How to program the quadratic formula into a ti-84 plus?.

Answers

Answer 1

The TI-84 Plus is a graphing calculator that can solve and graph a wide range of equations. One of the equations that it can solve is the quadratic equation, which is a useful tool for finding the roots of a quadratic equation.

The quadratic formula can be programmed into a TI-84 Plus by following these steps:

Step 1: Press the "Program" button on the calculator and then select "New" to create a new program.

Step 2: Enter a name for the program, such as "QuadForm" and then press "Enter."

Step 3: Type in the following code:

:Prompt A,B,C

:(-B+sqrt(B^2-4AC))/(2A)→X

:(-B-sqrt(B^2-4AC))/(2A)→Y

:Disp X,Y

Step 4: Press the "2nd" button and then the "Mode" button to exit the program.

Step 5: To use the program, enter the coefficients of the quadratic equation when prompted for A, B, and C. The program will then calculate the roots of the equation and display them on the calculator.

This program uses the quadratic formula to find the roots of a quadratic equation. The formula uses the coefficients of the equation (A, B, and C) to calculate the two possible values of x. The program then displays these values on the calculator using the "Disp" command.

To know more about graphing visit:

https://brainly.com/question/17267403

#SPJ11


Related Questions

Cheryl is responsible for cybersecurity at a mid-sized insurance company. She has decided to use a different vendor for a network antimalware than she uses for host antimalware. Is this a recommended action, why or why not

Answers

yes, this a recommended action and this is known to be best described as vendor diversity.

What is Vendor diversity?

This is known to be one that gives two security benefits in regards to the fact that it does  not have a single point of failure if one vendor cease operations and also each vendor has their own methodology and algorithms used for known or seeing malware.

Hence in the above case, yes, this a recommended action and this is known to be best described as vendor diversity.

learn more about cybersecurity from

https://brainly.com/question/12010892

#SPJ1

What is the windows defender used for in windows 10

Answers

Answer:

Windows Defender is a built-in antivirus and anti-malware software in Windows 10 that helps protect your computer from viruses, malware, and other malicious software. It constantly scans your computer for any threats and provides real-time protection by blocking any suspicious activity. It also includes features such as firewall and network protection.

Explanation:

Brainliest Plssss

If you clean your camera’s lens incorrectly, what might you damage?

Group of answers:

1. the aperture port
2. the outer coating
3. the inner coating
4. the battery port

Answers

Answer:

2. the outer coating

Answer:

Its number 2 the outer coating

Explanation:

According to the video, what are common tasks performed by Tour Guides? Check all that apply.

leading trips
maintaining equipment
shepherding tourists and luggage
socializing
purchasing tickets for flights
selling equipment
setting up meals
teaching first aid

Answers

Common tasks of the tour guide.

As per the question, the video shows us the tour guide n the ways he handles the tasks. The tour guide can be seen using making techniques such as providing tips, giving information, socializing with people, and setting up meals and other arrangements.

Thus the answer is leading trips, maintaining equipment, shepherding the tourists and luggage, and socializing, setting up meals.

Thus the duty of the tour guide its provide the latest information and provide the cratered services to the clients. The services like hotel, travel and maintains of the equipment's is essential for them. Thus the option 1, 2, 3,4 and 7 are correct.

Learn more about the according to the video.

brainly.com/question/19175630.

Answer: 1 2 3 4 7

Explanation:

what the other guy said

Date Detection Write a regular expression that can detect dates in the DD/MM/YYYY format. Assume that the days range from 01 to 31 , the months range from 01 to 12 , and the years range from 1000 to 2999. Note that if the day or month is a single digit, it'll have a leading zero. The regular expression doesn't have to detect correct days for each month or for leap years; it will accept nonexistent dates like 31/02/2020 or 31/04/2021. Then store these strings into variables named month, day, and year, and write additional code that can detect if it is a valid date. April, June, September, and November have 30 days, February has 28 days, and the rest of the months have 31 days. February has 29 days in leap years. Leap years are every year evenly divisible by 4 , except for years evenly divisible by 100 , unless the year is also evenly divisible by 400. Note how this calculation makes it impossible to make a reasonably sized regular expression that can detect a valid date

Answers

Answer:

Attached is your code, written in Python.

what are the 5 ways of controlling hazards and risk? explian each

Answers

Answer:

1 Eliminate the hazard. Remove it completely from your workplace.

2 Substitute the hazard.

3 Isolate the hazard.

4 Use engineering controls.

5 Use administrative controls.

6 Use personal protective equipment (PPE)

Explanation:

where can you specify to display a vertical line between columns?

Answers

Click the table. Click the Table Layout tab, and then under Settings, click Gridlines.

In Word, what is the symbol for a vertical line?

How to Use a Keyboard to Enter the Vertical Line Character. On a keyboard, the pipe character is not obscured. It is directly above the Enter key. Turn on the numeric keypad, hold ALT, and then hit 1, 2, and 4 to enter the vertical bar character.

Go to Home > Insert > Insert Sheet Columns or Delete Sheet Columns after selecting any cell in the column. Alternatively, right-click the column’s header and select Insert or Delete.You may utilize the columns property, and there is a column-rule option that inserts a line properly between columns. You may read and see examples of what I mean here.

To learn more about Word file to refer:

https://brainly.com/question/27982473

#SPJ4

unexpected character encountered while parsing value

Answers

The error message "Unexpected character encountered while parsing value" indicates an issue with parsing a value in a JSON or XML document.

This error typically occurs when the parser encounters a character that it doesn't expect or when the document structure is not valid. It could be due to a missing or extra character, a syntax error, or an incorrectly formatted document. To resolve this error, it is important to carefully review the code or document, ensure proper syntax and formatting, and validate the input against the expected structure or schema.

When parsing a JSON or XML document, the parser expects the input to follow a specific format and structure. The error message "Unexpected character encountered while parsing value" indicates that the parser has encountered a character that doesn't fit the expected structure or syntax. This could occur due to various reasons such as a missing or extra character, an incorrect data type, or an improperly formatted document.

To resolve this error, it is necessary to carefully review the code or document and identify any discrepancies or inconsistencies. Pay attention to the specific character that triggered the error and analyze its context within the document. Validate the input against the expected structure or schema to ensure it conforms to the required format.

Additionally, consider using appropriate parsing libraries or tools that provide error handling and validation mechanisms. These tools can help identify and handle parsing errors more effectively, providing detailed information about the specific issue encountered.

To learn more about data type; -brainly.com/question/30615321

#SPJ11

Different types of computer and state the major difference between them

Answers

Desktop computers are typically larger, stationary computers that sit on a desk or table, while laptops are smaller, portable computers that can be carried around.

What is the computers?

Servers are powerful computers designed to handle network resources and provide services to other computers, while workstations are high-performance computers used for specialized tasks such as graphic design or video editing.

Gaming computers are optimized for gaming performance with high-end hardware, while business computers are designed for productivity and typically come with business-oriented features such as security and manageability.All-in-one computers combine the monitor and computer components into a single unit, while traditional desktop computers have separate monitors and system units.Tablets are portable touchscreen devices that are smaller and more lightweight than laptops, and they are typically used for browsing, media consumption, and casual computing tasks.Embedded systems are specialized computers integrated into other devices, such as appliances, cars, and industrial equipment, and they are designed for specific tasks and functions.

Lastly, Wearable computers are small, portable devices that can be worn on the body, such as smartwatches or fitness trackers, and they are designed for monitoring health, fitness, or other specialized functions.

Read more about computer here:

https://brainly.com/question/24540334

#SPJ1

On march 12, medical waste services provides services on account to grace hospital for $9,400, terms 2/10, n/30. grace pays for those services on march 20.

Answers

The allowed discount was  $276. while Mar. 12 Dr. Receivables $9,200 Cr. $9,200 in service revenue and on Mar. 20 Dr. Cash $9,200 (97%), $8,924.

Account receivable is the term used to describe the company's legally enforceable demand for payment for the goods and services it has provided. Receivables are categorized as a current asset.

the process of creating journal entries

Mar. 12 Dr. Receivables $9,200 Cr. $9,200 in service revenue (To record service revenue)

Mar. 20 Dr. Cash $9,200 (97%), $8,924

Dr Discount and Allowances $276 (3 % $9,200) Cr. $9,200 in accounts receivable (To record collection from receivables)

Learn more about receivables here-

https://brainly.com/question/14032135

#SPJ4

You launch notepad.exe from a Powershell command line. Which of the following is true?
The notepad.exe process will terminate when the Powershell process terminates.
The Powershell process will terminate when the notepad.exe process terminates.
The notepad.exe process is the parent process for Powershell.
The Powershell process is the parent process for notepad.exe.

Answers

The notepad.exe process will not terminate when the Powershell process terminates.

PowerShell is a powerful tool for managing processes on a local or remote computer. You can retrieve a list of running processes with PowerShell, suspend a hung process, find a process by a windows title, run a new process in hidden or interactive mode, and so forth.

When you launch notepad.exe from a Powershell command line, the notepad.exe process is started as a separate process independent of the Powershell process. The termination of the Powershell process does not affect the execution of the notepad.exe process. Therefore, if you close the Powershell window or terminate the Powershell process, the notepad.exe process will continue running unaffected.

Know more about Powershell process here:

https://brainly.com/question/30619095

#SPJ11

Write the method drawSquare below.
/** Precondition: 0 ≤ x < 10, 0 < y ≤ 10, and len > 0.
* Draws a square on a 10-by-10 xy-coordinate grid
* and prints the square’s side length and area.
* The upper left corner of the square will be located
* at the coordinate (x, y) and the side length of the * square will be len (or as large as will fit in the grid).
*/
public void drawSquare(int x, int y, int len)

Answers

The method drawSquare is an illustration of functions; functions are named program statements that are executed when called

The method drawSquare

The method drawSquare written in Java, where comments are used to explain each action is as follows:

//This defines the function

public static void drawSquare(int x, int y, int len) {

//This checks if x + len exceeds 10

       if(x+len>10){

           len = 10-x;}

//This checks if y + len exceeds 10

       if(y+len>10){

           len = 10-y;}

//The next four lines draw the square

       drawLine(x, y, x+len, y);

       drawLine(x+len,y,x+len,y-len);

       drawLine(x+len, y-len, x, y-len);

       drawLine(x, y-len, x, y);

   }

Read more about java programs at:

https://brainly.com/question/19271625

yo need help can someone plz help

You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?

entering keywords into many different search engines
a Boolean search
a wild-card search
searching for synonyms

Answers

Boolean search would be the answer

what is the true colar of water

Answers

Answer:

blue

Explanation:

becausse it's blue and it's water

It’s translucent it doesn’t have a color it looks blue cause of the sky?

which three (3) factors make cybersecurity far more difficult now that it was in the past when you only needed to protect the computer?• Local nature of business• Mobile technology - everyone has a smartphone• Data protection - your data is everywhere• Multiple different vendors, each supporting different technology and protocols

Answers

• Increased threat landscape - more malware, ransomware, and other      malicious actors

• Complexity of networks - more devices and applications connected to the network

• Lack of visibility into cloud-based services - the use of cloud services   makes it difficult to monitor and detect threats.

What is Cloud Service?
Cloud Service is a type of internet-based computing that provides shared computer processing resources and data to computers and other devices on demand. It is a model of network computing where a cloud service provider makes resources, such as applications and storage, available to users over the Internet. This can be done without the need for users to have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them.

To know more about Cloud Services
https://brainly.com/question/28233143
#SPJ1

A workstation at work is found to be unsecured. The account used on the computer does not have a password, the data is not encrypted, and the computer itself is located in an area with easy access. This particular workstation contains personal information about its customers. In regards to the regulation of data, which is being compromised?
A) PII
B) PHI
C) PCI
D) GDPR

Answers

PII is being compromised Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.

What is meant by Encryption of data?Data encryption is a technique for converting plaintext (unencrypted) data to ciphertext (encrypted). The use of an encryption key and a decryption key allows users to access encrypted and decrypted data, respectively. Significant volumes of private data are managed and kept online, either on servers connected to the cloud. Sensitive information should be protected from hackers via encryption, which is a key strategy for both individuals and businesses. Websites that transmit credit card and bank account details, for instance, encrypt sensitive data to guard against fraud and identity theft. Data encryption changes plaintext data from a readable format to ciphertext, an unreadable format. Only once the data has been decrypted may users and processes read and use it. The decryption key needs to be secured against unwanted access because it is confidential.

To learn more about PII  refer to:

https://brainly.com/question/29829548

#SPJ4

Describe at least five ways in which information technology can
help students studying subjects other than computing.​

Answers

Answer:

It can help with; learning how to work things out in other subjects, help children gain access to help with subjects. It can help with studying for a test for any subject. Computers can help with maths because you have access to a calculator and finally. Computers can help with geography as you have access to maps.

Explanation:

When computer code encounters the word “if,” what does it do?

Answers

Answer:

It looks at the condition of the if() statement and determine whether the code inside its block should be run or not.

If the condition is true, run the code,

otherwise, skip that part of the code and continue.

A standard method for labeling digital files is called a file-labeling what? question 5 options: protocol tool setting configuration

Answers

A standard method for labeling digital files is called option A: file-labeling protocol.

What are three file naming conventions?

An outline for naming your files in a way that pass out  their contents and their relationships to other files is known as a file naming convention. File naming conventions make it simpler to recognize your files and help you stay organized. You can discover what you need quickly by constantly arranging your files.

Therefore, the three file naming patterns are;

Dashes (e.g. file-name. yyy) (e.g. file-name. yyy)No division (e.g. filename. yyy )Camel case, which capitalizes the initial letter of each block of text (e.g. File Name. yyy )

Learn more about file-labeling from

https://brainly.com/question/21440135
#SPJ1

Answer:

protocol

Explanation:

TOOK THE TEST 6.03 quiz 7th grade

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

question 7 a student writes a program that for any two lists l1 and l2, computes a list l3 that contains only the elements that are common between the two lists *without duplicates*. which following statement makes

Answers

To compute a list `l3` that contains only the elements common between lists `l1` and `l2` without duplicates, the student needs to iterate through each element in `l1` and check if it also exists in `l2`. If an element is found in both lists and is not already present in `l3`, it should be added to `l3`.

Here is an example of how the program could be implemented:

1. Initialize an empty list `l3`.
2. Iterate through each element `e` in `l1`.
3. Check if `e` exists in `l2` and if it is not already in `l3`.
4. If both conditions are met, add `e` to `l3`.
5. Repeat steps 2-4 for each element in `l1`.
6. After iterating through all elements in `l1`, `l3` will contain the common elements without duplicates.

For example:
```
l1 = [1, 2, 3, 4, 5]
l2 = [4, 5, 6, 7, 8]
l3 = []

# Iterating through l1
# Checking if 1 exists in l2 and if it's not already in l3 (add it)
# Checking if 2 exists in l2 and if it's not already in l3 (add it)
# Checking if 3 exists in l2 and if it's not already in l3 (add it)
# Checking if 4 exists in l2 and if it's not already in l3 (add it)
# Checking if 5 exists in l2 and if it's not already in l3 (add it)

l3 = [1, 2, 3, 4, 5]
```

The student should iterate through `l1` and check for common elements with `l2`. If a common element is found and is not already in `l3`, it should be added. The final result will be a list `l3` containing the common elements without duplicates. This explanation provides a step-by-step guide for the program.

To know more about program , visit ;

https://brainly.com/question/14454937

#SPJ11

You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter. As you are provided with the enterprise's strong password policy, which of the following methods will be the easiest for you to use when retrieving the password? a. Brute force attack b. Dictionary attackc. Hybrid attack d. Rule attack

Answers

Since You are a cyber forensic specialist, and you are asked to retrieve the password of an employee account suspected of being an imposter, the method that will be the easiest for you to use when retrieving the password is option d. Rule attack.

What is dictionary attack?

A kind of brute force attack where a hacker uses a "dictionary list" of terms and expressions that people and companies frequently use to try to break a password-protected security system is the term dictionary  attack.

Note that Hashcat's rule-engine was created to be 100% compatible with John the Ripper and PasswordsPro rules and vice versa for all functions that share the same letter name. Later, we began introducing some of our own, incompatible functions. To avoid confusion, these functions were given their own letter names.

Therefore, based on the above, When an attacker is aware of the rules that a system's passwords are built on, such as "alphanumeric and eight characters long," they can target their password cracking technique.

Learn more about Rule attack from

https://brainly.com/question/29358198
#SPJ1

if all the data in a database is not physically located in one place, it would be a(n) blank database.

Answers

If all the data in a database is not physically located in one place, it would be option D. Distributed database.

What does it mean when data is stored in one place?

Normalization is the process of rearranging data in a database to ensure that it satisfies two essential criteria: Data storage is centralized, therefore there is no redundant data.

A distributed database is one that is made up of two or more files that are spread across various sites, either on the same network or on distinct networks entirely. The database is divided into several physical locations for storage of different portions, and different database nodes are used for processing.

Therefore, one can say that Distributed databases provide for local autonomy and location transparency of the data. This means that even if applications might not be aware of the precise location of the data, each site is equipped with the tools necessary to manage local data, enforce security, monitor transactions, and recover from local site failures.

Learn more about Distributed database from

https://brainly.com/question/28271067
#SPJ1

See options below

A. individual. B. Web C. commercial. D. Distributed

write a program to determine whether or not an entered password is valid. valid passwords consist of 10 characters, 4 of which must be letters and the other 6 digits. the letters and digits can be arranged in any order. only lowercase letters are allowed for valid passwords. hints: use islower, isalpha, isdigit, and strlen.

Answers

It ensures the password has a length of 10 characters, with 4 letters and 6 digits. Implementing the necessary checks, the program determines whether the password is valid or not.

To write a program that will determine whether or not an entered password is valid and consists of 10 characters, 4 of which must be letters and the other 6 digits, we can use the following steps:

Start the program.

Declare the variables that we will use in our program. In this case, we will need a character array to store the entered password, as well as a count variable to keep track of the number of letters and digits in the password.

Here's an example of how this can be done:char password[11]; // to store the entered passwordint count = 0; // to keep track of the number of letters and digits in the password

Ask the user to enter a password and store it in the password array. We can use the scanf function for this:printf("Enter a password: ");scanf("%s", password);

Check the length of the entered password. If it's not 10 characters long, then it's not a valid password. We can use the strlen function for this:if(strlen(password) != 10) { printf("Invalid password length!\n"); return 0; }

Loop through each character in the password and check if it's a letter or a digit. If it's a letter, increment the count variable. If it's not a lowercase letter or a digit, then the password is not valid. We can use the islower, isalpha, and isdigit functions for this:for(int i = 0; i < 10; i++) { if(isalpha(password[i])) { if(islower(password[i])) { count++; } else { printf("Invalid password format!\n"); return 0; } } else if(!isdigit(password[i])) { printf("Invalid password format!\n"); return 0; } }

Check if the count variable is equal to 4. If it's not, then the password is not valid.printf("%d\n", count);if(count != 4) { printf("Invalid password format!\n"); return 0; }

If the password has made it this far, then it's a valid password!printf("Valid password!\n");return 0;

Learn more about the program; brainly.com/question/26497128

#SPJ11

another word for Arithmetic Logic Unit​

Answers

Answer:

ALU

Explanation:

just to say it faster than having to say it...

Answer:

ALU

Explanation:

ALU is a functional part of CPU which perform arithmetic and logical operations.

What is pollution?
the introduction of harmful substances into the environment
the removal of waste from landfills and other waste collection areas
the addition of organic materials in order to clean dirty air and water
the combination of specific chemicals to decompose garbage

Answers

Answer:

other guy is correct it is A.

Explanation:

Did the quiz and got 100%. Edge 2021

The term pollution is the the introduction of harmful substances into the environment.

What is pollution?

Pollution is known to be the bringing in of contaminants into any natural environment that may lead to adverse change.

Therefore we can say that The term pollution is the the introduction of harmful substances into the environment and thus it is correct.

Learn more about pollution from

https://brainly.com/question/18657523

#SPJ2

I NEED HELP!!! BRAINLIEST!!!
Drag each function to its protocol name.
Classify the functions of DHCP and DNS protocols.

assigns an IP address to each host

translates domain names into IP addresses

makes it easy to create English or language names for IP addresses

eliminates manual errors in setting up IP addresses

Answers

Answer:

DHCP Dynamic Host Configuration Protocol:

Is a network service that automatically assigns IP addresses and other TCP/IP configuration information on network nodes configured as DHCP clients. Server allocates IP addresses to DHCP clients dynamically. Should be configured with at least one DHCP scope. Scope contains a range of IP addresses and a subnet mask, and can contain other options, such as a default gateway and Domain Name System. Scope also needs to specify the duration of the lease and usage of an IP affects after which the node needs to renew the lease with the SHCP server. Determines the duration, which can be set for a defined time period or for an unlimited length of time.

DNS Domain Name Service: Is a TCP/IP name resolution service that translates FQDNs into IP addresses. System of hierarchical databases that are stored on separate DNS servers on all networks that connect to the Internet. DNS servers store, maintains and update databases, they respond to DNS client name resolution requests to translate host names into IP addresses.

DNS Components

DNS database is divided logically into a heieratchical grouping of domains. Physically into files called zones. Zone files contain the actual IP-to-host name mapping for one or more domains. Zone files is stored on the DNS server that is responsible for resolving hot names for the domains contained in the zone. Each network node in that domain will have a host record within the domain's zone files. Includes the node's host name, FQDN, and assigned IP address.

DNS Servers

*If you are configuring static IP addresses, including the IP address of the default DNS servers as you configure each client.

*If you are using DHCP, use the DHCP scope options to specify the IP Explanation:

dhcp provides an ip addrrss

dns creates language names for ip addresses

dns translates domain names into ip addresses

dhcp eliminates errors

im pretty sure

Have you ever watched Full House? Who is your favorite character and why? EXPLAIN AND ILL GIVE BRAINLIEST!

Answers

Answer:

havent watched it and thanks for this

Explanation:

Suppose we are using a three-message mutual authentication protocol, andAlice initiates contact with Bob. Suppose we wish Bob to be a stateless server, and thereforeit is inconvenient to require him to remember the challenge he sent to Alice. Lets modify theexchange so that Alice sends the challenge back to Bob, along with the encrypted challenge. So the protocol is:Step 1: Alice send a message [I’m Alice] to Bob. Step 2: Bob sends a random number, R. Step 3: Alice sends a message [R,KAlice−Bob{R}]. Is this protocol secure?

Answers

No, this protocol is not secure. A secure mutual authentication protocol must, among other things, support mutual authentication, which allows both parties to confirm the identities of one another.

Due to the fact that Bob cannot recall the challenge he gave to Alice, he is unable to confirm Alice's identity using this protocol. As a result, an attacker can read Alice and Bob's messages and then pretend to be Alice to Bob by simply playing back the message that Alice originally sent.

This problem can be resolved by changing the protocol so that Bob sends a challenge along with the random number R, and Alice must respond with the challenge as well. This way, Bob can verify Alice's identity by checking if the challenge in Alice's response matches the one he sent earlier.

For such more question on protocol:

https://brainly.com/question/8156649

#SPJ11

Why do electronic devices gather so much dust? Thanks

Answers

any electrical device that produces any type of air kind of gets collected as the air flows in or out
Other Questions
Helox, inc manutactures a product that passes through fwo production processes. A quantity schedule for a receit month tor the firsi process follows: Quantity scheduleUnits to be account forWork in process, april 1 (60% materials, 75%Conversion cost added last month)28,000Started into production204,000Total units232,000Costs in the beginning work-in-process inventory of the first processing department were materials, $5,600; and conversion cost. $19,000. Costs added during the month were materials, $88,000, and corversion cost, $454,280,Required: 1. Assume that the company uses the weighted average cost method of accounting for unas and cosd. Determine the equivalent units for the month for the first process What is the quotient of (x3 - 3x2 + 5x 3) = (x - 1)?x2 - 2x - 3x2 + 2x + 7x2-3x + 8x2 - 2x + 3 A population started with 100 individuals. There were 14 births, 20 deaths, and 2 new individuals immigrated into the population. As a percentage, what rate did the population change? Cuantas cifras se emplean para numerar las 48 paginas de una revista? Please help!Translate toEnglish:Que te gustacomer?A. What do you like todrink?B. What do you like tocook?C. What do you like toeat? Yoni has a ribbon that measures 5/3 yards. She wants to cut it into 3 equal pieces. What is the length of each piece of ribbon? 5\8 yards 5/6 yards 5/9 yards 5/3 yards What was the difference in population and area between the city state of Athens and the Roman republic Think about the function of the leaf structure shown in the diagram. What kind of plant is more likely to survive if the amount of carbon dioxide in the air decreases?A. A plant that has many of these structures on every leaf.B. A plant where these structures can close tightly.C. A plant where these structures absorb more oxygen.D. A plant that does not perform photosynthesis. Amir collected data from his sixth-grade class at Liberty Middle School. Which question could Amir ask as a statistical question? [1 point]a. What time do classes start at Liberty Middle School?b. What is your favorite subject?c. How many students are in sixth grade at the start of this year?d. How many subjects are there in sixth grade?help What is the quotient?-4/5 *2 HELP PLEASE after five minutes, the concentration of drug dazzie in the white blood cells is 20 mmoles l-1. what is the average rate of entry of drug dazzie into the white blood cells in units of moles min-1 white blood cell-1 during the first five minutes after placing the white blood cells into the bathing solution? assume that each white blood cell occupies about 1 x 10-13 liters. show your work. (2 pts). in a short essay (100150 words), discuss darwins view of how natural selection resulted in both unity and diversity of life on earth. I need help asap please CASE STUDY PEFORMING ROR ANALYSIS FOR 3D PRINTER AND IIOT TECHNOLOGY Background Software used in 3D printer systems manufactured by Spectrum LASER Corp. is currently able to automatically develop hollows, shells, and "tree supports" to save development time. Network printing for use on multiple machines and at different locations globally is available. New software, called JIT II, is being beta tested that will allow IIoT-type (Industrial Internet of Things) connections between machines at distant locations. When onboard monitoring sensors detect that a part is about to fail, or it is time to replace one of several high-profile parts, the JIT II software will automatically queue the part's manufacturing code onto a 3D printer that is detected to be locally idle or ready. The company believes it can design and produce the JIT II software, the 3D printers, and the accompanying computer equipment necessary to place this technology in a wide variety of harsh environments-chemically toxic to humans, in flight, underground in mines, on the ocean floor, in war-torn areas, etc. Information For this case, we will analyze the available computers that can provide the server function necessary to make this interlinking available and successful. The first cost and other parameter estimates, including expected contribution to annual net cash flow, are summarized below. Server 1 Server 2 First cost, $ 101,694 200,000 50,000 year 1, plus 5000 per year for years 2, 3, and 4 (gradient Net cash flow, $/ye 35,000 70,000 maximum for years 5 on, even if the server is replaced Life, years 3 or 4 5 Case Study Exercises Use spreadsheet analysis to determine the following: 1. If the MARR = 12%, which server should be selected? Use the PW or AW method to make the selection. For server 1 use 3 and 4 and for server 2 use 5 years. Note that you have to use LCM. 2. Use incremental ROR analysis to decide between the servers at MARR = 12%. What is the most accurate assessment if the client believes that the healthcare providers are fbi agents and that there are cameras everywhere monitoring the client? 2. Ajar contains 12 caramels, 7 mints and 16dark chocolates. What is the probability ofselecting a mint?FractionPercentDecimalCircle the likelihood of the event occurring:UnlikelyNeither Unlikely or LikelyLikely For example if a specific shampoo was only needed once a month because of new ingredients, will the demand for that industry go down? if a product moves ... PLEASE HELP WORTH 10 WILL GIVE BRAINILEST How many different committees with 4 members can be formed from 9 students despite the different kinds of communication and learning disorders that children have, one common denominator for all these children is .