high level description a string can be determined to be a palindrome (the string reads the same forwards and backwards)using a recursive algorithm. this algorithm checks if the first and last characters are the same, then if the second and second to last characters are also the same, and so on. implementing recursive algorithms in assembly, however, can be quite challenging. using static memory addresses to back up registers only works for one call to a subroutine, but fails if the subroutine is called either directly or indirectly recursively. you must use a stack data structure to properly execute recursive subroutine calls. you will write a program with a main subroutine and subroutines to get a string from the user and determine the length of a zero terminated string. additionally, you will write a subroutine to determine if the string entered by the user is a palindrome. while this determination can be made with an iterative algorithm, in this assignment you will be required to make the determination recursively. before you start coding the recursive version of determining if a string is a palindrome

Answers

Answer 1

Python program that uses recursive function call to determine the string entered by the user is palindrome.

Python code

# function for checking if string is palindrome

def palindrome(str,a,b):

# Run recursive loop from 0 to b

if a<b:

    if str[a-1:a]!=str[b-1:b]:

        return False

    else:    

        a = a+1

        b = b-1

        ans = palindrome(stri,a,b)

return True

# main function

if __name__ == '__main__':

 #Input  i = 1

 print("Check palindrome in string")

 print("Input string: ", end="")

 stri = input()

 stri = str.lower(stri)

 j = len(stri)

 ret = palindrome(stri,i,j)

 if (ret):

     print("Yes")

 else:

  print("No")

     

To learn more about recursive functions in python see: https://brainly.com/question/14911725

#SPJ4

High Level Description A String Can Be Determined To Be A Palindrome (the String Reads The Same Forwards

Related Questions

What are some of the things people try to do on social media when they can use
it to hide behind or pretend they are someone they are not

Answers

Answer: catfishing

Explanation:

They hide behind a screen and pretend to be and look like someone they're not by putting up fake pictures etc.

Interactive sites where users write about personal topics and comment to a threaded discussion are called?
A. chat rooms.
B. networking sites.
C. forums
D. messaging sites.

Answers

Answer:

C. forums

Explanation:

Forums are internet sites where users can meet to discuss different topics through the use of messages thereby forming chat rooms. An internet forum can be in form of a question and answer site. Most websites have internet forums where users can meet and discuss or ask questions. Sometimes there may be moderators that ensure that the posted messages are acceptable based on guidelines.

which of the following was the gettysburg address specifically designed to communicate?

Answers

The Gettysburg Address was designed to communicate the importance of preserving the Union and honoring those who fought and died in the Civil War. President Abraham Lincoln delivered the address on November 19, 1863, at the dedication of the Soldiers' National Cemetery in Gettysburg, Pennsylvania.

The Civil War was a turning point in American history, and the Gettysburg Address was a pivotal moment in the war.The Gettysburg Address is considered one of the most important speeches in American history. Lincoln's speech was less than three minutes long, but it conveyed the importance of the Union and the sacrifice made by those who fought and died in the Civil War. He emphasized the importance of preserving the Union and ensuring that the sacrifice of the soldiers would not be in vain. The speech also acknowledged that the struggle for freedom and equality was not yet complete and that the nation had a duty to continue working toward those ideals.

Lincoln's words were a rallying cry for the Union and helped to boost morale during a time of great hardship. His speech was a reminder that the nation was founded on the principle of liberty and that it was the duty of every citizen to preserve that freedom. The Gettysburg Address has been remembered and studied for generations and continues to inspire Americans to this day.

To know more about communicate visit:

https://brainly.com/question/31309145

#SPJ11

There is a new input technique for​ touch-screen devices that allows users to input a word by sliding a finger from letter to letter. The​ user's finger is only removed from the keyboard between words. The developers claim that typing speed using this new input technique is faster when compared with traditional​ touch-screen keyboards. The accompanying data table shows the typing speeds of 10 individuals who were measured typing using both methods. Complete parts​ (a) through​ (d) below.
student submitted image, transcription available below
a. Perform a hypothesis test using α=0.01 to determine if the average typing speed using these two input methods is different. Let μd be the population mean of​ matched-pair differences for the typing speed of the new method minus the typing speed of the traditional method
b. Calculate the appropriate test statistic and interpret the results of the hypothesis test using α=0.01.
c. Identify the p​-value and interpret the result.
d. What assumptions need to be made in order to perform this​ procedure?

Answers

In order to determine if the average typing speed using the new input technique for touch-screen devices is different from the traditional method, a hypothesis test is performed. The appropriate test statistic is calculated, and the p-value is identified and interpreted. Assumptions required to perform the procedure are also discussed.

a. To test if the average typing speed using the two input methods is different, a hypothesis test is conducted. Let μd represent the population mean of matched-pair differences, where the difference is the typing speed of the new method minus the typing speed of the traditional method. The null hypothesis H0 assumes that μd is equal to zero, indicating no difference in average typing speed. The alternative hypothesis Ha suggests that μd is not equal to zero, indicating a difference in average typing speed.

b. The appropriate test statistic for this hypothesis test is the paired t-test. By comparing the observed differences in typing speeds to the expected differences under the null hypothesis, the test determines if the difference is statistically significant. The results of the test are then interpreted based on the significance level α. If the p-value is less than α (0.01 in this case), the null hypothesis is rejected, suggesting that there is a significant difference in average typing speed between the two input methods.

c. The p-value represents the probability of observing a test statistic as extreme as the one calculated, assuming the null hypothesis is true. By comparing the p-value to the significance level α (0.01), if the p-value is less than α, it indicates strong evidence to reject the null hypothesis. In this case, if the p-value is less than 0.01, it means that the average typing speeds using the two input methods are significantly different.

d. In order to perform this procedure, certain assumptions need to be made. These assumptions include: 1) The differences in typing speeds between the two methods are normally distributed, 2) The paired observations are independent, and 3) The paired observations have a consistent and equal variability. Violations of these assumptions may affect the validity of the hypothesis test results. It is important to check these assumptions before conducting the test to ensure the reliability of the conclusions drawn.

Learn more about input here:

https://brainly.com/question/32418596

#SPJ11

Write a function that takes a number of rows, a number of columns, and a string and returns a two-dimensional array of the dimensions specified where each element is the string given. Sample run: mat = fill_str(4, 2, "2D​") print(mat) Prints the following: [['2D', '2D'], ['2D', '2D'], ['2D', '2D'], ['2D', '2D']]

Answers

Answer:

Explanation:

The following code is written in Python. The function, as asked, takes in three parameters and creates a 2D array with the dimensions specified in the inputs and fills it with the element passed for the third parameter.

def createArray(rows, columns, element):

   my_array = []

   for x in range(rows):

       sub_arr = []

       for y in range(columns):

           sub_arr.append(element)

       my_array.append(sub_arr)

   return my_array

Write a function that takes a number of rows, a number of columns, and a string and returns a two-dimensional

NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.

Answers

Answer:

NBA bank data is completely destroyed since it has not maintained any backup.

Explanation:

All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.

Explain why Austin takes close-up pictures of whales and displays them in life-size?

Answers

Austin takes close - up pictures of whales so that he that he can provide viewers with an indelible impression of what a whale really looks like.

Why was Austin interested in the picture?

He so interested because, he might not be able to see Whale any time soon.

And the picture will give a platform to evoke unexplored thought and emotion for him.

Learn more about picture at;

https://brainly.com/question/25938417

you are concerned about attacks directed against the firewall on your network. you would like to examine the content of individual frames sent to the firewall.

Answers

To inspect the content of certain frames sent to the firewall, we must use the Packet Sniffer tool.

Packet Sniffer

Using a sniffer, data traveling through a network can be intercepted (also known as a packet sniffer). If PCs are connected to a local area network that is not switched or filtered, then traffic can be broadcast to all computers in a segment. This rarely occurs because computers are typically programmed to ignore all incoming and outgoing traffic from other computers. In contrast, all of the traffic is shared when a sniffer gives the Network Interface Card (NIC) the order to stop ignoring the traffic. The NIC is put into promiscuous mode, allowing it to read communications between computers in a specific segment. Sensitive information may be accessed without authorization due to the sniffer's capacity to capture anything that is moving through the network. A packet sniffer may be implemented as hardware or software, depending on the application.

Packet analyzers are another name for sniffers.

To know more about Packet analyzer, check out:

https://brainly.com/question/25697816

#SPJ4

An information- and communication-based electronic exchange environment occupied by computer technologies and digitized offerings is called ______

Answers

Electronic commerce takes place in marketspace. It is a sophisticated environment for electronic interchange of information and communication, with a focus on digitized products and advanced computer and telecommunications technologies.

What does the marketspace idea mean?

Definition. An information and communication-based digital trade environment is known as a marketspace. Through the use of networked components like blogs, forums, and specialized applications, transactions involving the exchange of knowledge and/or tangible items take occur in a marketspace.

What constitutes a marketspace's components?

Customers, sellers, commodities and services (whether real or digital), infrastructure, a front end, a back end, middlemen and other business partners, and support services are the main participants and components in a marketspace.

To know more about marketspace visit :-

https://brainly.com/question/8467174

#SPJ4

When you save a file as a template, which types of information do you usually remove?

Answers

   When we save a file as a template, the type of information that is usually deleted is:

Baseline valuesActual values Resources rates

What is a template?

  A template is a type of document that generates a copy of itself when it is opened, this does not mean that a document is created and a copy is generated exactly the same so that it can be used later and the content does not have to be recreated again.

 Now, when we save a file as a template the type of information that is usually removed are the reference values, the current values and last but not least the values, this in order to complete the functions of saving the file as a template.

Learn more about templates in:

https://brainly.com/question/19944952

#SPJ4

When you save a file as a template, which types of information do you usually remove?

!WILL GIVE BRAINLIEST!
Write a Python program that prompts the user for a word. If the word comes between the words apple
and pear alphabetically, print a message that tells the user that the word is valid, otherwise, tell
the user the word is out of range.

Answers

Answer:

word = input()

if word > "apple" and word < "pear":

   print("Word is valid.")

else:

   print("Word is out of range.")

Assume we have ebgp, ibgp and rip. _______ with ebgp, ibgp or rip. 1c learns from

Answers

RIP (Routing Information Protocol) is an interior gateway protocol (IGP) that is primarily used for small-scale networks and does not directly interact with eBGP (External Border Gateway Protocol) or iBGP (Internal Border Gateway Protocol).

When it comes to routing, RIP operates within an autonomous system (AS) and exchanges routing information with other routers within the same AS. It uses distance-vector routing algorithms to determine the best path for routing packets within the AS.

In the context of eBGP and iBGP, these protocols are used for routing between different ASes (inter-AS routing) or within the same AS (intra-AS routing) respectively. eBGP is used to exchange routing information between different autonomous systems, while iBGP is used for communication between routers within the same AS.

In summary, RIP does not learn directly from eBGP or iBGP. Instead, RIP focuses on routing within an AS, whereas eBGP and iBGP are used for routing between different ASes and within the same AS, respectively.

Learn more about Protocol here:

https://brainly.com/question/28782148

#SPJ11

What is the benefit of pushing and popping register values when calling functions? a) Pushing processes into a higher run priority. b) Making sure parameters can be seen by called functions. c) Making sure needed values that are in call used registers are not clobbered by called functions. d) Pushing error codes so that they are ignored

Answers

When calling functions, it is important to push and pop register values for several reasons. First, pushing register values can help prioritize processes and ensure that the function being called receives the necessary resources to execute properly. Second, pushing and popping register values can help ensure that parameters passed to called functions are properly registered and can be accessed by the function. This is critical for functions that rely on input parameters to perform calculations or execute specific tasks.

Another important reason for pushing and popping register values is to ensure that necessary values in call-used registers are not overwritten or clobbered by called functions. Call-used registers are registers that are typically used to store intermediate results or temporary values during function execution. If these registers are clobbered by a called function, it can cause unexpected results and even system crashes.

Finally, it is important to note that pushing error codes so that they are ignored is not a valid reason for pushing and popping register values. Error codes should never be ignored, as they can indicate serious issues that need to be addressed and resolved.

In summary, pushing and popping register values when calling functions is essential for ensuring that the function being called receives the necessary resources, parameters are properly registered, and call-used registers are not overwritten. It is important to follow proper programming practices and avoid ignoring error codes, as they can indicate serious issues that need to be addressed.

More question related to pushing & popping : https://brainly.com/question/17177482

#SPJ11

Conduct research online or through other means on one source of renewable energy. Describe the applications and benefits of the energy source.
Earth Science (Plato)

Answers

A source of renewable energy is Solar energy.

What is the source of the solar energy?

The sun is known to be the source of Solar energy. This is known as any type of energy that is gotten from the sun.

Solar energy is formed by nuclear fusion that occurs in the sun. Fusion is said to take place when protons of hydrogen atoms does collide in the sun's core and fuse to form a helium atom.

Solar power  or energy benefits includes thermal or electrical energy. One can also get the cleanest and most abundant renewable energy source from here.

Learn more about renewable energy from

https://brainly.com/question/545618

List all the disadvantages of fort watchtower

Answers

A fort's drawbacks include limiting your range of motion and making it difficult to organize a sizable force inside the fort prior to a combat. Forts are useful stopovers for lodging troops traveling a long distance outside of conflict.

A fort is a fortified military structure designed to protect a specific location or area from external threats. Forts can vary in size and shape, and can be constructed using a variety of materials and techniques. Some forts are built to withstand attacks from land or sea, while others are designed to protect natural resources such as water sources or transportation routes. Historically, forts have been used by armies and other military forces as defensive positions during battles and wars. Today, many forts have been repurposed as historical landmarks, museums, or tourist attractions.

Learn more about routes here brainly.com/question/18850324

#SPJ4

2. in cell f5, enter a formula with the fv function that uses the rate per quarter (cell f10), the total payments (cell f8), the quarterly payment amount (cell f11), and the principal value (cell f4) to calculate the future value of the loan assuming the quarterly payments are limited to $15,000.

Answers

The formula used to determine the future value of the loan will be =FV(F10/4,F8*4,-F11,F4), assuming that the quarterly payments are restricted to $15,000 each quarter.

What is rate?

A rate in mathematics is the comparison of two related values expressed in different units. The numerator of the ratio shows the rate of change in the other (dependent) variable if the denominator of the ratio is written as a single unit of one of these variables, and if it is believed that this variable may be modified systematically (i.e., is an independent factor). "Per unit of time" is a common sort of rate, and examples include speed, heart rate, and flux. Currency values, literacy levels, and applied electric ratios are examples of ratios with a non-time denominator (in volts per meter).

To know more about rate
https://brainly.com/question/13324776
#SPJ4

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

A technician is trying to determine the IP address of a customer’s router. The customer has an IP address of 192.168.1.55/24. Which of the following is the address of the customer’s router?A. 192.168.0.55B. 192.168.1.0C. 192.168.1.1D. 192.168.5.5E. 255.255.255.0

Answers

Answer:

The answer is "Option C".

Explanation:

This IP address is used as a local network or gateway by devices like d-link as well as other system products. In this address companies operating router access permission to enable the system administrator to set up one's systems and adapters, that's why in this question, the "option c" that is "192.168.1.1" is correct.

what symbol is used on a diagram to represent a disjoint , or nonoverlapping, subtype?

Answers

The symbol used to represent a disjoint or nonoverlapping subtype in a diagram is a circle.

What symbol represents a disjoint or nonoverlapping subtype in a diagram?

In UML (Unified Modeling Language) diagrams, a solid line with a closed arrowhead is typically used to represent a generalization relationship between a superclass and its subclasses.

This relationship indicates that the subclasses inherit properties and behavior from the superclass.

To represent a disjoint or nonoverlapping subtype, a circle is often used in the diagram.

The circle is placed at the end of the solid line connecting the superclass to the subclasses.

This circle, known as a "disjoint constraint," signifies that the subclasses are mutually exclusive and do not overlap in terms of their instances.

It implies that an instance of the superclass can only be an instance of one of the subclasses but not multiple subclasses simultaneously.

By using the disjoint constraint symbol, you are indicating that the subclasses are distinct and independent categories within the superclass.

This visual representation helps convey the specific relationships and constraints between the superclass and its subclasses in the diagram.

Learn more about nonoverlapping

brainly.com/question/30766986

#SPJ11

The following program is run. Then the user click the "bottomButton TWO TIMES, What will be displayed in the console
1
onEvent("topButton","click", function ()
2
console.log("aaa"
3
4.
console.log("bbb");
5
onEvent( "bottomButton", "click", function() {
6
console.log("ccc");
7
)

Answers

Answer:

10

Explanation:

Write a program to help an analyst decrypt a simple substitution cipher. your program should take the ciphertext as input, compute letter frequency counts, and display these for the analyst. the program should then allow the analyst to guess a key and display the results of the corresponding "decryption" with the putative key.

Answers

Every character in plaintext is swapped out for a different character in simple substitution cyphers. One should perform a reverse substitution and change the letters back in order to decrypt ciphertext.

What is a straightforward instance of a substitution cypher?

Any character of plain text from the predetermined fixed set of characters is replaced by another character from the same set according to a key in a substitution cypher. For instance, with a shift of 1, B would take the place of A, and so on.

What does Python's simple substitution cypher mean?

An Easy Substitution Letters are swapped out in cyphers. The total number of possible substitutes is 26 for the letter A, 25 for the letter B, 24 for the letter C, and so on.

To know more about cyphers visit:-

https://brainly.com/question/14449787

#SPJ4

virtual corporations are also called group of answer choices modular corporation. modular network. virtual network. corporate network. anti-organizations.

Answers

Virtual corporations are also called: A. modular corporation.

What is a corporation?

A corporation simply refers to a corporate organization that has facilities and owns assets that are used for the production of goods and services in at least one country, other than its headquarter which is located in its home country.

What is a virtual corporation?

A virtual corporation is sometimes referred to as a modular corporation and it can be defined as a type of organization that is typically established from a network of suppliers, manufacturers (producers), and administrative services in order to enable it accomplish specific aims, objectives and goals such as responsiveness and flexibility.

Read more on corporations here: brainly.com/question/26593100

#SPJ1

migrating a traditional database design to the web can require design modification, additional software, and some added expense. t or f

Answers

A standard database architecture may need to be modified for the web, which might include purchasing new software and costing more money.

What purposes serve databases?

database, often termed online version, any collection pf data, or content, that is particularly arranged for quick searches and retrievals by a robot. To make it simple to save, retrieve, update, and delete the file while performing various data-processing functions, databases are built.

What is a database, exactly?

In computing, a database is an organized set of data that is accessible and stored electronically. Large databases are housed on data centers or cloud storage, whilst small data can be kept on a file system. .

To know more about Database visit :

https://brainly.com/question/13275751

#SPJ1

You have a folder on your Windows 7 computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the files. What should you do?

Answers

Answer:

change the NTFS permissions on the folder that you are sharing

Explanation:

In order to solve this, you are going to need to change the NTFS permissions on the folder that you are sharing. These are permissions that allow or prevent the files in that current system location from being modified. In order to do this, you will need to first, right-click on the folder that you are sharing. Next, click on "Properties" and head to the Security tab. Finally, choose the groups or user names of the individuals who have access and check allow on all the boxes. This will give them full control over the data in the folder.

Why would a user add controls to a form? check all that apply.

to provide a label
to perform actions
to add primary keys
to provide organization
to display a subset of data
to remove drop-down menus

answer: a,b,d,e. just did it.

Answers

A user adds controls to a form are:

to provide a labelto perform actionsto provide organizationto remove drop-down menus

Thus, option a,b,d, and e is correct.

How, explain your answer briefly?

Controls are objects that display data or make it easier for users to enter or edit data, perform an action, or make a selection.

In general, controls make the form easier to use. Examples of common controls include list boxes, option buttons, and command buttons.

Thus, option a,b,d, and e is correct.

To learn more about controls click here:

https://brainly.com/question/14782348

#SPJ1

Answer:

provide label, to perform actions, to provide organization, to display a subset of data

Explanation:

i just did it and it was right.

what is another name for a child class? question 10 options: derived class sub class descendent class all of the above

Answers

A subclass is a class that is descended from another class (also a derived class, extended class, or child class). A superclass is the class from which a subclass is descended (also a base class or a parent class).

All classes, including the ones you create, share behavior that is specified and implemented by the Object class, which is found in the java.lang package. A hierarchy of classes is formed in the Java platform by the fact that many classes descend directly from Object, others derive from some of those classes, and so on.

The private members of a parent class are not inherited by a subclass. However, the subclass may also use the public or protected methods that the superclass provides to access its private fields.

A nested class gets access to all the properties and methods that are private to its parent class. As a result, a subclass inheriting a public or protected nested class gets indirect access to every private member of the superclass.

Know more about java here:

https://brainly.com/question/12978370

#SPJ4

How were these isometric letters created?

How were these isometric letters created?

Answers

Answer:

Using the 3D Extrude & Bevel effect.

Explanation:

I just took the test, I got a 100.

2.2 Code Practice: Question 2

Answers

The codes are written below in python.

What are codes?

Coding is a type of computer language that facilitates communication with computers. Human languages are not understood by computers. Coding enables interaction between people and computers.

Code tells the computer what actions to take and which tasks to complete. We read input using the input() method and then convert it to a float using the float() function.

num1 = float(input("Enter a number: "))

num2 = float(input("Enter a number: "))

print("Sum: " + str(num1 + num2))

Therefore, the codes in python are written above.

To learn more about codes, refer to the link:

https://brainly.com/question/18508134

#SPJ9

The complete question is:

Question 2: write a python program to add two numbers.

how can i directly go to the corrupted spot identified by the spot verifier service?

Answers

The steps that you need to follow are listed below.

How can i directly go to the corrupted spot identified by the spot verifier service?

If you have identified a corrupted spot using a spot verifier service, here are the general steps to directly access that spot:

Note down the location or identifier of the corrupted spot provided by the spot verifier service. This could be a specific file, folder, or a memory address.Open the file explorer or the application relevant to the location of the corrupted spot. For example, if the spot is within a specific file, open the file in a text editor or the appropriate application to view the contents.If the corrupted spot is within a file, search for the identified spot or memory address within the file. You can use the search functionality within the application to locate the spot.If the corrupted spot is within a folder or directory, navigate to the specific location within the file explorer.Once you have reached the corrupted spot, you can assess its contents or make necessary changes based on the purpose or recommendation provided by the spot verifier service.

These are general steps, these may change depending on the service.

Learn more about memory address.

https://brainly.com/question/28483224

#SPJ4

Select all the correct answers.
Hans is works for a software company that is developing a banking service that employs online transaction processing. What are two advantages
of using this technology?
•It is simple to implement due to redundancy.
•It allows customers to access the service from any location.
•It experiences minimal losses during downtime.
•It provides a secure environment for transactions.
•It processes a transaction even if part of the transaction fails.

Answers

Banking services are monetary transaction that includes the deposit and withdrawal of money. The online transaction process allows one to access services in any place and secure transaction environment.

What is an online transaction?

Online transactions are the transfer of money on the cloud platform using internet services. The financial transactions are done on the web banking platform that includes money transfers, bill payments, shopping, etc.

Online transactions do not require physical presence and can be done at any place irrespective of the location the money gets transferred to the person. Also, it provides a secure environment to transact any amount.

Therefore, a secure environment and access to services at any place are the two advantages of online transactions.

Learn more about online transactions here:

https://brainly.com/question/24192124

#SPJ1

Answer:

a

Explanation:

what the first guy said

Other Questions
Bottleneck events lead to _______. a. population growth b. an increase in inbreeding c. an enrichment of dominant genetic traits d. a reduced rate of species mutation please select the best answer from the choices provided a b c d What is the relationship between purchases and budget constraints? How does this affect the circular flow model? You measure 41 dogs' weights, and find they have a mean weight of 48 ounces. Assume the population standard deviation is 5.2 ounces. Based on this, construct a 95% confidence interval for the true population mean dog weight. Element 1 is a hard dark-red solid. A 5 cm x 5 cm square of it, only 1 mm thick, is flexed slightly by hand. The sheet snaps in half.Is element 1 metal, nonmetal or cant decide? enetic control of leaf angle in sorghum and its effect on light interception. j experimental botany 73:801816 4kg of cheese costs 10.80 how much would 3kg cost calculate the force of gravity on a 1-kg mass at earths surface. the mass of eart is 6 x 10^24, and its radius is 6.4 * 10^6 Assume that 0pi/2. Find the exact value of sin(x-y) if sin x = 4/9 and sin y=1/4 Can someone evaluate? And please show work.8z - 3 z=4 1. Find and report the minimum, maximum, mean, median, standard deviation, Q1, Q3. 2. Find the z-score for the minimum value and maximum value. 3. Make a frequency table. Use the first class of (30, 35] and create more classes of the same size until you have accounted for the observations. 4. Add columns to the frequency table for relative frequency and cumulative relative frequency. 5. Make a histogram of the above frequency table (number 3). Do not make a relative histogram. Do not make a cumulative relative histogram. 6. Find the 3 intervals (x-s,x+s) (x-2s,x+2s) (x-3s,x+ 3s) and find the actual percentage of values that fall within each of the above intervals. 7. Make a box-whisker plot. 8. Find the LIF and UIF. 9. Report and justify any outliers. 10. Summarize the dataset in 2-3 sentences. Include symmetry, outliers, typical values. Religion in ancient Egypt was vital to society because itA) proved that the Pharaoh was practically a god. B) provided all people with a sense of stability. C) prevented the priestly class from attempting to overthrow the Pharaoh. D) gave peasants hope that they could improve their status in the next life. Religion in ancient Egypt was vital to society because itA) proved that the Pharaoh was practically a god. B) provided all people with a sense of stability. C) prevented the priestly class from attempting to overthrow the Pharaoh. D) gave peasants hope that they could improve their status in the next life. what is the largest number below 10 If you were interested in determining whether a gene you are studying is transcribed in response to a physiological stress, you would need to use a method capable of detecting a specific _______ sequence in the organism being studied. what type of joint is encased in a capsule and surrounded by fluid? Of the following, which country experienced the fastest rate of productivity growth over the period 2007-2017? A-United States B-Sweden C-France D-Germany what colors represent areas where a warming trend was recorded during 2000-2009 relative to average temperatures in 1951-1980? Eleri and her friends plan an adventure holiday. This graph shows rainfall in the UK last year. Eleri thinks that there was twice as much rainfall in May than in June. Is Eleri correct? Show why you think this. Twenty-five identical molecules are in a box. microstates are designated by identifying the molecules in the left and right halves of the box. the multiplicity of the configuration with 15 molecules in the right half and 10 molecules in the left half is A 22-year-old presents with chronic bronchitis. tests reveal closure of the airway during expiration. this condition is most likely caused by _________. T/F many popular books and articles on international negotiation treat culture as expected behavior, providing lists of dos and don'ts to obey when negotiating with people from different cultures.