Consider the following pattern of branch outcomes: T, NT, T, T, NT. (T = Taken, NT = Not Taken) (a) (5 pts) What is the accuracy of always-taken predictors for this sequence of branch out- comes? (b) (5 pts) What is the accuracy of the 2-bit predictor for this sequence of branch outcomes? Assume the predictor starts in "strongly not-taken" state. 5 (c) (Extra Credit, 10 pts) What is the accuracy of the 2-bit predictor if this pattern is repeated forever (e.g., in an infinite loop)? (d) (Extra Credit, 10 pts) Briefly describe a predictor design that would achieve a perfect accuracy if this pattern is repeated forever. You predictor should be a sequential circuit with one output that provides a prediction (1 for taken, 0 for not taken) and no inputs other than the clock and the control signal that indicates that the instruction is a conditional branch.

Answers

Answer 1

the accuracy of this predictor would be 100%.

(a) The accuracy of always-taken predictors for this sequence of branch outcomes is 60%.This is because out of the 5 branch outcomes, 3 were taken (T), and 2 were not taken (NT). Therefore, the percentage of correct predictions by an always-taken predictor would be (3/5) * 100% = 60%.(b) The accuracy of the 2-bit predictor for this sequence of branch outcomes is also 60%.Assuming the predictor starts in the "strongly not-taken" state, the first branch outcome (T) would be mispredicted, so the predictor would transition to the "weakly taken" state.

The next branch outcome (NT) would also be mispredicted, so the predictor would transition to the "strongly not-taken" state. The third branch outcome (T) would be correctly predicted, so the predictor would transition to the "weakly taken" state. The fourth and fifth branch outcomes (both T) would also be correctly predicted, so the predictor would remain in the "weakly taken" state.

Therefore, the percentage of correct predictions by a 2-bit predictor would be (3/5) * 100% = 60%.(c) If this pattern is repeated forever (e.g., in an infinite loop), the accuracy of the 2-bit predictor would be 100%.This is because the predictor would eventually learn the pattern and transition to the "strongly taken" state after observing the first three branch outcomes.

To know more about accuracy visit:

brainly.com/question/31696461

#SPJ11


Related Questions

what purpose does the world wide web serve

Answers

The World Wide Web (WWW) serves as a global information-sharing system on the internet.

Its purpose is to provide a decentralized platform for accessing and sharing a wide range of information in various formats, such as text, images, videos, and interactive content. The WWW enables users to navigate through interconnected web pages using hyperlinks and browse websites hosted on servers worldwide. It facilitates communication, collaboration, and the dissemination of knowledge across geographic boundaries. The WWW has transformed the way people access and interact with information, empowering individuals, businesses, and organizations to publish, retrieve, and exchange data on a global scale, thus fostering connectivity and information exchange on an unprecedented level.

To learn more about internet  click on the link below:

brainly.com/question/31952125

#SPJ11

Does anyone one watch LazarBeam?​

Answers

Answer:

yes

Explanation:

I do sometime when I have nothing to do

The study of acoustic energy is part of:

Question 4 options:

electromagnetic theory.


nuclear theory.


sound theory.


galvanic theory.

Answers

Answer: Sound Theory

Explanation:

Just took the test

-K12 Student

The study of acoustic energy is part of sound theory.

What do you mean by Sound Theory?

Sound theory refers to the scientific study of sound and its properties. This includes both the physical properties of sound and the way that it is perceived by humans and other animals. The study of sound is an interdisciplinary field that draws from physics, engineering, psychology, and biology.

In physics, sound is understood as a type of wave that travels through a medium, such as air, water, or solids. The study of these waves includes the measurement of their amplitude, frequency, and speed. Acoustic engineers use this knowledge to design and build systems that produce or transmit sound, such as loudspeakers, microphones, and soundproof rooms.

In psychology and biology, the study of sound focuses on how it is perceived and processed by the auditory system. Researchers in these fields study how sound is transformed into electrical signals in the ear and then processed in the brain. They also study how different sounds are perceived by humans and animals, and how this information is used to identify objects and navigate the environment.

To know more about auditory visit:

https://brainly.com/question/15883101

#SPJ1

If your company increases its market penetration, what is happening?
A.
The target market is growing.
B.
More people in the target market are buying the company's product.
C.
The market saturation of the target market has decreased.
D.
Competitors who offer similar products are entering the market.
D.
Your company collects credit card information from customers.

Answers

Answer:   (A, B, E)

A. ) The target market is growing.

B. ) More people in the target market are buying the company's product.

E. ) Your company collects credit card information from customers.

Explanation:  Simply what was on the assignment. Correct on Edge.

I hope this helped!

Good luck <3

Answer:

a,b,e like  the top one said

Explanation:

this is late but thats okay

An airport has an electronic system that randomly selects bags for extra security screening. Each bag has a 14\%14%14, percent probability of being selected for extra screening, and one bag being selected or not doesn't affect whether or not another bag will be selected.

Answers

The probability that the two bags are selected for extra screening will be 0.02.

How to calculate the probability?

From the information, the airport has an electronic system that randomly selects bags for extra security screening and each bag has a 14%  probability of being selected.

In this case,the probability of selecting 2 bags will be:

= P(bag) × P(bag)

= 14% × 14%

= 0.14 × 0.14

= 0.02

The probability is 0.02.

Learn more about probability on:

brainly.com/question/24965346

#SPJ1

Complete question

An airport has an electronic system that randomly selects bags for extra security screening. Each bag has a 14% percent probability of being selected for extra screening, and one bag being selected or not doesn't affect whether or not another bag will be selected. Suppose that 222 bags go through the system, one after the other. What is the probability that both bags are selected for extra screening? Round your answer to two decimal places.

which of these steps comes first in the boot process

Answers

Answer:

Missing Reference

Explanation:

can we save 2 MS Word documents with same names.​

Answers

Answer:

No, they have different names

Explanation:

The only way to have two rocuments with the same name is if you are creating a dublicate document.

Which of the following best explains how symmetric encryption are typically used?

Answers

A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

The option that best  explains how symmetric encryption are typically used is; A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Understanding Symmetric Encryption

Symmetric encryption is one of the oldest and best-known technique which makes use of secret key that could be a number, a word, or just a string of random letters, applied to the text of a message in order to change the content in a particular way.

Symmetric encryption involves the use of a key, which is known as the Symmetric Key which contains a series of numbers and letters.

Finally, Symmetric Key is used to encrypt a message as well as the same key is also used to decrypt it.

Looking at the given options from online, the correct option is A: Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

Read more about symmetric encryption at; https://brainly.com/question/20262508

Select the correct answer.
Read these lines from a news report. What type of lead do you think the reporter has used in the article?
On New Year's Eve, the aroma of freshly baked cake attracted John's attention to an old cottage, bringing back memories of his childhood. His
curiosity changed his life forever.
O A direct lead
OB. delayed lead
OC. question lead
OD. combination lead

Answers

Answer:

Explanation:

ob delayed lead

In JAVA Please and comments included
Implement Depth First Search (DFS) using a stack. The depth-first search (dfs) algorithm described in Listing 28.8 uses recursion. Design a new algorithm without using recursion. First, describe it using pseudocode and copy that pseudocode into the assignment submittal. Next, implement it by defining a new class named UnweightedGraphWithNonrecursiveDFS that extends UnweightedGraph (shown in Listing 28.4) and overrides the [Depth First Search] dfs method.
NOTE: when you review AbstractGraph.java Listing 28.3 you will notice that there are two dfs methods (page 1031). You need to override the method dfs(int v), (line 164, page 1031) not the other one with the longer list of parameters.

Answers

Using the knowledge in computational language in python it is possible to write a code that design a new algorithm without using recursion.

Writting the code:

# DFS algorithm

def dfs(graph, start, visited=None):

if visited is None:

visited = set()

visited.add(start)

print(start)

for next in graph[start] - visited:

dfs(graph, next, visited)

return visited

graph = {'0': set(['1', '2']),

'1': set(['0', '3', '4']),

'2': set(['0']),

'3': set(['1']),

'4': set(['2', '3'])}

dfs(graph, '0')

What is Microsoft Graph Explorer?

Graph Explorer is a developer tool that lets you learn about Microsoft Graph APIs. Use Graph Explorer to try the APIs on the default sample tenant to explore capabilities, or sign in to your own tenant and use it as a prototyping tool to fulfill your app scenarios

See more about JAVA at brainly.com/question/18502436

#SPJ1

In JAVA Please and comments includedImplement Depth First Search (DFS) using a stack. The depth-first

Your company is a small start-up that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented

Answers

Answer:

VLAN

Explanation:

In this specific scenario, you should request that a VLAN is implemented at the location. This is a feature that allows you to connect a group of computers to the same network but at the same time make sure that your computers are separate from other groups of computers in the network. This acts as an entire LAN network with specific protection for each group of connected devices. This allows you to pick and choose which groups get allowed access and which ones are isolated from your network.

a wi-fi access point with a non-broadcasting ssid is not discoverable through any means unless a wi-fi client is configured to connect to it in advance. true or false? a. true b. false

Answers

The given statement "a WI-FI access point with a non-broadcasting ssid is not discoverable through any means unless a wi-fi client is configured to connect to it in advance" is FALSE because Wi-Fi access point with a non-broadcasting SSID (Service Set Identifier) is not openly discoverable by casual users browsing for available networks, it can still be detected through other means.

Skilled users with specific tools, such as network analyzers, can identify and locate these "hidden" access points.

Configuring a Wi-Fi client to connect to a non-broadcasting SSID in advance is one method to access the network, but it is not the only way to discover its existence.

Learn more about Wi-Fi at https://brainly.com/question/31822436

#SPJ11

Why do you think a graphic designer might have a hard time seeing eye to eye with a copywriter?

Answers

Answer:

brainliest me plsss

Explanation:

Graphic designers may not see eye to eye with a copywriter because they already work so closely together they may clash heads on ideas when it comes to blending the text and graphics to complete the final details on a project.

heapsort has heapified an array to: 86 56 50 34 21 and is about to start the second for loop.what is the array after each loop iteration?

Answers

The heapify algorithm rearranges the elements of the array to form a max heap, where each parent node is greater than its child nodes.

here's a detailed explanation of the heap sort algorithm on the given array:Heapify the arrayTo start, the heapify process is applied to the array [86, 56, 50, 34, 21].

After applying heapify, the array looks like this:

     86

    /  \

   56   50

  /  \

 34   21

Step 2: Sort the array

Once the array is heapified, the algorithm can begin sorting it in ascending order.The first step is to swap the root node (the largest value in the heap) with the last node in the heap. In this case, the root node is 86, and the last node in the heap is 21

To learn more about array click the link below:

brainly.com/question/29311283

#SPJ11

7. Which SELECT statement implements a self join?
SELECT item.part_id, type.product_id
FROM part item JOIN product type
ON item.part_id =! type.product_id;
SELECT item.part_id, type.product_id
FROM part item JOIN product type
ON item.part_id = type.product_id;
SELECT item.part_id, type.product_id
FROM part item JOIN part type
ON item.part_id = type.product_id;
SELECT item.part_id, type.product_id
FROM part item JOIN product type
ON item.part_id = type.product_id (+);​

Answers

Answer:

SELECT item.part_id, type.product_id

FROM part item JOIN part type

ON item.part_id = type.product_id;

Explanation:

A self join is when a table joins to itself, in the above answer the part joins itself, note in bold below

   FROM part item JOIN part type

Pls help!!




if t= [0 1 1 0] is a transformation matrix which expression correctly applies t to v?

Answers

The expression t * v applies the transformation matrix t to the vector v. The resulting vector is obtained by multiplying each element of v by the corresponding column of t and summing the results.

In this case, the transformation matrix t is given as [0 1 1 0], and let's say the vector v is [x y z w]. Multiplying t and v gives the expression [0*x + 1*y + 1*z + 0*w]. This simplifies to [y + z].

So, applying the transformation matrix t to the vector v results in a new vector [y + z]. The original vector v is transformed by adding the second and third elements together, while the first and fourth elements remain unchanged.

Learn more about corresponding column of t and summing here:

https://brainly.com/question/15839095

#SPJ11

What is optical disc?​

Answers

Answer:

hope this helps

Explanation:

An optical disc is a disc that allows you to play movies, music that is already prerecorded also it uses a laser light the read the data that is on the disc.

Answer:

An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam. Explanation:

how will a stateful packet inspection (spi) firewall handle a packet containing a tcp syn segment?

Answers

A stateful packet inspection (SPI) firewall uses a method called dynamic packet filtering to examine not only the incoming packet, but also the state of the connection associated with the packet.

When a packet containing a TCP SYN segment arrives at an SPI firewall, the firewall examines the packet's headers to determine the source and destination addresses and ports, and checks to see if there is an existing connection in its state table. If there is no existing connection or the connection is closed, the firewall creates a new entry in its state table for this connection.

The firewall then sends a TCP SYN-ACK packet back to the originating device, which will respond with a final TCP ACK segment to establish the connection. If the firewall receives the final ACK segment, it updates the state table for the connection and allows the packets to pass through. If it does not receive the final ACK segment within a certain time, it may drop the packets and remove the connection from the state table to prevent unauthorized access.

Learn more about firewall here:

https://brainly.com/question/30006064

#SPJ11

Any please answer this How much resistance is required to gen-erate 50 mA of current from a 5 volt bat-tery?

Answers

Answer:

Calculating Currents: Current in a Truck Battery and a Handheld Calculator ... (b) How long does it take 1.00 C of charge to flow through a handheld calculator if a 0.300-mA current is ...

What types of games became popular in the 90s? List three games and how they had evolved from their successful 80s video game rivals.

Answers

Answer:

Doom (1993) Half Life (1998) Super Mario 64 (1997)

Explanation:

Doom and Half-Life were PC games.

Doom was an early 90s PC shooter that was "3d" it wasn't actually 3d but it used a unique rendering system to make it look 3d. It was a level to level shooter that also included secrets

Half-Life was a Actual 3D game and required quite a beefy Graphics card in your computer at the time to run it smoothly, It was a long story-driven game

Super Mario 64 was one of the first "True 3D" games on Home console because it was a launch title for the brand new N64 It utilized the hardware for a brand new experience for console players.

Most 80s games were even more primitive and were either Hosted in arcade cabinets at your local Arcade Such as Outrun (1986) (Btw great soundtrack!) or the NES that allowed you to play the Original few Mario games that were all 2D.

So one of the biggest Evolutions in 80s to 90s gaming is the introduction of 3D titles being able to run on good computers in the early 90s and home consoles could also run 3D titles at the end of the 90s

Pls, mark Brainliest I put my heart and soul into this. Very fun Question!!!


Keegan has a hard drive that he wants to connect externally to his laptop. Which two ports can he connect the external hard drive to?
O Graphics Port
DisplayPort
0 0 0 0 0
USB-C
Thunderbolt
HDMI
Reset
Next

Answers

Answer:

,홀로 ㅛㅍㅍ 내 ㅍ. 냐 ㅑㅇㄹ ㅑ 덮고 ㅇ ㅗㅗ묙 ㅗㄴ ㄴ

Explanation:

소 묘 뉴 ㅕㅁ ㅣ 홈 ㅛ ㅑㅍㄴ. ㅕ 이 ㅕㅁ ㅛ ㅁ 포 ㅛ ㄴ ㅕ 여 あか

TRUE/FALSE. if two methods in the same class have the same name but different signatures, the second overrides the first.

Answers

The statement is false. You can override a superclass method by creating a new instance method in the subclass that has the same signature.

Every class derives from the Object class, either directly or indirectly. The subclass method overloads the superclass method if the signature of the methods in the two classes match. The second method replaces the first if two methods in the same class have the same name but different signatures.

If a method in your subclass has the same name and signature as a method in its superclass, the method in your subclass takes precedence. As a result, the method from the superclass is not inherited by the subclass.

Learn more about subclass here-

https://brainly.com/question/15992142

#SPJ4

Create an informational slide using ethical Internet research and citation practices.


Choose a topic on anything you think would be interesting to research - for example, a famous or historical person, a place, an animal, or a device or invention. You will use the Internet to complete your research. With this research, you will create an informational presentation slide that describes


your topic. Your informational slide should contain the following elements: An introductory image- it can be a direct picture of the person/place/thing, or a photo that


relates to it in some way. This photo must be free to use, meaning you will have to check


the copyright details for any photo you select. (10 points) • A 200-to 300-word explanation of the topic. Use Internet sources to research the topic, and then write an explanation in your own words based on what you have learned (10 points)


• Properly cited Internet sources for both the image and written section (5 points)

Answers

Here is an example of an informational slide using ethical internet research and citation practices on the topic of Marie Curie:

Marie Curie was a Polish-born scientist who made groundbreaking discoveries in the field of radioactivity. She was the first woman to win a Nobel Prize and the only person to win two Nobel Prizes in different fields.Key Facts:Born on November 7, 1867, in Warsaw, PolandStudied physics and mathematics at Sorbonne University in ParisDiscovered two new elements, radium and poloniumAwarded the Nobel Prize in Physics in 1903 and the Nobel Prize in Chemistry in 1911Died on July 4, 1934, in Savoy, France, due to radiation exposureCitations:Encyclopædia Britannica. (2021, February 22). Marie Curie. In Encyclopædia Britannica. Retrieved from

To know more about ethical click the link below:

brainly.com/question/14948046

#SPJ11

Need answer to 13.1.1 codehs

Need answer to 13.1.1 codehs

Answers

Using the knowledge in computational language in python it is possible to write a code that have to make a half pyramid out of circle's  need to have a function, a variable named circle_amount.

Writting the code:

speed(0)

circle_amount = 8

def draw_circle():

pendown()

circle(25)

penup()

forward(50)

def move_up_a_row():

left(90)

forward(50)

right(90)

backward(circle_amount*50)

penup()

setposition(-175,-200)

for i in range(circle_amount):

for i in range(circle_amount):

draw_circle()

move_up_a_row()

circle_amount = circle_amount - 1

See more about python at brainly.com/question/19705654

#SPJ1

Need answer to 13.1.1 codehs

as a network administrator, you have had several employees ask for a way in which they could connect their phones to their linux computers without the use of wires. which of the following device types would best meet these employees' needs?

Answers

As a network administrator, the best device type that would meet the employees' needs of connecting their phones to their Linux computers without the use of wires is a Bluetooth adapter.

A Bluetooth adapter is a device that plugs into a computer's USB port and enables the computer to communicate with Bluetooth-enabled devices, such as smartphones, without the use of wires. This allows for easy transfer of data between the phone and computer, as well as the ability to use the phone as a remote control for the computer.

Additionally, Bluetooth adapters are relatively inexpensive and easy to set up, making them a convenient solution for the employees' needs.

Learn more about network administrator:

https://brainly.com/question/29462344

#SPJ11

is it important to know the basic foot massage first before giving foot spa treatment? why?​

Answers

Answer:

Just like your neck, back, and shoulders, your feet can also benefit from a regular rubdown. Foot massage improves circulation, stimulates muscles, reduces tension, and often eases pain. It also gives you a chance to check out your feet so you can get a jump on treating blisters, bunions, corns, and toenail problems.A good foot spa session releases the tension formed around the tight muscles and tendons and allows blood to flow and circulate smoothly to your other bodily organs and brain. Sliding into liquid bliss allows knots to unknot and pain for to be gently soothed away.

Hope this helps, have a wonderful day/night, and stay safe!

is a megabyte bigger than a kb

Answers

Well, in a nutshell megabyte is larger than KB. In actuality, 1 MB equals 1,024 kilobytes because an MB is 1,024 times larger than a KB.

Is a kilobyte larger than a megabyte?

You won't have any trouble knowing what MB, KB, GB, or even TB is when it comes to units of data storage sizes if you're a computer geek, IT specialist, or just a computer savvy individual. MB (MegaByte), KB (KiloByte), GB (GigaByte), and TB (TeraByte) are numbers used to indicate different sizes of data storage or computer memory, respectively.

Which Is Bigger: MB or KB?

We've conveniently placed this part at the top of the page so you can find the answer in a flash. MegaByte, or MB, is larger. The bigger data storage size between MegaBytes (MB) and KiloBytes (KB) (KB).

To know more about megabyte visit:-

https://brainly.com/question/22735284

#SPJ4

What is the definition of alternative technology?

Answers

Answer:

Alternative technology is a term used to refer to technologies that are more environmentally friendly than the functionally equivalent technologies dominant in current practice.

Explanation:

Answer:

Alternative technology, also known as appropriate technology or sustainable technology, refers to technologies that are designed to be environmentally friendly and socially responsible. These technologies often use renewable or reusable resources and are intended to improve the quality of life for individuals and communities without causing harm to the environment. Examples of alternative technology include solar panels, wind turbines, and composting toilets.

My friend wants to use my findSmallest() function in her program. Is this function ready to be shared in a library?

Answers

Answer:I would think that it would be.

Explanation:

the method used to transfer information to far off place instantly is called​

Answers

Telecommunication

Explanation:

Other Questions
How were the rights of Armenians restricted by the Ottomans during World War I? Because they openly sympathized with the Russians, they were ordered to pledge their loyalty to the Ottomans. Because of their religion, they were forced to move to the desserts of Syria where many died or were executed. They were forced to convert from Christianity to Islam before Russia intervened to protect religious freedom. They were not impacted because they migrated to Russia before the Ottomans could implement restrictions. please help!!! I need this urgently I will mark you brainliest!! Write a speech using the topic: are love poems still relevant in modern society? Do they reflect reality ( love songs can be included Find the square root of 9 by long division method Noun is to _____ as verb is to predicate. A local hamburger shop sold a combined total of 569 hamburgers and cheeseburgers on Tuesday. There were 69 more cheeseburgers sold in hamburgers. How many hamburgers where is sold on Tuesday NEED HELP ASAP!!!!!!!!!!!!!!!!!!!!!!!!!The arm span and foot length were measured (in centimeters) for each of the 19 students in a statistics class and displayed in the scatterplot. An analysis was completed and the computer output is shown.Using the computer output, the slope of the least-squares regression line means for each additional centimeter in:A) arm span, foot length will increase by about 0.186 cm.B) foot length, arm span will increase by about 0.186 cm.C) arm span, foot length is predicted to increase by about 0.186 cm.D) foot length, arm span is predicted to increase by about 0.186 cm. what is the difference between a monocot and a dicot The binomial expansion 625x4 7,500x3 + 33,750x2 67,500x + 50,625 can be expressed as (ax + b)4. What is the value of b?A. 15B. 5C. 5D. 15 This optional device allows you to set a constant speed in your vehicle. perceived judgment about weight can negatively influence weight loss: a cross-sectional study of overweight and obese patients You secure a team whos wants to help you develop, source, test, and launch the product. You spend the next 2 years getting to launch by spending $35,000 in your first year and $40,000 in year 2 prior to launch. Your forecasted sales: Year 1(post launch): 50units Year 2: 150 Year 3: 200 Year 4: 250 Year 5: 250 Your price point is $700 direct to Consumer, Amazon takes 16% of the Gross sale as a fee leaving you with a Net Sale of $588 per unit Your on-going cost to run the business starting in the launch year is the following: Year 1: 35% of Net Revenue, Year 2 through 5: 30% of Net Revenue. What COGS, and therefore net profit%, (to the nearest 10thof a $ and %)do you need to make this a positive NPV at 8% Cost of Capital (interest rate)? Please show your work in excel. Thank you! discuss the importance of market for successful business casey's wellness goal is to take a deep breath every time she feels stressed. what best describes the focus of her goal? Given AB with point D on AB as shown, a dilation on D is centered at A with a scale factor of 2. Which of the following statements is true? Using Microsoft Excel, create an investment cash-flow diagram that will have a present worth of zero using MARR = 11%. The study period needs to be exactly 5 years and each year should have at least one unique cash flow that is different from the cash flows over the other years. Your answer should contain a table showing the cash flows for each year and a graphical representation of the cash flows (cash-flow diagram). All of the following practices violate NASAA's Statement of Policy on Dishonest or Unethical Business Practices of Broker-Dealers and Agents EXCEPT A) effecting a transaction with no change in beneficial ownership B) conducting securities transactions, with clients, that are not reflected on the books of the broker-dealer and without the knowledge and supervision of the employing broker-dealer C) recommending the purchase of a security to a majority of the clients solely on the basis of the issuer's properly published press release regarding a likely increase in earnings per a new product branding strategy D) hypothecating customer securities held in margin accounts Unit 6 similar triangles homework 5 parallel lines and proportional parts giving ten points I really need help. What does good exposition do for the reader of a story? Which fraction represents the lowest amount? 5 1/4 36/8 46/9 35/7 g 1.90 kg textbook rests on a frictionless, horizontal surface. A cord attached to the book passes over a pulley whose diameter is 0.150 m, to a hanging book with mass 3.10 kg. The system is released from rest, and the books are observed to move 1.20 m in 0.900 s . Part A What is the tension in the part of the cord attached to the textbook? Express your answer with the appropriate units. T1 = nothing nothing Request Answer Part B What is the tension in the part of the cord attached to the hanging book? Express your answer with the appropriate units. T2 = nothing nothing Request Answer Part C What is the moment of inertia of the pulley about its rotation axis? Express your answer with the appropriate units. I = nothing nothing Request Answer Provide Feedback