a pet store sells dogs, cats, birds, and hamsters. write a declaration for an anonymous enumerated data type that can represent the types of pets the store sells.

Answers

Answer 1

Enumerators can be freely utilized to provide features like control variables or even improved readability because they have been developed and specified.

What is a fundamental data type?

The primary or fundamental data types are other names for the fundamental data types. The C language uses basic data types to store the accessible values in integer and decimal representations, and these types accept both unregistered and signed literals.

What does SQL datatype mean?

A type of data is an attribute that describes the kind of data an object can store, such as binary strings, numeric data, character data, financial data, time and date data, and so on. System data types are provided by SQL Server and can be utilized with SQL Server.

To know more about data type visit:

https://brainly.com/question/22574321

#SPJ4


Related Questions

Write a function mergingelements which adds each element in array1 to the corresponding element of array2 and returns the new array.

Answers

The mergingelements program is an illustration of functions and arrays

Arrays are used to hold multiple valuesFunctions are named code segments that are executed when called

The function mergingelements

The function mergingelements written in Java, where comments are used to explain each action is as follows:

//This defines the mergingelements function

public static int mergingelements[](int [] array1, int [] array2){

//This declares the new array

    int newArr = new int[array1.length];

//The following iterates through the arrays

    for(int i=0; i<array1.length; i++ ) {

//This adds the corresponding elements of the two arrays and append them to the new array

        newArr[i] = array1[i] + array2[i];

    }

//This returns the new array

    return newArr;

}

Read more about java programs at:

https://brainly.com/question/18554491

Which sentences from the section "Bad-Guy Benefits" BEST supports the main idea of the article?
Another take on video-game violence came from University of Buffalo professor Matthew Grizzard. He found that kids
who played the bad guy in shooter games often felt guilty.
O "Maybe one way to do that is showing what the consequences of wrong decisions would be. Gaming has long been
identified as a factor in obesity, which means being very overweight
O Gaming might bum more calories than just watching TV she believes. It also may be that kids holding a controller are not
as likely to pick up a snack or a soda.
o That theory made sense to Dan Wojtowicz, 18. He is a high school student in Illinois. Wojtowicz spends up to seven
hours a day on StarCraft II." "League of Legends" and other games.

Answers

Answer:

B

Explanation:

Drag each binary subnet mask on the left to its appropriate decimal equivalent on the right.
255.0.0.0
11111111.00000000.00000000.00000000
255.255.255.128
11111111.11111111.11111111.10000000
255.224.0.0
11111111.11100000.00000000.00000000
255.255.0.0
11111111.11111111.00000000.00000000
255.255.255.252
11111111.11111111.11111111.11111100

Answers

The correct matches are as follows binary subnet mask on the left to its appropriate decimal equivalent on the right.

255.0.0.0 -> 11111111.00000000.00000000.00000000

255.255.255.128 -> 11111111.11111111.11111111.10000000

255.224.0.0 -> 11111111.11100000.00000000.00000000

255.255.0.0 -> 11111111.11111111.00000000.00000000

255.255.255.252 -> 11111111.11111111.11111111.11111100

To convert a binary subnet mask to its decimal equivalent, we need to convert each octet (8 bits) from binary to decimal.

For example:11111111.00000000.00000000.00000000 in binary is equivalent to 255.0.0.0 in decimal. Each octet represents the sum of the corresponding powers of 2. The first octet, 11111111, is equal to 2^7 + 2^6 + ... + 2^0, which equals 255 in decimal. The other octets are all zeros, representing no additional bits set, so they remain as zeros in the decimal equivalent.

Similarly, we can apply this process to convert the remaining binary subnet masks to their decimal equivalents.

By converting the binary subnet masks to their decimal equivalents, we can represent the subnet masks in a more human-readable format. Decimal subnet masks are commonly used in network configuration and routing to define the network and host portions of an IP address.

To know more about  binary subnet visit:

brainly.com/question/30749839

#SPJ11

Identify characteristics of top-down programming design. Choose all that apply.
It assumes the problem has a simple solution.
It is good for running simple calculations.
It is simple to modify if steps change.
It is made of one or more modules.
It breaks a task into simpler and simpler steps.

Answers

Answer:

The correct option is;

It is made of one or more modules.

It breaks a task into simpler and simpler steps.

Explanation:

The implementation of top-down programming approach begins from the system defining basic modules and progresses by putting in place intermediate modules that take charge of more detailed and complex activities and processes. The intermediate modules are further streamlined into more specific programming

Therefore, the top-down programming is made of one or more modules that breaks a task into simpler and simpler steps.

Answer:

A, B, D and E

Explanation:

According to the video, what tasks do Carpenters commonly perform? Select four options. supervising Plumbers, Electricians, and Roofers forming walls and flooring out of concrete cutting, shaping, and fastening wood installing rafters, joists, windows, and subflooring operating heavy equipment setting hardwood floors building kitchen cabinets painting interior walls and cabinets

Answers

Answer:

Cutting, shaping, and fastening wood.

Installing rafters, joists, windows, and subflooring.

Setting hardwood floors.

Building kitchen cabinets.

Answer:

- Cutting, shaping, and fastening wood.

                                   -  Installing rafters, joists, windows, and sub-flooring

-  Setting hardwood floors

                                                                   - Building kitchen cabinets

___________________________________________________________

Which of the following are advantages of coding manually? Check all of the boxes that apply.

You can see what rendered code looks like as you type.

You can view source code to figure out HTML structure and behavior.

You can learn how HTML works.

You do not need a lot of HTML knowledge to create complex web pages.

Answers

Answer: Answer B

Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not  

¿Las marcas tendrán relación con las garantías de los productos, por qué?

Answers

Yes, brands are often related to the guarantees of the products they offer. Brands are built over time by establishing a reputation for quality, reliability, and consistency in their products or services. By offering a guarantee, a brand is making a promise to its customers that their products will meet certain standards of quality and performance.

What is the rationale for the above response?  

A guarantee is a way for a brand to build trust with its customers, to differentiate itself from its competitors, and to demonstrate confidence in its products. When a brand offers a guarantee, it signals to customers that it stands behind its products and is willing to take responsibility for any defects or issues that may arise.

Therefore, the quality of the products and the reliability of the guarantees offered by a brand are closely related. A strong brand reputation can often be built on the strength of its guarantees, and customers are more likely to trust and remain loyal to a brand that consistently delivers on its promises.

Learn more about Brands at:

https://brainly.com/question/22068280

#SPJ1

what is a computer?write any four features of computer​

Answers

Answer:

A computer is defined as an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Four features of a computer would be CPU, GPU, Memory, and Motherboard.

Explanation:

Computer is an electronic machine which accepts raw data from the user , process the data according to the predefined set of instructions, gives and stores the result or instructions....

Or

A computer is an electronic device that can perform several task according to the given instructions...

The four features of computer are :

Speed

Accuracy

Versatility

Diligence

Storage etc....

\(...\)

Define a recursive function mergeBy that merges two sorted lists by the given criterion, for example, in an ascending order or in a descending order (so that the resulting list is also sorted). The type signature of mergeBy is as follows. MergeBy :: (a -> a -> Bool) -> [a] -> [a] -> [a]

Answers

```python

def mergeBy(compare, list1, list2):

   if not list1:

       return list2

   if not list2:

       return list1

   if compare(list1[0], list2[0]):

       return [list1[0]] + mergeBy(compare, list1[1:], list2)

   else:

       return [list2[0]] + mergeBy(compare, list1, list2[1:])

```

The `mergeBy` function takes three arguments: `compare`, `list1`, and `list2`. The `compare` parameter is a function that defines the criterion for merging, such as whether to merge in ascending or descending order. The `list1` and `list2` parameters are the two sorted lists to be merged.

The function uses recursive logic to compare the first elements of `list1` and `list2`. If the criterion defined by the `compare` function is satisfied, the smaller (or larger, depending on the criterion) element is appended to the merged list, and the function is called recursively with the remaining elements of the corresponding list and the other list unchanged. This process continues until either `list1` or `list2` becomes empty.

The resulting merged list will be sorted based on the given criterion defined by the `compare` function.

Note: In the above implementation, it is assumed that the input lists are already sorted based on the given criterion.

For more such questions on python, click on:

https://brainly.com/question/26497128

#SPJ8

Q1. Illustrate the operation of HEAPSORT on the array A = {15, 113, 12, 125, 17, 117, 120, 18, 14}. Show, visually, the binary tree just after the BUILD-HEAP is called and at the end of each of the HEAPIFY operation. Q2. Write a complete algorithm that determines if a given number is a favorite number or not. Use the following definition of a favorite number. The algorithm should take one parameter, the number, and print a message that says if the number is favorite or not. A number N (greater than 0) is said to be favorite if the sum of all its factors equals the number. For example, 6 is a favorite number because 1 + 2 + 3 = 6, and 1, 2 and 3 are favorite of 6. 28 is also a favorite number because 1 + 2 + 4 + 7 + 14 = 28, and the individual numbers are all factors of 28. Q3. Given some items, pack the knapsack to get the maximum total value. Each item has some weight and some value. Total weight that we can carry is no more than some fixed number W. So, we must consider weights of items as well as their values. Items are indivisible; you either take an item or not. Considering Weights = {3,4,6,5} Profits = (2,3,1,4} W= 8, n=4 Solved the problem with dynamic programming. Draw the look-up table, based on the Dynamic Programming method, for the 0-1 knapsack problem. Provide the final optimal solution, too Q4. Write a complete Greedy algorithm for the Fractional Knapsack problem. The problem is defined as follows: Terrorist robbing a store finds n items each item worth Pi Rupees and weighs Wi kg. Terrorist has a knapsack of capacity W kg (Terrorist can carry a total weight of not more than W kg). Terrorist is allowed to carry all the quantity available of an item or a fraction thereof. What items should the Terrorist take and how much of each of those items to maximize the value of the theft?

Answers

For this array A, the binary tree after calling Build-Heap operation would look like the following:After building the heap, the largest element will be at the root and hence, we can swap it with the last element to move it to its correct position.

Then, we will perform Heapify operation on the remaining elements except for the last element (as it is already in its correct position) to ensure the heap property. This process is repeated until the entire array is sorted. The sequence of heap after Heapify operation are:Algorithm to determine if a given number is a favorite number or not: Declare the function to calculate the sum of factors of a given number.

The total weight is 9 which is less than the maximum weight . Complete Greedy algorithm for the Fractional Knapsack problem:Declare the function to calculate the maximum value that can be obtained from the knapsack.Step 3: Define the function to calculate the maximum value that can be obtained from the knapsack as follows: End.

To know more about element visit:

https://brainly.com/question/31950312

#SPJ11

What is LinkedIn?

A job search website
A virtual job fair
A recruiter website

Answers

Answer:

A job search website.

Explanation:

which raid system offers the best protection for the least cost, which is widely used in commercial systems? raid 1 raid 4 raid 5 raid 6

Answers

RAID 5 is often considered the best option for providing a good balance between data protection and cost-effectiveness.

It is widely used in commercial systems and provides fault tolerance by distributing data and parity across multiple disks in a way that allows for the failure of one disk without losing any data. RAID 5 can be implemented with a minimum of three disks, and provides better performance and capacity utilization than RAID 1, which is another popular option for data protection but requires more disks for the same level of redundancy. RAID 4 and RAID 6 are also options for data protection, but are less commonly used than RAID 5 due to various limitations and complexities.

To learn more about data click the link below:

brainly.com/question/31380817

#SPJ11

Note that common tasks are listed toward the top, and less common tasks are listed toward the bottom. According to O*NET, what common tasks are performed by Database Administrators? Check all that apply.

managing large teams of people to complete complex long-term projects
conducting surveys to determine which customers to market products to
modifying existing databases and database management systems
designing new arrangements of desks and office equipment for efficiency
testing programs or databases and correcting errors
planning, coordinating, and implementing security measures to safeguard information

Answers

Answer:

1). managing large teams of people to complete complex long-term projects.

4). designing new arrangements of desks and office equipment for efficiency

5). testing programs or databases and correcting errors

6). planning, coordinating, and implementing security measures to safeguard information.

Explanation:

The common tasks that are carried out by Database Administrators includes the direction of substantial teams for successful accomplishment of complex projects and preparing new designs for office desks as well as equipments most prominently. The less common tasks include evaluation of databases and programs along with the error rectification and hatching the plan and harmonizing with the team members to implement it and protect information.

Answer:

cef

Explanation:

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

i need an answer asap pls!! thank you!

i need an answer asap pls!! thank you!

Answers

To create and initialize the 2D list as shown, you can use the following code:

my_list = [["Account", "Grades", "Quizzes"],

          ["Miani", "Atlanta", "Dallas", "Los Angeles", "New York", "Chicago", "Portland", "Sacramento"]]

How to explain the Code

To print the list, you can define a function named printList() that takes the list as a parameter and prints it using nested loops, as shown below:

def printList(my_list):

   for i in range(len(my_list)):

       for j in range(len(my_list[i])):

           print(my_list[i][j], end=" ")

       print()

printList(my_list)  # call the function to print the original list

To flip the order of the cities in the list, you can define another function named fliporder() that takes the list as a parameter and reverses the order of each sublist containing cities using the reverse() method, as shown below:

def fliporder(my_list):

   for i in range(1, len(my_list)):

       my_list[i].reverse()

   printList(my_list)  # call the printList() function to print the flipped list

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

PKI is the a federal information processing standard that specifies a cryptographic algorithm developed to replace both DES and 3DES. _____ Group of answer choices

Answers

The assertion that PKI is a federal information processing standard that specified an algorithm to replace DES and 3DES is FALSE.

Why is this false?

The Public Key Infrastructure (PKI) is a framework which is used to support encryption, and authentication of certificates so that businesses are secure.

There is a federal information processing standard which is used to specify a cryptographic algorithm and this standard. This then replaced DES and 3DES. It is called the Advanced Encryption Standard (AES).

Find out more on the Public Key Infrastructure at https://brainly.com/question/10651021

#SPJ1

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy of it on her website with an attached Creative Commons license. Which of the following best describes who owns the photo? A. Beatrice owns the photo because only holders of a Creative Commons license can own works online. B. Arman owns the photo because he was the original creator and did not license the work. C. Arman owns the photo because it was granted a Creative Commons license by another person online. D. Both own the photo because creating a copy makes it her intellectual property.

Answers

Answer:

To me I think it’s B

Explanation:

The best statement that describes who owns the photo is that Arman owns the photo because he was the original creator and did not license the work.

For better understanding, we have to understand why Amman owns the photo and what creative Common license.

Amman own the photo and when he puts it online, he didn't license it but made it free for all to use. That does not mean someone should take His work and use as their own. Creative Commons simply known as the term that summarizes the scope of various outcome that exists between full copyright and the public domain. That is it ranges from all rights reserved to no rights reserved. This type of licenses helps one to have copyright while allowing certain uses of your work and the licenses can stand up in a court of law. Even though Beatrice has the creative license, the photo does not belong to her.

From the above, we can therefore say that the statement of The best statement that describes who owns the photo is that Arman owns the photo because he was the original creator and did not license the work is true.

Learn more about creative license from:

https://brainly.com/question/17082747

A data analyst wants to assign the value 50 to the variable daily_dosage. Which of the following types of operators will they need to write that code?
Assignment
The analyst can use an assignment operator to write the following code: daily_dosage <- 50. In this code, the assignment operator <- is used to assign a value of 50 to the variable daily_dosage.

Answers

Since the data analyst wants to assign the value 50 to the variable daily_dosage. The types of operators that will they need to write that code is option D: Assignment.

What is an assignment operator?

The assignment operator in the C# programming language is the operator used to assign a new value to a variable, property, event, or indexer element. The use of assignment operators is also possible for logical operations like bitwise operations, operations on integral operands, and operations on Boolean operands.

Therefore, in the above case, so the code daily dosage - 50 can be written by the analyst using an assignment operator. This code uses the assignment operator - to give the variable daily dosage a value of 50.

Learn more about data analyst from

https://brainly.com/question/29384413
#SPJ1

See options below

A data analyst wants to assign the value 50 to the variable daily_dosage. Which of the following types of operators will they need to write that code?

Single Choice Question. Please Choose The Correct Option

A

Arithmetic

B

Logical

C

Relational

D

Assignment

E-commerce refers to the use of any networking technologies to transact business
True
False

Answers

E-commerce does not necessarily refer to using networking technologies to do business, which is a false statement.

Which statement best describes e-commerce?

E-commerce is described as the exchange of money and data to complete sales while purchasing or selling products or services online. It is often referred to as online commerce or electronic commerce.

An e-commerce easy response is what?

E-commerce refers to the exchange of products and services over the internet. On the information superhighway, your bustling city center or physical store is being transformed into zeros and ones. Ecommerce, usually referred to as electronic commerce or internet commerce, is the term for the online purchase and sale of products and services as well as the exchange of financial instruments.

To know more about networking technologies visit:-

https://brainly.com/question/7499316

#SPJ4

choose the output of the following c++ statement: cout << "sunny " << '\n' << "day " << endl;. a. Sunny \nDay b. Sunny \nDay endl c. Sunny Day d. Sunny \n

Answers

An input can come from a file or the command line. Reading the input and passing it to the program as necessary is achievable with C programming's built-in functions. The term “output” describes how data is shown, whether it's on a screen, a printer, or in a file.

What are the different output of c++?

To accept input and show output in C++, input and output (I/O) operators are needed. The insertion or put to operator () is the operator used to display the output, whereas the extraction or get from operator (>>) is used to take the input.

Therefore, To print output to the console, C++ utilizes cut. But printf is also used in C++ ().

Learn more about output here:

https://brainly.com/question/13736104

#SPJ1

What are benefits of using AWS Organizations? (Choose two.) O Replaces existing AWS Identity and Access Management (IAM) policies with service control policies (SCPs), which are simpler to manageO Provides the ability to create groups of accounts and then attach policies to a group O Provides the ability to create an unlimited number of nested organizational units (OUs) to support your desired structure O Simplifies automating account creation and management by using APIsO Prevents any restrictions from being put on the root user that is associated with the main organization in an account

Answers

The  benefits of using AWS Organizations are that it provides the ability to create groups of accounts and then attach policies to a group, and Simplifies automating account creation and management by using APIs. Thus, option 2nd and 4th are correct.

What are AWS Organizations?

AWS Organizations is a service that allows you to merge numerous AWS accounts into a single organization that you establish and administer centrally. AWS Organizations features account administration and unified invoicing tools, allowing you to better meet the business's financial, security, and compliance requirements.

The advantages of utilizing AWS Organizations are that it allows you to build groups of accounts and then connect policies to them, and it simplifies account creation and maintenance by leveraging APIs. As a result, options 2nd and 4th are correct.

Learn more about AWS Organizations here:

https://brainly.com/question/30176139

#SPJ1

What is the drawback of the linear model?
A.
communication is only in one direction
B.
too much noise is created
C.
no feedback is sent on receiving the message
D.
long travel between the sender and the receiver

Answers

Answer:

long travel between the sender and the receiver

Explanation:

The drawback of linear model is long travel between the sender and the receiver. The correct option is D.

What is linear model?

Depending on the context, the phrase "linear model" is used differently in statistics.

The word is frequently used interchangeably with a linear regression model since it occurs most frequently in relation to regression models.

The phrase has a different connotation when employed in time series analysis, though.

Something that is linear is related to a line. A line is built using all of the linear equations. A non-linear equation is one that cannot be represented by a straight line. It has a variable slope value and resembles a graphed curve.

The linear model's disadvantage is the distance between the transmitter and the receiver.

Thus, the correct option is D.

For more details regarding linear model, visit:

https://brainly.com/question/29757372

#SPJ2

30 POINTS, ON A TIMER HELP ASAP

your answer will be removed if you steal my points!!

The history of the Internet dates back to the 1960s, when a group of scientists at Stanford University were entrusted to design which of the following as part of the competition between the US and its then Cold War enemy, the USSR?


a network of sophisticated computers

a mainframe to siphon information

a computer to control weapons

a super computer for the US government

Answers

b is not the answer

for c the goverment  dont  need a comptor to control weopons they have a briefase.      

for a it dont  make sense in that time

so it d pls mark barinliest    

Which of these is a biotic factor in a forest?
Will
O A. Climate
O O
O B. Terrain
O C. Trees
O D. Water​

Answers

Answer: trees

Explanation:

Implement the method countSecondInitial which accepts as parameters an ArrayList of Strings and a letter, stored in a String). (Precondition: the
String letter has only one character. You do not need to check for this.) The method should return the number of Strings in the input ArrayList
that is in the second index with the given letter. Your implementation should ignore the case of the Strings in the ArrayList
Sample Run:
Please enter words, enter STOP to stop the loop.
find
dice
hi
dye
STOP
Enter initials to search for, enter STOP to stop the loop.
1
Search for 1: 3
Hint - the algorithm to implement this method is just a modified version of the linear search algorithm.
Use the runner class to test your method but do not add a main method to your U7_14_Activity One.java file or your code will not be scored
correctly.
We have provided a couple of sample runs that can be used to test your code, but you do not need to include a Scanner and ask for user input when
submitting your code for grading because the grader will test these inputs automatically.

Answers

Answer:

import java.util.ArrayList;

public class U7_L4_Activity_One

{

 public static int countSecondInitial(ArrayList<String> list, String letter)

 {

   char letter1 = letter.toLowerCase().charAt(0);

   int count = 0;

   String phrase = "";

   for(int i = 0; i < list.size(); i++)

   {

     phrase = list.get(i).toLowerCase();

     if(phrase.charAt(1) == letter1)

     {

       count++;

     }

   }

   return count;

 }

}

Explanation:

I genuinely couldn't tell you why the program cares, but it worked just fine when I ran the search word as a char variable as opposed to a 1-length string variable, i.e. the inputted 'letter' parameter.

If it works, it works.

PS. You got 33% RIGHT because you didn't have a 'public static void main' as the method header. I don't doubt your code works fine, but the grader is strict about meeting its criteria, so even if your code completed it perfectly and THEN some, you'd still get the remaining 66% wrong for not using a char variable.

Define the term editing​

Answers

Answer:

editing is a word file mean making changes in the text contain is a file. or a word file is one of the most basic ms office word operation.

Which of the following is a distraction that you find when photographing animals at the zoo?

Fences
Enclosure glass
Other people
All of the above

Answers

Answer:

D all of the above

Explanation:

because fences, enclosure glass, and other people are all distracting from the real focus which is the animal.

Please Mark brainliest and give 5 star.

Answer:

All of the above (I did the test and got it right)

Explanation:

What security factors do companies need to consider when buying an operating system?

Answers

Answer:

What they can do to prevent malware and hacking.

Explanation:

They would want the ability to have high security including strong firewalls and a minimal amount of loopholes in the OS itself. A company can't always rely on a patch to come through and would instead need something guaranteed to be nearly perfectly secure. For this reason, some companies choose Linux or Unix.

You’ve been tossed into an insane asylum. What do you tell the people there to prove to them that you don’t belong inside?

Answers

Was this a question on an assignment or are you in an asylum right now

An asylum is for crazy people. I'm crazy. Crazy people don't realize they're crazy. If I realize I'm crazy, then I'm not crazy. Therefore, I do not belong here.

Other Questions
A jet engine has an incoming mass flow rate of air of 100 kg/s at a flight velocity of 200 m/s. The thrust of the engine can be calculated as the net of exhaust momentum minus the incoming momentum. The exit velocity of the jet exhaust is 900 m/s. Assuming that the fuel flow rate is 2 kg/s, what is the thrust produced by the engine? HELPP ITS 6 GRADE MATHS LOLLLL a client, newly diagnosed with a seizure disorder, asks the nurse why the client is receiving a specific drug. what would be the best answer by the nurse? A cone-shaped container has a height of 240 in. And a radius of 150 in. The cone is filled with a liquid chemical. The chemical evaporates at a rate of 12,000 in per week. How many weeks will it take for all of the chemical to evaporate?. What years did adams serve as president of the united states of america?. a monopoly consists of how much competition Why did President Reagan follow President Kennedy and President Nixon to make his speech at almost the exact same site they visited? find the distance and displacement by minutes hand of length by 7 cm at the end of 3 mins Work out 81.19 % of 283.84 cm Give your answer rounded to 2 DP. If 10 pounds of nails cost $4. 38, what is the cost to the bear test cent of 3. 2 pounds of the same type of nail? A whole number whose square root is an integer FILL THE BLANK. Federal and state agencies regulate the beauty and wellness professions. State agencies _____________. The pharmacist has a 2.8 L bottle of cough syrup. If she fills a bottle that is 1,200 ml, how many ml of cough syrup does the pharmacist have left?160 ml400 ml1,600 ml4,000 ml Read the excerpt from part 2 of Zeitoun. Zeitoun went outside, the air humid and gusty. He tied the canoe to the back porch. The water was whispering through the cracks in the back fence, rising up. It was flowing into his yard at an astonishing rate. As he stood, it swallowed his ankles and crawled up his shins. Back inside, he continued to move everything of value upward. As he did, he watched the water erase the floor and climb the walls. In another hour there was three feet of water indoors. And his house was three feet above street level. What conclusion can readers draw about this character vs. Nature conflict? Zeitouns strength allows him to save all of his possessions. As a result of the floods force, Zeitouns confidence is lost. Despite Zeitouns competence, his home sustains damage. Zeitouns fear of the flood forces him to abandon his efforts. Which expression is equivalent to square root 36/25 ? 6/25, 5/6 noble cause corruption is a type of wrongdoing that stems from a crime control orientation. Exercise 1 Draw one line under the simple subject and two lines under the simple predicate of each sentence below.Clouds of dust around the van obscured our vision. find the angle ACB of the given triangle with sides AB= 9cm and BC= 5cm. (give your answer to the nearest degree) 8b - 5r use b = 6 and r = 3 In an experiment, the number of bacteria present each day form a geometric sequence. On the first day, there were 100 bacteria. On the eighth day, there were 12,800 bacteria. How many bacteria were there on the fourth day?