4.8 Code Practice: Question 2

Answers

Answer 1

Answer:

for y in range(88, 43, -4):

   print(y, end=" ")

Explanation;

yw


Related Questions


What type of pointing device is often used by artists, and why is it ideal for artists?​

Answers

Answer:

A drawing/graphics tablet

Explanation:

It is ideal for artists, due to it being very similar to as if you were to draw on paper. The stylus replicates a pencil or pen.

Which technology will a business use to figure out who accessed confidential files on a company's computer system

Answers

Answer:

insaj cdsjl ljhwbalfhb

Explanation:

Which of the following commands sets "other" permissions on file to r-x?
chmod 775 file
chmod 776 file
chmod 777 file
chmod 774 file

Answers

Answer: The correct command to set "other" permissions on a file to r-x is:

chmod 755 file

In this command, the first digit (7) sets permissions for the owner, the second digit (5) sets permissions for the group, and the third digit (5) sets permissions for others.

The number 7 in the first digit indicates that the owner has read (4), write (2), and execute (1) permissions (4+2+1=7). The number 5 in the second and third digits indicates that the group and others have read (4) and execute (1) permissions (4+1=5). Therefore, the command chmod 755 file sets the permissions on file to -rwxr-xr-x, which means the owner has read, write, and execute permissions, and the group and others have read and execute permissions.

Explanation: o

With respect to EACH of the following contemporary MIS technologies, discuss TWO benefits of the technology and THREE issues that an organization would need to consider when making a decision on whether or not to adopt that technology:
a) Enterprise data warehouse;
b) Open source information reporting tool;
c) Data mining algorithms to develop predictive models

Answers

While enterprise data warehouses, open-source reporting tools, and data mining algorithms offer various benefits, organizations must carefully evaluate the associated issues to make informed decisions. Considering the initial costs, data quality, security, skill requirements, support, and ethical considerations can help organizations adopt these technologies effectively

The enterprise data warehouse (EDW) technology offers several benefits for organizations. Firstly, it allows companies to consolidate their data from various sources into a single, integrated platform. This enables better data management, analysis, and decision-making. Secondly, an EDW provides a scalable solution, accommodating large volumes of data and allowing for future growth.

However, when considering adopting an EDW, organizations must address three important issues. Firstly, implementing an EDW requires substantial investment in terms of infrastructure, software, and training. Secondly, data quality and integrity are crucial, as inaccurate or incomplete data can lead to unreliable insights. Lastly, ensuring data security and compliance with regulations is vital, as an EDW holds sensitive and confidential information.

Regarding open source information reporting tools, two advantages include cost-effectiveness and flexibility. Open-source tools are typically free, reducing expenses for organizations. Additionally, they offer flexibility in terms of customization and integration with existing systems.

However, organizations must consider three factors before adopting open-source reporting tools. Firstly, they may lack the robust features and support offered by commercial tools, which could impact functionality and performance. Secondly, organizations need to ensure the availability of skilled personnel capable of working with open-source tools. Lastly, they should assess the long-term viability of the open-source community supporting the tool, as this could affect the tool's maintenance and future development.

Data mining algorithms for developing predictive models provide two key benefits. Firstly, they enable organizations to extract valuable insights and patterns from large datasets, helping them make informed decisions and predict future trends. Secondly, data mining algorithms can improve efficiency and productivity by automating tasks such as classification, clustering, and anomaly detection.

However, there are three considerations when adopting data mining algorithms. Firstly, organizations need to address the challenge of selecting the most appropriate algorithm for their specific needs, as different algorithms have varying strengths and limitations. Secondly, ensuring data quality is critical, as poor-quality data can produce inaccurate and misleading results. Lastly, organizations must be mindful of privacy and ethical concerns when using data mining algorithms, as they may involve personal or sensitive information.

To know more about Enterprise data warehouse (EDW) technology visit:

https://brainly.com/question/4223001

#SPJ11

Juan has performed a search on his inbox and would like to ensure that the results only include those items with
attachments. Which command group will he use?

-Scope
-Results
-Refine
-Options

Answers

Answer: Refine

Explanation:

From the question, we are informed that Juan has performed a search on his inbox and would like to ensure that the results only include those items with attachments. The command group that he'll use will be the resume command group.

The refine command group help are one whereby the results include the items that have attachments. Therefore, the answer will be option C "Refine".

Answer:

Refine

Explanation:

A Class or ID can be declared in the opening or closing tag
psing tag
O True
O False

Answers

Answer

True.

Explanation:

In HTML, you can declare a class or ID for an element in the opening tag or closing tag of the element.

Type the correct answer in the box. Spell all words correctly.
Since the Internet, information has become easy to access quickly. This has lead to difficulty verifying this information and requires you to have
what attitude toward it?
A healthy(blank)
is required when attempting to verify information on the Internet.

Answers

Answer: search

Explanation:

Answer:

A healthy Skepticism is required when attempting to verify information on the Internet.

Explanation:

What is the purpose of indexing?

To combine characters in order to form a single string
To combine two or more strings into one big string
To pull out a group of characters from a string
To pull out one specific character from a string

Answers

Answer: Two or more strings can be combined to form one big string.

Answer:

the last one heheheeh

Explanation:

Select the correct answer.
Ben wants to keep similar items close to each other in the image he is working on. Which is the most effective technique for applying the gestalt
concept of proximity?
The BLANK technique is the most effective technique for applying the gestalt concept of proximity.

Answers

Gestalt Principles are principles/laws of human perception that describe how humans group similar elements, recognize patterns and simplify complex images when we perceive objects.

What are the Gestalt Principles?

The tendency to view items as belonging to the same grouping when they are close to one another is known as the gestalt principle of

proximity

. It claims that regardless of how different the forms and sizes are from one another, if shapes are close to one another, you will perceive them as groups. One of Gestalt's principles, the concept of closeness focuses on how each stimulus would be seen in its most basic form. The

Law of Simplicity

or the Law of Pragnanz are other names for it. It is founded on the idea that the sum of a thing is worth more than the sum of its components.

To learn more about Gestalt Principles refers to;

https://brainly.com/question/4734596

#SPJ1

plz answer this question
the three (3) classification of computers.​

Answers

Explanation:

micro computers

mini computers

super computers

Any single letter in the alphabet (not numbers) needs to be called by a ________ variable.
a) char
b) long
c) character
d) String

Answers

Answer:

the answer is c. character variable

which information purpose uses video from a security camera?

Answers

Answer:

robbery

Explanation:

it records a robbery so that police can later find out who did it

Design a 4-bit ADC with Proteus 8 and solve for 2V, 2.5V, 3V, 3.5V, and 4V levels. What are the output binary numbers?

Answers

The output binary numbers for the given analog voltage output levels are: 2V - 0000, 2.5V - 0001, 3V - 0010, 3.5V - 0011, and 4V - 0100.

To design a 4-bit ADC with Proteus 8 and solve for 2V, 2.5V, 3V, 3.5V, and 4V levels, the following steps are to be followed: Step 1: First, create the following circuit using a comparator, resistors, and an LM324.Op-amp LM324 Comparator Circuit Step 2: Next, set up the analog voltage output levels using a voltage source module. Set the voltages to 2V, 2.5V, 3V, 3.5V, and 4V, respectively. The following is an example of a 2V level setup:2V Voltage Level Step 3: For each of the analog voltage output levels, connect them to one of the non-inverting inputs of the comparator, and connect the output of the op-amp to one of the two digital input lines for the binary output.

The setup for the 2V level is as follows:2V level setup with 4-bit binary output Step 4: The output binary numbers can be calculated as follows: For 2V, the binary output will be 0000 For 2.5V, the binary output will be 0001For 3V, the binary output will be 0010 For 3.5V, the binary output will be 0011 For 4V, the binary output will be 0100.

To know more about  binary refer for :

https://brainly.com/question/15190740

#SPJ11

What is hierarchy/hierarchical?

Answers

Answer:

A hierarchical is an organizational structure in which items are ranked according to levels of importance. Most governments, corporations and organized religions are hierarchical

The physical equipment
The programs used to run the network
Part of the network that allows communication with other networks
Routes data where it is meant to go

Answers

Answer: hardware, software, gateway, router

Explanation:

Got it right on e2020

Although digital cameras today are pretty sturdy, they still require basic care and maintenance. Create a basic list of care and maintenance standards and procedures that any digital camera owner would be smart to follow. Briefly explain each item on your list.

Please help! Thank you!

Answers

Answer:

Avoid dirt and sand. Use care when cleaning dirt particles and sand from your digital camera. Do not use canned or pressurized air to clean the sand, as you might just drive the particles into the camera case. Avoid liquids. Keep all liquids away from the camera unless you own a model with a waterproof case. Avoid touching the lens and LCD. Oils from your skin smudge the lens and LCD, eventually causing permanent damage. Clean the lens and LCD with a microfiber cloth when you see a smudge from your fingertips. The lens and sun don't mix. Sunlight focused through the lens of the camera could damage the image sensor or even start a fire inside the camera. Use cleaning liquids with care. Avoid using an excessive amount of cleaning liquid with your camera. You should be able to clean the camera with a dry microfiber cloth. If a liquid is needed, place a few drops of the liquid on the cloth, rather than directly on the camera. Vacuum the bag. Dirt and sand inside your camera bag could damage your camera, so vacuum the bag regularly to keep it clean and protect your camera. Watch the temperature. Do not leave your camera in a sunny vehicle, where temperatures quickly can exceed 100 degrees Fahrenheit. Avoid leaving the camera in direct sunlight, which can damage the plastic. Finally, avoid extreme cold, too, which could damage the LCD. Use neck straps and wrist loops. If you slip while hiking, or if you lose the grip on your camera near the pool, the straps can save your camera from a potentially disastrous fall.

Explanation:

these are the exact words that I used on my assignment that I just completed I hope this helps! Enjoy your class!

The main 3 ways to care for your digital Camera  is that:

Always bag it when you are not using it. Always use lens caps to cap it.Dust it regularly.

What are the maintenance methods for the digital camera?

Know that there are ways to care for a camera. It is essential therefore to always clean at all times.

Conclusively, do use a dry and clean cloth in the wiping the physical body of the camera and note the type of cleaners or solvents that you use in the clean  up  as it needs to be a  blower, brush, etc.

Learn more about cameras from

https://brainly.com/question/26320121

write a program to print. *
**
***
****
*****​

Answers

Program:-

\(\tt for\:i \:in\: range(2,6):\)

\(\tt\quad for\: j\: in \:range(1,i+1):\)

\(\tt\quad\quad print("*",end='')\)

\(\tt\quad print()\)

Output:-

\(\tt **\)

\(\tt ***\)

\(\tt ****\)

\(\tt *****\)

which of the following is a task usually performed by the firmware? (choose two.) a. perform a post. b. create an interrupt. c. store the operating system. d. begin the boot procedure.

Answers

According to the question a. Perform a POST and d. Begin the boot procedure.

What is POST ?

POST stands for "Post Office Protocol". It is an application layer protocol used to communicate between a web server and a client. It is used to send data from the client to the server in an encrypted format. POST is used by most web browsers and servers to send data in form submissions, search queries, and other requests. POST is more secure than GET because it does not send data in URL parameters, which can be seen by anyone. POST also allows for larger amounts of data to be sent than GET, which is limited to a certain amount of characters. POST is an essential part of the HTTP protocol, which is used to transfer data on the web.

To learn more about POST

https://brainly.com/question/30256882

#SPJ4

Which three elements are required to have a Trade Secret?

Answers

The three elements that are required to have a trade secret are as follows:

It bestows a competitive lead on its owner.It is subject to sensible endeavor to control its secrecy.It is confidential in nature.

What do you mean by Trade secret?

A Trade secret may be defined as a type of intellectual property that significantly consists of secret information that might be sold or licensed specifically in order to main its secrecy.

Trade secrets can take many forms such as formulas, plans, designs, patterns, supplier lists, customer lists, financial data, personnel information, physical devices, processes, computer software, etc. These secrets must not be generally known by or readily ascertainable to competitors.

Therefore, the three elements that are required to have a trade secret are well mentioned above.

To learn more about Trade secrets, refer to the link:

https://brainly.com/question/27034334

#SPJ1

Fill in the blanks to complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0. Complete the code so that a function call like “countdown(2)” will return the numbers “2,1,0”.

Answers

Answer:

Check the code down below

Explanation:

You can use this code:

for i in range(5,-1,-1):

print(i)

This will print:

5

4

3

2

1

0

5 is changeable by the way!

The complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0 is in the explanation part.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Here is the code to complete the “countdown” function:

def countdown(start):

   for i in range(start, -1, -1):

       print(i, end=",")

The countdown function takes an integer start as an argument and counts down from start to 0 using a for loop.

The range function is used to generate an integer sequence from start to 0, with a step size of -1. (i.e., counting backwards).

Thus, each integer in the sequence, separated by commas, is printed using the print function.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

a ________ is a collection of related data that can be stored, sorted, organized, and queried.

Answers

Answer:

Database.

Explanation:

A database, by definition, is the storing of information in such a way that it organizes it (synonymous with sorting), and that can later be accessed (with the means of modifying, updating, or controlling it, i.e. queried).

Answer:

Database

Explanation:

A database, by definition, is the storing of information in such a way that it organizes it (synonymous with sorting), and that can later be accessed (with the means of modifying, updating, or controlling it, i.e. queried).

Which of the following programs enable root to set the ownership of files? (Select all that apply.) A. chmod. B. chown. C. usermod. D. Nautilus E. touch.

Answers

The programs that enable root to set the ownership of files are "chown" and "usermod." These commands provide root access to modify file ownership and user account settings, respectively.

The programs that enable root to set the ownership of files are:

B. chown

C. usermod

The "chown" command is used to change the ownership of files or directories, and it requires root privileges to modify ownership settings. The "usermod" command, also requiring root access, is used to modify user account settings, including ownership of files associated with that user.

The other options mentioned in the question are not used specifically to set ownership:

A. chmod: This command is used to change file permissions, not ownership.

D. Nautilus: Nautilus is a file manager in certain Linux distributions and graphical environments, and it does not provide direct ownership settings.

E. touch: The "touch" command is used to update file timestamps or create new files, but it does not modify ownership.

So, the correct answers are B. chown and C. usermod.

Learn more about programs here:

https://brainly.com/question/14368396

#SPJ11

Which one of the following wireless transmission types requires a clear LOS to function?o Bluetootho NFCo IRo Wi-Fi

Answers

Infrared is the sort of wireless transmission that needs a clear LOS (line of sight) to work (IR). A clear channel must exist between the transmitter and receiver for infrared signals.

What kind of antenna, specifically across long distances, is used in a point-to-point link?

Yagi antennas are useful for creating point-to-point links between buildings or in long, narrow spaces (for example, connecting to a distant point in a valley). They can also be utilised to increase a point-to-multipoint network's range.

What is the mobile Bluetooth range, measured in metres?

The Bluetooth connection's range is roughly 30 feet (10 meters). However, depending on obstructions (people, metal, walls, etc.) or the electromagnetic environment, the maximum communication range may vary.

To know more about Bluetooth visit:-

https://brainly.com/question/13072419

#SPJ4

GUIDING QUESTIONS
1. What are two ways to effectively reach customers/clients?

Answers

Answer:

phone calls

Explanation:

when a customer comes and u keep their data and information.incase of anything u can likely reach them on phone

24.a) A water tank is 4m long, 2.5m wide and 1.5m tall. Wap to calculate and display how much liters of water can store in the tank. [ hint: 1 cubic meter = 1000 liters] [v=1*b*h] [4] This program

Answers

Answer:

15000 liters

Explanation:

v = b1 * b2 * h

v = 4 * 2.5 * 1.5

v = 15 m³

1 m³ = 1000 L

15 m³ = 15000 L

What is printed by the python code? print('2' + '3')

Answers

Answer:

23

Explanation:

Given

print('2' + '3')

Required

The output

First, the expression in bracket is evaluated.

'2' + '3' = '23' i.e. The + concatenates '2' and '3'

So, the statement becomes

print('23')

The above statement prints the expression in quotes.

Hence, the output is 23

Answer:

23

Explanation:

In this lab, you complete a prewritten C++ program that calculates an employee’s productivity bonus and prints the employee’s name and bonus. Bonuses are calculated based on an employee’s productivity score as shown below. A productivity score is calculated by first dividing an employee’s transactions dollar value by the number of transactions and then dividing the result by the number of shifts worked.

Productivity Score Bonus
= 200 $200
Instructions
Ensure the file named EmployeeBonus.cpp is open in the code editor.

Variables have been declared for you, and the input statements and output statements have been written. Read them over carefully before you proceed to the next step.

Design the logic, and write the rest of the program using a nested if statement.

Execute the program by clicking the Run button and enter the following as input:

Employee’s first name: Kim
Employee's last name: Smith
Number of shifts: 25
Number of transactions: 75
Transaction dollar value: 40000.00
Your output should be:
Employee Name: Kim Smith
Employee Bonus: $50.0
Grading
When you have completed your program, click the Submit button to record your score.

Answers

Answer:

The answer to this question is given below in the explanation section

Explanation:

    The formula for productivity socre is      

 productivity score = ((transaction dollar value/no of transaction)/no of shift)

Productivity Score Bonus  is:  

<=30 $50

31–69 $75

70–199 $100

>= 200 $200

........................................................................................................................................

the code is given below

........................................................................................................................................

#include <iostream>

using namespace std;

int main()

{

   string firstName;

   string lastName;

   int noOfShift;

   int noOfTransaction;

   int transactionDollarValue;

   int productivityScore;

   int bonus;

   

   cout<<"Employee’s first name: ";

   cin>>firstName;

   cout<<"Employee's last name: ";

   cin>>lastName;

   cout<<"Number of shifts:";

   cin>>noOfShift;

   cout<<" Number of transactions: ";

   cin>>noOfTransaction;

   cout<<"Transaction dollar value:";

   cin>>transactionDollarValue;

   productivityScore = (transactionDollarValue/noOfTransaction)/noOfShift;

   

   if (productivityScore <= 30)

   {

       bonus =50;

       cout<<"Employee’s first name: "<<firstName<<" "<<lastName;

       cout<<endl;

       cout<<"Employee Bonuse: $"<<bonus;

       cout<<endl;

   }

   

   else if (productivityScore >= 79 && productivityScore <=199)

   

   {

       bonus =100;

       cout<<"Employee’s first name: "<<firstName<<" "<<lastName;

       cout<<"Employee Bonuse: $"<<bonus;

   }

   

   else if (productivityScore >= 200)

   

   {

       bonus =200;

       cout<<"Employee’s first name: "<<firstName<<" "<<lastName;

       cout<<"Employee Bonuse: $"<<bonus;

   }

   

   return 0;

}

               

       

Which of the following is not structured instruments?
Select one:
a.
Musharakah-Based Sukuk.
b.
Mudarabah-Based Sukuk.
c.
Murabahah-Based Sukuk.
d.
Profit-Rate Swap.

Answers

Answer:

d. Profit- Rate Swap

Explanation:

Thanks for the question

Explain why each UDM should only perform one action.

Answers

Answer:

what is a UDM?

Explanation:

the entity relationship model toward a unified view of data

Answers

The Entity-Relationship Model (ER Model) is a data model that is used to represent the conceptual schema of a system. It describes the entities, attributes, and relationships between entities in a system.

The ER Model is widely used in database design because it helps to provide a unified view of data in an organization. The ER Model consists of three components: Entities, attributes, and relationships. An entity is anything that is recognizable and unique within a system. An attribute is a characteristic of an entity. It describes a particular aspect of an entity that is of interest to the organization. Relationships describe the associations between entities. They provide a means of capturing the way in which entities relate to each other.

The ER Model is particularly useful because it allows organizations to create a unified view of data. This means that data is consistent and integrated across all systems in the organization. It is also useful because it provides a graphical representation of the data, which can be easily understood by stakeholders. This makes it easier to communicate and share information about the data within the organization.

Learn more about Entity-Relationship Model: https://brainly.com/question/14424264

#SPJ11

Other Questions
Please help me with all three. 100 brainly pointsWILL MARK BRAINLIEST! The extended warranty on a ceiling fan is 18% of the purchase price. If the price of the fan is $140, how much is the warranty? a. $7. 78 b. $25. 20 c. $18. 72 d. $12. 86. which reproduction method is found among the protists? Do I have to make the plus sign a minus Im unsure n + 16 = 9 is Caribbean Sea pacific or atlantic Mothballs are composed primarily of the hydrocarbon naphthalene (C10H8 ). When 1.312 g of naphthalene burns in a bomb calorimeter, the temperature rises from 24.710 C to 30.188 C .Find rH for the combustion of naphthalene at 298 K . When considering phase, assume all reactants and products are at 298 K. Read:Two historical Chinese leaders, Qin Shi Huang and Kublai Khan, stand out as having united the vast lands of Asia into one country. While both were successful, the methods of the uncivilized Khan were more kind. Yet, Qins dynasty, pronounced chin, became part of the countrys name.The Mighty QinQin Shi Huang became ruler in 246 BCE. He was only 13 years old. China had been at war for years. There was no central government. By 221 BCE, Qin had unified China. Before Qin, the states had different calendars, handwriting styles, and differences in road widths. That meant only carts with the exact axle width from that area could travel within the area.Qin ended the feudal system. He standardized handwriting and currency, legal, and measuring systems. He built a network of roads and canals to join parts of China. Qin built a fierce army. He believed the purpose of the population was to be part of the military. The goal was to win wars and expand his kingdom.Construction in the Qin DynastyQins construction projects were legendary. He began work on a huge wall. It would link bits of existing walls into one giant, protective wall. It later became the Great Wall of China. Qins tomb was begun when he took power. It covered four square miles. The area contained 8,000 clay soldiers and horses, meant to stand guard over his burial site. Each figure was unique and life size.Qins reign was violent and brutal. He destroyed anyone who was against him. Perhaps his most destructive act was to arrest and murder four hundred scholars. He burned every book not related to agriculture or his own dynasty. He believed history was unimportant unless it glorified him. The Qin dynasty was destroyed only three years after his death.The Great KhanPeople expected Kublai Khan of the Mongol Empire to be as ruthless and cruel as Qin. After all, the civilized Chinese considered Mongols barbarians. Ruler Genghis Khan, Kublais grandfather, was feared and hated. However, Kublai Khan chose to rule differently. He was more accepting of people. Like Qin, he was a skilled horseman at a young age. He quickly established his reputation as a warrior. In 1271, he was named Great Khan. He established the Yuan Dynasty after conquering China.Khan in BattleKublai wanted to create an empire. He needed to defeat the Song Dynasty in southern China. His role in the conquest shows his patience and intelligence. The Mongols laid siege to a walled city for five years. They were unable to break into the city. Equally, the Chinese were unable to break out of the city. Kublai had heard of a military device used by westerners. He hired two engineers who built a powerful catapult that could toss boulders nearly 1,000 feet. The city was quickly captured, and the Mongols ruled southern China.Kublai Khan was a clever administrator but made some mistakes as a general. Twice he sent ships to conquer Japan. Twice they were totally defeated. He tried to add other countries to his empire but failed. Those attempts put the country in debt.Like Qin, Kublai built impressive buildings, and his residence has been called the greatest palace that ever was. His most notable achievement was to re-establish unity in China, which had been divided for hundreds of years.Originally the Chinese considered Kublai uncivilized. However, he managed to become an honored ruler. His group of Chinese advisers helped him structure his government. He created three governing branches. They handled civilian affairs, the military, and making sure important officials did their job right. Kublai insisted on agricultural development and encouraged trade with other countries. He built roads and developed canals. His government lasted thirty-four years, but his heirs were unskilled. The Yuan dynasty ended in the fourteenth century.Think:1. Why were Qin Shi Huang and Kublai Khan significant leaders? Provide details from the text to support your answer.2. What is a central idea in the passage? What details does the author use to support the idea?3. What details support the idea that Kublai Khan was an intelligent leader?Please answer ASAP!! Unjumble the sentences: 1. Prefere skate interessant le je c'est 2: la deteste nul danse c'est je bruce bought two books,one book equal 4 dollals more than three times the other book they both equal 72what is x 14/28 is an(Select all that apply!)Whole numberIrrational numberIntegerNatural numberRational number Jenny is picking apples to make apple pie. The amount ofapples that she needs to pick varies directly with thenumber of pies she plans to bake. If Jenny needs to make 12apple pies, she will need to pick 42 apples. How many appleswould she need to pick if she was only making 8 pies? True or False? Face-saving is a principle of language. a client uses a suspense account for unresolved questions whose final accounting has not been determined. if a balance remains in the suspense account at year end, the auditor would be most concerned about bryan brought 8/10 gallon of water on a hiking trip.he drank 4/10 gallon of water.how much water is left if you were to take slices of potato and place them in distilled water, what would happen to the cells? the iroquios perform rituals to honor the twins in the world on turtles back illustrating the iroquoian belief that please help 20 points Which of the following powers does the Constitution give to Congress?: A. to appoint ambassadors: B. to grant pardons for crimes:C. to impose and collect taxes:D. all of the above What is the product? y3 27 y3 27 y3 6y2 27 y3 6y2 27. A group of students designed a study which restaurant was preferred by teenagers. To gather data, the students planned to visit a number of restaurants and keep a tally of how many teenagers were at each restaurant. Q. Which type of research design does the study use? A. Sample survey B. Stratified survey C. Experimental survey D. Observational survey PLS HELP I WILL GIVE BRAINLIEST AND 50 POINTS