the floating disk technique lends itself to independent investigation as it is relatively simple to collect large amounts of data in a fairly short period of time. to build your skill at doing this, consider the following scenario. a student decided to compare the rate of photosynthesis in english ivy leaves that were newly opened to leaves from the same plant that had been on the vine for many weeks. she punched out 10 disks from each leaf type, created a vacuum to remove the gases in the mesophyll, and sank them in 200 ml of a 0.2% sodium bicarbonate solution in plastic cups. the cups were placed four inches from a fluorescent light source. every minute, the number of disks that had risen in each solution was recorded. this procedure was repeated with fresh disks for a total of five trials. which metric would provide the most useful information for comparing the trials? the floating disk technique lends itself to independent investigation as it is relatively simple to collect large amounts of data in a fairly short period of time. to build your skill at doing this, consider the following scenario. a student decided to compare the rate of photosynthesis in english ivy leaves that were newly opened to leaves from the same plant that had been on the vine for many weeks. she punched out 10 disks from each leaf type, created a vacuum to remove the gases in the mesophyll, and sank them in 200 ml of a 0.2% sodium bicarbonate solution in plastic cups. the cups were placed four inches from a fluorescent light source. every minute, the number of disks that had risen in each solution was recorded. this procedure was repeated with fresh disks for a total of five trials. which metric would provide the most useful information for comparing the trials? the mean time it takes 10 disks to rise in each trial the mean time it takes five disks to rise in each trial the total time it takes 10 disks to rise in each trial the median time it takes five disks to rise in each trial

Answers

Answer 1

The floating disk technique is a method used to measure the rate of photosynthesis in plants.

What is the floating disk technique?

The floating disk technique is a method used to measure the rate of photosynthesis in plants.

In the given scenario, a student conducted an experiment to compare the rate of photosynthesis in newly opened English ivy leaves to leaves from the same plant that had been on the vine for many weeks.

The student used the floating disk technique and recorded the number of disks that had risen in each solution every minute. This procedure was repeated for a total of five trials.

The most useful metric for comparing the trials would be the mean time it takes 10 disks to rise in each trial, as it would provide an average value of the rate of photosynthesis for each trial and allow for easy comparison between the two leaf types.

Learn more about floating disk

brainly.com/question/6496355

#SPJ11


Related Questions

______ is encryption of the real-time video feed required by hipaa when using telehealth modalities.

Answers

Transport Layer Security (TLS), and encryption of the real-time video feed is required by HIPAA when using telehealth modalities. This is because telehealth involves the transmission of sensitive patient information.

Encryption is an important security measure that helps protect that information from being intercepted or accessed by unauthorized parties. HIPAA regulations require that all electronically protected health information (ePHI) is encrypted when it is being transmitted over the internet, and this includes the video feed used in telehealth sessions. So, healthcare providers who offer telehealth services must ensure that their video conferencing platforms and other telehealth tools use encryption to protect patient privacy and comply with HIPAA regulations. Encryption is the process of encoding information in such a way that it becomes unreadable and inaccessible to unauthorized parties. It is used to protect sensitive data such as personal information, financial transactions, and government secrets. Encryption relies on complex algorithms and keys to ensure that only authorized individuals can access the information.

Learn more about Encryption here:

https://brainly.com/question/30773308

#SPJ11

Households play a role in the circular flow of goods by

Answers

Answer:

People in households buy goods and services from businesses in an attempt to satisfy their unlimited needs and wants.

Explanation:

Households also sell their labor, land, and capital in exchange for income that they use to buy goods and services that firms produce.

Answer:

A runner buys a new pair of athletic shoes.

Explanation:

Households purchase goods and services, which businesses provide through the product market.

Source:

https://colors-newyork.com/what-is-the-role-of-the-household-in-the-circular-flow-model/#:~:text=What%20is%20the%20role%20of%20the%20household%20in,provide%20labor%20to%20businesses%20through%20the%20resource%20market.

In python, a comma-separated sequence of data items that are enclosed in a set of brackets is called.

Answers

A collection of data elements that are separated by commas and enclosed in a set of brackets is referred to as a LIST in Python.

A running total is a sum of numbers that grows with each iteration of the loop. The running total is maintained via a variable known as an accumulator. A list is an element-changing ordered sequence in the Python programming language. The components or values that make up a list are referred to as its items. Similar to how characters between quote marks constitute strings, values for lists must be enclosed in square brackets. Repetition structures, also known as loops, are used when a program needs to process one or more instructions repeatedly up until a condition is met, at which point the loop ends.

Learn more about python here-

https://brainly.com/question/18502436

#SPJ4

Total silence, smiling or frowning, and asking for clarification of what was received, are all examples of __________. Group of answer choices interpreting hearing responding evaluating

Answers

The c answer is: interpreting.

responding. Total silence, smiling or frowning, and asking for clarification of what was received are all examples of different ways individuals can respond to a message. Responding is a key element of communication that involves providing feedback or reacting to the information received. It includes both verbal and nonverbal actions that demonstrate understanding, agreement, disagreement, confusion, or any other form of acknowledgment. Responding allows the sender of the message to gauge the effectiveness of their communication and provides an opportunity for further clarification or dialogue if needed. It plays a crucial role in maintaining effective communication by facilitating the exchange of information and ensuring mutual understanding between individuals involved in the communication process.


learn more about interpreting here :
https://brainly.com/question/27694352
#SPJ11

PLEASE ASAP!!

Today, most film editors manually cut and splice the actual film footage once it arrives.


O True
O False

Answers

The correct answer should be true, as their job is to *edit* the footage.

Answer:

True

Explanation:

edg2021

The film editor is such an important person on a film that he is often hired before the cast and other crew. This editor is responsible for revising the filmed footage until it becomes the finished film. The editor begins by reading the script to get familiar with the story. It is important for the editor to know the script because film scenes are generally shot and edited out of sequence. When footage begins to come in, the editor reviews the footage and production notes provided by the director and production team. These notes contain details about the footage and the director’s comments about the footage. The editor then uploads or transfers the footage to computers in the editing bay and begins editing the footage into finished scenes. The editing bay is the control room with editing equipment, computers, monitors, and sound system where film editors manipulate plot, sound, graphics, and score to produce a well-constructed scene. This is a painstakingly detailed and time-consuming task

What is the maximum number of guesses it will take to find a number
between 1 and 64?

Answers

Answer:

10?

Explanation:


Explain why it is important for you to understand and describe the basic internal and external components of a computer in the
workplace. How might you use this information?

Answers

Users can adequately describe to your boss or consumer if they know the identity of an internal part of a computer, i.e. RAM, Processor, HDD, motherboard, etc and the further discussion can be defined as follows:

When any problems in a few of our computers are present user have to know the computer part names like keyboard, cursor, printer, scanner, microphone, cam, etc.Users can explain easily which inner or outside part of a computer is problematic if a problem has been found.

Therefore, We can easily deal with it and solve issues if we know of various components at work in a computer.

Learn more:

brainly.com/question/12899825

. Electricians will sometimes call ______ "disconnects" or a "disconnecting means."
A) SwitchesB) Three-pronged plugsC) Two-pronged plugsD) Electrical cords

Answers

Answer: A: Switches

Explanation:

Answer:

A) Switches

Explanation:

Social networking sites are usually ________________ during work hours unless the activity is work-related. Responses

Answers

Explanation:

Social networking sites are usually restricted during work hours unless the activity is work-related.

Within a word processing program, predesigned files that have layout and some page elements already completed are called
text boxes
templates.
frames
typography

Answers

Answer:

I think it's B) templates

     

                   Sorry if it's wrong I'm not sure!!

Explanation:

Within a word processing program, predesigned files that have layout and some page elements already completed are called: B. templates.

In Computers and Technology, word processor can be defined as a processing software program that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.

A template refers to a predesigned file or sample in which some of its page elements and layout have already completed by the software developer.

In this context, predesigned files in a word processing program, that have layout and some page elements already completed by the software developer is referred to as a template.

Read more on template here: https://brainly.com/question/13859569

what is computer engineering

Answers

Answer:

Computer Engineering is the discipline embodying science and technology in the design, building, implementing, and maintenance of modern computer systems and computer-controlled equipment software, and hardware components.

Explanation:

Computing engineering is an engineering branch that incorporates several computer sciences and engineering industries that are necessary for the development of computer equipment and software. In general, computer engineers are educated not only in software engineering or electronic engineering but also in software design and software integration. Computer engineers participate in numerous computer software and hardware aspects from the conception of different microcontrollers, micro-producers, personal computers, and supercomputers to the design of circuits.

Computer engineers are usually involved in the writing of software and firmware for embedded microcontrollers, the design of VLSI chips, analog sensors, the construction of mixed-signal systems, and the design of operating systems. The robotic research process is also suitable for the use of digital systems to control and monitor electrical systems, such as drives, communications, and sensors. Computer engineers are also suitable.

In many universities, informatics students are allowed to choose areas of in-depth study in their junior and senior levels, as the full size of knowledge used in computer design and use is beyond the scope of a bachelor's degree. Other institutions may require students to complete one or two years of general engineering before declaring the focus on computer technology

Phone directory applications using doubly linked list make a c++ prgram which perform all operations in it

Answers

A C++ program that implements a phone directory using a doubly linked list. The program allows you to perform operations such as adding a contact, deleting a contact, searching for a contact, and displaying the entire phone directory.

```cpp

#include <iostream>

#include <string>

using namespace std;

// Structure for a contact

struct Contact {

   string name;

   string phoneNumber;

   Contact* prev;

   Contact* next;

};

// Class for the phone directory

class PhoneDirectory {

private:

   Contact* head; // Pointer to the head of the list

public:

   PhoneDirectory() {

       head = nullptr;

   }

   // Function to add a contact to the phone directory

   void addContact(string name, string phoneNumber) {

       Contact* newContact = new Contact;

       newContact->name = name;

       newContact->phoneNumber = phoneNumber;

       newContact->prev = nullptr;

       newContact->next = nullptr;

       if (head == nullptr) {

           head = newContact;

       } else {

           Contact* temp = head;

           while (temp->next != nullptr) {

               temp = temp->next;

           }

           temp->next = newContact;

           newContact->prev = temp;

       }

       cout << "Contact added successfully!" << endl;

   }

   // Function to delete a contact from the phone directory

   void deleteContact(string name) {

       if (head == nullptr) {

           cout << "Phone directory is empty!" << endl;

           return;

       }

       Contact* temp = head;

       while (temp != nullptr) {

           if (temp->name == name) {

               if (temp == head) {

                   head = head->next;

                   if (head != nullptr) {

                       head->prev = nullptr;

                   }

               } else {

                   temp->prev->next = temp->next;

                   if (temp->next != nullptr) {

                       temp->next->prev = temp->prev;

                   }

               }

               delete temp;

               cout << "Contact deleted successfully!" << endl;

               return;

           }

           temp = temp->next;

       }

       cout << "Contact not found!" << endl;

   }

   // Function to search for a contact in the phone directory

   void searchContact(string name) {

       if (head == nullptr) {

           cout << "Phone directory is empty!" << endl;

           return;

       }

       Contact* temp = head;

       while (temp != nullptr) {

           if (temp->name == name) {

               cout << "Name: " << temp->name << endl;

               cout << "Phone Number: " << temp->phoneNumber << endl;

               return;

           }

           temp = temp->next;

       }

       cout << "Contact not found!" << endl;

   }

   // Function to display the entire phone directory

   void displayDirectory() {

       if (head == nullptr) {

           cout << "Phone directory is empty!" << endl;

           return;

       }

       Contact* temp = head;

       while (temp != nullptr) {

           cout << "Name: " << temp->name << endl;

           cout << "Phone Number: " << temp->phoneNumber << endl;

           cout << "------------------------" << endl;

           temp = temp->next;

       }

   }

};

int main() {

   PhoneDirectory directory;

   // Example usage

   directory.addContact("John Doe", "1234567890");

   directory.addContact("Jane Smith", "9876543210");

   directory.addContact("Alice Johnson", "5678901234");

   directory.displayDirectory();

   directory.searchContact("Jane Smith");

   directory.searchContact("Bob

Learn more about C++ program here:

https://brainly.com/question/30905580

#SPJ11

One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed. Since all files are contiguous, copying a
file squires a seek and rotational delay to read the file, followed by the transfer at full speed. Writing the file back requires the same work. Assuming a seek time of 5 msec, a rotational delay of 4 msec, a transfer rate of 8 MB/sec, and an average file size of 8 KB, how long does it take to read a file into main memory and then write it back to the disk at a new location? Using these numbers, how long would it take to compact half of a 16-GB disk?

Answers

Answer:

The answer is below

Explanation:

a) Seek time = 5 msec, transfer time = 4 msec, transfer rate = 8 MB/sec = 8000 KB/sec, average file size = 8 KB

Transfer time = 8 KB ÷ 8000 KB/sec = 1 msec

The time required to read and write is twice the sum of the seek and transfer time.

Total time = (5 msec + 4 msec) * 2 + 1 msec = 19 msec

b) half of 16 GB = 8 GB = 8000000 KB

number of read and writes = (8000000 KB of total file size/ 8 KB of average file size) * 2 = 2000000

Transfer rate = 8 MB/sec = 0.008 GB/sec

Transfer time = 8 GB ÷ 0.008 GB/sec = 1000 sec

Total time = (5 msec + 4msec) * 2000000 + 1000 sec = 19000 sec

which of the following is the correct function of the interpreter? (1 point) it translates the entire program, creating an executable program, which can be run at a later time. it takes one program, written in a high-level language, as input, and creates a machine language program as output. it takes the most recently entered instruction, translates it into machine language, and executes it. it allows programmers to more easily write programs.

Answers

The correct function of the interpreter is c) it takes the most recently entered instruction, translates it into machine language, and executes it.

An interpreter is a software program that executes high-level code by converting it to machine code line-by-line. It reads code from a source file or interactive console and translates each instruction into machine code, which is then executed by the computer. The interpreter can also check for syntax errors as it reads each line of code, allowing programmers to quickly identify and correct errors.

This makes it easier to write and debug programs in high-level languages, since the interpreter handles many of the low-level details of memory management and optimization.

Option c is answer.

You can learn more about interpreter at

https://brainly.com/question/27961648

#SPJ11

A group of small local businesses have joined together to share access to a cloud-based payment system. Which type of cloud is most likely being implemented?

Answers

The type of cloud that is most likely being implemented when a group of small local businesses has joined together to share access is community cloud service. The correct option is C.

What is cloud service?

Cloud services have a wide variety of services for companies and businesses. They provide applications and software with resources. They provide easy and affordable services.

Community cloud service is a shared type of cloud service that helps banks and heads of trading firms.

Thus, the correct option is C. Community.

To learn more about cloud service, refer to the below link:

https://brainly.com/question/24227961

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Public

Private

Community

Hybrid

3.
What is the meaning of *.VBP.

Answers

Answer:

The meaning of VBP is Visual Basic Project

Answer:

visual basic projects thankyouu HAHAHAHA

because cute ako

3.
An open path has these, but a closed path does not.
a. endpoints
b. terminators
c. segments
d. anchor points

Answers

A endpoints is the correct t answer

your chief information security officer (ciso) wants to develop a new collection and analysis platform that will enable the security team to extract actionable data from its assets. the ciso would like your input as far as which data sources to draw from as part of the new collection platform, worrying that collecting from too many sources, or not enough, could impede the company's ability to analyze information. is this a valid concern, and how can it be addressed within an intelligence life-cycle model?

Answers

Yes, it is a valid concern. The requirements (or planning and direction) phase of the intelligence cycle is used to assess data sources and develop goals and objectives for making actionable intelligence to support the use of events demanded by intelligence consumers. You can also mention that the feedback phase of the cycle serves as the chance to review sources and determine whether they are delivering valuable intelligence.

CISO can be described as something that stands for the chief information security officer. CISOs work alongside company officers, business managers, cyber security teams, and IT managers  to effectively monitor and maintain the security of their organization's applications, databases, computers, and websites.

You can learn more about Ciso at https://brainly.com/question/13261608

#SPJ4

Using a list help Dr. Pepper investigate a crime. He usually asks 5 questions to each person he interviews:
"Did you call the victim?"
"Were you in the crime scene?"
"Do you live close to the victim?"
"Did you owe money to the victim?"
"Have you ever worked with the victim?"
The answers are always either "Yes" or "No".
Print the list after you record all the answers.
Your program must give a final verdict about the participation of that person in the crime. If there are 2 positive answers this person must be classified as "Suspect". For 3 or 4 positive answers the classification is "Accomplice", and for 5 positive answers the classification is "Killer". Otherwise, this person should be classified as "Innocent".
For example, if the input is:
No
Yes
Yes
Yes
No
The expected output is:
The recorded answers were ['No', 'Yes', 'Yes', 'Yes', 'No']
The verdict is: Accomplice.

Answers

This program prompts the user to answer each question with "Yes" or "No", stores the answers in a list, and then determines the final verdict based on the number of positive answers.

To determine the level of involvement of the person in the crime, the program should count the number of positive answers. If there are two positive answers, the person should be classified as a "Suspect". If there are three or four positive answers, the person should be classified as an "Accomplice".

Dr. Pepper can use this list of questions and classifications to help investigate a crime and determine the level of involvement of each person interviewed. To help Dr. Pepper investigate a crime using a list, you can create a Python program that takes input for the 5 questions and prints the list with the recorded answers.

To know more about program visit:

https://brainly.com/question/11023419

#SPJ11

Which of the following devices is NOT required to successfully implement teleconferencing?
Sensor
Modem
Speaker
Microphone

Answers

Answer: a. Sensor

Explanation: Modem= internet

Speaker= able to hear

microphone = to speak

What is meant by virtual memory?

Answers

Virtual memory is a feature of an operating system (OS) that allows a computer to be able to compensate for shortages of physical memory by temporarily transferring pages of data from random access memory (RAM) to disk storage.

Virtual memory enables a computer to run larger applications or multiple applications concurrently.

Virtual memory is a memory management technique that provides an "idealized abstraction of the storage resources that are actually available on a given machine" which "creates the illusion to users of a very large memory."

The use of virtual memory allows a computer to run larger applications or multiple applications concurrently, as it provides an "idealized abstraction" of the storage resources that are actually available on a given machine. This creates the illusion to users of a very large memory, even though the physical memory may be limited.

Overall, virtual memory is an important feature of modern operating systems, as it allows for more efficient use of physical memory resources and enables computers to run larger and more complex applications.

Learn more about virtual memory here:

https://brainly.com/question/13088640

#SPJ11

difference between data bus and address bus and control bus​

Answers

Answer: The address bus carries the information about the device with which the CPU is communicating and the data bus carries the actual data being processed, the control bus carries commands from the CPU and returns status signals from the devices.

Who Invented Abacus!

Answers

Answer:

Tim Cranmer

Explain: I remember reading a book about it but forgot the book name

Does anyone know where online I can buy the MacBook Air 2017 at I can’t find any I’ll give brainlist and points

Does anyone know where online I can buy the MacBook Air 2017 at I cant find any Ill give brainlist and

Answers

Answer:Amazon

Explanation:

Which of the following is true of lossy and lossless compression algorithms?
A. Lossy compression algorithms are used when perfect reconstruction of the original data is important.
B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.
C. Lossless compression algorithms are only used to compress text data.
D. Lossless compression algorithms only allow for an approximate reconstruction of the original data.

Answers

Answer:

B. Lossy compression algorithms are typically better than lossless compression algorithms at reducing the number of bits needed to represent a piece of data.

Explanation:

The lossy compressions allow for data to be compressed in inexact measurements which means less loss than the exact measurements that Lossless compression uses.

The true statement regarding lossy & lossless compression algorithms is that they should be treated better as compared to lossless compression algorithms with respect to decreasing the no of bits that are required for presenting the piece of data.

The following statements should not be relevant:

It can't be used at a time when the perfect reconstruction of the real data should become significant.It not only applied for compressing the text data.It not only permits the predicted reconstruction of the real data.

Therefore we can conclude that the true statement regarding lossy & lossless compression algorithms is that they should be treated better as compared to lossless compression algorithms with respect to decreasing the no of bits that are required for presenting the piece of data.

Learn more about the data here: brainly.com/question/10980404

Daniel is writing about emergency steps to take if a fire breaks out in school. Which organizational aid would be
most useful?
O a sequence chart
O a timeline
a Venn diagram
O a web diagram

Answers

Answer:

sequence chart

Explanation:

Answer:

a sequence chart

Explanation:

i took the test

What should a developer use to implement an automatic approval process submission for cases?

Answers

Process Builder  should a developer use to implement an automatic approval process submission for cases.

What is Process Builder?

Process Builder is an automated Salesforce tool that allows you to control the order of actions or evaluate the criteria for a record. Process Builder gives you the ability to use straightforward 'If/Then' logic to easily add automation to your Salesforce environment.

What is the difference between Workflow and process builder?

In Workflow, if you put multiple actions on criteria, there is no way to predict or control which action will happen first. However, with Process Builder, you are able to control the multiple actions set to criteria and what order you want them to take place in.

To learn more about Process Builder , refer

https://brainly.com/question/14312209

#SPJ4

Complete Question is,  

A . An Assignment Rule

B . Scheduled

C . Process Builder

D . A Workflow Rule

what does the internet information services (iis) role do

Answers

Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files

To provide requested HTML pages or files, Microsoft's Internet Information Services (IIS) is a versatile, all-purpose web server that works with Windows operating systems.

An IIS web server accepts requests from distant client computers and responds with the necessary information. Web servers are able to share and distribute data via LANs, like corporate intranets, and WANs, like the Internet, thanks to this fundamental capability.

A web server can provide users with information in a variety of ways, including static HTML-coded webpages, file downloads and uploads, text documents, image files, and more.

learrn more about Internet Information Services here:

https://brainly.com/question/29353164

#SPJ4

Which is an example of a crime that might occur in an e-commerce transaction?
A customer’s new purchase is stolen after delivery.
A customer’s credit card information is stolen and used by someone else.
A customer can easily take merchandise without having to pay for it.
A customer pays an unfair price for the merchandise she bought.

Answers

Answer:

A costumers credit card information is stolen and used by someone else.

Answer:

A customer's credit card information is stolen and used by someone else.

Explanation:

Since e-commerce is online sales, the customer can not take merchandise without having to pay for it.

Also the customer can search for the best price.

how can you turn on a light switch and it not work, without turning off the power to the whole house?

Answers

Answer:

Go to the beaker box and turn off the power to that one room. Duh

Explanation:

Other Questions
The posters will be signed by Mufasa after his performance. Active voice Passive voice Choose the correct verb to complete the expression:____ aux cartesJouerfaire How to simply ((4/x)-2)/((1/x)+3) Please help me,Is it (more modern)Or(Moderner)??? Does Brainly cost money?. PLEASE ANSWER AND EXPLAIN ILL MARK BRAINLIEST If I spent 2/5 of my monthly salary on my mortgage and had $1200 left over for all my other expenses. How much did I spend on my mortgage? Company x has 128000 in a savings account that pays 6% interest per year. How much interest will it earn at the end of the year? WILL GIVE BRAINLIEST!!TO CORRECT ANSWER. You have four credit cards. Each has a balance of $950. 00, but their credit limits are $1,200. 00, $2,200. 00, $2,400. 00, and $3,000. 0. Paying off and closing which card would decrease your debt ratio?A) $3,000. 00 limitB) $2,400. 00 limitC) $2,200. 00 limitD) $1,200. 00 limit PLS HELP!!! THIS IS THE SECOND TIME I'M ASKING THIS QUESTION!! WILL MARK BRAINLIEST TO FASTEST AND CORRECT PERSON! 20 POINTS!! (THIS IS FOR ATHLETICS)1. Which fact from healthy eating tips stood out to you?Why?2. What physical muscular endurance activity benefits you the most?Why?3. Why is it so important to make good choices when planning your meals?4. Did a parent join you in the exercise and meal planning?5. Describe the meal you planned? 11 Three forces are acting upon the box shown in the diagram below.40 N60 N[29 NAssuming there is no friction between the floor and the ground, how will these forces affect the position of the box?A. The forces will cause the box to move to the left.B. The forces will cause the box to move to the right.C. The forces will cause the box to collapse to the ground.D. The forces will be unable to move the box in any direction. 178 N-m 120 N-m 100 N-m None of the above A16. In an AC power system, a capacitor can be connected across the line and neutral wires to correct the power factor of a load. A 2-hp air conditioner draws 8.5A current with a lagging power factor 0.8 at 220V. The line frequency of the power system is 50 Hz. What is the value of the capacitor in order to correct the power factor to unity? SA DIO 46.4 73.8 F 30 H 230 V 464 F Load (b) (c) (d) (e) 19.32 F None of the above a A17. A single-phase 7.46 kW motor is supplied from a 400 V, 50 Hz AC source. Its efficiency is 85 % and the power factor 0.8 lagging, calculate the kVA input. (a) (b) (c) (d) 5.97 kVA 9.325 kVA 10.97 kVA 8.78 kVA None of the above the resistance Help please hurry up An artist is creating tiles to use in a project. Each tile is to be in the shape of a right triangle. One of the legs of the tile is to be 3 Inches long. The hypotenuse is to be z Inches long.Write an expression in terms of 3 that models the other leg of a tile. Which best explains why people failed to make their promised payments on items during the 1920s? What is the purpose of the establishment clause to give citizens the right to form religious groups? In the xy-plane, what is the y-intercept of the graph of the equation y = 6 (x - 1) (x + 3)? Which pair of functions is not a pair of inverse functions?A. flt=*1 and g(t)=681B. f(x)= $184 and g(x)=193+4C. f(x)= 35 and g(1)=5VTD. f(x)== # 20 and g(x)= 2041 Try these Copy and complete these sentences by adding connecting adverbs and adverbial phrases or conjunctions to create a paragraph about a day out. One has been done for you. 1. First of all, we went on the swings and then we went on the seesaw. Answer: First of all, we went on the swings and then we went on the seesaw. 2. We had a great time 3. We stopped I wanted a drink. 4. We stopped for lunch 5. we walked around the forest. 6. it was cold. 7. We got back to the bus stop 8. we went home I was shattered. What is the circumference of the following circle use 3.14 for pi and enter your answer as a decimal