The implementation stage of the SDLC _____.


involves describing the desired functionality of the system


involves establishing an overview of the project goals


involves putting the system into production so users can begin to perform real business operations with the system


involves analyzing end-user business requirements in order to refine project goals

Answers

Answer 1

Answer:

d. involves analyzing end-user business requirements in order to refine project goals

Explanation:

In the software development life cycle, the implementation stage is the stage where the computer programmers begin the actual coding of the application required by the end-user. At this stage, the developer takes into account the needs and specifications of the customer.

For example, if the end-user wants a software application that can track payment records, the researcher at this stage begins using the right software to code programs that can effect this function.


Related Questions

execute or non-execute some of Javascript statements according to condition expression result.................​

Answers

Answer:

execute

Explanation:

. Suppose you have a text file called notes.txt. You are provided with this notes.txt file on blackboard. Write a C++ code to display a word which appears most in notes.txt file and how many times the word appears. This is called word frequency. Your code should automatically find this word that appears most in the text file and also should automatically calculate how many times this word appears. Your code should be such that when I use it to count words from a file with million words, it should tell me which word appears most, this means I do not need to look at the file to know the word first. Your code should also count the number of characters in the word you found and also convert the word to all CAPS. Your code should also count the total number of words in the file. [20] For example, suppose a text file has the following text: Apple Mango Apple Apple The code will read from this file then the output should look like this: The word that appears most is: Apple Apple appears: 3 times Number of characters: Apples has 5 characters Word in ALL CAPS: APPLE Total number of words in the file : 4

Answers

The C++ code to display a word that appears most in notes.txt file and how many times the word appears and also should automatically calculate how many times this word appears is given below:```
#include
using namespace std;
int main()
{
   string s,str;
   map m; //Map to store the count of each word
   int cnt=0,maxi=-1;
   while(cin>>s)
   {
       cnt++;
       m[s]++;
       if(m[s]>maxi)
       {
           maxi=m[s];
           str=s;
       }
   }
   cout<<"The word that appears most is: "<

To know more about appears visit:

https://brainly.com/question/17144488

#SPJ11

Which of the following types of HDFS nodes stores all the metadata about a file system?
A) Data node
B) Client node
C) Name node
D) Map node

Answers

Name node stores all the metadata about a file system in HDFS. In HDFS, data is stored across multiple nodes in cluster, & metadata about the file system is stored on a dedicated node called the NameNode.

Hadoop Distributed File System (HDFS) is a distributed file system in Hadoop that provides high-throughput access to large data sets. In HDFS, data is stored across multiple nodes in a cluster, and metadata about the file system is stored on a dedicated node called the NameNode.

The NameNode is responsible for managing the file system namespace, including maintaining a record of the files, directories, and blocks in the file system, as well as their locations within the cluster. It also tracks the health of the data nodes and assigns block replicas to them. The NameNode acts as a single point of reference for clients that want to access the data in HDFS.In summary, the NameNode is the central component of HDFS that keeps track of all metadata about the file system, such as the file and directory structure, block locations, and block replicas.

Learn more about Hadoop here:

https://brainly.com/question/30023314

#SPJ4

PLZ HELP ME! 30 POINTS! WILL CHOOSE BRAINLIEST!
It can be challenging to stay motivated when learning from home. One strategy to stay focused on your school work is to use intrinsic and extrinsic motivation. Brainstorm some ways you can keep yourself motivated during virtual learning.




Below: List at least three strategies each for intrinsic and extrinsic motivation.

Answers

Answer:

1. Autonomy: having a degree of control over what needs to happen and how it can be done;

2. Competence: feeling that one has the ability to be successful in doing it;

3. Relatedness: doing the activity helps them feel more connected to others and feel cared about by people whom they respect; and

4. Relevance: the work must be seen by students as interesting and valuable to them and useful to their present lives and/or hopes and dreams for the future.

Explanation:

Answer:

Explanation:

Me personally

1. Live healthy - Wake up an hour before school for breakfast, exercise and be social with family. Studies have shown mental and physical health have a direct relation.

2. Virtual hangout- Facetime, google meet, zoom, and many other virtual calls are great to stay motivated. Call your friends and socialized safely. If you're not too prideful just ask for some verbal motivation.

3. Learn self-motivation- Learn how to be excited and how to look forward to school or whatnot. You can do this by giving yourself a reward after a good study session or class.

A(n) __________ provides all the necessary tools to create, test, and debug software.

Answers

An integrated development environment (IDE) provides all the necessary tools to create, test, and debug software.

What is an Integrated development environment (IDE)?

A code editor, a compiler or interpreter, and a single graphical user interface are the three common components of integrated development environments (GUI).

Keep in mind that an IDE is one that includes tools for creating automation and a source code editor. Therefore, the two things that website builders and integrated development environments (IDES) both offer are pre-defined themes for layout.

A software package known as an integrated development environment (IDE) combines the fundamental instruments needed to create and test software. Throughout the development, testing, and creation of software code, developers employ a variety of tools. Text editors, code libraries, compilers, and test platforms are examples of development tools.

To learn more about IDE, refer to:

https://brainly.com/question/28237544

#SPJ4

int example (int n) { if (n == 0) return 0; else return example (n – 1) n; } what does the example method do, when passed a positive int n?

Answers

If a positive integer n is passed, the example method will return the sum of all the positive integers from 0 to n.

The given code is an example of a recursive function. A recursive function is a function that calls itself until the base case is reached. In this case, the function example takes in an integer n, and if n is equal to 0, then it returns 0. Otherwise, it returns example(n-1) + n. If a positive integer n is passed, the function will return the sum of all the positive integers from 0 to n.

Example:If n = 5, example(5) will be called and return example(4) + 5.example(4) will return example(3) + 4.example(3) will return example(2) + 3.example(2) will return example(1) + 2.example(1) will return example(0) + 1.example(0) will return 0. So, the final result of example(5) will be: example(5) = example(4) + 5= example(3) + 4 + 5= example(2) + 3 + 4 + 5= example(1) + 2 + 3 + 4 + 5= example(0) + 1 + 2 + 3 + 4 + 5= 0 + 1 + 2 + 3 + 4 + 5= 15

You can learn more about integers at: brainly.com/question/490943

#SPJ11

Tiana is planning a marketing campaign for her employer, Catering Queen. She is identifying the types of IMC tools she will be using for the marketing message and associating the amount of money to be used for implementing each tool. Which portions of the campaign plan is Tiana working on right now

Answers

Tiana is currently working on the budget allocation and selection of Integrated Marketing Communications (IMC) tools for Catering Queen's marketing campaign.

Tiana's focus is on the financial aspect of the campaign plan, specifically determining the allocation of funds for various IMC tools.

This involves identifying the different types of communication channels, such as advertising, public relations, direct marketing, sales promotion, and personal selling, that will be used to convey the marketing message. Tiana needs to associate a specific amount of money with each tool, considering factors like reach, effectiveness, and cost-effectiveness. By allocating the budget appropriately and selecting the most suitable IMC tools, Tiana aims to maximize the impact of the marketing campaign within the available resources.

Learn more about Integrated Marketing Communications  here:

https://brainly.com/question/30389494

#SPJ11

Why is computer called a fast machine​

Answers

Answer:

it does work faster and better than humans

Which statement is true?


A. A flowchart uses comments that can be kept as a permanent part of a program.


B. A comment line begins with #.



C. Pseudocode uses shapes such as rectangles and diamonds to plan a program.


D. You only use comments for pseudocode.

Answers

Answer:

B just took the test.

Explanation:

Answer:

comment line begin with #

Explanation:

From the perspective of computers and networks, _________ is confidence that other users will act in accordance with your organization’s security rules.
network security trust reliability non-repudiation

Answers

Hi! From the perspective of computers and networks, "network security trust" is confidence that other users will act in accordance with your organization's security rules.

In the context of network security, trust refers to the level of confidence that can be placed in a user, device, or network to behave in a predictable and secure manner. Trust is an important consideration in designing and implementing security measures, as it affects how users and systems interact with each other and with the network as a whole.For example, if an organization trusts its employees to follow security policies and practices, it may allow them greater access to network resources and systems.                                                                                                     Conversely, if an organization does not trust a particular user or device, it may restrict access to certain resources or implement additional security measures to prevent unauthorized access or data loss.Overall, trust is an important concept in network security, as it affects the overall security posture of an organization and can impact the effectiveness of security measures implemented to protect network resources and data.

Learn more about network security here, https://brainly.com/question/4343372

#SPJ11

Match each task with the features necessary to complete the task

Match each task with the features necessary to complete the task

Answers

Answer:

the first one on the left row to the 3rd one in the right row

the second one on the left row to the top one in the right row

the third one on the left row to the middle one in the right row

Explanation:

looks like you got it right though already

Explain whether you think that algorithms should be protected under copyright law, and therefore whether it is possible to ‘steal' them?

Answers

Answer:

no no and no you cant steal them

Explanation:

Fill in the Blank
Complete the code.
from random import randint
# Generate and save a random number.
correct = randint(1,10)
# Initialize the variable to count the number of guesses.
attempts = 0
# Create a loop that continues until the user guesses the number.
keepGoing = True
_______________ keepGoing:
# Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")
guess = int(guess)
attempts = attempts + 1
# Compare the guess to the correct answer.
if guess == correct:
# Tell the user the guess was correct.
print("You were correct!")
keepGoing = False
else:
if guess < correct:
print("Guess higher.")
else:
print("Guess lower.")

Answers

while

Explanation:

I just did this question

Answer: while

Explanation:

from random import randint

# Generate and save a random number.

correct = randint(1,10)

# Initialize the variable to count the number of guesses.

attempts = 0

# Create a loop that continues until the user guesses the number.

keepGoing = True

while keepGoing:

# Get a guess from the user and update the number of guesses.

guess = input("Guess an integer from 1 to 10: ")

guess = int(guess)

attempts = attempts + 1

# Compare the guess to the correct answer.

if guess == correct:

# Tell the user the guess was correct.

print("You were correct!")

keepGoing = False

else:

print("You were wrong.")

# Continue the loop until the user is correct.

# Tell the user how many guesses were required.

print("You guessed the number in",attempts,"attempts.")

You modified the program to give the user a hint by changing the "else" part of the if block.

​ if guess == correct:

# Tell the user the guess was correct.

print("You were correct!")

keepGoing = False

else:

if guess < correct:

print("Guess higher.")

else:

print("Guess lower.")

Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself. Here is an example of the program’s screen:
Enter your name: Julie Taylor Enter
Describe yourself: I am a computer science major, a member of the Jazz club, and I hope to work as a mobile app developer after I graduate. Enter
Once the user has entered the requested input, the program should create an HTML file, containing the input, for a simple Web page."

Answers

Creates an HTML file using the user's name as the title and displays the name and description in the body of the file. The program achieves this by replacing spaces in the name with underscores, creating a filename, and writing HTML code to the file.

Here is the program that will ask the user for his or her name, then ask the user to enter a sentence that describes himself or herself: Program:

```
name = input("Enter your name: ")
description = input("Describe yourself: ")

filename = name.replace(" ", "_") + ".html"

with open(filename, "w") as file:
   file.write("\n")
   file.write("\n")
   file.write("{}\n".format(name))
   file.write("\n")
   file.write("\n")
   file.write("

{}

\n".format(name))
   file.write("

{}

\n".format(description))
   file.write("\n")
   file.write("\n")
```

We start by asking the user for his or her name and storing the input in the variable `name`. We then ask the user to describe himself or herself and store the input in the variable `description`.

We create a filename for the HTML file by replacing any spaces in the user's name with underscores and appending the string ".html". We then open the file with the specified filename in write mode using a with statement so that the file is automatically closed when the block is exited.

We write the HTML code to the file using multiple write statements that format the user's name and description as necessary.

The resulting HTML file will have the user's name as the title and a header with the user's name and a paragraph with the user's description in the body.

Learn more about HTML : brainly.com/question/4056554

#SPJ11

a netbios suffix may identify a computer or server being enumerated as a domain controller. why do hackers often exert more effort to attack computers identified as domain controllers?

Answers

Hackers frequently expend more effort attacking domain controllers because they provide more information, such as logon names for user accounts and network resources.

What is Domain controllers?

On computer networks, a domain controller is a server that responds to authentication requests and verifies users. Domains are a hierarchical method of organizing users and computers that share a network. The domain controller organizes and secures all of that data

The domain controller (DC) is the box that houses the kingdom's keys—Activ Directory (AD). While attackers can use a variety of techniques to gain elevated access to networks, including attacking the DC itself, you can not only protect your DCs from attackers, but also use them to detect cyberattacks in progress.

To learn more about Domain controllers, visit: https://brainly.com/question/25664001

#SPJ1

Select the correct answer.
Which relationship is possible when two tables share the same primary key?
А.
one-to-one
B.
one-to-many
C.
many-to-one
D.
many-to-many

Answers

Answer:

Many-to-one

Explanation:

Many-to-one relationships is possible when two tables share the same primary key it is because one entity contains values that refer to another entity that has unique values. It often enforced by primary key relationships, and the relationships typically are between fact and dimension tables and between levels in a hierarchy.

Can you modify an existing virtual hard disk (VHD) file?
No, once created, a VHD file is fixed.
Yes, but you can modify it only through Windows PowerShell.
Yes, you can even modify it without mounting it to a VM.
No, but you change it into a VHDX file.

Answers

Yes, you can modify an existing virtual hard disk (VHD) file, including without mounting it to a VM.

An existing VHD file can be modified in various ways. Firstly, you can mount the VHD file to a virtual machine (VM) and make changes to the contents of the virtual disk within the VM's operating system. Alternatively, you can use tools such as Windows PowerShell to perform modifications directly on the VHD file, without the need for mounting it to a VM. This allows for tasks such as resizing the VHD, converting it to a different format like VHDX, or applying disk-related operations. Hence, modifying an existing VHD file is possible both with and without mounting it to a VM, depending on the specific requirements and tools used.

To know more about hard disk click the link below:

brainly.com/question/32350396

#SPJ11

true or false A software license is a legal agreement but it does not control the use and distribution of software.

Answers

A software license is a legal agreement but it does not control the use and distribution of software is True.

They are some of the exclusive rights that the copyright owner has, or the rights that come with copyright ownership. A permission is granted by a license.

What is licensed software?On the other hand, licensed software is exclusive software that is only made available to authorized users through a licensing agreement. As the source code is not intended to be shared with the public for anyone to view or alter, it is the exact opposite of open source.Shareware software is offered for free or at a cheap cost, but in order to use it fully legally, it usually needs to be purchased and registered.Free software that has minimal license and copyright restrictions is known as proprietary software. The distribution disc's most popular apps and files are copied to your computer's hard drive during a custom installation.

To learn more about licensed software refer to:

https://brainly.com/question/29106760

#SPJ1

User
Application Software
Operating System
Hardware

Assignment #1
•Explain the meaning of this graphics organizer base on what you have learned from this lesson.

• Is an "app" same in meaning with "application"? ​

User Application Software Operating System HardwareAssignment #1 Explain the meaning of this graphics

Answers

This graphics organizer base talks about Software and how it is divided into two groups such as the operating systems and application software.

What are Software?

Software are said to be often shared into  two categories such as:

The operating systems The application software.

Note that the Operating systems functions by helping the hardware and produce a kind of interface between the hardware and its user while the Application software is said to be a stage of a programs that help the user to do anything meaningful just as seen in the diagram.

Conclusively, The word "app" has the in meaning with "application". It is known to be the short form of application.

Learn more about Application Software from

https://brainly.com/question/1538272

Sora is preparing a presentation describing policies included in President Lyndon Johnson’s "Great Society” and wants to use a relevant online source.


Which source is the most relevant for the presentation?


a]-an interview with history students about the “Great Society”


b]-a photograph of Johnson making his “Great Society” speech


c]-a chart describing the conditions that led to the “Great Society”


d]-an audio recording of Johnson’s “Great Society” speech

Answers

Answer:

Option d) is correct

Explanation:

To prepare a presentation describing policies included in President Lyndon Johnson’s "Great Society”, the most relevant source that Sora should use is an audio recording of Johnson’s “Great Society” speech.

An audio recording of Johnson’s “Great Society” speech can give a more proper clarification and information regarding policies included in President Lyndon Johnson’s "Great Society”.

So,

Option d) is correct

Answer:

the answer is D

Explanation:

I just took the quiz :)

reviewing error logs is an example of a(n) group of answer choices processing control data transmission control output control data entry control

Answers

Data entry controls include things like error logs and reviews. The client will be given more information about the error and its location via the error log file.

What serves as the error log file?

Data Contract Data Format Guidelines are available for more details. Verify once more that you submitted your model.json files to your storage account appropriately.

What is the data lake storage's error log?

The Data Lake Storage account receives a write-back of the error log. Use this article to comprehend the mistakes listed in the log and learn how to fix them if your data configuration isn't working properly. The many error kinds in the log that the Intelligent Recommendations service .

To know more about Data visit :-

brainly.com/question/13650923

#SPJ4

compare and contrast photosystem i, ii and the z-scheme regarding flow and yield. how do these different methods of photorespiration mirror adaptation?

Answers

Photosystem I (PSI) and Photosystem II (PSII) are two components of the light-dependent reactions in photosynthesis.

How do the Photosystem I (PSI) and Photosystem II (PSII) compare

PSI absorbs light with a peak wavelength of 700 nm and transfers energized electrons to NADP+ to form NADPH. PSII absorbs light with a peak wavelength of 680 nm, generates ATP through photophosphorylation, and releases oxygen as a byproduct.

The Z-scheme represents the flow of electrons and energy between PSI and PSII, with electrons passing from water to PSII, through the electron transport chain, and then to PSI. This flow of electrons generates ATP and NADPH.

These mechanisms have evolved to optimize energy capture and transfer in photosynthesis. Photorespiration, a separate process, deals with the fixation of oxygen and is considered wasteful in terms of carbon loss.

Read more on Photosystem here https://brainly.com/question/13034934

#SPJ4

N an AWS design template, the "depends on" property of a resource is represented by an _________ color dot. Red Orchid Blue Black

Answers

Answer:

Black

Explanation:

Explicit dependencies in Amazon Web Services are used to determine the order in which resources are added or deleted on AWS Cloud Formation. If a user wishes to create explicit dependency, a line from the "dependson" dot located at the route is moved to the gateway-VPC attachment.

The "dependson" dot helps to specify which resource is created before another. It is signified by a black dot (*). It can be used to override parallelisms and also to determine when a wait condition becomes activated.

Falling If the user doesn't do anything, the player sprite should fall. Do This • Find the code comment // FALLING . • Use the counter pattern with the player sprite's velocityy to make the flyer fall. Test your code to make sure that it works. The sprite should fall faster as it goes down the . screen. Toolbox ♡ Workspace World Sprites 1 77 GAME SETUP Drawing Control 2 // create player, target, and obstacles Math Variables 3 var rock = createSprite(109 100) var sprite = createSpritex, 4 rock.scale = 0.5; sprite.setAnimation (label) 5 var player createSprite(200, 100) 1: player.setAnimation "fly_bot"); sprite.x 6​

Answers

sdcyecreat nobody cares because nobody asked nobody likes you I’m just kidding I love you so much have a great day

A student has a ten-year-old desktop computer that she only uses for word processing, but she would like to start using it to play new computer games. She has been working and has money saved up, and she can either upgrade the computer or purchase a new one to replace the old one.________
The school’s theater department uses a desktop computer for accounting purposes only — to keep track of costume purchases, fund-raising dollars, and the number of hours volunteers, students, and teachers participate in the production. The computer is only three years old, but it is running slow. It appears as though there are just too many pictures from past productions on the hard drive.___________

replace
upgrade

Answers

Answer:

She should buy a new one or buy a Gaming PC to upgrade the setup.

Explanation:

Answer:

replace

upgrade

Explanation:

im doing edge too it might not be right tho

One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all that apply. If it is easy to understand, no one will dispute what is included in the algorithm. It will give everyone else an opportunity to comment on the process described in the algorithm. It will serve as the starting point for all future activity. It communicates the consecutive instructions of the solution.

Answers

Answer: B,C,D

Explanation:

Answer:

the answer is B,C,D

Explanation:

which algorithm, based on runtime and memory resources, is the most efficient? group of answer choices short runtime and high memory usage short runtime and low memory usage long runtime and high memory usage long runtime and low memory usage

Answers

Short runtime and low memory usage is generally considered the most efficient algorithm, as it completes the task quickly while using minimal resources. However, the most efficient algorithm can vary depending on the specific problem and the constraints of the system.

When evaluating the efficiency of an algorithm, we typically consider both its runtime and memory usage. Short runtime means that the algorithm can complete the task quickly, while low memory usage means that it does not require a large amount of memory to execute. Algorithms with long runtimes or high memory usage may not be practical for certain applications, especially those with limited resources. However, it's important to note that the most efficient algorithm can vary depending on the specific problem and the trade-offs involved.

To learn more about low memory
https://brainly.com/question/13196228
#SPJ11

Create a flowchart to find the total of 10 negative numbers start from -1.

Answers

Here is a simple flowchart to find the total of 10 negative numbers starting from -1:

```

Start

Set total = 0

Set counter = 1

While counter <= 10

|

├─ Yes ─┬─→ Add counter to total

│ ↓

│ Increment counter by 1

├─ No ──┬─→ Display total

End

```

In this flowchart, we start by initializing the total to 0 and the counter to 1. Then, we enter a loop that continues as long as the counter is less than or equal to 10. Inside the loop, we add the current value of the counter to the total, and then we increment the counter by 1. Once the loop finishes, we display the total.

\(\huge{\mathfrak{\colorbox{black}{\textcolor{lime}{I\:hope\:this\:helps\:!\:\:}}}}\)

♥️ \(\large{\textcolor{red}{\underline{\mathcal{SUMIT\:\:ROY\:\:(:\:\:}}}}\)

Which of the following is a common identification method that can verify the identity of specific files?
A. Firewall
B. Binary pattern
C. Hashing
D. Data sanitization

Answers

Hashing is a common identification method that can verify the identity of specific files.

In cryptography, hashing refers to the method of transforming a data set of any size into a fixed size of data that may be checked readily. The output is a hash value or merely a hash, which is a representation of the original data set. The hash is typically a unique identifier for the original data when it is hashed.

Hashing is one of the most efficient ways to store and retrieve data since it allows for rapid comparisons. A common application of hashing is to check the validity of data transferred across a network. Furthermore, hashing may be used to safeguard the secrecy of passwords by storing hash values instead of actual passwords.

To conclude, hashing is a common identification method that can verify the identity of specific files.

Know more about the Hashing

https://brainly.com/question/13164741

#SPJ11

Which of the following would be better communicated with an image than with text?
Choose the answer.
the tone of a person's voice
an invitation to a museum opening
the decor at a wedding
the schedule for a conference

Which of the following would be better communicated with an image than with text?Choose the answer.the

Answers

Answer:

A decor to a wedding

Explanation:

its bc who would want to know how its described when u could look of how it looks u might be speechless

The wedding's decor would've been best communicated through an image than through prose, and further calculation can be defined as follows:

Humans react and process new info more efficiently than every sort of data. Visual content is processed 60,000 seconds faster by the human brain than text. It is the picture is worth 60,000 words! Moreover, visual data accounts for 90% of the information conveyed to the mind.

Therefore, the final choice is "the decor at a wedding ".

Learn more:

brainly.com/question/16390691

Other Questions
Which western state is the largest producer of apples?IdahoOregonWashingtonArizona To collect data on student opinions of BU's dining services, you ask the Dean of Students for an email list for all students on campus, and use the RAND() function in Excel to select a sample of students. This would be an example of: Judgement Sampling O Simple Random Sampling Convenience Sampling Systematic Random Sampling Which of the following type of scanner is used by banking industry to process the cheque?O OCRO OMRO MICRO Card Reader which behavior would be better predicted by implicit motives rather than explicit motives?a.choosing dessert from a menu of optionsb.selecting a job based on salary and benefitsc.performance on a cognitive taskd.judging the winner of a baby beauty pageant if the plaintiff has either engaged in or refrained from actions that are at least partially to blame for the injuries received, what negligence has occurred? If 30% of a number is 78 and 65% of the same number is 169, find 95% of thatnumber. (URGENT) A dog is resting against a pole to which he is attached with a 24 meter chain. He watches a cat approach to within 8 meters of the pole and promptly gives chase. The dog runs at 12 meters per second and the cat runs at 10 meters per second. Which does the dog reach first, the car or the end of the chain? what are the three basic electrical characteristics of a complete electric circuit? A LED lamp rated 13 W is on for 28 minutes and a stereo of 52W is on for 9 hours. How much energy has been used in Watt-hours? (response not displayed) Need help will mark brainliest What is the sum of a + b? 180We need more information to solve this problem.The answer depends on the values of the individual angles.360 Write a compound sentence that uses twoinfinitives A car travels 120 km in the first 2 hours and 100 km in the next 2 hours.What is the cars average speed?240 km/h440 km/h55 km/h128 km/h which factor might affect the physical distribution of a particular species? Use the three laws of logarithms to simplify the following expression: log8(64r^6/m^3) What sentiments were shared by some americans in 1941 and the european union in 2015? Within the Bilateria, animals can be divided into three major divisions based on the presence and structure of a body cavity called the 0.1 + 0.2x +0.3 + 0.05x = -2.4 write the equation in fully simplified slope intercept form Shureka Washburn has scores of 62, 82, 62, and 68 on her algebra tests.a. Use an inequality to find the scores she must make on the final exam to pass the course with an average of 71 orhigher, given that the final exam counts as two tests.b. Explain the meaning of the answer to part(a).