The algorithm S(A, n, i) selects all the j-th smallest elements (with j ≤ i) from an array A of n elements, by using linearselect to select each of the j-th smallest elements (with j ≤ i). Clearly, one could also implement S alternatively as T(A, n, i), which first sort A (on average-case and on worstcase, the sorting takes time O(n log n) using mergesort) and then select the first i elements. Please compare the average-case complexities of the two algorithms; i.e., For the average-case complexities, under what conditions (on the choices for i), S is better than T or vice versa

Answers

Answer 1

Answer:

Follows are the solution to this question:

Explanation:

In the linear selected algorithms scans the given field sequentially but instead calculates the fixed amount by crossing the items throughout the list since they are displayed. Take into consideration the various chosen algorithm:

S(A, n, i) Algorithm:

In array B, copy array A items.

To save results, construct an array C of height.

Start Loop j = 0 to i-1.

Determine array B's lowest value.

In array C, also save the minimum value.

Delete from array B the minimum value.

Back the C array.

Analysis of runtime:

In i iterations, the external loop is used, although i have to compute the number of small lots.

This internal loop should run and calculate the minimum variable, whereby n is the input array length at the most values of n.

Its cumulative runtime is equal to O(in)+C =

O(in). All remaining operations are done at a precise rate.

The combine type technique requires that division concept to

sort the sorted array either in or upwards backward order.

Follow the appropriate method using merge type to

select the shortest items of a certain list.

T (A, n, i) algorithm:

In B array, copy array A elements.

To save the output, build a C array of sizes.

Using merge form in an increasing order to sort all items of the B list.

Start the loop j= 0 to i-1.

Save A[j] value in C[j].

Return array C,

return array C.

Analysis of run time:

The combined function requires O (n log n) to arrange a size n list.

Its number of samples in the process to construct the resulting sequence becomes equal to i since i is the minimum number of elements to also be calculated. All remaining transaction is performed in continuous time.

The time to work is O (n log n) + O i + C = O (n log n). The time needed.

The complexities of the following algorithms are similar:

Scenario 1: S is stronger than to the T-algorithm

Consider the number for smallest elements to also be calculated or even the I value is significantly smaller than the number of array elements.  Let i = 2 and  n = 16.

Its algorithm S requires O(in) time for both the calculation of a result, who in this case is equivalent to (2 16).

If algorithm T finds the initiative of O (n log n), who in this case is equivalent to (16 logs 16) = (16 4).

The S method, therefore, operates better than that of the T algorithm, if another I value exceeds the log n value.

Scenario 2: Algorithm T is much more successful that algorithm S

Evaluate if the number of components which must be calculated is smaller or if the value of I is comparable with that of the items inside the array.

Let the I = 12 quality and n = 16 value. Its S method applies O(in) time, and in this, the situation is just like (12 16).

Hence, the algorithm T performs better than the algorithm S when the value of i is greater than the value of the log n.


Related Questions

What feature allows a person to key on the new lines without tapping the return or enter key

Answers

The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap

How to determine the feature

When the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.

In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.

This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.

Learn more about word wrap at: https://brainly.com/question/26721412

#SPJ1

Discuss ISG. Discuss how ISG moves information security beyond technical decisions and makes security a strategic decision. How and why does ISG move information security from the technical arena to the business arena. Discuss why this is necessary.

Answers

Answer:

ISG (Information Security Governance) refers to the engagement of executive management in the issues surrounding how Information Security matters, assets, and risks are directed and managed.

ISG is the high-level involvement that a business entity introduces to achieve the correct information structure, leadership, and guidance, which help it to analyze and mitigate information security risks.

2. ISG moves information security from the technical arena or specialists to the business front burner by ensuring the involvement of those responsible for corporate governance (i.e. board-level management) in the security of an entity's information infrastructure.

3. It becomes necessary to have the board's involvement in order to create senior management awareness and secure their support in efforts to implement policies and processes for the security of information assets.

Explanation:

Generally, corporate governance consists of the set of policies and internal controls by which organizations are directed and managed. Information security governance should be a subset of an organization's overall governance program, which analyzes the risk management, reporting, and  accountability responsibilities of senior management in solving information security challenges.

Which of the following is a positional argument?
a) ABOVE
b) MIN
c) AVERAGE
d) MAX

Answers

D) MAX is a positional argument

Where would you place the change score by block if you want the score to change each time the monkey touches the banana?
on start
set background color to
set mysprite •
to sprite

of kind Player
set
move
to sprite
mySprite with buttons of kind Food
on sprite of kind Player overlaps


banana♥
position to x pick randon (
ornersprite
of lndlEoodl
to 169 y pick random 10 to
A. Inside the on overlap block at the top
B. Outside of the on start block and the on overlap block
C. Inside the on start block at the top
D. Inside the on start block at the bottom

Answers

To ensure that the score changes each time the monkey touches the banana, you would place the change score block inside the on overlap block is  A. Inside the on overlap block at the top

What is the block  about?

This habit, at any time the fairy of kind Player overlaps accompanying the joker fairy, how things stand will be transformed.

Placing the change score block except for the on ride block or inside the on start block would not guarantee that how things stand changes accompanying each touch of the joker.

Learn more about  block from

https://brainly.com/question/28753487

#SPJ1

Ways information technology does not make us productive

Answers

Answer:

Although technology is moving the limits, its power is not always helpful.

Explanation:

Technology can make us very non-productive, as it takes time away from our most productive hours when we use our productive time to scroll social media.

Notifications can interrupt the concentration. It makes us lazy in the morning, when, instead of being productive, we are reading anything online.

It can impact our sleep, anxiety, and it may force us to spend time creating a false image of ourselves.

You decided to test a potential malware application by sandboxing. However, you want to ensure that if the application is infected, it will not affect the host operating system. What should you do to ensure that the host OS is protected

Answers

Considering the situation described here, the thing to do to ensure that the host OS is protected is to install a virtual machine.

What is a virtual machine?

Virtual Machine is the virtualization of a computer system. The purpose of a Virtual Machine is to deliver the functionality of a physical computer containing the execution of hardware and software.

How Virtual Machine is used to ensure that the host OS is protected

Virtual Machine is used to host the virtual environment and subsequently run the operating system within the virtual machine.

This process allows the sandbox to be isolated from the physical hardware while accessing the installed operating system.

Hence, in this case, it is concluded that the correct answer is to install a virtual machine.

Learn more about Virtual Machine here: https://brainly.com/question/24865302

List the applications in the CyberOps menu.

Answers

Answer:

IDLE, SciTE, and Wireshark

Explanation:

Virtualization is the ability to operate more than one virtual computer (known as virtual machines) on a physical computer (known as host computer). CyberOps is a workstation for virtual machines. Virtual machines are used to test applications and OS without affecting the host computer but it requires hard drive space and RAM.

To go to the CyberOps menu, first locate the application menu and then click CyberOps.

Complete the code to change the label to black text on a yellow background. w = tk.Label(root, text="Movies", ="yellow", ="black")

Answers

Answer:

To change the label to black text on a yellow background, you need to specify the foreground and background colors using the fg and bg attributes, respectively. Here's the updated code:

w = tk.Label(root, text="Movies", fg="black", bg="yellow")

Abby has always dreamed of having her own ice cream shop. Now as a young entrepreneur she has decided to pursue her dream, but she needs some help in determining the financial viability of her plan. She has come up with a list of income and expense parameters and needs a simple program to input these parameters and calculate the monthly profit or loss as well as performing some variable cost what-if analysis.

Answers

A simple program that Abby can use to input her parameters and calculate her monthly profit or loss is given as follows:

# Get inputs from the user

sales_price = float(input("Enter the sales price per scoop of ice cream: "))

number_of_scoops_sold = int(input("Enter the number of scoops sold per month: "))

fixed_expenses = float(input("Enter the total fixed expenses per month: "))

variable_cost_per_scoop = float(input("Enter the variable cost per scoop of ice cream: "))

# Calculate monthly revenue, cost, and profit/loss

monthly_revenue = sales_price * number_of_scoops_sold

monthly_cost = fixed_expenses + (variable_cost_per_scoop * number_of_scoops_sold)

monthly_profit_loss = monthly_revenue - monthly_cost

# Print the results

print("Monthly revenue: $", monthly_revenue)

print("Monthly cost: $", monthly_cost)

print("Monthly profit/loss: $", monthly_profit_loss)

What is the rationale for the above response?

Abby can input the necessary parameters (sales price, number of scoops sold, fixed expenses, and variable cost per scoop) and the program will calculate her monthly revenue, cost, and profit/loss. If she wants to perform some variable cost what-if analysis, she can simply change the variable cost per scoop and re-run the program to see the new results.

This program assumes that all of the parameters are constant over the month. In reality, these values may fluctuate over time, so it is important for Abby to keep track of her actual expenses and revenues to ensure the accuracy of her financial analysis.

Learn more about program at:

https://brainly.com/question/11023419

#SPJ1

Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.

Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.

You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:

What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.

Answers

In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:

Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.

What is the Case Facts?

First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.

Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.

Learn more about affidavit from

https://brainly.com/question/30833464

#SPJ1

. What projects would Excel best be used for?

Answers

Answer:

Projects that require spreadsheet organization and/or calculations between data

Explanation:

That is why Excel is a spreadsheet program

Which situations are the most likely to use telehealth? Select 3 options.

Your doctor emails a suggested diet plan.

Your brother was tested for strep throat and now you think you have it.

Your doctor invites you to use the patient portal to view test results.

You broke your arm and need a cast

You request an appointment to see your doctor using your health app.

Answers

Answer:

Your doctor emails a suggested diet plan.

Your brother was tested for strep throat and now you think you have it.

Your doctor invites you to use the patient portal to view test results.

Answer:

Your doctor emails a suggested diet plan

You request an appointment to see your doctor using your health app

Your doctor invites you to use the patient portal to view test results

Explanation:

Edge 2022

Technology is both the results and determinant of development.Discuss

Answers

Tecchnology is both the results and determinant of development because technology provide the work done which are not possible to do with our human hand .

What is Technology?

Technology, or as it is sometimes referred to, the modification and manipulation of the human environment, is the application of scientific knowledge to the practical goals of human life.

The current technological revolution described as Assiduity 4.0 is determined by the development of the following technologies of advanced information processing Big Data database technologies, pall computing, machine literacy, Internet of effects, artificial intelligence, Business Intelligence and other advanced data mining technologies.

The development of Internet information services is decreasingly determined by technological progress in the field of Assiduity 4.0. also, the development of electronic banking, the development of fintechs and social media doors is also decreasingly identified with technological advances in advanced information processing determined by the development of new Internet information technologies of the current technological revolution Assiduity 4.0.

Learn more about technology click here:

https://brainly.com/question/27948910

#SPJ1

Instructions:Emotet is an advanced banking Trojan that primarily functions as a downloader of other Trojans. According to the Symantec Internet security threat report, Emotet first emerged in 2014 and, after a quiet period, reappeared to make waves in the second half of 2017. Emotet again made headline news when it was used in more attacks in late 2019. In this activity, you will do some research and answer the following questions about Emotet.Note:Include references to support each of your answers, such as the book, news article, or website you collected the information from. Only answers with references will receive points.1. [10 points] Explain how the malware spread itself. In particular, do you think its spreading mechanism is like a worm or a virus? Justify your answer. (4-6 sentences)2. [10 points ] Explain the concealment mechanisms employed by Emotet. (3-6 sentences)3. [10 points ] Explain how Emotet communicates with a command and control (C&C) server? (4-6 sentences)

Answers

I don’t understand your question could you explain it better ?

What is wrong with the following circuit?




Nothing. This circuit has no mistakes.

The NOT gate should only two input.

There should be only one output from the OR gate.

The AND gate should have one input and two outputs.

Answers

Do you have a pic so i can answer it?

Can someone give me answers for 1-4

Can someone give me answers for 1-4

Answers

Answer:

you want me help u with this one?

2. The different amount of shades of color

3. The artist had given every marvel or DC or villian the color that fit them and the texture is also very nice in the picture.

4. The artist maybe could make the pic a little bit more high quality cause in the image is sort of blurry and you cant really see the further people that well.

A contains elements that appear closest to the user, will have the best focus, and are meant to draw the most attention within design.

Answers

Answer:

Emphasis is the part of the design that catches the viewer's attention.

Why shouldn't you use the "blank endorsement" on every check you receive?

Answers

Answer: Risky

Explanation:

It can be considered risky because the endorser is not restricting the check. The blank endorsement indicates that whoever is in possession of the endorsed check is considered to be the owner.

Question 1 Why should a user seek support when troubleshooting a computer problem is beyond his or her technical knowledge?​

Answers

A user must seek support when troubleshooting a computer problem is beyond his or her technical knowledge because: When the user seeks support, the computer problem is solved accordingly and further complications are avoided.

Discussion:

Further computer problems may arise from a computer problem. As such, when a user finds it difficult to troubleshoot a computer problem, the user should seek support since the computer problem is beyond his or her technical knowledge

Read more on troubleshooting:

https://brainly.com/question/18315517

The are two schools of ____________ are Symmetry and Asymmetry.

Answers

The two schools of design that encompass symmetry and asymmetry are known as symmetrical design and asymmetrical design.

Symmetrical design is characterized by the balanced distribution of visual elements on either side of a central axis. It follows a mirror-like reflection, where the elements on one side are replicated on the other side, creating a sense of equilibrium and harmony.

Symmetrical designs often evoke a sense of formality, stability, and order.

On the other hand, asymmetrical design embraces a more dynamic and informal approach. It involves the intentional placement of visual elements in an unbalanced manner, without strict adherence to a central axis.

Asymmetrical designs strive for a sense of visual interest and tension through the careful juxtaposition of elements with varying sizes, shapes, colors, and textures.

They create a more energetic and vibrant visual experience.

Both symmetrical and asymmetrical design approaches have their merits and are employed in various contexts. Symmetry is often used in formal settings, such as architecture, classical art, and traditional graphic design, to convey a sense of elegance and tradition.

Asymmetry, on the other hand, is commonly found in contemporary design, modern art, and advertising, where it adds a sense of dynamism and creativity.

In conclusion, the schools of symmetry and asymmetry represent distinct design approaches, with symmetrical design emphasizing balance and order, while asymmetrical design embraces a more dynamic and unbalanced aesthetic.

For more such questions on symmetry,click on

https://brainly.com/question/31547649

#SPJ8

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

Plzzzzzzz help good answers only and best answer gets brainly

Plzzzzzzz help good answers only and best answer gets brainly

Answers

Answer:

Desmos (colab w/h math antics) , Calendar, Quizlet (colab w/h google) , Quizizz (colab w/h quizlet) , Kahoot (colab w/h google) , or Google Translate

Write pseudocode for a program that allows a user to enter 20 numbers, then displays all of the numbers, the largest number, the smallest, the total and the average.

Answers

Answer:

set array of size 20

set larger_no to 0

set smallest_no to 0

for loop 20 times:

  asks for input for each input from user

  insert each value in array

run for loop 20 times again:

   display each number in array

   Inside for loop check IF number > larger_no then

    set larger_no=number

  Inside for loop check ELSE IF number <smallest_no THEN

     smallest_no=number

Write  smallest_no

Write larger_no

which of the following is a personal benifit of earning a college degree?
A) you have more friends
B) you are more likely to exercise
C) you are more likely to vote for the right candidate.
D) you have a longer life expectancy

Answers

Answer:

you have a longer life expectancy

Explanation:

mention three types of pipeline hazards​

Answers

Answer:

Structural Hazards.

Data Hazards.  

Control Hazards.

Explanation:

Answer:

Structural Hazards, Data Hazards, Control Hazards

Explanation:

A data analyst is working with a data frame named retail. It has separate columns for dollars (price_dollars) and cents (price_cents). The analyst wants to combine the two columns into a single column named price, with the dollars and cents separated by a decimal point. For example, if the value in the price_dollars column is 10, and the value in the price_cents column is 50, the value in the price column will be 10.50. What code chunk lets the analyst create the price column

Answers

The code chunk that lets the analyst create the price column is;

unite(retail, “price”, price_dollars, price_cents, sep=”.”)

The code chunk unite(retail, “price”, price_dollars, price_cents, sep=”.”) is the one that will allow the analyst to create the price column.

The reason for that answer is that;

The unite() function would allow the analyst  to make the dollars and cents data to be combined into a single column.Meanwhile, in the parentheses of the given function, the analyst will write the name of the data frame.Next step for the analyst is to write the name of the new column in quotation marks.Next step is the names of the two columns they want to combine.Lastly, the argument sep=”.” will now place a decimal point between the dollars and cents data given in the price column.

Read more about programming at; https://brainly.com/question/15683939

write c++ an algorithm to write a program to sort two numbers ascending or descending order​

Answers

Answer:

++ provides versions of these algorithms in the namespace std::ranges. Algorithms are the vast topic that covers topics from searching, sorting to min/max heaps. These can be categorized as:

Explanation of C++ Algorithm

Explanation:

1) You have a class called Sheep that wants to keep track of how many Sheep have ever been created. Where is a good place to put that variable? 2) When an h file mentions another class, what is that called? (When a cpp file needs to use a class, they include it. This is an h file just mentioning a class, like it has a pointer of that type. You are promising the compiler that the class is in another file.) 3) What is a good guideline for deciding you must write a copy constructor, an assignment operator, and a destructor? 4) void Rock::Func( const Rock & X){} What is that argument type called and what does it do? 5) We saw overloading the = sign. How do you declare a class wanting to override the parenthesis operator?

Answers

Answer:

The counter variable for the sheep count should be declared and initialized before the constructor in the class. The extern keyword should be used to declare the class in the receiving C source file. A constructor is defined when there is a need to instantiate an object with an argument and an assignment operator is used to initialize a variable. The const keyword is used to specify a variable whose value should not change during the course of the program execution.

Explanation:

The C programming language is an object-oriented programming language and has variable specifiers to define variable scopes in a program.

T/F. one reason to apply one transition to one slide and a different transition to all of the other slides in the presentation is to draw attention to the slide that has a different transition applied to it.

Answers

Applying one transition to one slide and another transition to all of the other slides in the presentation draws attention to the slide with the different transition, So the given statement is true.

What is transition in a presentation?During a presentation, a slide transition is the visual effect that occurs when you move from one slide to the next. Transition effects can be customized in terms of speed, sound, and appearance. Slide transitions improve the slideshow's professional appearance and draw attention to specific important slides.Most commonly used transition is fade. Many seasoned presenters rely on this tried-and-true classic. It's easy to understand why. A pleasing fade transition among slides is usually all you need, and only that hint of motion and gradient provides a lot of texture.Animation can help us make a PowerPoint presentation more dynamic, and actually make information more memorable. Entrances and exits are the most common types of animation effects. You can also use sound to enhance the impact of your animation effects.

To learn more about presentations refer to :

https://brainly.com/question/23714390

#SPJ4

What applications would you pin to your taskbar, why?

Answers

Answer:

The basics: microsoft edge, files, prbly word doc because I`m writing all the time

Other stuff would be spo.tify because i listen to music often and mine.craft

Other Questions
Suppose the Brazilian government sets the price of coffee at $1 per pound when the market price is $10 per pound. The government's action will: O improve efficiency, since the low price will force producers to find cheaper production methods. cause a surplus of coffee, since coffee is now cheap, cause a shortage of coffee, even in a coffee-rich country. O improve equality between rich and poor, since the poor can now afford coffee, Which three of the following mixed numbers will produce a whole number when added? 2 1/2 , 4 1/8 , 3 1/4, 2 3/4, 4 3/8 mumbai is 845 km away from bangalore whats that distance in cm it has been determined that the cost of supplies used during the month was $600. record the increase or decrease solve the simultaneous equation:6x+y=293x-y=7 52. Explain how angiotensinogen I (ANG I) is formed. 53. Explain how angiotensinogen II (ANG II) is formed. 54. Explain the effects of ANG II on blood vessels. How does this effect blood pressure? 55. What is the effect of ANG II on aldosterone levels? Does it raise or lower aldosterone levels? 56. Aldosterone targets the kidney. Explain the effect aldosterone has on the kidney and how this effects blood pressure. The spinner shown has eight congruent sections the spinner is spun 120 times what is a reasonable prediction for the spinner will land on an even number. AND NO THERES NO FRACTIONS At what temperatures will the following processes be spontaneous? H = -18 kJ and S = -60.0 J/K H = +18 kJ and S = +60.0 J/K H = +18 kJ and S = -60. J/K Please I need help. Quick please. The Romantic EraMatch each satirical quote to its real meaning FORMATIVE ASSESSMENT 2 [100 Marks]Important:Students are requested to read widely and answer the following questions on project management. Furthermore, studentsare required to integrate theory and practise in their answers. The examiner will take into consideration the links to theoryand practice and finally the synthesis of the discussion. Students should support their discussions with tables, figures andgraphs where possible.Project Scope:You have been appointed to project manage the building of a hospital in Soweto where a number of people have recentlydied due to the coronavirus. The hospital is needed urgently due to the existing hospitals having limited capacity toaccommodate the thousands of coronavirus infected residents that are in dire need of hospital care, or risk death. TheSouth African minister of health has a personal interest in this project and has determined a strict deadline for thecompletion of the project. The minister is an ex-resident of Soweto and hence is passionate about helping the residents. Hehas pledged to the residents that he will ensure that the hospital is made operational in record time. As the appointedproject manager have been mandated to deliver on the project and have been instructed that the project risks need to bemanaged in a prudent manner.Answer ALL the questions in this section.Question 4 (20 Marks) Many projects, apart from a risk management plan, also include contingency plans, fall-back plans, and contingency reserves (Scwhalbe, 2015:430). Enlighten your team on the contingency plans, fall back plans and contingency reserve that you have in mind for your project. Question 5 (20 Marks) One of the most common approaches to identifying the sources of risks is brainstorming. The project manager should involve key project team members in identifying potential sources of risk. Now that your team is sitting with you, use the brainstorming approach to map out the potential risks of your project. Comparable properties are properties that have ______ recently and are similar to the subject property in terms of location, size, number of bedrooms and bathrooms, features, and age. 1. Analyze Wiesel's speech begins: "After Auschwitz, the human condition is not the same, nothing will be thesame. " Identify where similar language is repeated later in his speech. What is the effect of this repetition? Classify the following data. Indicate whether the data is qualitative or quantitative, indicate whether the data is discrete, continuous, or neither, and indicate the level of measurement for the data.Survey responses to the question "In which of the following regions of the country do you live?" 1) East 2) North 3) South 4) West How to get to the correct answer, it is the second question on the sheet Pls help me Will mark you as brain plssss help me for these 2 questions just say top or bottom for which answers you pick a patient with severe diarrhea is losing all of the following except __________ from his body. A current of electricity flowing through a wire will create an):: electrical field.:: magnetic field.:: gravitational field Which equation represents a population of 250 animals that decreases at an annual rate of 21% ?A. p = 250(1.21)B. p = 250(1.79)C. p= 250(0.79)D. p=250(0.21) HELP ME PLEASE Your friend invites you to go to an indoor skateboard park. you'd like to go, but since you dont have a helmet or knee pads, you'll have to pay to rent them. You'll also need to buy a day pass to enter the park. Write a formula that will help you determine your total cost. h=helmet rentalk=knee pad rentalp=cost of day passc=total cost