You are interested m computing the average acid level of coffee served by local coffee shops. You visit many coffee shops and dip your pH meter into samples of coffee. Unfortunately, your pH meter sometimes produces false readings. So you decide to disregard the single reading that is most distant from the average. Write a program that reads the data into an array. Use a negative value to signal the end of data. Compute the average of all the data by summing all the values and dividing by the number of values. If there are two or more values, scan through the array to find the value that is farthest (in either direction) from that average and compute an average that does not include this value by subtracting this value from the previously computed sum (If the most distant value occurs m the data more than once, that is OK Just subtract it from the sum once) If all the values are the same the average will not change, but do the above step anyway. Print the new average. If there is only one value, skip the above step (the average win be just the single value entered.) If there are no values (if the first value entered was negative) exit with an error message and without printing an average. Allow up to 100 pH values. The array will be an array of doubles, use double precision computation Here is a run of the program: sample 1: 5.6 sample 2: 6.2 sample 3: 6.0 sample 4: 5.5 sample 5: 5.7 sample 6: 6.1 sample 7: 7.4 sample 8: 5.5 sample 9: 5.5 sample 10: 6.3 sample 11: 6.4 sample 12: 4.0 sample 13: 6.9 sample 14: -1 average: 5.930769230769231 most distant value: 4.0 new average: 6.091666666666668

Answers

Answer 1

The program calculates the average pH value as 5.930769230769231. The most distant value is 4.0, and after excluding it, the new average is 6.091666666666668.

This program is designed to compute the average acid level of coffee served by local coffee shops. The program reads the data into an array and uses a negative value to signal the end of data. The average of all the data is computed by summing all the values and dividing by the number of values. However, since the pH meter sometimes produces false readings, the program disregards the single reading that is most distant from the average.


The new average is then printed. However, if there is only one value, the program skips the above step, and the average will be just the single value entered. If there are no values (if the first value entered was negative), the program exits with an error message and without printing an average.

To know more about program visit:

https://brainly.com/question/11023419

#SPJ11


Related Questions

the following is a legal command, which would allow to provide audio in ogg vorbis, mp3 and wave formats to support a. firefox
b. chrome
c. opera
d. safari,
e. and ie9

Answers

To provide audio in Ogg Vorbis, MP3, and WAV formats to support Firefox, Chrome, Opera, Safari, and IE9, a combination of audio elements with appropriate source elements can be used in HTML.

To support multiple browsers and audio formats, you can use the HTML audio element along with source elements to specify different audio formats. Here's an example of how you can achieve this:

<audio controls>

 <source src="audio.ogg" type="audio/ogg">

 <source src="audio.mp3" type="audio/mpeg">

 <source src="audio.wav" type="audio/wav">

 Your browser does not support the audio tag.

</audio>

In the above example, the audio element is used with three source elements, each specifying a different audio file format (Ogg Vorbis, MP3, and WAV). The browser will attempt to play the audio in the first supported format it encounters. If the browser does not support any of the specified formats, the fallback message "Your browser does not support the audio tag" will be displayed. This approach allows you to provide audio in Ogg Vorbis, MP3, and WAV formats, which are widely supported by modern browsers including Firefox, Chrome, Opera, Safari, and IE9. Each browser will choose the appropriate source format based on its compatibility, ensuring audio playback across different platforms and browsers.

learn more about Ogg Vorbis here:

https://brainly.com/question/30725379

#SPJ11

A person who is good with numbers and problem solving has which type of learning preference?
a) hands-on
b) verbal
c) logical
d) visual

Answers

Answer:

I believe it is logical.

Answer:  c) logical

Explanation:

:)

Unsupervised learning is:
a. learning without
computers

b. learning from the
environment

c. learning from teachers d. Problem based
learning

Answers

Answer:

The answer is A, duhhhhhhh

Assume you are the project manager for the tidal 2 software project. You have been asked to calculate the expected cost for the project. Your company’s database indicates that developers can handle eight function points each person-month and that the cost per developer at your firm is $7,600 per month. You and your team of five developers have come up with the following requirements:

Answers

To calculate the expected cost for the tidal 2 software project, we need to consider the number of function points and the number of developers in the team.
Explanation:
Step 1: Calculate the total number of function points
In this case, we have the number of function points as a measure of the project's size. If we sum up the function points for all the requirements, we can determine the total size of the project.

Step 2: Determine the effort in person-months
To estimate the effort required for the project, we can divide the total number of function points by the productivity rate of the developers. Given that each developer can handle eight function points each person-month, we can divide the total number of function points by eight to get the effort in person-months.

Step 3: Calculate the total cost
To calculate the total cost, we multiply the effort in person-months by the cost per developer per month. Since we have a team of five developers, we multiply the effort by the cost per developer and then by the number of developers.

Conclusion:
To calculate the expected cost for the tidal 2 software project, follow these steps:
1. Calculate the total number of function points by summing up the function points for all requirements.
2. Determine the effort in person-months by dividing the total number of function points by eight (the productivity rate per developer per person-month).
3. Calculate the total cost by multiplying the effort in person-months by the cost per developer per month and then by the number of developers.

By following these steps, you will be able to calculate the expected cost for the project accurately.

To know more about software visit

https://brainly.com/question/32393976

#SPJ11

Which feature of an executive information system (EIS) enables users to examine and analyze information? case of use intelligent agent secure login digital dashboard

Answers

The feature of an Executive Information System (EIS) that enables users to examine and analyze information is the digital dashboard. Option D

What is a digital dashboard?

A digital dashboard is a graphical user interface that displays important business data and key performance indicators (KPIs) in real-time.

It provides executives with a visual representation of the data, allowing them to quickly and easily identify trends, patterns, and anomalies.

Additionally, the use of intelligent agents and secure login adds an extra layer of security to the EIS, ensuring that only authorized users can access the system and its data.

Read more about digital dashboard at: https://brainly.com/question/28014965

#SPJ1

In a computer's IP address settings, the _____________ gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own.A. defaultB. default routeC. dedicated bandwidthD. bandwidth sharing

Answers

In a computer's IP address settings, the default gateway is the address of the router to which a computer sends all packets that are intended for networks outside of its own.

The default gateway is a crucial component of a computer's IP address settings, as it helps ensure that packets are routed to the correct destination. Without a default gateway, a computer would not be able to send packets to networks outside of its own, and would therefore be unable to access the internet or communicate with other devices on different networks. The default gateway is usually the IP address of the router that connects the local network to the Internet or to another network.

Learn more about the default gateway here:https://brainly.com/question/27975111

#SPJ11

Differentiate between a real integer and exponential form in a double quote.

At least 5 differences please

Answers

A real integer is a whole number without any fractional or decimal part, expressed in standard numerical form while the exponential form represents a number in the form of a base raised to an exponent.

What is the difference between real integer and exponential form in numbers?

Real integers are represented as standard numerical values without any fractional or decimal parts such as 1, 2, 3, -4, or 0. They can be positive, negative, or zero.

The exponential form is a way of expressing numbers using a base and an exponent. In exponential form, a number is written as the product of a base raised to a power or exponent. For example, \(10^2\) represents 10 raised to the power of 2 which is equal to 100.

Read more about double quote

brainly.com/question/28643982

#SPJ1

an x-ray technique imaging the urinary bladder and the ureters is called

Answers

The x-ray technique used to image the urinary bladder and the ureters is called a retrograde pyelogram.

A retrograde pyelogram is a radiographic procedure that involves the use of contrast dye to visualize the urinary bladder and the ureters. It is commonly performed to diagnose and evaluate various conditions affecting the urinary system, such as kidney stones, blockages, or abnormal structures.

During a retrograde pyelogram, a contrast dye is injected into the ureters through a catheter inserted into the urethra. The contrast dye helps to highlight the urinary tract, allowing the radiologist to capture x-ray images of the bladder and ureters. These images provide valuable information about the structure, function, and potential abnormalities within the urinary system.

The procedure is typically done in a hospital or radiology clinic under the guidance of a radiologist. It can help identify issues like urinary tract obstructions, tumors, or other abnormalities that may require further medical intervention. The retrograde pyelogram is a safe and effective technique for imaging the urinary bladder and the ureters, aiding in the diagnosis and treatment of urinary system disorders.

Learn more about x-ray here:

https://brainly.com/question/23955034

#SPJ11

HEEEEELPPP!!!BRAINLIEST!!! THIS IS URGENT!!!

Read the following code:

count in range(80):
leo.forward(count * 2)
leo.left(count + 2)

There is an error in the for loop. What should be fixed?

Add a colon to the end of the statement
Begin the statement with the proper keyword to start the loop
Place the loop condition outside the parentheses
Replace the parentheses around the range with quotation marks

Answers

Answer:

Begin the statement with the proper keyword to start the loop

Explanation:

Given

The code segment

Required

Fix the code

The first line of the code segment is meant to be a for loop, but it does follow the right syntax.

This is so because the for keyword is missing.

The first line should be corrected and replaced with:

for count in range(80):

Hence, option (b) is correct

a) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:

b) Calculate the checksum of following 2 bytes: 01011010 and 10110100, and fill in the blank:

Answers

The Checksum is used to examine and detect errors in transmitted data over a computer network. The Checksum values are :

0010111000001111

To calculate the checksum :

Add the two bytes together :

0_0_1_1_0_1_0_1

1_ 0_1_0_1_1_0_0

_______________

1_ 1_0_1_0_0_0_1

Take the complement of the sum

Checksum = 00101110

B.)

Add the two bytes together

0_1_0_1_1_0_1_0

1_ 0_1_1_0_1_0_0

_______________

0_ 0_0_0_1_1_ 1_0

______________1

0_ 0_0_0_1_1_1_1

Take the complement of the sum

Checksum = 00001111

Therefore, the checksum values are :

0010111000001111

Learn more : https://brainly.com/question/13968647?referrer=searchResults

State Whether the given statement are TRUE OR FALSE. 13X1=13

23] The result of any condition is true ,false or unknown.

24] The WHILE and UNTIL can be placed at the end of DO….LOOP.

25] When a program contains a loop , it means it can repeat statements only

once.

26] The first version of visual basic was VB. Net

`27] The name of the form 1 dialog box which appears by default can be

changed .

28] The Error window opens when there are some coding mistakes.

29] E.F Codd proposed the first type of relational database model.

30] there is a way to rename the tables in Access.

31] One row will have one unit of complete information .

32] The text can be only numerical

33] currencies cannot be stored in Access

34] A number of list items go within the <ul> tags give right​

Answers

Answer:

true

Explanation:

because everyone know that 13x1=13

arrange the two open excel workbooks on the screen vertically, ensuring that the e05fallseminars file is active.

Answers

You can use the "Arrange All" feature again if you'd like to rearrange the workbooks differently, such as horizontally or as cascading windows.

To arrange the two open Excel workbooks on the screen vertically, follow these steps:
1. Click on the View tab in the Excel ribbon.
2. In the Window group, click on the "Arrange All" button.
3. In the Arrange Windows dialog box, select "Vertical" from the options.
4. Make sure the "Windows of active workbook" checkbox is selected.
5. Click on the OK button to apply the changes.

This will arrange both Excel workbooks side-by-side on the screen, with the e05fallseminars file active. You can then easily switch between the two files by clicking on their respective tabs in the Excel ribbon. It's worth noting that Excel offers a number of different ways to arrange and organize your workbooks and worksheets on the screen, so don't be afraid to experiment with different options to find the layout that works best for you. Additionally, if you frequently work with multiple Excel workbooks or screens, you may find it helpful to invest in a larger monitor or dual monitor setup to help you stay organized and productive.

Learn more about Window here: https://brainly.com/question/13605383

#SPJ11

​ Many organizations and institutions are moving toward using Social Security numbers as primary keys because of privacy issues. T/F

Answers

This is true.

i would explain, but i keep receiving an error message for my explanation and im not sure why.

News video for cable does not need to be reformatted before being placed online.


True

False

Answers

Answer:

True

Explanation:

Answer: true!


Step by step explanation:

The number ____ is the standard dots per inch used for blogs, social media, webpages, and emails.

That question is for my photography class.

Answers

Answer:

72 dpi

Explanation:

72 DPI is standard for social media posts and others. It is not 300 DPI which is standard for print.

The standard dots per inch (DPI) used for blogs, social media, webpages, and emails can vary depending on the specific platform and device.

A common standard for these digital mediums is 72 DPI.

DPI refers to the resolution or sharpness of an image on a digital display. A higher DPI means more dots or pixels per inch, resulting in a clearer and more detailed image. On the other hand, a lower DPI means fewer dots per inch, resulting in a less sharp image.

For digital content displayed on screens, a DPI of 72 is often used because it strikes a balance between image quality and file size. This resolution is considered sufficient for viewing images online without causing excessive loading times or using excessive bandwidth.

It's important to note that when printing physical copies, a higher DPI is generally recommended to achieve better print quality. In print media, resolutions like 300 DPI are commonly used to ensure sharp and detailed prints.

Know more about dots per inch,

https://brainly.com/question/32108345

#SPJ3

Classify the following skills: communication, creativity, and independence.

Hard skills
Interpersonal skills
People skills
Soft skills

Answers

Answer:

Communication, creativity, and independence are people skill

Explanation:

Soft skills depict the quality of a person and classify his/her  personality trait or habit.

Communication - Interpersonal skill

Interpersonal skill allows one to interact and communicate with others effortlessly.

Both soft skill and interpersonal skill comes under the umbrella term i.e people skill.

Hence, communication, creativity, and independence are people skill

Answer:

It's not people skills I got it wrong on my test

Explanation:

1) Using the topics below, in 150 words or more for each item, describes how Threat Modeling fits into each:
a) System development life cycle.
b) Software development life cycle (address software development and not system items).
c) Security maturity.
d) Security plan and policies.

Answers

Threat modeling can be described as the method of analyzing a software system or application in order to identify and address any potential security threats and vulnerabilities. This analysis takes into account the components and structure of the system, as well as the external environment in which it will operate. Threat modeling is a crucial aspect of secure software development and can be integrated into various stages of the system development life cycle (SDLC), software development life cycle (SDLC), security maturity, and security plan and policies.

a) System development life cycle: Threat modeling can be integrated into the system development life cycle in several stages, including the design and implementation phase. At this stage, the threat model will help developers identify potential threats and vulnerabilities and ensure that they are addressed early on in the development process. This will help to prevent security issues from being introduced into the system later on and ultimately save time and resources in the long run.

b) Software development life cycle: Threat modeling can be integrated into the software development life cycle by addressing software development and not system items. At the coding stage, developers can use the threat model to help identify potential security vulnerabilities and ensure that they are addressed before the code is deployed. This can help prevent common security issues like SQL injection, cross-site scripting, and other types of attacks.

c) Security maturity: Threat modeling is a critical aspect of security maturity. By using threat modeling, organizations can develop a more comprehensive security strategy that takes into account potential threats and vulnerabilities and addresses them before they can be exploited by attackers. A mature security posture includes a proactive approach to identifying and addressing potential security risks and the use of tools like threat modeling can help organizations achieve this.

d) Security plan and policies: Threat modeling can be used to inform security plans and policies by identifying potential threats and vulnerabilities that need to be addressed. This information can then be used to develop policies and procedures that will help to mitigate these risks and ensure that the system is secure. Threat modeling can also be used to ensure that policies and procedures are effective by identifying potential gaps or areas for improvement. Overall, threat modeling is an essential component of developing effective security plans and policies.

Learn more about System development life cycle here:

https://brainly.com/question/19977141

#SPJ11


What do the numbers 0s and 1s actually represent inside a computer?

Answers

Answer:

Binary.

Explanation:

Binary, the off and on, Is how computers think.

You think code is Function(Os,35,Export) and stuff like that? Thats trillions of binary lines to make that. Binary is the very fabric of code. modern code engines are very organized binary to make predefined functions so your brain doesnt have to manually think of quadrillions of off and on switches for each function you assign.

2 points
1. Which characters are normally used to represent the root of the Floppy
disk drive? *
a) C1
b) A:
c) B:
d) D:
points

Answers

Answer:

B) A:

Explanation:

What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0]; for (int i = 1; i < numbers.length; i++) { if (numbers[i] < value) value = numbers[i]; } The value variable will contain the highest value in the numbers array. The value variable will contain the sum of all the values in the numbers array. The value variable will contain the average of all the values in the numbers array. The value variable will contain the lowest value in the numbers array.

Answers

Answer:

The value variable will contain the lowest value in the numbers array.

Explanation:

Given

The given code segment

Required

The result of the code when executed

The illustration of the code is to determine the smallest of the array.

This is shown below

First, the value variable is initialized to the first index element

int value = numbers[0];

This iterates through the elements of the array starting from the second

 for (int i = 1; i < numbers.length; i++) {

This checks if current element is less than value.

     if (numbers[i] < value)

If yes, value is set to numbers[i]; which is smaller than value

value = numbers[i];

Hence, the end result will save the smallest in value


Can Anyone see what's wrong in this
this is not working why ?
you can see in picture its not working why ?
please help me
can u see what the problem

Can Anyone see what's wrong in this this is not working why ?you can see in picture its not working why

Answers

do you mean the highlighted part, "<img scr = "https : // images. app. goo. gl?"

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

COMPUTER ACTIVITY

help guys thank you so much!!​

COMPUTER ACTIVITYhelp guys thank you so much!!

Answers

A type of flowchart called an Entity Relationship (ER) Diagram shows how "entities" like people, things, or ideas relate to each other in a system.

What exactly is a ER diagram?

A type of flowchart called an Entity Relationship (ER) Diagram shows how "entities" like people, things, or ideas relate to each other in a system. In the fields of software engineering, business information systems, education, and research, ER Diagrams are most frequently utilized for the design or debugging of relational databases. They use a defined set of symbols like rectangles, diamonds, ovals, and connecting lines to show how entities, relationships, and their characteristics are interconnected. They follow grammatical structure, using relationships as verbs and entities as nouns.

To learn more about databases visit :

https://brainly.com/question/6447559

#SPJ1

With the range e2:e30 selected, create a new conditional formatting rule that uses a formula to apply yellow fill and bold font to values that sold for less than or equal to 70% of the sticker price. be sure to select a rule type that will use a formula to determine which cells to format. 5

Answers

What is layout rule in Excel?

In a comparable fashion, you may create a conditional formatting rule to examine the values of  cells. For example: =$A2<$B2 - layout cells or rows if a fee in column A is much less than the corresponding fee in column B. =$A2=$B2 - layout cells or rows if values in columns A and B are the same.

The process of a new conditional formatting rule that uses a formula to apply yellow fill and bold font to values is given in the picture attached.

Read more about the formatting :

https://brainly.com/question/3653791

#SPJ1

                                                                                 

With the range e2:e30 selected, create a new conditional formatting rule that uses a formula to apply

Juan has performed a search on his inbox and would like to ensure the results only include those items with attachments which command group will he use will he use

Answers

Answer:

refine

Explanation:

Juan can use the "refine" group command to search for items with attachments in his inbox.

What is inbox?

The Inbox is where e-mail messages are received in an e-mail client or online e-mail account.

The "outbox" is where incoming communications are stored. Inboxes and outboxes operate similarly to folders but are not recognized by the computer.

He can use the "refine" group command to search for items with attachments in his inbox. This group command allows Juan to narrow down the search results to only include email messages that have attachments.

To use this command, Juan can simply select "refine " from the search criteria options and then perform the search. The results will only display email messages that have attachments, allowing Juan to easily find the information he needs without having to sort through all the messages in his inbox.

Learn more about the inbox here:

https://brainly.com/question/27114613

#SPJ6

to copy the content of a letter in another letter we can dash features


ans) mobile​

Answers

Answer:

Copy/Cut

Explanation:

Copy option is used to copy the text without removing it from there. To copy any text just hold the text for 2-3 seconds, then you can able to see a box(first image). From there select Copy option. Now text has been copied.

Cut option is also used to copy any text but, it will remove the text from where we have cut it. To Cut any text hold the text which you want to cut. Then, you will see a box(first image), from the box select Cut option. After selecting Cut option the text will get copied in the clipboard and the text you have cut will be removed from there.

Now, to Paste the text you have copied/cut, go to any text field and hold there for 2-3 seconds and a box(Second image) will appear. Now, select Paste option and text will get paste there.

to copy the content of a letter in another letter we can dash featuresans) mobile
to copy the content of a letter in another letter we can dash featuresans) mobile

Throughout the lecture, the teacher speaks about the defintion of "Science"
From the choices below, which option supports the wording mentioned in the lecture?
a. Observation, inferencing, predicting, classifying and making models.
b. Science is using different skills to make models
c One or more senses to gather info
d. None of these

thanks for helping, hope this helps someone else as well!​

Answers

Answer: B. Science is using different skills to make models

Explanation: On Edge!!!!!!!!!!!!!!!!

The option that supports the wording mentioned in the lecture is B. Science is using different skills to make models.

Science refers to the practical and the intellectual activity that has to do with encompassing the systematic study of the physical and the natural world.

Since studies nature and the behavior of natural things and the knowledge that people get from them. In this case, science is using different skills to make models.

Read related link on:

https://brainly.com/question/25110362

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

A team of scientists is designing a study to examine factors that affect
people's enjoyment of video games. Which statement best represents a valid
hypothesis for the study?
A. More people enjoy role-playing games than platformer games.
B. Action games are better than role-playing games.
C. The graphics in console games are cooler than those in PC
games.
O D. Video games are fun.

Answers

Answer:

A. More people enjoy role-playing games than platformer games.

Explanation:

It is A because the genre of game is a factor of a video game.

B is trying to state an objective truth that one genre is better than another but not giving a reason (like it being more enjoyable).


C isn't even really game related, that would be a study on which gaming platforms are more enjoyable and why.


D has already been established. The current study is to determine what makes them more or less enjoyable.

Answer:

B. Action games are better than role-playing games.

Explanation:

In my opinion I like to do roleplay's I don't know why but I just do, but this is the correct answer.

What is the text output by the program?


A. Less than 10
B. Less than 20
C. Less than 30
D. 30 or more

What is the text output by the program?A. Less than 10B. Less than 20C. Less than 30D. 30 or more

Answers

Answer:

30 or more

Explanation:

30 or more is the answer

Thanks hope that helps my dude
Other Questions
Do you agree that Whirlpool can realize a competitive advantage through its diverse employees? Janice brought a set of 8 classic paperbacks to a secondhand store to sell. She was paid cashfor the entire set. Before she left, Janice used $4 of her earnings to purchase a used boardgame. She had $10 remaining.Which equation can you use to find p, the value of each paperback in the set?4p - 8 = 108p - 4 = 108(p-4)= 104(p-8)= 10 The diagram below shows a human sperm cell, which has a specialized taillike structure called a flagellum.Choose 1 answer:(Choice A)AIt allows the sperm cell to function similarly to cells that do not have flagella.(Choice B)BIt can cause the sperm cell to move.(Choice C, Checked)CIt contains the sperm cells DNA. 4n + 3n +5 and 2n+3 Which is NOT a function of the circulatory system?*A. deliver oxygen and nutrients to cells B. remove carbon dioxide and waste from cellsC. break down carbohydrates into glucose D. transport other nutrients through body Which of the following is not a good way to manage stress?A. Get enough sleepB. Eat a healthful diet.C. Spend most of the time alone.D. Get plenty of exercise. Hue is arranging chairs. She can form 6 rows of a given length with 1 chair left over, or 9 rows of that same length if she gets 11 more chairs. Complete the equation and solve it to find how many chairs are in that row length. In your equation, use the variable x to represent the number of chairs in each row. What should a scrum master do if he or she notices disruptive behavior during a scrum? How do historians believe Buddhism first spread to Japan? It is now 8:59 a.m. when the bell rings at 9:01 am. Damian will be late for science class for the 3rd time this week. He must get from one side of the school to the other by hurrying down 3 different hallways. He runs down the first hallway, a distance of 35.0 at a speed of 3.5 m/s. The second hallway is crowded with students and he covers its 4.80 m length at a speed of 1.20 m/s. The final hallway is empty and Damian covers its 60.0 m length at a speed of 5.00 m/s. How long does it take him to cover the 1rst hallway? The second one? The third one? _______________ involves you imagining yourself achieving your final goal.A. Process visualizationB. Outcome visualizationC. Backward goal settingD. SMART goal setting The Zhou Dynasty began after The word geometry comes from the Greek words geo, which means "earth," and metron, which means "a measuringof." Given this information, how do you think the study of geometry developed? i need help ASAP pleaseee which of the 9 molecules had the strongest intermolecular forces? use your data to determine your answer. Which choices accurately identify portions of the Three-Fifths Compromise ratified at the Constitutional Convention?A)The compromise required a national census to be administered every tenyears.B)The debate in question related to the compromise concerned the issue ofslavery.The compromise required the end of the slave trade in the Unites States by1808.D)The compromise defined a state's population to equal the free populationplus 3/5 of "all other persons."E)The compromise required 3/5 of the members of Congress to agree to theend of slavery as an institution in the United States Prove algebraically that the difference between the squares of any two consecutive integers is equal to the sum of these two integers. Which area of business can not use the time-value concept ?A.-Accounting.B.- Marketing.C.- Manufacturing.D.- Budgeting Greenhouse gases are best described as _______. a. the result of fossil fuel use b. gases that cause the greenhouse effect c. carbon dioxide and methane d. gases that trap energy from the sun in earths atmosphere please select the best answer from the choices provided a b c d Determine the mass of water (in kg) if 43,120 cal of energy is placed into water, resulting in a temperature change from 105 degrees celsius from 87.1 degrees celsius