unlike regular variables, ________ can hold mutliple values

Answers

Answer 1

Unlike regular variables, arrays can hold multiple values.

Here's a step-by-step explanation of arrays:

1. An array is a data structure in programming that can hold a fixed number of values of the same data type.

2. Unlike regular variables that can only hold a single value at a time, an array can hold multiple values.

3. Each value in an array is assigned an index, starting from 0 for the first element and incrementing by 1 for each subsequent element.

4. The syntax for declaring an array varies depending on the programming language, but generally involves specifying the data type and the number of elements in the array.

5. Arrays can be initialized with values at the time of declaration or can be populated with values later in the program.

6. Values in an array can be accessed using their index by using array indexing notation, which typically involves enclosing the index value in square brackets and placing it after the name of the array.

Arrays can be useful for storing and manipulating large sets of related data and are used extensively in programming for tasks such as sorting, searching, and data processing.

Know more about the arrays click here:

https://brainly.com/question/30726504

#SPJ11


Related Questions

What kind of synchronization is this line of code? Why is it
there in the function ADC_In?
while((ADC0_RIS_R&0x08)==0){};
Thanks!

Answers

The line of code `while((ADC0_RIS_R&0x08)==0){};`                                                                                                                                                                               in the function ADC_In is an example of busy-wait synchronization.

Busy-wait synchronization is a method that involves repeatedly checking a shared variable until it meets a particular condition. It is utilized in ADC_In to wait for an analog-to-digital conversion to be completed before proceeding with the execution of the next instruction.
When the ADC0_RIS_R bit is 0, the condition in the while loop is met, and the program advances to the next instruction. If the bit is not 0, the while loop is repeated until it is.
The busy-wait synchronization method may be useful in some situations where the wait time is anticipated to be very brief. It may be inefficient and resource-intensive to use this synchronization method for extended periods. This is because the CPU spends a significant amount of time monitoring the shared variable, limiting its use for processes with brief periods of waiting. Furthermore, busy-wait synchronization may lead to issues such as priority inversion and starvation, which occur when a high-priority task is forced to wait for a low-priority task to finish its busy-wait cycle.
Busy-wait synchronization is a synchronization method that checks a shared variable repeatedly until a specific condition is met. In the function, ADC_In is used to wait for an analog-to-digital conversion to be completed before proceeding with the execution of the next instruction.

Busy-wait synchronization is useful in some scenarios where the wait time is anticipated to be brief. However, it is not suitable for extended periods, and it can cause problems like priority inversion and starvation.

To know more about while loop visit:

brainly.com/question/30761547

#SPJ11

which of the following would not be a moment of truth? group of answer choices guest calling for directions while trying to find the restaurant calling a restaurant for a reservation your car not starting when it is time to leave for your reservation server taking your order

Answers

"Car not starting" not a moment of truth, as it's personal inconvenience, not direct interaction with brand, unlike "calling for directions," "reservation call," and "server taking order."

The moment of truth is defined as a customer's interaction with a company or brand that influences their perception of that company or brand. Of the options provided, "your car not starting when it is time to leave for your reservation" would not be considered a moment of truth. This is because it is not an interaction with the company or brand, but rather a personal inconvenience that may impact the customer's experience but does not directly involve the company or brand. The other options, such as guest calling for directions while trying to find the restaurant, calling a restaurant for a reservation, and server taking your order, are all examples of moments of truth as they are interactions with the company or brand that can shape the customer's perception of the company or brand.

Learn more about server here:

https://brainly.com/question/28384472

#SPJ4

prepare a webpage to describe the input devices of computer

Answers

çbñhd4àß xx 21h on úò6ū8

Which software is microsoft’s anti-malware product that is preinstalled on most new computers?.

Answers

Microsoft Defender Antivirus is free and is included in Windows, always on and always working to protect your PC against malware.

More About Microsoft Defender :

                Microsoft Defender is a Microsoft Windows anti-malware component. It was initially released as a free anti-spyware programme for Windows XP and was included with Windows Vista and Windows 7. It has evolved into a full-fledged antivirus programme, taking the place of Microsoft Security Essentials in Windows 8 and later versions.

          Windows Defender only protected users against spyware prior to Windows 8. It contains a number of real-time security agents that monitor several common areas of Windows for changes that could be caused by spyware. It can also uninstall installed ActiveX software.

      Windows Defender included built-in support for Microsoft SpyNet, which allows users to report spyware to Microsoft as well as what applications and device drivers they allow to be installed on their systems. Virus protection was later added to Windows 8, which is similar to Microsoft Security Essentials (MSE). It also employs MSE's anti-malware engine and virus definitions.

           Windows Defender settings in Windows 10 are managed through the Windows Defender Security Center. The Windows 10 Anniversary Update includes a new logo and a pop-up notification that announces the results of a scan, even if no viruses are found.

To learn more about Microsoft Defender refer :

https://brainly.com/question/17209742

#SPJ4


A wide-angle lens corrected for barrel distortion is called a(n)
lens.

Answers

Answer:

Rectilinear lens

Explanation:

In photography, the distortions are caused in the formation of the image due to either the position of the camera or the optical design of the lenses i.e perspective and optical distortion.

The barrel distortion is a type of optical distortion caused due to the optical design of the lens. In barrel distortion, the straight lines of the light bend as a result of which the lines appear curved inwards in images.  

The field of view of wider than the image sensor in barrel distortions which can be corrected by the use of rectilinear lens which provides straight lines without bending them. This lens stretches the image towards the edge and removes distortion.

Thus, Rectilinear lens is the correct answer.

explain the following types of storages


flash disk ​

Answers

Explanation:

a data storage device that uses flash memory specifically : a small rectangular device that is designed to be plugged directly into a USB port on a computer and is often used for transferring files from one computer to another. — called also thumb drive.

Answer:

storage module made of flash memory chips. Flash disks have no mechanical platters or access arms, but the term "disk" is used because the data are accessed as if they were on a hard drive. The disk storage structure is emulated.

The first flash disks were housed in Type II PC Cards for expanding laptop storage. Subsequently, flash memory disks have arrived in a variety of formats, including entire hard drive replacements (see SSD), memory cards for digital cameras (see flash memory) and modules that fit on a keychain (see USB drive

write a function cascade that takes a positive integer and prints a cascade of this integer. hint - this very challenging problem can be solved with and without string manipulation!

Answers

Using the knowledge in computational language in python it is possible to write a code that write a function cascade that takes a positive integer and prints a cascade of this integer

Writting the code:

function cascade(s)

   for i=1:length(s)

       for j=1:i

           fprintf("%s", s(j))

       end

       fprintf("\n")

   end

end

% Testing above function here..

cascade('ylem')

cascade('absquatulate')

See more about python at brainly.com/question/18502436

#SPJ1

write a function cascade that takes a positive integer and prints a cascade of this integer. hint - this

Which symbol should you use for entering a formula in a cell?

Answers

The symbol should you use for entering a formula in a cell is the equal sign.

What is a formula in excel?

A formula in Excel is an expression that works on values in a range of cells or a single cell. For example, =A1+A2+A3 returns the sum of the values from cell A1 to cell A3.

You can use Excel formulae to accomplish computations like addition, subtraction, multiplication, and division. In addition to this, you can use Excel to calculate averages and percentages for a range of cells, modify date and time variables, and much more.

Learn more about Excel formulas:
https://brainly.com/question/30324226

#SPJ4

Write an LMC program as follows instructions:
A) User to input a number (n)
B) Already store a number 113
C) Output number 113 in n times such as n=2, show 113
113.
D) add a comment with a details exp

Answers

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

The LMC program can be written as follows:

sql

Copy code

INP

STA 113

INP

LDA 113

OUT

SUB ONE

BRP LOOP

HLT

ONE DAT 1

Explanation:

A) The "INP" instruction is used to take input from the user and store it in the accumulator.

B) The "STA" instruction is used to store the number 113 in memory location 113.

C) The "INP" instruction is used to take input from the user again.

D) The "LDA" instruction loads the value from memory location 113 into the accumulator.

E) The "OUT" instruction outputs the value in the accumulator.

F) The "SUB" instruction subtracts 1 from the value in the accumulator.

G) The "BRP" instruction branches back to the "LOOP" label if the result of the subtraction is positive or zero.

H) The "HLT" instruction halts the program.

I) The "ONE" instruction defines a data value of 1.

The LMC program takes an input number (n) from the user, stores the number 113 in memory, and then outputs the number 113 n times.

To know more about LMC program visit :

https://brainly.com/question/14532071

#SPJ11

what did Ada lovelace do

Answers

Answer: Ada Lovelace is often considered to be the first computer programmer!

Explanation: Most wealthy women of the 1800s did not study math and science. Ada Lovelace excelled at them—and became what some say is the world's first computer programmer. Born in England on December 10, 1815, Ada was the daughter of the famous poet Lord George Byron and his wife, Lady Anne Byron.

Ben wants to implement a Redundant Array of Independent (RAID) array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What RAID type should he use

Answers

Ben wants to implement a Redundant Array of Independent (RAID) array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. the Raid type is RAID 10. Option D.

This is further explained below.

What is a Redundant Array of Independent?

Generally, RAID, which stands for "redundant arrays of independent disks," is a method of information storing that makes use of numerous hard disk drives in order to save data.

In conclusion, Combining the advantages and drawbacks of RAID 0 striping with those of RAID 1 mirroring, RAID 10 (1+0) is a hybrid solution. Striped disks with complete copies preserved through the mirror are the best solution for Ben's use case, where speed and robustness are critical and the cost is not. Even if their performance is lessening, RAID 5 and RAID 6 are more resilient in the event of a disk failure. Redundancy and read speeds are provided by RAID 1 but write speeds remain unchanged.

Read more about Redundant Array of Independent

https://brainly.com/question/14599303

#SPJ1

CQ

Ben wants to implement a RAID array that combines both read and write performance while retaining data integrity if a drive fails. Cost is not a concern compared to speed and resilience. What RAID type should he use?

A. RAID 1

B. RAID 5

C. RAID 6

D. RAID 10

Need help ASAP

Select the correct answer.
Which testing is an example of non-functional testing?

A.testing a module

B.testing integration of three modules

C.testing a website interface

D. testing the response time of a large file upload

Answers

Answer:

Option D, testing the response time of a large file upload

Explanation:

Non functional testing is basically the testing of non performance related attributes. Time taken in uploading a file is of a non performance attribute and hence, testing this attribute is termed as non functional testing. Remaining options are essential performance attributes which needs to be tested regularly.

Hence, option D is correct

Question 6 (2 points)
Which of the following is an example of technology?
O A DVD player
O A new medical treatment.
O The skills needed to purify water.
O All of the above.

Answers

Answer:

It is all of the above

Explanation:

Technology is seen everywhere like in DVD player , a new medical treatment and skills needed to purify water

any part of a computer which you are able to touch is called​

Answers

You can touch the key board and screen at any time
The Physical Part of the Computer That You Can See and Touch Are Called Hardware

what is a security strategy that administers and enforces corporate epolicies for applications on mobile devices?

Answers

The security strategy that administers and enforces corporate e-policies for applications on mobile devices is known as mobile application management (MAM).

Mobile application management (MAM) is a security strategy that administers and enforces corporate e-policies for applications on mobile devices. MAM strategies secure, manage, and monitor both work and personal apps on an employee’s device. Mobile application management ensures corporate data security by enforcing data encryption, access restrictions, and remote wiping features on managed devices.

The MAM security strategy has a few key characteristics, including:Monitoring and tracking employee devices as they access company apps from personal devices, Integrating with existing enterprise mobility management (EMM) solutions to streamline mobile device management, and providing granular controls over app access, which allows IT managers to decide which apps can access corporate data.

More on mobile application management (MAM): https://brainly.com/question/29459063

#SPJ11

Full form of NCP?............

Answers

Answer:

Nondeterministic polynomial- time complete

Explanation:

hope it helps plz mark me as a brainliest

Will give brainliest if answered right

Will give brainliest if answered right

Answers

Answer:

control shift u

Explanation:

Answer:

I believe U is the answer.

The half-life of a decaying radioactive isotope is the time it takes for half of the original mass of the isotope to decay. If the mass (in grams) of a particular radioactive sample is given by M(t)=30e^(-0. 05t) where t is in years, what is the half-life of that isotope?
Round your answer to 2 decimal places. Do not include units

Answers

Answer:

Explanation:

The half-life of 20F is 11.0 s. If a sample initially contains 5.00 g of 20F, how much 20F remains after 44.0 s?

Solution

If we compare the time that has passed to the isotope’s half-life, we note that 44.0 s is exactly 4 half-lives, so we can use Equation  ???

 with  n=4

. Substituting and solving results in the following:

amountremaining=5.00g×(12)4=5.00g×116=0.313g

Less than one-third of a gram of 20F remains.

ways to be your best digital self?

Answers

To be your best digital self just remember that everything you do on the internet STAYS on the internet. There’s no way around it. Be mindful of what you post, say, and do online. Don’t let that, however, stop you from showing something you love to do or talking about something you’re interested in. Being your best digital self requires restraint and knowledge. Think to yourself, do I really want to send this message? this picture? this threatening message? Be safe rather than sorry. Don’t let that stop you from being you. Have fun :) !

When posting electronic resumes how is open block form different from a fill in blank form

Answers

When posting an electronic résumé, how is a Open Block form different from a Fill-in-the-blank form? An Open Block form allows you to copy and paste an entire electronic résumé in a space to submit. A Fill-in-the-blank form requires to copy and paste individual sections of a résumé into a space.

IBM's indexed sequential access method (ISAM) 1. uses an index file for sequential access 2. uses a small master index (kept in memory) that points to disk blocks of a secondary index, while the secondary index blocks point to the actual file blocks 3. use the pointers (kept in memory) of the actual file blocks 4. uses the pointers (kept in memory) that points to disk blocks of a master index which points to disk blocks of a secondary index, while the secondary index blocks point to the actual file blocks O 1 02 04 Question 5 1 pts When the shared lock is applied to a file then :_________

1. several processes can acquire the lock concurrently 2. only one process can use this file 3. many processes can read and write to this file concurrently 4. many processes can write to this file concurrently

Answers

When the shared lock is applied to a file, many processes can read and write to this file concurrently.

A shared lock, also known as a read lock, is a locking mechanism used to control access to a file or resource in a concurrent computing environment. When a shared lock is applied to a file, it allows multiple processes to read from and write to the file simultaneously.

The purpose of a shared lock is to enable concurrent access to a file while ensuring data integrity and consistency. Multiple processes can acquire the shared lock at the same time, indicating their intent to read or write to the file. This allows for efficient parallel processing and improved system performance, especially in scenarios where multiple processes need to access the same file simultaneously.

By allowing concurrent read and write access, the shared lock facilitates collaborative work and data sharing among different processes or applications. It enables processes to access and modify the file's contents without exclusive ownership, promoting efficient data sharing and resource utilization.

Learn more about shared lock

brainly.com/question/29804873

#SPJ11

Web services allow different applications to talk to each other and share data and services among themselves. Question 4 options: True False

Answers

True. Web services are a technology that allows different applications to communicate and exchange data over the internet. They enable applications to interact with each other, even if they are written in different programming languages or run on different platforms.



Web services use a set of standards and protocols, such as XML (eXtensible Markup Language) and SOAP (Simple Object Access Protocol), to ensure interoperability and enable communication between applications. They provide a standardized way for applications to request and exchange data, perform operations, and access services.

For example, a web service can be used to retrieve weather information from a weather data provider and display it on a website. The website can send a request to the web service, which then retrieves the weather data and sends it back to the website in a format that can be easily processed and displayed.

Overall, web services facilitate the integration and sharing of data and services between applications, making it easier to develop complex systems that leverage the functionality and capabilities of multiple applications.

To know more about protocols, visit:

https://brainly.com/question/28782148

#SPJ11

Select the correct answer.
What internet access technology currently uses a technology called 4G?
ОА.
mobile Internet access
OB.
satellite Internet access
O C. DSL
OD.
ISDN
OE. wireless Internet access

Answers

Answer:

Wireless Internet Access

Answer:

A. Mobile Internet Access

Explanation:

what is the overall lenght limitation of a utp cable run from the telecoomucantins coloset to a networking device in the work area?

Answers

The overall length limitation of a UTP cable run from the telecommunication closet to a networking device in the work area is 100 meters or 328 feet.

This is because beyond this length, the signal strength of the data transmitted over the cable may degrade, resulting in errors or data loss. It is important to adhere to this length limitation to ensure the reliability and performance of the network.

UTP cables are employed as telephone and ethernet cables for short- to medium-distance data and audio signal transmission. Data transport at low rates is also very well using unshielded twisted pair cable, which doesn't need to be grounded. They are utilized in automation and control systems for the transfer of signals.

Unshielded Twisted Pair, or UTP, cables are frequently marketed by manufacturers as Ethernet cables. The most popular type of network cable is UTP, which has been closely associated with Ethernet cables.

To know more about UTP cable, click here:

https://brainly.com/question/13362491

#SPJ11

If you have a computer with three hard disks, what type of raid fault-tolerant configuration will make best use of them?

Answers

Answer:

RAID 1 or RAID 5

Explanation:

RAID 1 mirrors data across all disks, if you lose 1 disk, you still have 2 copies of that disk.

RAID 5 spreads data evenly across all disks with parity, if you lose 1 disk then lost data can be reconstructed. If you lose 2 disks then all data is most likely lost.

RAID 1 is ideal for important information. RAID 5 is ideal for storage efficiency and security.

Determining which computer platform (operating system) would be best for a particular student often depends on what the student wants to study and in which industry she or he wants to enter after graduation. Students who plan to study graphic design or want to focus on photo production or publishing should strongly consider the __ platform since it is generally considered the industry standard in those fields.

Answers

Answer: Window OS

Explanation:

Based on the information given, it should be noted that the students who plan to study graphic design should consider the Window OS platform since it is considered to be the industry standard in those fields.

Microsoft Windows, also refered to as the Windows OS, is a computer operating system that's developed by Microsoft to run personal computers. It has the first graphical user interface and also, the Windows OS dominates the personal computer market.

an_is a sepuence of precise instructions which result in a solution​

Answers

Answer:

algorithm.

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer. The time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

Furthermore, the processing symbols and their functions used in developing an algorithm are oval (start or stop), diamond (decision-making), circle (on-page connector), parallelogram (input and output), rectangle (calculation), arrow (flow or direction) and pentagon (off-page connector).

Some of the characteristics of an algorithm include the following;

I. An algorithm can be written using pseudocode. A pseudocode refers to the description of the steps contained in an algorithm using a plain or natural language.

II. An algorithm can be visualized using flowcharts. A flowchart can be defined as a graphical representation of an algorithm for a process or workflow.

In conclusion, an algorithm is a sequence of precise instructions which result in a solution​ for solving problems using a computer system.

Problem 1: tokenizeTurtleScript (program) Write a function called tokenizeTurtleScript(program) which, given a Turtle Script program, return a list of commands in that program. The function should break up the input string into individual commands and return a list containing commands as strings. The most common kind of token in a turtle program is a command character (typically a letter, although any non-whitespace character is legal), which is typically followed by a sequence of decimal digits. For example, the command F120, which moves the turtle forward 120 pixels, is a single token in a turtle program. All command listed in the table above are individual tokens, including repetition and function definitions. In addition, spaces are not required between tokens but are permitted for readability. These rules mean, for example, that you could rewrite the program that draws a square as: F120L90F120L90F120L90F120 even though doing so makes the program much more difficult for people to read. Consider the following examples: tokenizeTurtleScript("F120L90F120L90F120L90F120") returns ['F120', 'L90', 'F120', 'L90', 'F120', 'L90', 'F120'] tokenizeTurtleScript("X4 \{F120 L90\} U F200 X4 \{F120 L90\}") returns ['X4\{F120L90\}', 'U', 'F200', 'X4\{F120L90\}'] tokenizeTurtleScript("MS {X4{ L90 F50\}\} S U F100 D S") returns ['MS\{X4\{L90F50\}\}', 'S', 'U', 'F100', 'D', 'S'] Note: This problem is made much easier if you plan ahead by choosing good helper functions. (b) Problem 2: convertTurtleScript (program, funcs) Write a function convertTurtleScript (program , funcs) that will convert a Turtle Script program to a Python program. It should take as arguments a Turtle Script program and a dictionary consisting of all the functions defined so far in the program. The dictionary will contain function names as keys and function code as values. The convert TurtleScript function has the responsibility of taking the program and translating each token to the appropriate command for turtle in Python. For example, given the program tokens: ['F120', 'L90', 'F120', 'L90', 'F120', 'L90', 'F120'] The convert TurtleScript function will have to translate each token into the appropriate function call in Python. Thus, executing the F120 token needs to invoke the function call turtle.forward (120). Similarly, executing the L90 token needs to invoke a call to turtle.left (90) Notes:

Answers

The given problem can be solved by creating a function tokenizeTurtleScript(program) that accepts a program as an input string and tokenizes the program into individual commands.

To create the function, the program should be split into tokens using a regex that searches for any non-whitespace character followed by any number of digits. The resulting tokens should then be appended to a list and returned as the output of the function. The function is implemented as shown below: def tokenizeTurtleScript(program): import re tokens = re.findall('\S+\d*', program) return tokens

Problem 2: convertTurtleScript (program, funcs)The given problem can be solved by creating a function called convertTurtleScript(program, funcs) that accepts a program as an input string and a dictionary of functions as arguments.

The function should convert the program to a Python program by parsing the program string into individual tokens and translating each token into a corresponding Python command. To achieve this, the function should split the program string into tokens using a regex that searches for any non-whitespace character followed by any number of digits. Once the program string is tokenized, the function should loop through each token and use a switch statement to map each token to its corresponding Python command. The resulting Python commands should then be concatenated into a single string and returned as the output of the function.

Learn more about program :

https://brainly.com/question/14368396

#SPJ11

4. Roland was able to connect to servers on the LAN, but discovered that an incorrect ________________address was preventing him from communicating beyond his local

Answers

The default gateway is simply  know as a device, such as a DSL router that connects the local network to the Internet. Roland discovered that an incorrect default gateway address was preventing him from communicating beyond his local network.

A LAN server is also called a file server. It is a high-speed computer network that comprises of application programs and files for computers on a network.

A network administrator often grants user access to applications and files on a LAN server.

For a server to function a LAN, an individual must plug the server directly into the same network as all of the client computers that use the LAN.

Learn more from

https://brainly.com/question/16565071

__________ is designed to render a target unreachable by legitimate users, not to provide the attacker access to the site.

Answers

Answer: Denial of Service or DDoS

Explanation: Denial of Service or DDoS attack is designed to render a target unreachable by legitimate users, not to provide the attacker access to the site.

Other Questions
3(8+2) use distributive property.please answer as soon as possible , thank you :) Which ideas are part of the Declaration of Independence?Select all that apply.consent of the governedall men are created equalseparation of church and statethat which governs best, governs leastgovernment is needed to protect citizens' rights A student is holding a 1 kg bag. What is the normal force on the bag from the ground? An equation of the cona-3x+3y in spherical coordinates None of these O This option This option This option This option P=3 This photo depicts modern-day Cuba. Modern-day Cuba. A 1950's car sits parked along a street. How does this picture illustrate an effect of national security policies against Cuba? It shows that Cubans cannot afford new and modern items. Only necessities such as transportation are available to people. Modern American cars are not available due to trade restrictions. The empty street shows a lack of tourism and travel. statistical methods of forecasting are not good at considering special events in the data. true false Who is Ariel Sharon? Please help!!!!!!!!!! In Strophe 1, what helps the reader understands the chorus position on the battle Help me please it due tomorrow!!!!Please and Thank you!!!Thank you PLEASE HELP ASAP!!! :)) ITS EASY Ellen has maxed out her credit card at $18,500 and vows not to make any other credit card purchases. Her credit card company charges 19% interest permonth, and the minimum monthly payment is all interest due plus 2% of the principal balance. How much of the balance can Elen pay down If she pays theminimum payment only for 4 months? Round the answer to the nearest cent.After 4 months, Ellen would have paid off $ 3. Heather and Todd each earn $12.00 per hour. Heather receives a raise of $0.50 per hour, followed by a 10% raise.Todd receives a 10% raise, followed by a raise of $0.50 per hour.How much more does Heather earn per hour now than Todd does now? true or false: accounting profit is usually smaller than economic profit because economic profit does not include sunk costs. If an unresponsive infant is not breathing and has a heart rate of 53 beats per minute and signs of poor perfusion despite oxygenation and ventilation with a bag and mask, which of the following should you perform?A. One rescue breath every 10 secondsB. Cycles of back blows and chest thrustsC. Chest compressions without breathsD. Both chest compressions and breaths 1. Clara Contest(contestar) el telfono.2. Yo Salud(saludar) a Clara.3. Nosotros(hablar) de la fiesta del sbado pasado.4. Enrique y Calos(invitar) a muchas personas.5. Sus padres(preparar) muchas cosas para comer.6. Todos los invitados(pasar) un buen rato en la fiesta.7. T(cantar y bailar) mucho en la fiesta.8. Yo(regresar) a casa muy tarde.Writing with the Preterit if a country has a positive net capital outflow, then a. on net other countries are purchasing assets from it. this adds to its demand for domestically generated loanable funds. b. on net it is purchasing assets from abroad. this adds to its demand for domestically generated loanable funds. c. on net it is purchasing assets from abroad. this subtracts from its demand for domestically generated loanable funds. d. on net other countries are purchasing assets from it. this subtracts from its demand for domestically generated loanable funds. please dont copy and paste i need answers in your ownwords4. explain the four basic requirements needed to create a contract.10. explain the difference between express and implied termsin a contra A sequence of translations maps triangle ABC to triangle A'B'C'.Triangle ABC has vertices at G(-8,2), H(13.2), I(-2.10)The coordinates of A' are (-1,-3).What are the coordinates for B and Cl?AMM Which of the following best describes the process of gradual democratic decline?A. Accountability and protection of Civil LibertiesB. Polarization, Institutional dysfunction, and assault on the Rule of LawC. Protection of Voting Rights and Electoral freedomsD. Respect for the Rule of Law and Congressional consensus across the aisle