC. The Fed's action did not affect the forecasted cash flows. By how much did the change in the WACC affect the project's forecasted NPV? Note that a project's projected NPV can be negative, in which case it should be rejected.Old WACC: 10.00% New WACC: 9.50%Year 0 1 2 3 Cash flows -$1,000 $410 $410 $410Answers: A. $10.85 B. $10.13 C. $9.04 D. $11.12 E. $10.22 You make 12 equal payments. You pay a total of $1500. How much is each payment? a corporate e-mail service would be classified as belonging to what layer of the osi model? When it comes to the baby formula shortage would an oligopoly or perfect competition be the better market type to handle the product? Explain your answer. What signs are cos(-80) and tan(-80)?a) cos(-80) > 0 and tan(-80) < 0b) They are both positive.c) cos(-80) < 0 and tan(-80) > 0d) They are both negative. Let y=(x+sin(x))^3Find g(x) and f(x) so that y=(fg)(x), and compute the derivative using the Chain Rulef(x)=g(x)=(f o g)' = Which excerpt from Everyman best represents how Everyman is characterized overall in the passage?