k-means drawbacks 1 point possible (graded) which of the following are drawbacks of the k-means algorithm with euclidean distance (as presented so far in this lecture)? select all those apply. does not scale well to large datasets manual choice of not robust to outliers does not scale well with increasing number of dimensions

Answers

Answer 1

Drawbacks of k-means with Euclidean distance: manual choice of k, not robust to outliers, and does not scale well with increasing dimensions.

One of the main drawbacks of the k-means algorithm with Euclidean distance is that the choice of k, the number of clusters, is a manual process. It can be challenging to determine the optimal number of clusters, and incorrect choices can lead to suboptimal results. Another drawback is that the algorithm is not robust to outliers, which can significantly affect the clustering results.

In addition, k-means does not scale well with increasing dimensions. As the number of dimensions grows, the distance between points becomes less informative, making it difficult to find meaningful clusters. Finally, k-means also struggles with large datasets, as the algorithm has to compute the distance between each point and each cluster, which can be computationally expensive.

Learn more about datasets here:

https://brainly.com/question/32013362

#SPJ11


Related Questions

When HTTPS is used, the contents of the document are encrypted but the URL of the requested document is still sent in plaintext.

Answers

The given statement that is "When HTTPS is used, the contents of the document are encrypted but the URL of the requested document is still sent in plaintext" is FALSE.

HTTPS stands for Hypertext Transfer Protocol Secure. It is a secure version of HTTP, the protocol used to send data between your web browser and the website you are accessing.

HTTPS is designed to keep your data safe and prevent third parties from accessing it. It is achieved by encrypting the data sent between your browser and the website with a secure connection called SSL (Secure Sockets Layer) or TLS (Transport Layer Security).

When you visit a website using HTTPS, the entire communication between your browser and the website is encrypted. This means that not only the contents of the document, but also the URL of the requested document is encrypted and sent in ciphertext instead of plaintext. Therefore, the given statement is False.

Learn more about HTTPS at

https://brainly.com/question/12717811

#SPJ11

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

list three ways you can help somone who is being cyber bullied instead of just being a bustander​

list three ways you can help somone who is being cyber bullied instead of just being a bustander

Answers

tell an adult
give them moral support
help them stand up for themselves

What is shotgun microphone?

Answers

Answer:

A type of microphone characterized by an extremely directional polar pattern. Shotgun mics may be condenser or dynamic, but are almost always built with a long (8 to 24 inch) tube protruding from the front.

Explanation:

Shotgun mics are long, narrow tubes with slits evenly spaced along each side and a capsule near the rear end.

¿Cuántos motores tiene el Toyota Prius y que características poseen?

Answers

Answer:

yo no se busca en gogle amiga

An android user recently cracked their screen and had it replaced. If they are in a dark room, the phone works fine. If the user enters a room with normal lights on, then the phone's display is dim and hard to read. What is most likely the problem?

Answers

There are two possibilities for the problem in the given scenario. The first and most probable cause of the problem is that the replaced screen was of low quality or did not meet the device's standards.

Therefore, the screen is not transmitting light properly and is producing dim or blurry images.The second possibility for the problem is that the light sensor of the phone might be affected by the screen replacement. The phone might be adjusting the brightness levels based on the low light environment in the dark room and not adjusting correctly in the normal light environment.

This can result in the phone being too bright or too dim, making it difficult to read the display.However, both of these possibilities can be avoided by purchasing a high-quality replacement screen or seeking professional assistance to fix the problem. In such cases, it is recommended to have an expert inspect the device for any faults and repair it accordingly.Moreover, one can also try to adjust the screen brightness levels manually to make the display more readable in the normal light environment.  

To know more about visit:

https://brainly.com/question/32730510

#SPJ11

write the importance of software In computer ​

Answers

Answer:

Microsoft word, Excel, Access, Power point, Microsoft windows...........

Explanation:

Write a program to:
• It will collect and output some basic data about the user such as name, and gender which will be
displayed with an accompanying welcome message [3]
• Use appropriate data structures to store the item code, description and price information for
the mobile devices, SIM cards and accessories [2]
• Allow the customer to choose a specific phone or tablet [3]
• Allow phone customers to choose whether the phone will be SIM Free or Pay As You Go [2]
• Calculate the total price of this transaction [4]
• Output a list of the items purchased and the total price. [3]
• Any other choice outside of these three categories would give out appropriate message to the
user and requesting the user to make a new choice. [2]

Answers

According to the question, a program using appropriate data structures are given below:

#include <iostream>

#include <string>

#include <vector>

#include <map>

using namespace std;

int main() {

   string name;

   string gender;

   cout << "Please enter your name: ";

   cin >> name;

   cout << "Please enter your gender (male/female): ";

   cin >> gender;

   cout << "Welcome " << name << ", you are a " << gender << ".\n\n";

   map<string, vector<string>> items;

   items["mobile"] = {"iphone11", "1000", "samsungs20", "800"};

   items["sim"] = {"sim1", "30", "sim2", "40"};

   items["accessories"] = {"charger", "20", "headphone", "30"};

   string choice;

   cout << "Please choose a device (mobile/sim/accessories): ";

   cin >> choice;

   string phone;

   if (choice == "mobile") {

       cout << "Which phone do you want to buy (iphone11/samsungs20) ? ";

       cin >> phone;

       cout << "Do you want to buy a SIM Free or Pay As You Go ? ";

       cin >> choice;

   }

   int totalPrice = 0;

   for (auto item : items[choice]) {

       totalPrice += stoi(item);

   }

   cout << "You have chosen " << phone << " (SIM Free/Pay As You Go) and your total price is: " << totalPrice << endl;

   if (choice != "mobile" && choice != "sim" && choice != "accessories") {

       cout << "Please choose a valid item from the list (mobile/sim/accessories)." << endl;

   }

   return 0;

}

What is data structures?

Data structures are the way in which data is organized and stored in a computer system. Data structures provide a means to manage large amounts of data efficiently, such as large databases and internet indexing services. Data structures are used in almost every program or software system. They are essential in providing an efficient way to store and retrieve data. Data structures are divided into two categories: linear and non-linear. Linear structures include arrays, linked lists, stacks, and queues.

To learn more about data structures

https://brainly.com/question/24268720

#SPJ9

Read the sentence. Piles of discarded trash litter the cobblestones of the quaint brick alley. Which image best shows a visualization of this sentence? A cobblestone alley with garbage on the ground. A cobblestone alley with several garbage cans. A cobblestone alley with weeds growing in the cracks. A clean cobblestone alley.

Answers

Answer:

C

Explanation:

JUST DID IT

Answer:

c

Explanation:

A search expression entered in one search engine will yield the same results when entered in a different search engine.
A. True
B. False

Answers

Answer:

false

Explanation:

what is system analyst explain the role of system analyst​

Answers

Answer:

A system analyst is a person that works to optimize user experience with programs.

Explanation:

A system analyst is somebody that analyzes how well a software or hardware system fits the business needs of their employer or of a client.

They basically look at how a software functions and determines what needs to be fixed in order to better their software for consumers.

A _______ engine is a specialized program that assists you in locating information on the web and the internet.

Answers

Answer:

search

Explanation:

A search engine is a type of software that is used to carry out web searches. It works by "crawling" through the World Wide Web one web page at a time and indexing the pages.

u.s. copyright law doesn’t apply internationally group of answer choices true false

Answers

False u.s. copyright law doesn’t apply internationally group of answer choices

While the U.S. Copyright Law is primarily enforced within the United States, it still has some international reach through treaties and agreements such as the Berne Convention and the World Intellectual Property Organization (WIPO) Copyright Treaty. These agreements provide some level of protection for U.S. copyrighted works in other countries and allow for legal action to be taken against infringement in certain situations.

The U.S. Copyright Law is a set of federal laws that provide protection to original works of authorship, including literary, dramatic, musical, and artistic works. It grants exclusive rights to the creator of the work, such as the right to reproduce, distribute, and perform the work. However, the extent to which these rights apply internationally is often a question of legal interpretation and application  .While it is true that the U.S. Copyright Law is primarily enforced within the United States, it does have some international reach through treaties and agreements. One of the most important of these is the Berne Convention for the Protection of Literary and Artistic Works, which is an international agreement that establishes minimum standards for copyright protection among its member countries. The United States has been a member of the Berne Convention since 1989, and as such, U.S. copyrighted works are protected in other countries that are also members of the convention. Additionally, the World Intellectual Property Organization (WIPO) Copyright Treaty is another international agreement that the U.S. has signed. This treaty provides additional protection for copyrighted works in the digital age, specifically addressing issues related to the distribution and transmission of copyrighted materials online. However, it is important to note that the level of protection provided by these treaties and agreements can vary depending on the specific circumstances and the laws of the country where the infringement occurs. In some cases, it may be necessary to pursue legal action in the country where the infringement occurred in order to enforce U.S. copyright law.

To know more about copyright law visit:

https://brainly.com/question/22089522

#SPJ11

What are the basic tasks performed by an operating system?​

Answers

Answer:

An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

Explanation:

i hope it helps:)

Consider executing the following code on the pipelined datapath we discussed in class: lw $t4, 100($t2) sub $t6, $t4, $t3 add $t2, $t6, $t5 How many cycles will it take to execute this code

Answers

It would take 15 cycles to execute this code on the pipelined datapath. To determine the number of cycles, we need to consider the pipeline stages and any possible dependencies between the instructions.

Assuming a classic five-stage pipeline (Fetch, Decode, Execute, Memory, Write Back), the code can be broken down as follows: lw $t4, 100($t2) - This is a load instruction, which takes one cycle to fetch, one cycle to decode, one cycle to execute, one cycle for memory access, and one cycle for write back.

sub $t6, $t4, $t3 - This is a subtraction instruction, which takes one cycle to fetch, one cycle to decode, one cycle to execute, one cycle for memory access, and one cycle for write back. add $t2, $t6, $t5 - This is an addition instruction, which takes one cycle to fetch, one cycle to decode, one cycle to execute, one cycle for memory access, and one cycle for write back.

Since each instruction takes five cycles to complete, the total number of cycles required to execute this code would be: 5 cycles (lw) + 5 cycles (sub) + 5 cycles (add) = 15 cycles. Therefore, it would take 15 cycles to execute this code on the pipelined datapath.

To learn more about pipeline, click here: brainly.com/question/32356260

#SPJ11

i) List any four requirements for multimedia system.

Answers

Answer:

Any four requirements of multimedia are:

1.sound card

2. High speed processor

3.multimedia enable keyboard

4.large capacity RAM

an obstacle or barrier that may prevent you from accomplishing your goal is called

Answers

Answer:

a roadblock

Explanation:

A roadblock because it is

What is a geostationary satellite and what makes them special.

Answers

Answer: See explanation

Explanation:

A geostationary satellite is a satellite above the equator at an altitude of 22300 miles. It should be noted that it revolves exactly the same way the Earth does.

It is essential as it is used in the provision of infrared and visible images about the surface of the Earth which in turn is used for oceanography and also to observe the weather. Examples are

Fengyun of China, Geostationary Operational Environmental Satellite of USA, Himawari of Japan etc.

which practice demonstrates courteous and responsible cell phone use? drive now; talk later. answer all calls when you receive them. ignore wireless-free areas.

Answers

The practice that demonstrates courteous and responsible cell phone use drive now; talk later is option D: Choose a professional ring tone.

What is the ringtone about?

The sound a phone makes to signal an call is known by various names, including ringtone and ring tone. The term, which was once used to describe and describe the sound created by the electromechanical striking of bells, is now used to describe any sound on any device.

Note that In order to use a cell phone in a respectful and responsible manner, you must be considerate of others around you, observe wireless-free zones, speak in low, conversational tones, only take urgent calls,  select a professional ringtone.

Learn more about being courteous from

https://brainly.com/question/9773752
#SPJ1

which practice demonstrates courteous and responsible cell phone use? drive now; talk later. answer all calls when you receive them. ignore wireless-free areas Choose a professional ring tone.

What is the most efficient
form of transportation we
have?

Answers

Answer:

The bicycle is a tremendously efficient means of transportation. In fact cycling is more efficient than any other method of travel--including walking! The one billion bicycles in the world are a testament to its effectiveness

Explanation:

The bicycle is a tremendously efficient means of transportation. In fact cycling is more efficient than any other method of travel--including walking! The one billion bicycles in the world are a testament to its effectiveness.

rest is an architecture to provide access to data over a network through an api. which of the following are true? pick one or more options rest is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests. rest is a server-server interaction meaning that both sides can make requests and send responses to requests. in rest architecture, a properly designed access endpoint should not specify actions as a part of the resource uri. instead, actions should be specified using appropriate protocol methods such as get, post, put, and delete over http. rest responses are not capable of specifying any caching related information regarding the accessed resource. caching must be resolved with other mechanisms.

Answers

Since Rest is an architecture to provide access to data over a network through an api. The option that is true is option c) In REST architecture, properly designed access endpoint should not specify actions as a part fo the resources URI. Instead, actions should be specified using appropriate protocol methods such as GET, POST, PUT, and DELETE over HTTP.

What is the issue about?

The physical and logical layout of the software, hardware, protocols, and data transmission media is referred to as computer network architecture.

The organization of network services and hardware to meet the connection requirements of client devices and applications is known as network architecture.

Therefore, note that HTTP is the fundamental protocol for REST. Hence, you can select all but the third option by taking a closer look at HTTP. Consider best practices for implementing HTTP protocol method calls before choosing the third alternative.

Learn more about Network architecture from

https://brainly.com/question/13429711
#SPJ1



1-the principle of recycling applies only to open systems

True/False


2-It is important that measurements be consistent in engineering because

A-There is only one established system of measurement available

B-there is one unit that is used to measure weight, length and distance

C-engineers often work together internationally and replicate each others' results


Answers

Answer:

The answer to this question can be described as follows:

In question 1, the answer is False.

In question 2, Option C is correct.

Explanation:

Recycling seems to be the concept of organizing life by making use of as little resources as possible. The recycling approach enables us to live and reconstruct in modules that are closed, it use everywhere not only in the open system. Measurements must be accurate in engineering because engineers often operate independently globally and repeat the findings of one another.

What is the greatest magnitude negative number one can represent in

an 8-bit 2's complement code? Write your result in binary and

decimal.

Answers

In 2's complement notation, the range of numbers that can be represented with an n-bit system is from -2ⁿ⁻¹ to 2ⁿ⁻¹ - 1. In an 8-bit system.

This means that the maximum magnitude of a positive number that can be represented is 2⁷ = 128 and the minimum magnitude of a negative number that can be represented is -2⁷ = -128. This leaves one bit for representing the sign of the number.

The greatest magnitude negative number that can be represented in an 8-bit 2's complement code would have a binary representation of 10000000. To find the decimal equivalent, we can calculate the value of the bits using their corresponding powers of 2 and add them together:1 * -128 + 0 * 64 + 0 * 32 + 0 * 16 + 0 * 8 + 0 * 4 + 0 * 2 + 0 * 1= -128Therefore, the greatest magnitude negative number that can be represented in an 8-bit 2's complement code is -128, with a binary representation of 10000000.

To know more about range visit:

https://brainly.com/question/29204101

#SPJ11

Generalize huffman’s algorithm to ternary codewords (i. E. Codewords using the symbols 0, 1, 2), and prove that it yields optimal ternary codes

Answers

For each combination of symbol frequencies, the Huffman algorithm must provide the best possible ternary code.

How to generalize Huffman's algorithm?

To generalize Huffman's algorithm to ternary codewords, use same basic steps as in the binary case.

To prove that this algorithm yields optimal ternary codes,  show that the average code length produced by the algorithm is at least as small as any other possible ternary code for the same set of symbol frequencies.

Use a proof by contradiction. Assume that there exists some set of symbol frequencies for which the Huffman algorithm does not produce the optimal ternary code. Let C denote the optimal ternary code, and let H denote the ternary code produced by the Huffman algorithm.

Represent each codeword in C as a sequence of ternary digits (0, 1, or 2). Let C_i denote the ith ternary digit of the codeword for symbol i. Similarly, let H_i denote the ith ternary digit of the codeword for symbol i in H.

Since C is an optimal code, the average code length L_C is given by:

L_C = ∑_i p_i × l_i

where p_i = frequency of symbol i, and l_i = length of the codeword for symbol i in C.

Similarly, the average code length for H is:

L_H = ∑_i p_i × k_i

where k_i = length of the codeword for symbol i in H.

Since H is produced by the Huffman algorithm, k_i ≤ l_i for all i. Therefore:

L_H ≤ ∑_i p_i × l_i = L_C

But this contradicts the assumption that H is not optimal. Therefore, the Huffman algorithm must produce the optimal ternary code for any set of symbol frequencies.

Find out more on Huffman's algorithm here: https://brainly.com/question/15709162

#SPJ4

Draw an example of the multi-level BOM for desktop
PCs

Answers

A multi-level Bill of Materials (BOM) for desktop PCs includes various components categorized into different levels, such as the overall system, subsystems, and individual parts.

A multi-level BOM for desktop PCs helps organize and understand the hierarchical structure of the components that make up the system. At the highest level, we have the overall system, which includes major components like the computer case, power supply, motherboard, and storage devices. These components form the foundation of the PC.
Moving to the next level, we have subsystems that are composed of interconnected components. For instance, the CPU, RAM, and graphics card form the processing subsystem, while the storage devices and interface cables constitute the storage subsystem. Other subsystems could include the input/output (I/O) devices like the keyboard, mouse, and display.
Further down the hierarchy, we reach the individual parts level. This includes specific items like the CPU cooler, memory modules, hard drives or solid-state drives (SSDs), expansion cards, cables, connectors, and peripherals. Each part plays a crucial role in the functioning of the desktop PC.
In conclusion, a multi-level BOM for desktop PCs provides a comprehensive breakdown of the system into different levels, enabling a better understanding of the components and their relationships within the overall structure.

learn more about desktop here

https://brainly.com/question/30052750



#SPJ11

Draw an example of the multi-level BOM for desktopPCs

5. What are the two main functions performed by UPS​

Answers

Delivery and packaging

is this even possible

is this even possible

Answers

Answer:

yes

Explanation:

The fastest WPM was 216 wpm

Answer:

Yes it is

Explanation: Because the 96 is how fast you typed and the 100 is what words you typed correctly.

please write a 200 to 300 word of the topic you choose
read the direction and answer if you do i will give you brainlest!!!!!!!

please write a 200 to 300 word of the topic you choose read the direction and answer if you do i will

Answers

Answer:

There is a scar above my brother’s knee.

This scar tells a story of distance.

You should know for the longest time my dad worked the late shift. He’d sleep in the day and then be up all night. Because of this, we didn’t get much time with him.

We always joked about Jon being Dad’s favorite.

Although a joke, there was still some semblance of truth to our kidding around.

Most mornings when Mom had time, she’d apply her makeup in the dining room. She’d sit on the floor cross legged, peering into the mirror. Months earlier the mirror came loose from our bathroom cabinet, so now Mom found herself sitting here daily. You should know, the mirror wasn’t in a frame. Instead it had sort of an unfinished edge. This morning Mom in her haphazard rush to get out the door, precariously placed the mirror overlapping the door frame.

I imagine I was chasing Jon around the house one summer morning. Although two years younger than me, he could always hold his own against me. Most often, we didn’t fight, but instead pushed each other to be more competitive. Mostly we played. From lava, to tag, to wrestling, hide-n-go seek, to ninja turtles. We were always roughing about.

Loop after loop we were silly and screaming. “I’m gonna get you now! Come hear sucka! You’re going to DIE!!” “Nuh uh!!”  We were endless in our back and forth pursuit of each other. Sometimes we’d chase each other and wrestle over something: the remote control, a toy, a snack, a dictionary.

So now I was hot on Jon’s tail. He turned a corner and I gained on him through the living room.

Instantly Jon crumpled to the ground. A scream hung in the air.

“Chaz!! Stop!!

A flood of red began to seep through Jon’s jeans. I’d never seen this much blood before. Panic settled in.

“Sorry. Sorry! What happened?”

Silence from my brother. The mirror had sliced and sunk into his skin.

I hurried to the phone. Dialed mom’s work.  342-2746.

“Bob’s Tasty Treats.”

“Is Penny there? I need to talk to my mom.”

“Just a second.”

“You know I’m busy. What’s going on?”

“Mom. Jon just sliced his knee open. There’s blood. Like so much blood. It’s everywhere. Help. What do we do?”

“Have you told your dad?”

“Oh yeeeaah… K. Love you so much. Bye”

I rushed upstairs and woke dad up from his slumber. “Dad! Dad! Jon’s hurt. He’s bleeding. Get up!”

I’m not sure what followed. I imagine Dad rushed down the stairs and wrapped Jon’s knee up in a towel or something. He probably packed us all in to our Red Lumina and rushed Jon off to the hospital twenty minutes away. Jon got stitches. I’m not sure how many. Jon doesn’t even know anymore. All Jon really remembers is the pain.

In the years that passed I began to wonder why we didn’t go upstairs to dad in the first place. Why’d we call mom first?

Through a conversation with my sister, we realized this was our normal. Although Dad was around, he was never present. He was absent so often that in a time of crisis we didn’t even turn to him. As a father, I want to be present.

hope mine gets picked i really need it also good luck on this!

How to add a new worksheet in Microsoft Excel?

Answers

To add a new worksheet in Microsoft Excel, you can click the "+" icon at the bottom of the worksheet tab bar. You can also right-click on any existing worksheet tab and select "Insert" from the menu. You can also go to the "Insert" tab on the ribbon and select "Worksheet" from the drop-down menu.

True or False. Write TRUE if the underlined word/phrase is correct. If not, write the correct answer. 1. Word Processor is a computer software application that performs the task of composing, editing, formatting, and printing of documents. 2. Home tab gives you access to a variety of design tools. 3. Microsoft Excel is used to calculate complex functions. 4. Animation allows you to make illusion of change. 5. Illustrations in MS Word can be found at the Layout Tab. 6. When you click the shape in MS Word, a picture tool will appear. 7. MS Excel will appear when you want to edit data of charts in MS Word. 8. MS Excel does not follow PEMDAS in computing. 9. Status bar displays the value or formula entered in the active cell. 10. In MS Excel, the symbol "​

Answers

1. TRUE
2. TRUE
3. TRUE
4. TRUE
5. FALSE. Illustrations in MS Word can be found at the Insert Tab.
6. TRUE
7. FALSE. MS Excel will appear when you want to edit data of charts in MS Word, but you need to activate the Edit Data command within the chart.
8. FALSE. MS Excel follows PEMDAS (Parentheses, Exponents, Multiplication and Division, and Addition and Subtraction) in computing.
9. TRUE
10. FALSE. The symbol "=" is used to start a formula in MS Excel.
Other Questions
is coach carter a true story? how do i use las, los, la, and el infront of a word! spanish the behavior, patterns, beliefs, and all other products of a specific group of people that are passed on from generation to generation is the definition of . multiple choice question. Which raid configuration, known as block-striped with error check, is a commonly used method that stripes the data at the block level and spreads the parity data across the drives? what is the temperature in Celsius? (LOOK AT PIC) Peyer's patches are clusters of lymphoid tissue found primarily in the large intestine. Draw a graph which has the following adjacency matrix: [2 1 1 0] 1 0 0 1 1 0 0 1 0 1 1 0 (b) Label the vertices of your graph A,B,C,D (in any order). (c) How many different paths of length 10 are there from the vertex you labelled A to the vertex you labeled D in the graph you draw in part (a)? Show your working. Who does Nora ask to be a witness of her sanity? A particle moves in the xy plane so that at any time ,x=3sint and .y=t-4cost+1What is the vertical component of the particle's location when it's horizontal component is 2?Responsesy = -1.05y = -1.05y = -2.25y = -2.25y = -1.25y = -1.25y = 0.73 Solve the simultaneous equation y=x/2 2x-y=1 PLEASE HELP TIMED ASSIGNMENT PLATOwhat is the density of the oak board that is 5.5 inches wide, 1.5 inches thick and 3 feet long. show your work.Weight: 8.05 lbs PLEASE HELP : Creon says that if he is guilty of treason he should die. A) True B) False Need help with these! :) ILL GIVE BRAINLIEST AND 5 POINT STAR RATING!!! Acid rain has a pH lower than 5.0 The lower the pH, the more acidic the rain. Which region of the United States receives the most acid rain? 1.Midwest 2.West 3.Northeast 4.South Acknowledging personal bias in writing can help you articulate your own points of view while also defending yourself against unreasonable points of view. True or false a second example of an allusion from Chapter 12 or 15 of Paper Towns Someone HELP me!!! Will mark BRAINLIEST!!!! 50 POINTS!!!! The ages of the 12 members of a track and field team are listedbelow. Construct a boxplot for the data set. Enter the minimumvalue. 21, 18, 14, 29, 16, 29,28, 18, 20, 23, 28, 17 Click this link to view o*nets tasks section for municipal clerks. note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. according to o*net, what are some common tasks performed by municipal clerks? select four options. record and edit the minutes of meetings and distribute the information to the appropriate officials or staff members. performing inspections to make sure restaurants meet standards evaluate then information on applications to verify completeness and accuracy and to determine whether applicants are qualified to obtain desired licenses. record and maintain all vital and fiscal records and accounts. drafting and proposing specific legislation traveling to attend conferences in other states with various team members prepare meeting agendas or packets of related information. Fallow Corporation has two separate profit centers. The following information is available for the most recent year: West Division East Division Sales (net) $390,000 $540,000 Salary expense 45,000 59,000 Cost of goods sold 137,000 251,000 The West Division occupies 9,750 square feet in the plant. The East Division occupies 5,850 square feet. Rent, which was $ 78,000 for the year, is an indirect expense and is allocated based on square footage. Compute operating income for the West Division.