Which of the following are signatures for constructors in the Rectangle class?

----Choose all options that apply.-----


A. Rectangle(double len1, double len2, double len3, double len4)

B. Rectangle(double len)

C. Rectangle(int len)

D. Rectangle(int len, int wid)

E. Rectangle()

F. Rectangle(double len, double wid)

Answers

Answer 1
Answer to this answer is B because
Answer 2

constructor is a special method that's also called once memory is allocated for a freshly constructed object to initialize it, and further  discussion can be defined as follows:

It has the same identity as the class or struct, so it normally sets up the new object's data members.In the Rectangle class if it calculates the area. so, it takes two parameters that are "length, width", that is equal to "Rectangle(int len, int wid)".

Therefore, the final answer "Option D".

Learn more:

brainly.com/question/14239397


Related Questions

Find the maximum value and minimum value in milestracker. Assign the maximum value to maxmiles, and the minimum value to minmiles.

Answers

Python:

#TODO: Update the milestracker as you wish.

milestracker = [3,4,5,6,7,8,9,10,11]

#Find max and min and then print those values.

maxmiles = max(milestracker)

minmiles = min(milestracker)

print("The maximum:",maxmiles,"\nThe minimum:",minmiles)

C++:

#include <bits/stdc++.h>

int main(int argc, char* argv[]) {

   //TODO: Update the milestracker as you wish.

   std::vector<int> milestracker{2,3,4,5,6,7,8,91,10,11};

   

   //Compare and then print.

   int maxmiles = *std::max_element(milestracker.begin(),milestracker.end());

   int minmiles = *std::min_element(milestracker.begin(),milestracker.end());

   

   std::cout << "The maximum: " << maxmiles << "\nThe minimum: " << minmiles << std::endl;

   return 0;

}

Name two sensors which would be used in a burglar alarm system

Answers

kind of sensors used in a burglar alarm system:-Passive Infrared SensorsTomographic Motion Detector.Microwave Detectors.Ultrasonic Detectors.Photoelectric Beams.Glass Break Detectors.

1. Passive Infrared Sensor

This sensors type is passive in a way that it doesn't radiate its own energy. Instead, it detects the infrared light radiating from objects. This way, it can detect whenever there's a human or another living being in its field of view.

2. Photoelectric Beams

This is also another type of motion detector, but it doesn't work similarly to the others. For one, it doesn't have a coverage area. It only forms a fence, which triggers the alarm if broken.

It consists of two separate parts that form a sort of a fence made of IR beams. When someone steps into the beams, between the two parts, they trigger the alarm.

If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature

Answers

The key would he use to create the digital signature is Mike public key.

Which key is used to sign messages?

Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that  uses a private key to encrypt signature-linked data.

The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.

Learn more about  public key from

https://brainly.com/question/17486027

how to sum all the odd or even numbers in an arraylist in java?

like the program asks for user input and adds the input to an arraylist and then the user can click a button (sum odd or sum even) and then the value of all odd or even numbers should be returned based on what button the user clicks, so how do i do that ?

Answers

A program exists as a detailed set of ordered operations for a computer to execute. Generally, the program exists placed into a storage area available to the computer.

What is java?

Java exists as a class-based, object-oriented programming language that exists designed to contain as rare implementation dependencies as possible.

For even sum:

BtnSumE.addActionListener(new ActionListener()

{

public void actionPerformed(ActionEvent e)

{

int sumE = 0;

for (int counter = 0; counter < aryNums.size(); counter++)

{

if (aryNums.get(counter) % 2 == 0)

{

sumE += aryNums.get(counter);

TxtArea.setText(String.valueOf(aryNums.get(counter)));

TxtArea2.setText("The sum of the even integers is " + valueOf(sumE));

}

For odd sum:

BtnSumO.addActionListener(new ActionListener()

{

public void actionPerformed(ActionEvent e)

{

int sumO = 0;

for (int counter = 0; counter < aryNums.size(); counter++)

{

if (aryNums.get(counter) % 2!= 0)

{

sumO += aryNums.get(counter);

TxtArea.setText(String.valueOf(aryNums.get(counter)));

TxtArea2.setText("The sum of the odd integers is " + valueOf(sumO));

}

When running the program for an even sum we get "74" and for the odd sum, we get "263".

Array list (aryNums) contain these numbers [0, 2, 23, 74, 263].

To learn more about computer programs refer to:

https://brainly.com/question/23275071

#SPJ9

A vertical series of cells in a spreadsheet that can be formatted and used to make calculation is a _______________.
Question 1 options:

cell

column

row

column header

Answers

Answer:

Column

Explanation:

I found the word list that has all the jive words

A vertical series of cells in a spreadsheet that can be formatted and used to make calculation is a column. The correct option is B.

What is spreadsheet?

A spreadsheet is a computer program for organizing, calculating, and storing data in tabular form.

Spreadsheets were created as digital counterparts to traditional paper accounting spreadsheets. The data entered into a table's cells is what the programme uses to run.

A spreadsheet is a piece of software that can store, display, and edit data that has been organized into rows and columns.

One of the most used tools for personal computers is the spreadsheet. In general, a spreadsheet is made to store numerical data and short text strings.

A column in a spreadsheet is a row of cells that can be styled and used for calculations.

Thus, the correct option is B.

For more details regarding spreadsheet, visit:

https://brainly.com/question/8284022

#SPJ2

When you are on a friendly basis with your colleagues, employer, or customers, you should communicate ____

Answers

When you are on a friendly basis with your colleagues, employer, or clients, you have to communicate in a friendly and respectful manner. Building and retaining nice relationships inside the workplace or commercial enterprise surroundings is vital for effective verbal exchange.

When speaking on a pleasant foundation, it is essential to use a warm and alluring tone, be attentive and considerate, and show true hobby in the different person's thoughts and evaluations. Clear and open communication, along side energetic listening, can help foster a friendly and collaborative ecosystem.

Additionally, being respectful and aware of cultural variations, personal obstacles, and expert etiquette is essential. Avoiding confrontational or offensive language and preserving a effective and supportive mindset contributes to maintaining right relationships with colleagues, employers, or clients on a friendly foundation.

Read more about friendly communication at :

https://brainly.com/question/3853228

True or
false?
1) The CRT is the most common display screen. True or false

Answers

Answer:

True

Explanation:

we use it often like on electronics

Answer:

False

Explanation:

CRT is now old technology my friend

one of the key skills of a good data scientist is the ability to construct and implement a good data structure that allows for manipulation of the data. true or false

Answers

The given statement ''one of the key skills of a good data scientist is the ability to construct and implement a good data structure that allows for manipulation of the data'' is true.

We have to give that,

Statement is,

One of the key skills of a good data scientist is the ability to construct and implement a good data structure that allows for the manipulation of the data.

Now, Constructing and implementing a good data structure is a crucial skill for data scientists as it allows them to effectively organize and manipulate large amounts of data.

By creating a well-designed data structure, data scientists can quickly and efficiently extract insights from the data and make informed decisions based on their analysis.

Hence, the statement is true.

To learn more about data visit:

brainly.com/question/30308987

#SPJ4

1Jeremiah searches his computer for movie files that he recently shot duringhis vacation in Belize.Select the set of file types that Jeremiah should look for..avi and .wmv.mov and .ods.wma and .mpg.mpg and .key

Answers

Jeremiah should be looking for .avi, .wmv, .mov, and .ods file types when searching for his movie files on his computer. Other file types such as .wma and .mpg, as well as .key, are not relevant to this search.

In order to assist Jeremiah in finding his vacation movie files, we will identify the appropriate file types that are commonly associated with video recordings. Among the given sets of file types, we can determine which ones are specifically related to movie files:
- .avi and .wmv: Both of these are video file formats, with .avi being a common format for Windows-based systems and .wmv being a Windows Media Video format.
- .mov and .ods: While .mov is a video file format commonly used by Apple's QuickTime, .ods is an OpenDocument Spreadsheet format, unrelated to video files.
- .wma and .mpg: .wma is a Windows Media Audio format, which is an audio file type, while .mpg is a video file format.
- .mpg and .key: As previously mentioned, .mpg is a video file format, but .key is a Keynote presentation file format, not a video file.

Based on the information provided, Jeremiah should look for the set of file types ".avi and .wmv" as well as ".mpg," since these formats are commonly associated with video recordings.

To learn more about file types, visit:

https://brainly.com/question/18241798

#SPJ11

What are the missing parts to produce the following output?

What are the missing parts to produce the following output?

Answers

Answer:

1.for

2.2

Explanation:

the entry to record an issuance of an installment notes payable would include a

Answers

The entry to record an issuance of an installment notes payable would include a credit to notes payable account and a debit to cash account.

Installment notes payable is a type of loan or debt that a company has to pay back in multiple installments over time.

Installment notes payable are different from term notes payable, which are usually due in one lump sum at the end of a certain time frame.

A company may issue installment notes payable to finance the purchase of an asset or to pay for other business expenses.

The entry to record the issuance of installment notes payable involves a debit to cash or bank account and a credit to notes payable account.

The cash received from the installment notes payable is recorded as a debit to the cash or bank account, while the notes payable account is credited for the face value of the loan.

A note payable is a type of financial instrument that is issued by a borrower to a lender. It is a written promise to repay a specified amount of money, typically with interest, at a future date or on demand.

A note payable is a liability for the borrower and an asset for the lender, and it is used by businesses to borrow money to finance their operations.

Know more about installment notes payable  here:

https://brainly.com/question/31951150

#SPJ11

Which of the following is normally included in the criteria of a design?

Answers

The one that is normally included in the criteria of a design is budget. The correct option is 3.

What is budget?

A budget is an estimate of revenue and expenses for a given period of time that is usually compiled and re-evaluated on a regular basis.

Budgets can be created for an individual, a group of people, a company, a government, or almost anything else that makes and spends money.

Criteria are requirements that the design must meet in order to be successful. Constraints are design limitations.

These may include the materials available, the cost of the materials, the amount of time available to develop the solution, and so on.

Thus, the correct option is 3.

For more details regarding budget, visit:

https://brainly.com/question/15683430

#SPJ1

1. Materials

2. Time

3. Budget

4. Efficiency

Write a function that returns the average `petalLength` for each of the flower species. The returned type should be a dictionary.

Answers

The function given below takes a list of dictionaries `flowers` as its argument. Each dictionary in the list contains the attributes `species` and `petalLength`.

The function returns the average `petalLength` for each species in the form of a dictionary with the species as the key and the average petal length as the value.```def average_petal_length(flowers):    # Create an empty dictionary to store average petal length for each species    avg_petal_length_dict = {}    # Create an empty dictionary to store the total petal length and count of each species    petal_length_count_dict = {}    for flower in flowers:        # Check if species already exists in the petal_length_count_dict        if flower['species'] in petal_length_count_dict:            # Add the petal length to the total petal length for the species            petal_length_count_dict[flower['species']]['total_petal_length'] += flower['petalLength'] .

# Increment the count of the species by 1 petal_length_count_dict[flower['species']]['count'] += 1     The function first creates an empty dictionary to store the average petal length for each species. It then creates another empty dictionary to store the total petal length and count of each species.

To know more about attributes visit:

brainly.com/question/32473118

#SPJ11

Do any of you guys know what the main problem in E.T is?

Answers

Answer:

At its glowing red heart, E.T. is a film about friendship. Elliott and E.T. are a tightknit pair from wildly different backgrounds, and their bond is grounded in love, loyalty, compassion, teamwork, and even a mysterious cosmic connection.

ok so I have two accounts and like, the other account has -20 points??? what happened​

Answers

You need to do the questions to get more points

Help Please!!! Will give brainliest!!!!!

Help Please!!! Will give brainliest!!!!!

Answers

The code for the class named Retail Item that holds data about an item in a retail store is given below.

What is the class  about?

In the attached code, we have characterized a course called RetailItem. This code has three qualities such as depiction, units, and cost, which speak to the item's portrayal, the number of units of the thing in stock, etc.

Hence, the program makes three RetailItem objects, utilizing the RetailItem course constructor, and allots them to factors item1, item2, and item3. These objects speak to a coat, architect pants, and a shirt individually.

Lastly, the program prints out the string representation of each RetailItem protest utilizing the print() work.

Learn more about class from

https://brainly.com/question/29330362

#SPJ1

See text below



Item Class

Write a class named Retail Item that holds data about an item in a retail store. The class should store the following data in attributes: item description, units in inventory, and price. Once you have written the class, write a program that creates three Retail Item objects and stores the following data in them:

Description

Units in Inventory

Price

Item #1   Jacket                           12               59.95

Item #2    Designer Jeans          40              34.95

Item #3    Shirt                            20               24.95

Help Please!!! Will give brainliest!!!!!

a vulnerability is a weakness or flaw that allows a threat to bypass security. (ch-1) question 3 options: true false

Answers

Answer:

TRUE

Explanation:

True. A vulnerability is a weakness or flaw in a system, process, or organization that can be exploited by a threat to gain unauthorized access, disrupt operations, steal information, or cause damage. Identifying and addressing vulnerabilities is an important part of maintaining security.

What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B. Interactivity C. Management plan D. Business analysis​

Answers

Answer:

Management plan

Explanation:

PLEASEEEE HELPPPP
Which key navigates a user out of Read View to the previous view?​

Answers

Answer:
Esc/Escape
explanation:

Which can be used to view a web page?
File viewer
Text editor
Web browser
WYSIWYG

Answers

The answer is C: web browser

so we use web browsers to look at web pages

hope this helped

-scav

write a program with a car's gas mileage (miles/gallon) and the cost of gas (dollars/gallon) as floating-point input, and output the gas cost for 20 miles, 75 miles, and 500 miles.

Answers

A program with a car's gas mileage (miles/gallon) and the cost of gas (dollars/gallon) as floating-point input, and output the gas cost for 20 miles, 75 miles, and 500 miles is given below:

#include <stdio.h>

int main(void) {

  double milesperGallon;

  double costperGallon;

  double totalCost;

  double totalCost2;

  double totalCost3;

 

  scanf("%lf", &milesperGallon);

  scanf("%lf", &costperGallon);

 

  totalCost = (20 / milesperGallon) * costperGallon;

  totalCost2 = (75 / milesperGallon) * costperGallon;

  totalCost3 = (500 / milesperGallon) * costperGallon;

 

  printf("%0.2lf", totalCost);

  printf(" %0.2lf", totalCost2);

  printf(" %0.2lf\n", totalCost3);/* Type your code here. */

  return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

define the term cyber space​

Answers

Answer: Cyberspace, is an amorphous, supposedly virtual world created by links between computers, Internet-enabled devices, servers, routers, and other components of the Internet’s infrastructure

Wired Equivalent Privacy (WEP) is An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure.
True or False

Answers

The given statement, "Wired Equivalent Privacy (WEP) is An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure" is true because wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol that was initially designed to provide security for wireless networks by encrypting data transmitted between devices.

However, over time, significant vulnerabilities were discovered in WEP, making it easily exploitable by attackers. These vulnerabilities allowed unauthorized parties to decrypt the encrypted data and gain access to the wireless network.

Due to its weaknesses and vulnerabilities, WEP is no longer considered a secure wireless security protocol. It has been widely replaced by more robust and secure protocols, such as Wi-Fi Protected Access (WPA) and WPA2, which provide stronger encryption algorithms and enhanced security features to protect wireless communications.

It is recommended to use WPA2 or the latest security standards available for securing wireless networks to ensure the confidentiality and integrity of transmitted data.

Learn more about Security protocol: https://brainly.com/question/30086911

#SPJ11

Type the correct answer in the box. Spell the word correctly.
Which programming language completes the sentence?
Translators convert code written in a high-level language to the ___
that the computer processor can execute.

Answers

Translators convert code written in a high-level language to the machine language.

Answer:

compiler

Explanation:

algorithm and flowchart and c program to display sum of 5 different number​

Answers

The algorithm and flow chart and c program to sum of 5 different number is given below.

Describe C programming?

C is a compiled language, which means that programs written in C must be compiled before they can be run. This compilation process produces machine code, which is the code that can be executed by a computer. Because of this, C programs can be very fast and efficient.

One of the strengths of C is its ability to work with memory directly through pointers. Pointers are variables that store memory addresses, allowing the programmer to manipulate the data at that address. This can be useful in low-level programming tasks, such as working with hardware or writing device drivers.

Here's the algorithm to display the sum of 5 different numbers:

Declare a variable sum and initialize it to zero.Prompt the user to enter the first number and store it in a variable.Add the value of the first number to the sum variable.Repeat steps 2-3 for the second, third, fourth, and fifth numbers.Output the value of the sum variable.

Here's the flowchart for the same:

          Start

             ↓

Initialize sum = 0

             ↓

Prompt user for first number

             ↓

Add first number to sum

             ↓

Prompt user for second number

             ↓

Add second number to sum

             ↓

Prompt user for third number

             ↓

Add third number to sum

             ↓

Prompt user for fourth number

             ↓

Add fourth number to sum

             ↓

Prompt user for fifth number

             ↓

Add fifth number to sum

              ↓

Output sum

               ↓

            End

Here's the C program to display the sum of 5 different numbers:

#include <stdio.h>

int main() {

   int num1, num2, num3, num4, num5, sum;

   printf("Enter the first number: ");

   scanf("%d", &num1);

   printf("Enter the second number: ");

   scanf("%d", &num2);

   printf("Enter the third number: ");

   scanf("%d", &num3);

   printf("Enter the fourth number: ");

   scanf("%d", &num4);

   printf("Enter the fifth number: ");

   scanf("%d", &num5);

   sum = num1 + num2 + num3 + num4 + num5;

   printf("The sum of the numbers is %d\n", sum);

   return 0;

}

This program prompts the user to enter 5 different numbers, stores them in variables, calculates their sum, and outputs the result.

To know more about sum visit:

https://brainly.com/question/13437666

#SPJ9

PLS HELP
1. You can tape a movie off Showtime.
a. if you use it for educational purposes.
b. only if you have written permission from the company.
c. so that it may be archived.
d. to use as an entertainment for your great students.

2. You may photocopy parts of the encyclopedia:
a. if it is for your use only.
b. only if your copy is of the subject you are researching.
c. if you don’t have a copy at home.
d. to pass out to all your students.

3. You may record a local symphony concert to share with your class:
a. as long as you don’t sell tickets to hear it.
b. as long as you use it at a listening center in your room.
c. if you relate it to your lessons.
d. you may not record a public performance of any kind.

4. You may make a copy of a computer program:
a. if you are giving it to a friend.
b. as long as you purchased it and are using it for a back-up copy.
c. as long as you downloaded it from the internet.
d. you may not copy software.

5. You may use any image from the Internet or clip art software:
a. if you know that no one will know.
b. if you save it as an “image” and give it a new name.
c. as long as it is confirmed to be “royalty free”.
d. you cannot copy any photograph, artwork, or image without permission.

Answers

Answer:

1. so that it may be archived

2.to pass out to all your students

3.if you relate it to your lessons

4.as long as you've purchased it and you are using it for back up copy

5.C

Which image file format is an uncompressed raster file which may contain different depths of color depths per pixel, or may be saved in grayscale?.

Answers

Answer:

BMP

Explanation:

The BMP file format, also known as bitmap image file, device independent bitmap (DIB) file format and bitmap, is a raster graphics image file format used to store bitmap digital images, independently of the display device (such as a graphics adapter), especially on Microsoft Windows[2] and OS/2[3] operating system

The _____ is the part of a computer that executes the instructions of a computer program.

Answers

Answer:

Central processing unit (CPU)

Hope you have a great day :)

The following is a table of activities associated with a project at Rafay Ishfaq's software firm in Chicago, their durations, what activities each must precede and the crash cost to reduce duration per week: Suppose that Rafay is only given 6 weeks (instead of 9 ) to complete the project. By how many weeks should each activity be crashed in order to meet the deadline? Assume that you can crash an activity down to 0 weeks duration.

Answers

To determine by how many weeks each activity should be crashed in order to meet the deadline, we need to calculate the total crash time required for each activity. The total crash time is the difference between the normal duration and the desired duration.

Given that the project originally had a duration of 9 weeks and now needs to be completed in 6 weeks, we can calculate the crash time as follows:

Activity A:

Normal duration = 2 weeks

Desired duration = 0 weeks (crash to the minimum)

Crash time = Normal duration - Desired duration = 2 weeks - 0 weeks = 2 weeks

Activity B:

Normal duration = 3 weeks

Desired duration = 2 weeks

Crash time = Normal duration - Desired duration = 3 weeks - 2 weeks = 1 week

Activity C:

Normal duration = 4 weeks

Desired duration = 3 weeks

Crash time = Normal duration - Desired duration = 4 weeks - 3 weeks = 1 week

Activity D:

Normal duration = 3 weeks

Desired duration = 2 weeks

Crash time = Normal duration - Desired duration = 3 weeks - 2 weeks = 1 week

Activity E:

Normal duration = 5 weeks

Desired duration = 4 weeks

Crash time = Normal duration - Desired duration = 5 weeks - 4 weeks = 1 week

Activity F:

Normal duration = 4 weeks

Desired duration = 3 weeks

Crash time = Normal duration - Desired duration = 4 weeks - 3 weeks = 1 week

Activity G:

Normal duration = 2 weeks

Desired duration = 1 week

Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week

Activity H:

Normal duration = 2 weeks

Desired duration = 1 week

Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week

Activity I:

Normal duration = 2 weeks

Desired duration = 1 week

Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week

Therefore, each activity should be crashed by the corresponding number of weeks mentioned above in order to meet the 6-week deadline.

Learn more about  total crash time here:

https://brainly.com/question/30199703

#SPJ11

you are the network administrator for a large organization. you are in charge of developing a plan to install 200 windows 10 computers in your company's data center. you decide to use wds. you are using a windows server 2012 r2 domain and have verified that your network meets the requirements for using wds. what command-line utility should you use to configure the wds server?

Answers

You should use the wdsutil command-line utility to configure the Windows Deployment Services (WDS).

Configuring the WDS server

As the network administrator for a large organization, you are in charge of developing a plan to install 200 Windows 10 computers in your company's data center. You decide to use Windows Deployment Services (WDS) to automate the installation process. You are using a Windows Server 2012 R2 domain and have verified that your network meets the requirements for using WDS.

To configure the WDS server, you will use the wdsutil command-line utility. This utility will allow you to manage the WDS server and images, as well as perform other tasks such as starting and stopping the server.

Learn more about Windows at: https://brainly.com/question/14531631

#SPJ4

Other Questions
Whats the symol and eqations of pi After George asks Hazel what she just saw on TV, Hazel responds:"I forgot," she said, Something real sad on television. " What type of irony is this? ________ split from a common hominoid ancestor.Humans and chimpanzeesHumans and chimpanzeesGreater apes and lesser apesGreater apes and lesser apesPrimates and mammals a range of cells from the fifth row in column A to the twelfth row in column G is written as Math is boring/need help pls T/F "Far better is it to dare mighty things, to win glorious triumphs, even though checkered by failure, than to take rank with those poor spirits who neither enjoy much nor suffer much, because they live in the gray twilight that knows neither victory or defeat" suppose that labor costs $5/unit, and capital costs $10/unit. what levels of capital and labor will whole food choose to produce an output of q and minimize costs (that is, l and k must depend on q)? Selective perception relies mostly on the use of __________ to understand the things we sense in the world. . The financial and political investment made between Thomas Jefferson and Napoleon Bonaparte is known as the..Louisiana PurchaseFrench treatyProclamation f 1804Manifest Destiny What are strategies used by organisms to survive in an ecosystem ? FILL THE BLANK.Adolescent smoking is influenced more by ____. romantic partners than by peers siblings than by peers parents than by siblings peers than by parents For both men and women, marriage is positively related to life satisfaction psychological well-being Ojob satisfaction Ophysical well-being Study the images below of works of art from either the Renaissance or the medieval period.A.A man kneeling in front of another man. Colors are muted and flat.B.A woman sitting with her hands together in prayer. 3 children of various ages are on her left. Colors are bright, with shading and lighting creating perspective.C.A mother and child. 6 angels are looking down from an arch over the mother and child. Some detail is shown using shading.D.And angel stands in front of a woman in a room with curved architectural supports. Shadows and light provide perspective. Shading is used to create detail in clothing. Which image is the best example of Renaissance painting style?ABCD Read these central ideas from "Homer. The Poet for All Ages." Some people question whether Homer really existed. People have different ideas about who Homer was. Which details from "Homer. The Poet for All Ages" best support these two central ideas about Homer? Select the two correct answers. "One legend says that long ago in Greece, a blind poet, Homer, wandered from city to city and earned his living by reciting poems." "In this way, they believe, these great poems grew, being added to and gradually shaped through many years." "Whatever the source of the poems, however, they must have been recited for a good many years before they were finally written down." "Some people believe that such a poet really lived, and that he composed the Iliad and the Odyssey himself and recited them in the cities where he stayed." The index of refraction of water is 1.33.At what angle theta above the horizontal is the Sun when a person observing its rays reflected off water finds them linearly polarized along the horizontaltheta=__________ (b) when we invoke a function defined in a package, we should qualify the function with its package name, such as package_name.function_name. The half-life of a certain chemical in the human body for a healthy adult is approximately 3 h. a) What is the exponential decay rate? b) How long will it take 94% of the chemical consumed to leave the body? Need help on this one thanks 2. potatoes can be peeled commercially by soaking them in a 3-m to 6-m solution of 2 sodium hydroxide, then removing the loosened skins by spraying them with water. does a sodium hydroxide solution have a suitable concentration if titration of 12.00 ml of the solution requires 30.6 ml of 1.65 m hci to reach the end point? Alex is 6 years older than Frank. The sum of their ages is 50. Find Alex's age andFrank's age.HELP Why is it necessary for DNA to replicate? A. DNA has to replicate to give more location from which proteins can be created. B. DNA can break down randomly so more copies ensure that all pieces are present in the nucleus. C. DNA must be copied before a cell can divide.