Assume that class Vehicle contains the following method.

public void setPrice(double price)

{ /* implementation not shown */ }

Also assume that class Car extends Vehicle and contains the following method.

public void setPrice(double price)

{ /* implementation not shown */ }

Assume Vehicle v is initialized as follows.

Vehicle v = new Car();

v.setPrice(1000.0);

Which of the following is true?

A. The code above will cause a compile-time error, because a subclass cannot have a method with the same name and the same signature as its superclass.
B. The code above will cause a run-time error, because a subclass cannot have a method with the same name and the same signature as its superclass.
C. The code above will cause a compile-time error because of type mismatch.
D. The code v.setPrice(1000.0); will cause the setPrice method of the Car class to be called.
E. The code v.setPrice(1000.0); will cause the setPrice method of the Vehicle class to be called.

Answers

Answer 1

The code v.setPrice1000.0, will cause the setPrice method of the Car class to be called. This is an example of method overriding, where the subclass Car has a method with the same name and signature as the superclass Vehicle.

When v is initialized as a new Car object, it still retains its type as a Vehicle reference. However, when the method v.setPrice(1000.0) is called, it will call the overridden method in the Car class rather than the method in the Vehicle class. This is because the method resolution happens at runtime and is based on the actual object type rather than the reference type.

In this case, since class Car extends Vehicle, it inherits the setPrice method from the Vehicle class. However, since the Car class also contains its own setPrice method, it is said to override the method from the Vehicle class. When the setPrice method is called on an object of type Vehicle but initialized as a Car Vehicle v = new Car() , the method of the Car class will be called due to method overriding and polymorphism in Java. There are no compile-time or run-time errors, and the setPrice method from the Car class will be executed.

To know more about setprice visit :

https://brainly.com/question/16100528

#SPJ11


Related Questions

Determine whether mr.Mullins is eligible. Why or why not

Answers

Mr. Mullins is not eligible as he made some critical decisions without actually getting to the root of them.

How to determine Mr. Mullin's eligibility

The text about Mr. Mullins and Mr. Conatser was because the former gave the latter permission to drive a truck because he had seen him driving a similar vehicle.

The only condition in which Mr. Mullins would be eligible would be if he had followed the right steps in determining the legal right of Mr. Conatser to drive a truck.

Learn more about eligibility here:

https://brainly.com/question/1138155

#SPJ1

Activity Sheet 2
A.Illustrate how to create the object below using draw and modify commands.​

Answers

Answer:

Vjfxfffccvvvvvv

Explanation:

Hgvjhgxxgyjjbvccjkn Hugh bună vvvvhg un www buukbbchfcvbvc. Hggvhhvbhchgx

The use of turn signals and your __________ are the methods of communicating to other road users that are used most often.

Answers

Whenever the driver hits the brake pedal, brake lights activate. They warn other drivers that you are braking, thus improving everybody's driving safety. For this, they are usually brighter than tail lights and incorporate a third brake light.

As you brake, your brake lights communicate to other cars that they must slow down. As a result, it is critical to check that the brake lights are operational. If you notice a danger ahead and need to back off, consider backing off right away so the cars behind you can prepare to back off safely.Its most common methods of communication with other road users are the usage of brake lights and "brake lights".

Therefore, the final answer is "brake lights".

Learn more:

brainly.com/question/10949936

Which programming language was released first? FORTRAN BASIC Perl Pascal

ANSWER: FORTRAN (A)

Answers

Answer:

FORTRAN

Explanation:

The first programming language was FORTRAN .It was released on 1957About 65 years ago , when programming languages are at infant stage

Answer:

Fortran

Explanation:

Fortran is rarely used today in industry — one ranking ranks it behind 29 other languages. However, Fortran is still a dominant language for the large scale simulation of physical systems, ie. for things like the astrophysical modeling of stars and galaxies, hydrodynamics codes

your software system will have to model 4 separate stoplights that can display one of three different colors at any time: red, yellow or green. the four lights each point in a different direction: north, south, east, and west.

Answers

To model the four separate stoplights that can display one of three different colors (red, yellow, or green), we can use a software system. Each of the four lights points in a different direction: north, south, east, and west. Here's how we can implement this system:

Define the stoplights: Create four variables, each representing a stoplight pointing in a specific direction. For example, we can use variables like "northStoplight", "southStoplight", "eastStoplight", and "westStoplight".

Set the initial state: Assign an initial color to each stoplight. For instance, we can set "northStoplight" to red, "south Stoplight" to green, "east Stoplight" to yellow, and "west Stoplight" to red. Each of the four lights points in a different direction: north, south, east, and west.

To know more about stoplights visit:

https://brainly.com/question/28182073

#SPJ11

An online ad that displays in a new window that opens in front of the current window is called a.

Answers

An online ad that displays in a new window that opens in front of the current window is called a pop-up ad.

What is an ad?

Ad or advertising refers to the strategies and methods used to make goods, services, viewpoints, or causes known to the public with the intention of influencing how they react to what is being advertised.

The majority of advertising promotes a product that is available for purchase, but similar techniques are also employed to persuade people, among many other things, to drive defensively, donate to charities, or cast ballots for particular candidates.

The most significant source of revenue for the media outlets through which it is carried out is often advertising (such as newspapers, magazines, or television stations). Advertising has grown to be a significant and significant service industry in the noncommunist world.

Learn more about Advertising

https://brainly.com/question/3163475

#SPJ4

Terry is building a web site and wants to have three main links called Home, Product Info, and Contact Us. She will create a hierarchy of page elements and revise the style sheets. In this case, the Home page contains two _____ elements.

Answers

In Terry's website, the Home page contains two hierarchical elements. These elements play a crucial role in structuring and organizing the content of the web page.

By utilizing a hierarchy of page elements, Terry can effectively present the Home page's information and enhance the user experience. When building a website, it is common to structure the content using a hierarchical approach. In this case, the Home page consists of two hierarchical elements. These elements could be sections, divs, or any other HTML elements that Terry chooses to use in her website design.

By dividing the content into hierarchical elements, Terry can establish a clear visual and structural hierarchy on the Home page. Each element can contain different types of content, such as text, images, or interactive elements, providing a logical organization of information.

The use of a hierarchy helps users navigate and understand the content better. It allows for easy identification of different sections or areas on the Home page and helps maintain consistency throughout the website.

In summary, Terry's Home page contains two hierarchical elements, which contribute to the overall structure and organization of the content. By utilizing a hierarchical approach, Terry can create a visually appealing and user-friendly website that effectively communicates information to her visitors.

Learn more about website here: brainly.com/question/6107621

#SPJ11

electronic junk mail is considered a computer virus. (True or False)

Answers

FALSE, The claim is untrue since a virus is software, whereas electronic junk mail, or spam, is typically generated by marketing firms for commercial gain.

Regarded as electronic spam mail?

Email spam, commonly referred to as junk email, is the practise of sending unwanted email to a large list of subscribers in mass.

What is unsolicited email?

Bulk electronic mail transmitted over the internet to several recipients is known as spam email or junk email. These emails' primary objective is to promote themselves as much as possible. No human ever sends junk mail.

To know more about software visit:-

https://brainly.com/question/1022352

#SPJ4

What actions can you take to ensure the physical security of network devices?

Answers

use vpns, use long hard to figure out passwords, and keep ur devices in sight or reach of you

Answer:

Here are some steps you can take to make sure your network is secure:

Take physical precautions. ...

Make sure all of your server's security features are enabled. ...

Use both hardware and software firewalls. ...

Install the latest version of your server's software. ...

Guard passwords. ...

Be Wi-Fi savvy.

Explanation:

PLEASE MARK ME AS BRAINLIEST

How do I make someone "Brainiest".
First person to reply will get "Brainiest"

Answers

Answer:

Usually when someone answers a question there would be an option to mark the brainliest. However, you only get one every like 24 hrs so if you already gave someone brainliest you can't give it to someone else for a while

Explanation:

Answer:

Brainiest

Explanation:

Pls help me pls I’m struggling

Pls help me pls Im struggling

Answers

Answer:

Forward(30)

Explanation:

To turn right you have to say right(Angle) and then forward(steps) to go that many steps in that direction

when you open a web browser and have access to many home pages in your browser, this feature is known as?

Answers

Answer:

The feature you're talking about is usually called a web browser's "homepage." It lets users set a specific web page or a group of web pages to load automatically when they open their web browser. Users can change the settings for their homepage to suit their needs. Some web browsers may also have extra features, like the ability to open multiple tabs with different homepages or to show a grid of frequently visited sites.

hope its help

follow me its my answer

when you open a web browser and have access to many home pages in your browser, this feature is known

differentiate between organizational policies and organizational procedures?​

Answers

Answer:

Policies set parameters for decision making but can still be flexible whereas procedures provide step by step routines for specific tasks and need to be followed

Explanation:

basically policies are not as restrictive as procedures

A policy is a guiding principle used to set direction in an organization. A procedure is a series of steps to be followed as a consistent and repetitive approach to accomplish an end result.

I need help please I’m behind

I need help please Im behind

Answers

Answer:

The last one

Explanation:

Software is coding so they'll be impressed :)

Answer:

network administrator

Explanation:

It says a job that manages NETWORK hardware and software. So I would put network administrator.

Given that n refers to a positive int use a while loop to compute the sum of the cubes of the first n counting numbers, and associate this value with total. Use no variables other than n, k, and total.

Answers

Answer:

first, we have to make value for n.

n = 10

now, use the while loop to cube the numbers.

while n = 10 and k = 4:

k = n ^ 3

lastly, make a total.

total = k

the total should be 10 cubed, given the value.

I hope this helps!

Which generation experienced a generation gap?
A.
the boom generation
B.
the silent generation
O C.
Generation X
D.
the millennial generation

Answers

Answer:

B. Baby boomers (the boom generation)

Explanation:

They went against everything their parents said. Also I took a test on it and got it right.

Find the output of the following:
a = 10
b = str(82)
'b, a = a, b
a=a * 3
print(a, b)​

Answers

The code you provided has a small error in the assignment statement. The corrected version is as follows:

The Code

a = 10

b = str(82)

b, a = a, b

a = a * 3

print(a, b)

Let us analyze the code systematically by breaking it down into individual steps.

The variable a is allocated the value of 10.

b = str(82): Converts the integer 82 to a string and assigns it to the variable b.

b, a = a, b: Swaps the values of a and b. After this statement, b will have the value 10, and a will have the value '82'.

a = a * 3: Multiplies the value of a (which is '82') by 3 and assigns the result to a. The result is the string '828282'.

print(a, b): Prints the values of a and b.

The output will be:

828282 10

So, the final output is '828282 10'.

Read more about program output here:

https://brainly.com/question/18079696

#SPJ1

Suppose you have been hired as a Software Engineer by a company XYZ. You have been assigned a task to develop a complex data processing application, involving the parsing and analysis of large XML files that contain structured data. This structured data is organized and formatted consistently. Your specific responsibility revolves around memory allocation for the data processing tasks, with a focus on fast data access and no requirement for memory deallocation. For doing so, either you will carry out the stack memory allocation or heap memory allocation.

Answers

As a software engineer, my responsibility revolves around memory allocation for the data processing tasks with a focus on fast data access and no requirement for memory deallocation.

For this task, either stack memory allocation or heap memory allocation can be used. Before deciding between stack and heap memory allocation, we should understand the basics of both types of memory allocation. Stack Memory Allocation: Stack memory allocation is an automatic memory allocation that occurs in the stack section.

It is a simple and efficient way of memory allocation. However, it is limited in size and can result in stack overflow if the allocated size is more than the limit. It follows a Last In First Out (LIFO) order. It is faster compared to heap memory allocation due to its simple mechanism and fixed size.

To know more about engineer visit:

https://brainly.com/question/31140236

#SPJ11

Read the excerpt from Greta Thunberg’s speech at the United Nations Climate Action Summit.

You say you hear us and that you understand the urgency. But no matter how sad and angry I am, I do not want to believe that. Because if you really understood the situation and still kept on failing to act, then you would be evil. And that I refuse to believe.

How does the underlined sentence create pathos to make the speaker’s claim persuasive?

It shifts the tone of the argument from one of resentment to one of regret.
It suggests that the speaker sees the humanity in her audience despite her disappointment.
It implies that those responsible for combatting climate change are doing the best they can.
It highlights the intensity of her disagreement with the actions of her audience.

Answers

The statement shows that It suggests that the speaker sees the humanity in her audience despite her disappointment.

What is the meaning of the excerpt

In the second excerpt from the same speech, the underlined sentence creates pathos by suggesting that the speaker still believes in the humanity of her audience despite their inaction.

The statement implies that the speaker has not given up hope and still believes that people can change and do better. By using a tone of regret rather than resentment, the speaker emphasizes the gravity of the situation and the importance of taking action.

The statement also creates a sense of moral responsibility, as it suggests that those responsible for combating climate change must act in the best interest of future generations, or risk being deemed "evil."

Read more on humanity here:https://brainly.com/question/27438014

#SPJ1

Which if the following broad categories is not a type of analytic technique?a. manipulative analyticsb. descriptive analyticsc. predictive analyticsd. prescriptive analytics

Answers

Descriptive, Diagnostic, Predictive, and Prescriptive analytics are the four different categories.

Businesses rely on three different forms of analytics to help them make decisions: descriptive analytics, which explain what has actually occurred; predictive analytics, which show us what might happen; and prescriptive analytics, which explain what ought to occur going forward. Students use the mean, mode, median, and range to analyze the data and draw conclusions. Using both recent and old data, descriptive analytics seeks out patterns and connections. Because it only describes trends and associations without going any further, it is frequently referred to as the most basic type of data analysis.

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

Depict the symbols used to define the following in a system map (a) boundary line (b) relationship/interaction between components (c) impact of components

Answers

The depictions of the symbols that are used to define the following in a system map are as follows:

Boundary line: A dark black line is used for this representation.Relationship between components: Dotted lines or solid lines are used for this representation. Impacts of components: The impact of components on a system can be represented by different symbols depending on the nature of the impact. Some common symbols include Plus and minus signs, arrows, circles or bubbles, etc.

What is a system map?

A system map may be characterized as a type of synthetic and organized representation of any geographical location that significantly expresses in one single frame all the different actors involved in service delivery, and their mutual links.

A boundary line is utilized in order to determine the limits or scope of a system. It is typically drawn as a solid line around the system. The relationship or interaction between components in a system can be depicted through numerous distinctive symbols relying on the nature of the relationship.

Therefore, the depictions of the symbols that are used to define the following in a system map are well described above.

To learn more about system map, refer to the link:

https://brainly.com/question/30350364

#SPJ9

histograms are used for numerical data while bar charts are suitable for categorical data. T/F

Answers

True. histograms are suitable for numerical data while bar charts are suitable for categorical data.

Histograms are used to display the distribution of numerical data, specifically continuous data, by dividing the data into intervals called bins. The height of each bar in a histogram represents the number of data points that fall into that bin. On the other hand, bar charts are used to display categorical data,

The height of each bar represents the count or frequency of each category. Bar charts are often used to compare different categories or groups, while histograms are used to show the distribution and shape of the numerical data.

To know more about data visit:

https://brainly.com/question/30051017

#SPJ11

a(n) __________ is a computer, data, or network site that is designed to be enticing to crackers to detect, deflect, or counteract illegal activity. a. honeypot
b. firewall
c. bot herder
d. botnet
e. zombie computer

Answers

A honeypot is a computer, data, or network site that is designed to be enticing to crackers to detect, deflect, or counteract illegal activity.

Essentially, a honeypot is a trap that is set up by security professionals to attract hackers and other cybercriminals. The idea is to make the honeypot appear vulnerable and valuable to these criminals, thereby drawing them in and allowing security professionals to monitor their behavior and gather information about their tactics.Honeypots can take many forms, including fake websites, fake servers, and even fake virtual machines. They are typically designed to appear as if they contain sensitive or valuable information that would be of interest to hackers, but in reality, they are closely monitored by security experts. The goal is to learn more about the tactics used by cybercriminals so that these tactics can be countered in the future.In some cases, honeypots are used to redirect hackers away from more important systems and data. For example, a honeypot might be set up to lure hackers away from a company's main network, thereby reducing the risk of a successful cyber attack. Overall, honeypots are an important tool in the fight against cybercrime and can help security professionals stay one step ahead of the criminals.

For such more questions on honeypot

https://brainly.com/question/17004996

#SPJ11

The term referred to in the question is "honeypot." A honeypot is a security mechanism designed to attract potential attackers by creating a system that appears vulnerable, valuable, or both, to lure them away from valuable systems and data.

A honeypot can be a physical or virtual system or network that is deployed intentionally to collect information about the attacker's methods, tools, and objectives. The goal of a honeypot is to identify potential vulnerabilities in the system, learn more about the attacker's tactics, and develop strategies to prevent and mitigate future attacks. Honeypots can be used by security professionals and researchers to analyze new and evolving threats, identify trends, and gather intelligence. They can also be used to distract attackers from valuable systems, buy time to develop countermeasures, and create a false sense of security.

However, honeypots can also pose risks if they are not configured and managed properly. Attackers may use honeypots to launch attacks on other systems or use the information collected to improve their techniques. Therefore, it is essential to use honeypots with caution and in conjunction with other security measures to maximize their benefits and minimize the risks.

Learn more about honeypot  here:

https://brainly.com/question/24182844

#SPJ11

1. An isosceles triangle is a triangle that has at least two equal sides. Write a pseudocode algorithm that determines whether a triangle is an isosceles triangle. • The user inputs the lengths of the three sides as Length 1, Length2, Length3 • If any two sides have the same length the program outputs "Isosceles". • Otherwise the program outputs "Not Isosceles". [6]​

Answers

The pseudocode algorithm that  tends to tell whether a given triangle is seen as an isosceles triangle is known to be given in the image attached

What is the program?

In the image algorithm, we need to read all of the lengths of the various three sides of the triangle that has been given from the user.

Thereafter, one need to check if there is found to be any of the two sides that is said to have the same length via the use of the term the OR logical operator.

In all, the algorithm is one that looks if any two sides of the given triangle is said to have the same length.

Learn more about program from

https://brainly.com/question/23275071

#SPJ1

Your coworker has created a webpage using HTML, but it is pretty dull. Which of these would you use to make it more visually appealing? Group of answer choices Python a database CSS a binary converter

Answers

The CSS would be employed to make the web-page more visually appealing since its would add some flare as it’s used for styles.

Cascading Style Sheets refers to a style sheet language used for describing the presentation of a document written in a markup language such as HTML

Hence, the CSS would be employed to make the web-page more visually appealing since its would add some flare as it’s used for styles.

Therefore, the Option C is correct.

READ MORE ABOUT CSS

brainly.com/question/26051375

You manage a group of 10 Windows 8 workstations that are currently configured as a Workgroup.
Which are advantages you could realize by installing Active Directory and adding the computers to a domain? (Select two.)
a Centralized authentication
b Centralized configuration control
c Reduced need for specialized hardware
d Decreased cost to implement
e Increased local control of workstation settings

Answers

By installing Active Directory and adding the Windows 8 workstations to a domain, you could realize two major advantages: centralized authentication and centralized configuration control.

Centralized authentication means that users can use the same username and password to access any workstation in the domain. This simplifies the login process for users and makes it easier for IT administrators to manage user accounts and access permissions. Authentication can also be enhanced with features such as two-factor authentication, smart card authentication, and password policies. Centralized configuration control means that IT administrators can apply the same configuration settings, software installations, and security policies to all workstations in the domain. This makes it easier to manage updates, patches, and software licenses, and ensures that all workstations are consistent and secure. Configuration control can also be enhanced with features such as Group Policy Objects (GPOs) and System Center Configuration Manager (SCCM).

In terms of the other options listed, adding the workstations to a domain may actually increase the need for specialized hardware and could potentially increase the cost to implement, as domain controllers require additional resources. Additionally, increased local control of workstation settings may not be desirable if IT administrators want to ensure consistent security and configuration settings across all workstations..

Learn more about hardware here: https://brainly.com/question/23882707

#SPJ11

Which god kept the same name when adopted from Greek mythology by the Romans? a. Venus b. Zeus c. Juno d. Apollo

Answers

The Roman goddess Juno kept the same name when adopted from Greek mythology.

In Greek mythology, Juno was known as Hera, the queen of the gods and goddess of marriage, childbirth, and family. When the Romans adopted the Greek gods and goddesses, they identified Juno as the equivalent of Hera and incorporated her into their religious and cultural practices.

Juno became an important figure in Roman mythology and was often depicted as the protector of women, especially married women. She was also associated with the idea of fertility and the birth of new life, as well as the idea of civic responsibility and social order.

To know more about mythology click here:

brainly.com/question/2497166

#SPJ4

What is the OOB automation timing for solved ticket to become closed tickets? How many days before it's closed with inborn functionality (even without automation)?

Answers

The timing for a solved ticket to become a closed ticket varies depending on the specific configuration of your helpdesk software and the policies and procedures of your organization.

The OOB automation timing for solved tickets to become closed tickets depends on the specific configuration of your helpdesk software. Generally, helpdesk software has a setting that allows administrators to determine how many days must pass after a ticket is marked as solved before it is automatically closed. This setting can be adjusted to meet the specific needs of your organization. Without automation, the timing for a solved ticket to become a closed ticket would also depend on the policies and procedures of your organization. For example, your team may have a policy that requires a manager to review all resolved tickets before they are officially closed. Alternatively, your team may simply wait a set number of days after a ticket is marked as solved before closing it manually.

To know more about software visit:

brainly.com/question/985406

#SPJ11

why is it necessary to have usernames and passwords if one is working on a network?​

Answers

Answer:

So nobody finds and uses your personal information

help plz

1. Write a function to return the larger of two numbers entered from two user inputted values, where the user inputs are entered after the displays of “First Entry =” and “Second Entry = ”. The numbers should be decimal values (not just integers).



2. Write a function to return the word that is first alphabetically from two user inputted text entries, where the user inputs that text by entering their own words after the displays of “First Entry =“ and “Second Entry =“. Remember that you can use the operators with strings. (You can assume that the user only inputs lower case words.)

Answers

1.

first = float(input("First Entry = "))

second = float(input("Second Entry = "))

def func(num1, num2):

   return max(num1, num2)

print(func(first, second))

2.

first = input("First Entry = ")

second = input("Second Entry = ")

def func(word1, word2):

   return sorted([word1,word2])[0]

print(func(first, second))

I hope this helps!

In this exercise we have to use the knowledge of computational language in python to write the following code:

The code can be found in the attached image.

That way, to find it more easily we have the code like:

First code:

first = float(input("First Entry = "))

second = float(input("Second Entry = "))

def func(num1, num2):

  return max(num1, num2)

print(func(first, second))

Second code:

first = input("First Entry = ")

second = input("Second Entry = ")

def func(word1, word2):

  return sorted([word1,word2])[0]

print(func(first, second))

See more about python at brainly.com/question/26104476

help plz1. Write a function to return the larger of two numbers entered from two user inputted values,
help plz1. Write a function to return the larger of two numbers entered from two user inputted values,
Other Questions
most people mis-recall the sentence, "the angry rioter threw the rock at the window" as "the angry rioter threw the rock through the window." this best illustrates the importance of universal containers (uc) customers have provided feedback that their support cases are not being responded to quickly enough. uc wants to send all unassigned cases that have been open for more than 2 hours to an urgent case queue and alert the support manager. which feature should an administrator configure to meet this requirement? Determine the solution to the system of equations graphed below and explain your reasoning in complete sentences. 10 cm15 cm17 cm5 cmWhat is the volume of this figure?6 cm10 cm if you can only find information about an event on radio, television, and social media, then the event likely took place group of answer choices a week ago. a year ago. a month ago. yesterday. today. What does GDP stand for and why is it important? lam a multiple of 6.lam also a multiple of4.lam less then 30. who am l? Mays and McCovey are beer-brewing companies that operate in a duopoly (two-firm oligopoly). The daily marginal cost (MC) of producing a can of beer is constant and equals $0.40 per can. Assume that neither firm had any startup costs, so marginal cost equals average total cost (ATC) for each firm. Which substance is the least toxic? a. chlorine (LD50 = 850 mg/kg) b. vitamin A (LD50 = 2000 mg/kg) c. cola (LD50 = 140 mg/kg) d. aspirin (LD50 = 200 mg/kg) what did the aztecs design and build that only a few world empires would master? (hint: we saw these in the colosseum documentary) At a basketball game, a team made 57 successful shots. They were a combination of 1- and 2-pointshots. The team scored 94 points in all. Write and solve a system of equations to find the number ofeach type of shot.There were2-point shots and1-point shots The area of genomics that studies the similarities and differences in gene content, function, and organization of whole genomes of different organisms is _____ genomics. Please choose the correct answer from the following choices, and then select the submit answer button. Answer choices A bag contains 6 blue marbles, 4 red marbles, and 4 green marbles. You choose one without looking,What is the probability that it is red or green? Enter your answer as a fraction.The probability that you choose a red marble or a green marble is From 1995 - 2008 in the US 648 people were struck by lightening. 531 of them were men. You want to see if this observation differs from the null hypothesis, that 50% of people who are hit by lightening would be men, based on the proportion of men in the population as a whole. Calculate the probability under the normal distribution of getting a result of 531 or more (including the continuity correction). Use the binomial test with a normal approximation. What is your conclusion? __MgCl2 +_Na3PO4 -->NaCl_Mg3(PO4)2 +---In the reaction above, how many moles of sodium chloride would be producedif you started with 20 grams of magnesium chloride and excess sodiumphosphate? The equation is not balanced.(If anyone can answer in depth if appreciate it ) which event does not take place before the start of mitosis? view available hint(s)for part a which event does not take place before the start of mitosis? dna is replicated. the parent cell grows. the nuclear envelope disintegrates. organelles proliferate. Create a campaign of 3-5 visual and/or written radio spot ads which make use of various techniques to send a single clear persuasive message. This message can be as simple as the selling of a product or as complex as the delivery of an important social message.If you choose this option, be sure to include each feature of the form:propaganda techniques such as bandwagon, name-calling, and emotional transferadvertising techniques such as the use of mind tricks, branding, and curiositya consistent and recognizable style that unites the different ads Based on the following products, predict the parent acid and base:_______ (parent base) + 3 _________ (parent acid) 3 H2O + AlCl3(40 points) Determine the area of the triangle at the back of the prism ( base is 6 cm,height is 4 cm ) What are your thoughts on track & field being considered a sport? Why or why not?