HS Computer Science Questions

HS Computer Science Questions

Answers

Answer 1

The CPU is in charge of carrying out a program, which is a collection of stored instructions. An input device will be used to provide input for this application, which will then process the input and report the results to an output device.

What computer work with input, output processing?

1.Typed text, mouse clicks, and other methods of entering data into a computer system are examples of input. Processing is the process of converting input data into output data. Output is what the computer produces after analysing the input—the visual, aural, or tactile experiences.

2. A directory structure is a type of container for files and folders. It uses a hierarchical structure to organize files and directories. A directory can be logically organized in a number of ways, some of which are listed below. The single-level directory is the simplest type of directory structure.

3. Data flow is the key of programming. Data is available for a programmer to input into a program. The software can interpret the input data using its own data. All of this information can be combined to represent concepts and benefit the user and the program.

Therefore, A computer is a tool that can be configured to take in data (input), transform it into information that is useful (output).

Learn more about computer here:

https://brainly.com/question/13976978

#SPJ1


Related Questions

What problem does Mitra identify in education? How can the internet and social media influence this problem?

Answers

The problem that Mitra identifies in education is that kids don't go to school, don't know what a computer or the internet is. Teachers don't want to go to places where they're needed the most.

Answer:

     The problem that Mitra identifies in education is that kids don't go to school, don't know what a computer or the internet is. Teachers don't want to go to places where they're needed the most. The Internet and Social Media can influence problems because kids and young adults could be focusing on social media and relying on the internet more than actually focusing on there school work and working in general.

Assume 'v' being an array of long integers (64 bits), with base address stored in register x1, 'i' being a long integer residing at address 1024, translate the following codes in Assembly RISC-V:

1) v[i] = v[i] + v[i+1]
2) for(i=1; i < 10; i++){
v[i] = v[i] * v[i+1];
}

Answers

Answer:

Here's the translation of the code into RISC-V assembly:

# Load the value of v[i]

ld x10, 1024(x0)      # Load i into register x10

slli x11, x10, 3      # Multiply i by 8 to get the byte offset

add x12, x1, x11     # Add the offset to the base address to get the address of v[i]

ld x13, 0(x12)        # Load the value of v[i] into register x13

# Load the value of v[i+1]

addi x10, x10, 1      # Increment i by 1 to get i+1

slli x11, x10, 3      # Multiply i+1 by 8 to get the byte offset

add x12, x1, x11     # Add the offset to the base address to get the address of v[i+1]

ld x14, 0(x12)        # Load the value of v[i+1] into register x14

# Add the two values and store the result in v[i]

add x13, x13, x14     # Add v[i] and v[i+1]

sd x13, 0(x12)        # Store the result in v[i]

# Initialize i to 1

li x10, 1

loop:

# Check if i < 10

bge x10, 10, exit

# Load the value of v[i]

slli x11, x10, 3      # Multiply i by 8 to get the byte offset

add x12, x1, x11     # Add the offset to the base address to get the address of v[i]

ld x13, 0(x12)        # Load the value of v[i] into register x13

# Load the value of v[i+1]

addi x10, x10, 1      # Increment i by 1 to get i+1

slli x11, x10, 3      # Multiply i+1 by 8 to get the byte offset

add x12, x1, x11     # Add the offset to the base address to get the address of v[i+1]

ld x14, 0(x12)        # Load the value of v[i+1] into register x14

# Multiply the two values and store the result in v[i]

mul x13, x13, x14     # Multiply v[i] and v[i+1]

sd x13, 0(x12)        # Store the result in v[i]

# Increment i and jump to the beginning of the loop

addi x10, x10, 1

j loop

exit:

Explanation:

We're given the training set data with the following values for variable X1:

X1 Feature Values
6
7
12
-5


We chose to perform scaling Using t-distribution standardization.
Which of the following answers is true, regarding the values of the feature after scaling?
Remark: a 2-digit accuracy after the decimal point is sufficient.
Select the best answer

Select one:
A.
The value of the feature of the third example after scaling is about 0.6
B.
The value of the feature of the third example after scaling is about 1.33
C.
The value of the feature of the third example after scaling is about 1.67
D.
The value of the feature of the third example after scaling is about 0.97

Answers

The option that is true, regarding the values of the feature after scaling is that The value of the feature of the third example after scaling is about 0.6.

What is standard t-distribution?

The t-distribution is one that the standardized distances of sample mean implies to the population mean if the population standard deviation is said to be unknown, and the observations is originated from a normally distributed population.

Note that The option that is true, regarding the values of the feature after scaling is that The value of the feature of the third example after scaling is about 0.6.

Learn more about t-distribution standardization from

https://brainly.com/question/24277447

#SPJ1

match each option to the description of the task it accomplishes?

Answers

Answer:

did u mean to send a picture

Explanation:

chemical reaction to metal​

Answers

Answer:

Metals can react with water, acid and oxygen. The reactivity of the metal determines which reactions the metal participates in.

Explanation:

In general, acids react with metals to give salt and release hydrogen gas. In general, bases do not react with metals and release hydrogen gas.When metals react with other substances, the metal atoms lose electrons to form positive ions .

ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the following letters is represented by the hexadecimal (base 16) number 56?A. AB. LC. VD. Y

Answers

The answer to the above-given question is option D. - Letter V

ASCII character encoding:

American Standard Code for Information Interchange (ASCII) was developed to create an international standard for encoding the Latin alphabet. In 1963, ASCII was introduced to allow information to be interpreted between computers. Representation of lowercase and uppercase letters, numbers, symbols, and some commands. ASCII is encoded with 1's and 0's, so a radix-2 number system uses 7 bits. With 7 bits, characters can be encoded in 2 to the power of 7 = 128 number combinations.

ASCII encodes characters in 7 bits, so the move to 8-bit computing technology meant that extra bits had to be used. This extra digit encodes extended ASCII up to 256 characters.

ASCII was originally based on the (modern) English alphabet and encodes the given 128 characters in 7-bit integers as shown in the ASCII table above. 95 of the encoded characters are printable. These include the digits 0 through 9, lowercase letters a through z, uppercase letters A through Z, and punctuation marks. Additionally, the original ASCII specification contained 33 non-printable control codes derived from teletype machines. Most of these are now obsolete, but some are still in common use. Carriage return, line feed, and tab codes.

For example, a lowercase is in the ASCII encoding is represented by 1101001 in binary = 69 in hex (where i is his ninth character) = 105 in decimal. American standard, but ASCII does not have a code point for the cent (¢). It also does not support English terms with diacritics, such as resume or jalapeño, or proper nouns with diacritics, such as Beyoncé.

Learn more about ASCII character encoding here :

brainly.com/question/20361136

#SPJ4

Explain how the entity relationship (ER) model helped produce a more structured
relational database design environment.

Answers

The way that the entity relationship (ER) model helped produce a more structured relational database design environment is that

A database's primary entities and their relationships can be determined with the aid of an entity relationship model, or ERM. The role of the ERM components is easier to comprehend because they are graphically portrayed.

It is simple to translate the ERM to the tables and attributes of the relational database model using the ER diagram. The full set of needed database structures is generated by this mapping procedure, follows a set of clearly defined processes which are:

uses clearly defined images and rules to represent reality.the theoretical basisbeneficial for communicationTranslate to any DBMS type

How does the ER model aid in relational database design?

A visual representation of relational databases is an entity relationship diagram (ERD). Relational databases are modeled and designed using ERDs.

The Entity Relationship Model (ERM), which enables designers to perceive entities and connections visually, contributed to the creation of a more structured relational database design environment.

Therefore, Instead of defining the structures in the text, it is easier to understand them graphically.

Learn more about entity relationship (ER) model from

https://brainly.com/question/14424264
#SPJ1

what number am i. i am less than 10 i am not a multiple of 2 i am a coposite

Answers

Answer: 9 is less than 10, it is odd (not a multiple of 2), and it is composite (since it has factors other than 1 and itself, namely 3). Therefore, the answer is 9.

The answer is nine because if you write all the numbers that are under ten you can see that 2, 4, 6, and, 8 are multiples of 2 so you can’t do that so then you gotta see which ones are composite which is nine because 1, 5, and 7 don’t have any more factors than for example 7 and 1.

the difference between tool bar and status bar​

Answers

Answer:

A toolbar offers easier access to tasks typically conducted within the application whereas in the status bar it is displayed at the lower side of the web browser screens and other application windows.

Explanation:

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses, and infected nodes in the computer network. A new methodology for finding patterns in data that signify infections was investigated in IEEE Transactions on Information Forensics and Security (May 2013). The method uses multiple filters to check strings of information. For this exercise, consider a data string of length 4 bytes (positions), where each byte is either a 0 or a 1 (e.g., 0010 ). Also, consider two possible strings, named and In a simple single filter system, the probability that and differ in any one of the bytes is .5. Derive a formula for the probability that the two strings differ on exactly of the 4 bytes. Do you recognize this probability distribution?

Answers

What is Network forensics ?

Network forensics is the procedure of tracking packets and reading community site visitors hobby for intrusion or malware detection. It entails figuring out an issue, amassing and reading data, choosing the great troubleshooting response, and imposing it.

The probability distribution is 1.25.

Read more about the probability distribution:

https://brainly.com/question/24756209

#SPJ1

Network forensic analysis. A network forensic analyst is responsible for identifying worms, viruses,

which statements describes the size of an atom

Answers

answer:

A statement that I always think about to understand the size of an atom. If you squish a person down to the size of an atom. It will make a black hole. and if you squish the whole Earth. down to the size of a jelly bean it will also make a black hole. This is just a approximation.

-----------------------

I use the scale to understand how small that is I am open to hear more principles if you were talking about math wise that would be glad to help.

if you have anymore questions I will try to answer your questions to what I know.

.

In an executing process, the program counter points __________.

Answers

Answer:

To the next instruction to be executed and is incremented after each instruction has been executed.

Explanation:

Given that Program counter is a form of record or directory in a computer processor that has the location of the instruction that is currently being executed.

This it does in such a way that, following the execution of each instruction, the program counter increases the number of instructions it stored and immediately points to the subsequent instruction that follows.

Hence, in an executing process, the program counterpoints "To the next instruction to be executed and is incremented after each instruction has been executed."

6.23 LAB: Flip a coin
Define a function named CoinFlip that returns "Heads" or "Tails" according to a random value 1 or 0. Assume the value 1 represents "Heads" and 0 represents "Tails". Then, write a main program that reads the desired number of coin flips as an input, calls function CoinFlip() repeatedly according to the number of coin flips, and outputs the results. Assume the input is a value greater than 0.

Hint: Use the modulo operator (%) to limit the random integers to 0 and 1.

Ex: If the random seed value is 2 and the input is:

3
the output is:

Tails
Heads
Tails
Note: For testing purposes, a pseudo-random number generator with a fixed seed value is used in the program. The program uses a seed value of 2 during development, but when submitted, a different seed value may be used for each test case.

The program must define and call the following function:
string CoinFlip()

Answers

The program that defines a function named CoinFlip that returns "Heads" or "Tails" according to a random value 1 or 0 is given below:

The Program

#include <iostream>

#include <cstdlib>

#include <ctime>

std::string CoinFlip() {

   int randomValue = std::rand() % 2;

   return (randomValue == 1) ? "Heads" : "Tails";

}

int main() {

   std::srand(std::time(0)); // Seed the random number generator

   int numFlips;

   std::cin >> numFlips;

   for (int i = 0; i < numFlips; ++i) {

       std::cout << CoinFlip() << std::endl;

   }

   return 0;

}

We use std::rand() to generate a random number between 0 and RAND_MAX, and limit it to 0 or 1 with the % operator.

The CoinFlip() function returns "Heads" or "Tails". In main(), we seed the random number generator with std::srand(std::time(0)).

To ensure unique random values, we call CoinFlip() function in a loop after taking user input for the desired number of coin flips. Finally, return 0 for program success.

Read more about programs here:

https://brainly.com/question/28938866

#SPJ1

The greater than sign(>) is an example of ​

Answers

Answer:

charactor

Explanation:

It's used in arythmetic calculation

You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next?
a) Check for data you have previously hidden.
b) Make the columns wider.
c) Check that the worksheet is not Read-Only.
d) Change the format to reduce the font size.

Answers

Answer:

a)

Explanation:

Since the worksheet contains most of the data that you need, there is a decent possibility that it also contains the data that you are missing. Therefore, you should check for data you have previously hidden. Sometimes, some data in a worksheet may become irrelevant in a given moment, and instead of deleting it since it may be useful later most people tend to make that data hidden. So checking for previously hidden data may be the best solution in this scenario.

Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. What will he use?

a. Fuzzer
b. Happy path
c. Boundary value analysis
d. Agile testing

Answers

Answer:

A) fuzzer

Explanation:

From the question, we are informed that Allen needs a program that injects automatically semi-random data into a program or stack and detects bugs. In this case,he will use a fuzzer. A fuzzer can be regarded as a program that gives in a semi-random data to a program/stack, and it will detect bug. fuzzing testing can be regarded as

software testing process which discover bugs in the software, this is done automatically by giving in input of randomized data to the computer program. Generation of data is done by a generator, while vulnerability identification depends on the tools use in the debugging process.

File Encryption is a process that is applied to information to preserve it's secrecy and confidentiality. How would file encryption protect your report?


a. Scrambles that document to an unreadable state.

b. Remove unwanted information before distributing a document.

c. Prevent others from editing and copying information.

d.Prevent the data to be read by authorized person.​

Answers

Answer:

A for sure

Explanation:

other are not encryption

What is the final step when creating an appointment to ensure that the content of the appointment is stored in Outlook?

double-clicking OK
clicking Save & Close
clicking the X at the top right corner
double-clicking the Appointment button

Answers

Answer:

Explanation:

double clicking ok but um i hope this helps

Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?

Answers

To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.

How to calculate

To calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.

Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.

Therefore, we need 2 subnet bits.

Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.

Read more about subnet mask here:

https://brainly.com/question/28390252

#SPJ1

True or False: An application package is the most expensive alternative

Answers

Answer:True

Explanation: The price of it is more then the original product

Select the correct statement(s) regarding digital baseband modulation.
a. similar to analog signal modulation, logical ""1s"" and ""0s"" are represented by carrier wave amplitudes, frequencies, or phase angles
b. QAM is a modulation technique in which both carrier amplitude and phase angle changes represent logical data
c. with QAM, two carrier waves of the same frequency, but separated by π/2 radians, are used to represent logical data
d. all statements are correct

Answers

Answer:

The answer is "Option d".

Explanation:

The electronic firmware synchronization was its method where even the series of bytes is amplified even before the transmission process into to the sound waves and, thus, and in conceptual "1s" and "0s" represented by large font, wavelengths, or switching frequency.

QAM utilizes both magnitudes of the transporter and adjustments in the phase shift. Rational data is represented by \(\frac{\pi}{2}\) cartesian coordinates for both the carries waves of the same wavelengths and represents the result in total.

Question 2 Multiple Choice Worth 5 ports)
(01.03 MC)
John is the yearbook president and wants to edit articles and pictures for the yearbook at home, but he is afraid of losing a device on his walk home from sch
storage should John use?
Cloud storage
O External hard drive
Floppy disk
O USB flash drive

Answers

Answer:

USB Drive

Explanation:

Its a portable small item that can store files and be plugged into laptops, PC's, Mac etc

Conclusion:

When he arrives home he will need a Device to plug it into for him to be able to edit the articles and pictures of the yearbook

what is real time os ?​

Answers

Explanation:

A real-time operating system (RTOS) is an operating system (OS) intended to serve real-time applications that process data as it comes in, typically without buffer delays. Processing time requirements (including any OS delay) are measured in tenths of seconds or shorter increments of time. A real-time system is a time-bound system which has well-defined, fixed time constraints. Processing must be done within the defined constraints or the system will fail. They are either event-driven or time-sharing. Event-driven systems switch between tasks based on their priorities, while time-sharing systems switch the task based on clock interrupts. Most RTOSs use a pre-emptive scheduling algorithm.

Consider the following 2 pseudocode options for implementing the Allocate-Node() functionality of the BTree in C++. How would each impact the runtime of the
B-Tree-Insert function? Consider both asymptotic analysis as well as real time impacts.
Allocate-Node()
x = Node()
x.leaf = true
x.n = 0
x.keys = new int[2*t-1] \\ member variable int* keys
x.c = new Node*[2*t] \\ member variable Node** c
Allocate-Node()
x = Node()
x.leaf = true
x.n = 0
x.keys = { } \\ member variable vector keys
x.c = { } \\ member variable vector c

Answers

Answer:

The first option, using new, has a worst-case runtime of O(n), where n is the number of elements in the B-Tree. This is because the new operator must allocate memory for the entire node, which can be a significant amount of time if the node is large. The second option, using a vector, has a worst-case runtime of O(1). This is because vectors are automatically resized as needed, so there is no need to allocate a new block of memory each time a node is created.

In practice, the difference in runtime between the two options is likely to be small. However, if the B-Tree is large, the first option could have a significant impact on performance.

Here is a more detailed analysis of the two options:

Option 1: new

The new operator allocates memory on the heap. This means that the operating system must find a free block of memory large enough to hold the node, and then update the memory allocation tables. This process can be relatively slow, especially if the node is large.

In addition, the new operator can be a source of memory leaks. If a node is created but never deleted, the memory it occupies will eventually be reclaimed by the garbage collector. However, this can take a long time, especially if the node is large or if there are many other objects in the heap.

Option 2: vector

Vectors are a type of data structure that automatically resizes as needed. This means that when a new node is created, the vector will automatically allocate enough memory to hold the node's data. This is much faster than using new, and it also eliminates the risk of memory leaks.

However, there is one downside to using vectors: they can be slower than arrays for accessing individual elements. This is because vectors must first check to see if the element is within bounds, which can add a small amount of overhead.

In general, the second option (using a vector) is the better choice for implementing Allocate-Node(). It is faster, it eliminates the risk of memory leaks, and it is just as efficient for most operations. However, if performance is critical, and the nodes in the B-Tree are large, the first option (using new) may be a better choice.

In cell G5, enter a formula without using a function that subtracts the actual dollars billed from the estimated amount to determine the remaining amount of the estimate for general administrative services

Answers

Using the appropriate excel syntax, the formula which calculates the actual amount from estimated amount is : =C10 - D10

Using the cells thus :

Actual dollar billed = C10Estimated amount = D10

Using the cell values defined above ; the required excel syntax is as follows :

=C10 - D10

Note : All excel formulas begin with the equal to sign.

Learn more : https://brainly.com/question/25644130

Why might you get a warning that there is a problem with a web page’s security certificate?

Ads will infect your computer with malware.
The web page might be unsafe.
Your security software is out of date.
Your computer may have the wrong settings.
The web page could have intrusive ads.

Answers

The web page might be unsafe.

Why there is a problem with this website's security certificate?This website's security certificate was not produced by a reputable certificate authority. Problems with security certificates may be a sign that someone is trying to trick you or intercept the data you submit to the server. We advise you to leave this website now and not go any further.If the computer's date and time are incorrect, changing them and then reloading the website should resolve the problem. However, if the date and time are accurate and the website is well-known and reputable, it can simply be a certificate error.The web page or website you are viewing does not offer an encrypted connection, which is why you are getting the "Not Secure" warning.

To learn more about web page refer,

https://brainly.com/question/10450768

#SPJ1

Information overload can put tension on your brain and cause you to feel
A. tired and forgetful.
B. busy and rushed.
C. depressed.
D. addicted.

Answers

A brain under stress from too much information might make you feel rushed and busy. Hence, option B is correct.

What is brain?

Every physical function, including intellect, memory, emotion, touch, motor skills, vision, breathing, temperature, and hunger, is controlled by the sophisticated organ known as the brain. The spinal cord that protrudes from the brain is part of the central nervous system, or CNS.

In a typical adult, the brain weighs roughly 3 pounds and contains about 60% fat. The remaining 40% are made up of various water, protein, carbohydrate, and salt combinations. The brain does not function like a muscle on its own. It is composed of glial cells, neurons, blood vessels, and nerves.

To get more information about brain :

https://brainly.com/question/11950231

#SPJ1

instruction for a computer to follow​

Answers

Answer:

program/software program

Explanation:

main types are application software and system software

Dynamic addressing: __________.
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing, changing networks

Answers

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

E. can solve many updating headaches for network managers who have large, growing, changing networks
Other Questions
An investor with risk-averse behavior will seek to reduce risk by mixing investments in a portfolio with different or offsetting risks. This technique is most effective to reduce? Use the diagram to answer the following question.What is the BEST title for this diagram?A. Factories and the Great DepressionB. The Purchasing Cycle and the Great DepressionC. Supply and Demand During the Great DepressionD. The Role of Unemployment in the Great DepressionFactories produced more goods than people could buy. Prices dropped. Companies lowered wages and laid off workers. People had less money to buy goods. A piece of construction equipment will cost $6,000 new and will have an expected life of 8 years, with no salvage value at the end of its life. The disbursements for taxes, insurance, maintenance, fuels, and lubricants are estimated to be $1,500 for the first two years, $1,700 for the third, $1,900 for the fourth, and will continue to increase by $200 each year thereafter. a) Draw a fully labelled diagram to represent this cash flow. b) What is the equivalent Future Cost (FW) of this piece of equipment if the rate of interest is 12% ? Monsoons in india and China are both a blessig and a curse. A. True B. False IF you invited these six to a tea party what will each bring to your atmosphere? Where will you seat everyone at the table and why? What will the table look like? What would a conversation between two of the party members sound like? Was your tea party a success? what are the indicators?. what does Martin Luther and Christopher Columbus, Galileo Galilei, King LouisIX, Empress Catherine the Great, Leonardo Da Vinci Solve the system by substitution.4x-2y=14y=12x-1 On a number line, a number, b, is located the same distance from 0 as another number, a, but in the opposite direction. Thenumber b varies directly with the number a. For example b = 2 when a = -2. Which equation represents this directvariation between a and b?b = -a-b= -ab - a = 0b(-a)=0 Simplify:4(4y-7y^{2})-9(5y+2) which of the following situations would involve the calculation of the future value of an ordinary annuity? multiple choice question. determining a single amount borrowed today, which will be repaid in 3 years. depositing an amount to a savings account each month that will grow to purchase a car in 5 years. determining the value of a liability that must be reported on the balance sheet today. the existence of cash is always relevant, and valuation a relevant assertion for the cash account what number multiplied by it's self give the product 576 An ideology espousing limited government control of the economy with expanded government control over social order describes which of the following Hyperphosphorylation of proteins by the Sik3 protein explains:a. why Dreamless mutants have reduced REM.b. why Sleepy mutants are so sleepy.c. why Dreamless mutants have increased REM.d. why Sleepy mutants and sleep-deprived wild type mice are sleepy. Paul needs to purchase a new flat screen TV for the entertainment center in his game room. Future Electronics is selling a 50-inch television. This distance is the diagonal distance across the screen. If the television has a height of 30 inches, what is the area of the 50-inch TV? calculate the unknown angles in following figures .only h number plss i will give u braniest and follow u What about financial statements of privately held firms? Does fraud occur in these firms. An individual that is ____ that others of its species is more likely to reproduce and pass its genes to its offspringOPTIONS:Dark coloredMore aggressive LargerFitter When can acceleration be observed and what result will it have on an object? Using beta as a risk measurement device has not caught on in the real world because finding the value is nearly impossible for most investors. TRUE OR FALSE? Help im sooooo confused Fill in the blanks primarybilingualtoddlersimmersiongrappleextensiveinfancySome believe that parents should start using two languages with their kids since_________________, but some argue that exposing _________________ to both languages from the same person would lead to delayed acquisition of language.