given the data path of the lc-3 as per the above-linked schematic, give a complete description of the instruction: ; the instruction is stored at address x31a1: x31a1: ldi r1, label ; where label corresponds to the address x3246 a) (1 point) assemble the instruction to ml (machine language) b) (1 point) give the rt (register transfer) description of the instruction. c) (1 point) list, in the correct sequence, every control signal set by the fsm to implement this instruction.

Answers

Answer 1

We explore the process of assembling an instruction to Machine Language and providing the Register Transfer description and the control signals set by the FSM to implement the instruction.

a. Assemble the instruction to Machine Language

The instruction stored at address x31a1 is ldi r1, label, where label corresponds to the address x3246. When assembled to ML, the instruction would be xE118.

This was done by applying the instruction's opcode (xE1) and the address (x18).

b. Give the Register Transfer description of the instruction.

The RT description of the instruction is: Load the data at address x3246 into register 1.

Finally, the third step was to list, in the correct sequence, every control signal set by the FSM to implement this instruction.

c. List every control signal set by the fsm to implement this instruction.

The correct sequence of control signals set by the FSM to implement this instruction is:

→ PCout → MARin→ MDRout → IRin → IRout → PCin → MARout → MDRin → R1in

This sequence of control signals will allow the data stored at address x3246 to be loaded into register 1.

Learn more about Programming: brainly.com/question/23275071

#SPJ4


Related Questions

Here is a super challenge for you if you feel up for it. (You will need to work this out in Excel.) In 2017 the Islamic month of fasting, Ramadan, began on Friday, 26 May. What fraction of the year was this? (to 1 decimal place) Hint: Think carefully which start and end dates to use.

Answers

The date Friday 26, May 2017 represents 2/5 of the year 2017

From the question, we understand that Ramadan starts on Friday 26, May 2017.

Using Microsoft Office Excel, this date is the 146th day of the year in 2017.

Also, 2017 has 365 days.

This is so because 2017 is not a leap year.

So, the fraction of the year is:

\(\frac{146}{365}\)

Multiply the fraction by 73/73

\(\frac{146}{365} = \frac{146}{365} \times \frac{73}{73}\)

Simplify

\(\frac{146}{365} = \frac{2}{5}\)

Hence, the fraction of the year is 2/5

Read more about fractions and proportions at:

https://brainly.com/question/21602143

The fraction of the year that corresponds to the Islamic month of fasting, Ramadan, beginning on May 26, 2017, is 2/5.

Find out how many days passed from January 1, 2017, to May 26, 2017.

January has 31 daysFebruary has 28 daysMarch has 31 daysApril has 30 daysMay has 26 days

Total days = 31 + 28 + 31 + 30 + 26

Total days = 146 days.

The total days in regular year:

The total days = 31 + 28 + 31 + 30 + 31 + 30 + 31 + 31 + 30 + 31 + 30 + 31

The total days  = 365 days.

The required fraction is calculated as:

Fraction = 146 days / 365 days

Fraction = 2 / 5

So, the fraction is 2 / 5.

Learn more about Fraction here:

https://brainly.com/question/10708469

#SPJ3

Shelly uses Fac3book to interact with friends and family online. When is she most likely to express a positive mood on social media?

a.
Sundays
b.
Wednesdays
c.
Fridays
d.
Thursdays

Answers

Answer:

Fridays

Explanation:

On record, Fridays are preffered

The correct option is c. Fridays.

What is Social media?Social media refers to the means of relations among people in which they create, share, and/or interact with information and ideas in virtual societies and networks. In today's civilization, the use of social media has evolved into a necessary daily exercise. Social media is commonly used for social relations and credentials to news and information, and determination making. It is a valuable contact tool with others locally and worldwide, as well as to communicate, create, and spread announcements.

To learn more about Social media, refer to:

https://brainly.com/question/1163631

#SPJ2

Who want to play among us?

Serves: Europe

Code: AMOFMF

Answers

Answer:

i can't rn

Explanation:

Cant, sometime later?

If a change is made to the active
cell, what type of cell will also
change?
Precedents
Dependents

Answers

Answer:

precedents

Explanation:

which of the following are DPs (Departure procedures)
Obstacle Departure procedures and standard Instrument Departures
ATC climb clearances
En route ATC clearances

Answers

Departure Procedures (DPs) are specific guidelines and instructions that pilots follow when departing from an airport. They are designed to ensure safe and efficient aircraft departures, particularly in challenging or congested airspace. There are various types of DPs, including Obstacle Departure Procedures (ODPs) and Standard Instrument Departures (SIDs).

1. Obstacle Departure Procedures (ODPs): ODPs are departure procedures that provide guidance to pilots on how to navigate around obstacles, such as mountains or tall structures, during the initial climb phase. ODPs are typically published for airports where terrain or obstacles pose a potential hazard to departing aircraft. These procedures outline specific headings, altitudes, and other instructions that pilots must follow to ensure obstacle clearance.

2. Standard Instrument Departures (SIDs): SIDs are departure procedures that provide a standard and efficient route for aircraft to follow after takeoff. SIDs are typically used in controlled airspace and help to ensure aircraft maintain safe separation and follow a predictable path. SIDs include specific waypoints, altitude restrictions, and other instructions that pilots must adhere to during the initial climb and transition to the en-route phase.

On the other hand, ATC climb clearances and en-route ATC clearances are not considered DPs. ATC climb clearances refer to instructions given by air traffic control to pilots during the climb phase to reach a specific altitude or flight level. These clearances may include altitude restrictions, speed restrictions, or other instructions to ensure safe separation and airspace management.

En route ATC clearances are instructions provided by air traffic control to pilots during the en-route phase of flight. These instructions may include changes in altitude, route modifications, or other directives to ensure safe and efficient navigation through the airspace.

In summary, the DPs specifically refer to Obstacle Departure Procedures (ODPs) and Standard Instrument Departures (SIDs), while ATC climb clearances and en route ATC clearances are separate instructions given by air traffic control during different phases of flight.

Learn more about Departure procedures: https://brainly.com/question/31813870

#SPJ11

After you set a goal or purpose for your Web site, what is the next step to designing your​ pages​?

Answers

The next step to designing your pages after setting a goal or purpose for your website is to determine the target audience for your website.

Once the target audience has been determined, the designer can then begin to create the overall layout and design of the website, selecting appropriate colors, fonts, and images to create a visually appealing and easy-to-use interface. It's also important to consider the navigation structure and content organization to ensure that visitors can easily find what they are looking for.

You can learn more about easy-to-use interface at

https://brainly.com/question/20340641

#SPJ11

Please help explain Loops question. I will give brainliest.

Please help explain Loops question. I will give brainliest.

Answers

Answer:

And 1 and 2 and 3

Explanation:

It is asked to display the 'and' every time, and the count is equal to 1 plus the previous count starting at zero, so it runs 3 times

Fill _________ skips the Saturday and Sunday dates in a date fill.
A. Weekends
B. Weekdays
C. Skip Weekends
D. Skip Saturday and Sunday

Answers

A. Weekends is the correct answer

what family of technology helps us gather, store, and share information?

Answers

Answer:

ITC’s are the family of technology

Explanation:

:)

what note for percussun is this??

what note for percussun is this??

Answers

Answer:E-flat major

Explanation:

is a communication system that is composed of images that represent words

Answers

Answer:

Egyptian hieroglyphs

Explanation:

This system was long practiced in ancient Egypt. At the time visible characters (images) where used to represent words (often engraved on walls).

What this means is that, throughout ancient Egypt their communication system especially of religious literature was composed primarily of images in place of words.

Answer:

Blissymbol

Explanation:

When it comes to credit scores, why is having a
thin file NOT good?
What reasons might an 18-year-old have for
his/her thin file?

Answers

Answer:

credit karma

Explanation:

karma is -69

What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service

Answers

Answer:

code injection

Explanation:

Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.

Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)

Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)

Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests

Current assets include a. inventory and accounts receivable. b. accounts payable and cash. c. cash and intangible assets. d. inventory and accounts payable. e. buildings and equipment.

Answers

a. inventory and accounts receivable. Current assets are resources that are expected to be converted into cash or used up within a year or an operating cycle.

The two most common types of current assets are inventory and accounts receivable. Inventory refers to goods held for sale or in the process of production, while accounts receivable represents the amount owed to a company by its customers for goods or services already delivered. Both inventory and accounts receivable are typically considered liquid assets as they can be readily converted into cash.

Other current assets may include cash equivalents, short-term investments, and prepaid expenses, but the primary components are inventory and accounts receivable.

Learn more about inventory and accounts receivable here:

https://brainly.com/question/28584710

#SPJ11

In an information system, the rules or guidelines for people to follow are called ________. A) procedures B) compiling C) database management D) data processing

Answers

Answer:

Procedures

Explanation:

Procedures are the rules or guidelines for people to follow when using hardware, software, data

Procedure is the rules and guidelines established for people to follow.

In information technology, procedures refers to policies which govern the operation of an information system.

In banks, procedures need to be established by the IT on how the banker can register a new customer. The guideline is known as procedure in Information system.

Some reason for establishing procedures are:

To make a process easierTo make sure task are easier to performTo establish a known guideline for a task.

In conclusion, these rules are created to simplify the use of the computer program.

Learn more about this here

brainly.com/question/4412057

Write a program that creates a two-dimensional array named height and stores the following data:

16 17 14
17 18 17
15 17 14
The program should also print the array.

Expected Output
[[16, 17, 14], [17, 18, 17], [15, 17, 14]]

Answers

Answer:

Explanation:

The following code is written in Java and it simply creates the 2-Dimensional int array with the data provided and then uses the Arrays class to easily print the entire array's data in each layer.

import java.util.Arrays;

class Brainly {

   public static void main(String[] args) {

       int[][] arr = {{16, 17, 14}, {17, 18, 17}, {15, 17, 14}};

   

     

      System.out.print(Arrays./*Remove this because brainly detects as swearword*/deepToString(arr));

   }

}

Write a program that creates a two-dimensional array named height and stores the following data:16 17

Answer:

height = []

height.append([16,17,14])

height.append([17,18,17])

height.append([15,17,14])

print(height)

Explanation:

I got 100%.

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

Answers

In the program for the game, we have a garden scene represented by a green background and a black rectangular border. The cartoon character is a yellow circle with two black eyes, a smiling face, and arcs for the body. The character is drawn in the center of the screen.

How to explain the information

The game uses Pygame library to handle the graphics and game loop. The garden is drawn using the draw_garden function, and the cartoon character is drawn using the draw_cartoon_character function.

The game loop continuously updates the scene by redrawing the garden and the cartoon character. It also handles user input events and ensures a smooth frame rate. The game exits when the user closes the window.

This example includes appropriate use of variables, a function definition (draw_garden and draw_cartoon_character), and a loop (the main game loop). Additionally, it meets the requirement of using the entire width and height of the canvas, uses a background based on the screen size, and includes shapes (circles, rectangles, arcs) that are used appropriately in the context of the game.

Learn more about program on

https://brainly.com/question/23275071

#SPJ1

Identify the programming language released by
the Department of Defense in the 1980s.
Pascal
O
Ada
C++
BASIC

Answers

Answer:

the answer is ADA

Explanation:

got it right

ADA 83,  

(Context on ADA)

It was recognized as a powerful, modern programming language that addressed DOD's stated requirements for embedded systems.

listen to exam instructions which two commands do you use to force a new ip configuration?

Answers

The two commands used to force a new IP configuration is ipconfig /release and ipconfig /renew. Therefore, the correct option is b and d.

What is IP configuration?

IP configuration refers to the process of assigning Internet Protocol (IP) addresses to devices on a network. An IP address is a unique identifier that allows devices to communicate with each other on a network.

The command “ipconfig /release” releases the current IP address configuration of the device, while the command “ipconfig /renewrequests a new IP address configuration from the DHCP server. Therefore, the correct option is b and d.

Learn more about IP configuration, here:

https://brainly.com/question/28332850

#SPJ1

The question is incomplete, but most probably the complete question is,

Which two commands do you use to force a new IP configuration?

a. ipconfig /flushdns

b. ipconfig /release

c. ipconfig /all

d. ipconfig /renew

e. ipconfig

you store the x, y, and z coordinates of stars in a galaxy simulator in an array named starsthat is declared like this:double precision ::stars(10000, 3). in this array the rows are the star number and the columns are the coordinates of the star (double precision uses 8 bytes of memory). how many bytes apart in computer memory are the x and y coordinates of any particular star stored?

Answers

When dealing with large amounts of data, particularly numerical data, how that data is stored in memory becomes critical to its efficient manipulation.

In the case of storing star coordinates in an array, it is important to consider how those values are stored in memory to determine the number of bytes apart in computer memory that the x and y coordinates of any particular star are stored.The declaration double precision ::stars(10000, 3) creates an array named stars that can hold up to 10,000 stars, each with 3 coordinates. The double precision keyword indicates that each coordinate is stored in 8 bytes of memory. Therefore, each star in the array takes up 3 x 8 bytes = 24 bytes of memory.To determine how many bytes apart in computer memory the x and y coordinates of any particular star are stored, it is important to consider how the array is laid out in memory. In this case, each star takes up 24 bytes of memory and is stored sequentially in the array. This means that the x coordinate of the first star is stored at the beginning of the array, followed immediately by the y coordinate of the first star, then the z coordinate of the first star, followed by the x coordinate of the second star, and so on.Therefore, the x and y coordinates of any particular star are stored 8 bytes apart in computer memory. This is because the x coordinate takes up the first 8 bytes of memory for each star, followed immediately by the y coordinate, which takes up the next 8 bytes of memory. This pattern repeats for each star in the array.

for such more question on array

https://brainly.com/question/28061186

#SPJ11

How is the IT career cluster different from most other clusters?

Answers

Answer:

All career clusters use information technology in carrying out their work

which biometric has a high number of false positives? group of answer choices swipe lock face lock fingerprint lock pattern lock

Answers

Fingerprint biometric lock has the highest number of false positives. Thus, the correct option is C.

What is Fingerprint?

Fingerprint is an individual's unique, permanent, and unchanging pattern of ridges and valleys on the surface of their fingertips. This pattern is used for identification purposes and is impossible to duplicate. Fingerprint scanners are used to identify individuals in a variety of settings including law enforcement, security, and health care. Fingerprints are unique to each individual, and are formed before birth and remain unchanged throughout life. Fingerprints can be taken from any part of the body that contains ridges and valleys, including the fingers, palms, and the soles of the feet.

This is because fingerprint recognition technology is not always accurate and can be affected by environmental factors such as moisture, dirt, and oil. Also, the technology can be fooled by a fraudulent fingerprint created from a latex mold.

To learn more about Fingerprint

brainly.com/question/28221902

#SPJ4

Which function is used to add a range of cells? =SUM =AVERAGE =MAX =ADD

Answers

Answer:

=SUM

Explanation:

The function used to add a range of cells is =SUM. Thus, option A is correct.

What is a function in excel?

Functions are pre-written formulas that carry out calculations by utilising unique values, referred to as inputs, in a given order, or layout. Calculations of any complex variable can be carried out using functions. the purpose for which a human, thing, or both are created, expressly designed, or employed.

Values are added by the SUM function. Users can include specific values, cell references, specific ranges, or a combination of all three. F

Excel's AutoSum feature makes summing up several items in an quick and simple manner. The Alt+= button makes using the AutoSum command much quicker. It can be found on the Homepage or Formulas tabs.

Therefore, option A is the correct option.

Learn more about Functions , here:

https://brainly.com/question/21145944

#SPJ6

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?.

Answers

WPA3 if available, WPA2-AES if not available

Disabling SSID broadcast is the greatest practice to take to increase security for wireless networks.

What is network?

a chain, group, or system that is interconnected or associated in some way. a system of interconnected computers and devices that can communicate with one another. 4. a collection of radio or television stations connected by a radio relay or wire.

The best method to implement to add security for wireless network is disabled SSID broadcast.

By turning off the SSID broadcast, the router stops broadcasting the name of the wireless network, rendering it undetectable to users.

This only prevents the name from appearing on device lists for neighboring networks, though. Since users still require the network, it is still in existence.

Hence, disabled SSID broadcast is correct option.

To know more about Network on:

https://brainly.com/question/15002514

#SPJ12

What do you call a collection of pre-programmed commands and functions used in programs?

Answers

Answer:

Heya Buddy..

Explanation:

A computer program is a collection of instructions that can be executed by a computer to perform a specific task. ... A collection of computer programs, libraries, and related data are referred to as software.

Hope that helps you dear..

Bye!

A computer program is a set of instructions that a computer can use to carry out a particular task. Software is a term used to describe a group of computer programs, libraries, and related data.

What is commands and functions?

Commands are statements that tell a script what to do. They might make mention of a ready-made handler or a built-in SenseTalk command. For additional information on how commands function, see Commands and Comments. A function is a handler that produces value.

Because every function can also be used as a command, there is no functional difference between functions and commands. The distinction lies in the syntax of the calls made, not in the functionality of what they do.

Generally speaking, commands are used to organize text globally and to indicate how the data collecting interview should be constructed.

Thus, A computer program is a set of instructions that a computer can use to carry.

For more information about commands and functions, click here:

https://brainly.com/question/27936993

#SPJ2

Which three events occur when a DNS request is processed?
A. A local DNS server sends the IP address back to the requesting
device for access.
B. A local DNS server checks to see if it knows the IP address for the
site requested.
C. A subdomain DNS server defines how data will be transferred
over the internet.
D. Top-level domain DNS servers look up the site and return the IP
address.

Answers

The three events occur when a DNS request is processed is that

A local DNS server sends the IP address back to the requesting device for access. A local DNS server checks to see if it knows the IP address for the site requested.Top-level domain DNS servers look up the site and return the IP address.What are the types of DNS queries?

There are known to be 3 types of DNS queries which are:

Recursive iterativenon-recursive.

Therefore, The three events occur when a DNS request is processed is that

A local DNS server sends the IP address back to the requesting device for access. A local DNS server checks to see if it knows the IP address for the site requested.Top-level domain DNS servers look up the site and return the IP address.

Learn more about DNS from

https://brainly.com/question/12465146

#SPJ1

Please show excel formulas

X Co. is considering replacing two pieces of equipment, a truck and an overhead pulley system, in this year’s capital budget. The projects are independent. The cash outlay for the truck is $ 15,200 and that for the pulley system is $ 20,000. The firm’s cost of capital is 14%. After-tax cash flows, including depreciation are as follows:

Year Truck Pulley

1 $ 5,300 $ 7,500

2 5,300 7,500

3 5,300 7,500

4 5,300 7,500

5 5,300 7,500

Calculate the IRR, NPV and the MIRR for each project, and indicate the accept-reject decision in each case.

Answers

Based on the calculations, we can make the following accept-reject decisions:

Truck Project: Since the NPV is positive ($2,451.53) and the IRR (15.14%) is greater than the cost of capital (14%), the Truck project is acceptable.

To calculate the IRR, NPV, and MIRR for each project, we need to use the cash flows provided and the cost of capital. Here are the formulas and calculations for each project:

For the Truck project:

Initial Cash Outlay: $15,200

Cash Flows: $5,300 for each year (Year 1 to Year 5)

Cost of Capital: 14%

IRR Formula:

=IRR(range of cash flows)

MIRR Formula:

=MIRR(range of cash flows, cost of capital, reinvestment rate)

Performing the calculations for the Truck project, we get:

IRR: 15.14%

NPV: $2,451.53

MIRR: 15.55%

For the Pulley project:

Initial Cash Outlay: $20,000

Cash Flows: $7,500 for each year (Year 1 to Year 5)

Cost of Capital: 14%

IRR Formula:

=IRR(range of cash flows)

NPV Formula:

=NPV(cost of capital, range of cash flows) - Initial Cash Outlay

Learn more about reinvestment here:

https://brainly.com/question/28188544

#SPJ11

which of the following is not a component of URL; a. web protocol b. name of browser c. name of web server d. name of the file with the directory​

Answers

The component of URL that is not listed correctly is b. name of browser. The components of a URL (Uniform Resource Locator) are:

a. Web protocol: specifies the protocol used to access the resource, such as HTTP or HTTPS.

b. Domain name or IP address of the web server: identifies the location of the server hosting the resource.

c. Path to the resource: specifies the location of the specific resource on the server, including the name of the file and any directories or subdirectories.

d. Query parameters (optional): additional information that is sent to the server to help retrieve or filter the resource.

The name of the browser is not a component of the URL itself, but rather a software application that is used to access the URL.

a systems engineer at an organization tightens security by enabling sandboxing on a crucial system. the measure is in place to help prevent ransomware.which valid features does the engineer enable on the system

Answers

When enabling sandboxing on a crucial system to help prevent ransomware, the systems engineer may enable the following valid features:

Isolation: Sandboxing provides a separate and isolated environment for executing potentially untrusted or unknown programs. By isolating these programs from the main system, any malicious activity or ransomware attack can be contained within the sandbox without affecting the rest of the system.Restricted Access: The sandboxed environment can have restricted access to system resources, files, and network connections. This prevents unauthorized or malicious activities from accessing sensitive data or spreading across the network.Application Whitelisting: The engineer may enable application whitelisting, which allows only approved and trusted applications to run within the sandbox. This helps prevent the execution of malicious software or unauthorized programs.Behavioral Analysis: Sandboxing often includes behavioral analysis capabilities to monitor the behavior of programs running within the sandbox. Any suspicious or abnormal behavior can be detected and flagged, preventing potential ransomware attacks.

To know more about sandboxing click the link below:

brainly.com/question/29981719

#SPJ11

6.36. Four kilograms of steam in a piston/cylinder device at 400kPa and 175 ∘
C undergoes a mechanically reversible, isothermal compression to a final pressure such that the steam is just saturated. Determine Q and W for the process.

Answers

To determine Q (heat transfer) and W (work) for the given process, we can use the first law of thermodynamics:

Q = ΔU + W

where ΔU is the change in internal energy of the system.

For an isothermal process, the change in internal energy (ΔU) is zero since the temperature remains constant. Therefore, the equation simplifies to:

Q = W

Now let's calculate the work done:

Work done (W) = P_initial * V_initial * ln(V_final / V_initial)

Given:

P_initial = 400 kPa

V_initial = (mass of steam) / (density of steam at initial conditions)

V_final = (mass of steam) / (density of saturated steam at final pressure)

To calculate the specific volume (V), we can use the steam tables or properties of water and steam at different conditions.

Once we have the specific volumes at initial and final conditions, we can calculate W using the equation mentioned above.

To calculate Q, we can use Q = W since it is an isothermal process.

To know more about temperature visit-

https://brainly.com/question/14532989

#SPJ11

Other Questions
Analyzing lines 55-56, what is the old mans hope for Scotland after Macbeths coronation? what argument might you use to justify a postculturalist approach to a literary work What is the primary goal of interest groups? the ________ operator is used in c++ to test for equality. Each day, Ted can wax 4 cars or wash 12 cars, and Ishana can wax 3 cars or wash 6 cars. What is each person's opportunity cost of washing a car? Instructions: Enter your responses rounded to two decimal places. Ted's opportunity cost of washing one car is __ wax jobs. Ishana's opportunity cost of washing one car is ___ wax jobs.Who has a comparative advantage in washing cars?a. Tedb. Neitherc. Ishana Between which two weeks did the greatest increase in new blossoms occur? a. 1 and 2 b. 4 and 5 c. 5 and 6 d. 8 and 9 A Farmer paid Rs 47000 on his crops last year. How much did he sell his crops if his land is irrigated by tube well? What is the volume of the rectangular prism?A rectangular prism where the area of the base is 24 square inches and the height is 6 inches. 150 in.3 144 in.3 132 in.3 120 in.3 psychologist michael gazzaniga asked split-brain patients to stare at a dot as he flashed heart on a screen. he appeared in the left visual field, art in the right. when asked, patients said they saw Some readers of The Metamorphosis contend that Gregor has not transformed into a bug at all, but that hes experiencing some kind of insanity and only believes that hes a bug. What do you think? What does the evidence from the text tell you? Could this be the case? which of the three types of police beats in the kansas city preventive patrol were the treatment areas that received 2 to 3 times as much police presence during the study period to test the impact of increased patrol on crime rates? question 15 options: reactive beats proactive beats control beats target beats 1. Determine the molecular formula of an oxide of iron in which the mass of iron and oxygen are 69.9% and 30% respectively given that the molar mass of the oxide 159.898/mol, find the empirical and molecular formula.2. a crystalline salt when heated becomes anhydrous and loses 51.2% of its weight the anhydrous salt analysis gave the percent composition as magnesium is equal to 20.0% and sulphur is equal to 26.66% and oxygen is equal to 53.33%.3. In three moles of Ethane calculate the following1. calculate number of carbon atoms.2. number of moles of hydrogen atoms3. number of molecules of Ethane. It takes jada 20 minutes to walk to school. It takes Andre 80% as long to walk to school.How long does it take Andre to walk to school ?SHOW ALL WORK !!NO WORK = NO CREDIT = REPORT how do sugars from cyclic hemiacetals Down Below: QuestionPlease help (50 BRAINLIST!!!!!!!!!!!) Read the excerpt from "The Storyteller.""Why weren't there any flowers?"Because the pigs had eaten them all, said the bachelor promptly. "The gardeners had told the Prince that you couldn't have pigs and flowers, so he decided to have pigs and no flowers.There was a murmur of approval at the excellence of the Prince's decision; so many people would have decided the other way.How does the characterization of the children create satire?They are curious about what is in the garden.They are pleased to learn that the prince chooses pigs over flowers.They interrupt the bachelor just as much as they interrupt their aunt. if there are 2,000 people in the population and 1,000 people in the labor force, and 900 are classified as employed, what is the unemployment rate? please choose the correct answer from the following choices, and then select the submit answer button. answer choices 10% 5% 3% 45% Who is most likely to be injured or killed in a work zone related crash?. Which one is the answer Based on years of weather data, the expected low temperature T (in degrees F) in Fairbanks, Alaska, can be approximated by T=36 sin [2pi/365(t-101)]+14, where t is in days and t=0 corresponds to January 1. Predict when the coldest day of the year will occur.