In this course project you need to compile the principles of object-oriented programming in order to design and implement a graphical user interface application using JavaFX. The application is a food ordering application, where the user login to the system using a given username and password and land to a main panel which shows the menu items of the available dishes, and the user selects the items that he/she wishes to order, and the application prints out a bill that shows the order details. The main features:
1. A given text file "USERS.txt" contains username, password pairs of the registered users in the system, where the application reads the file from the beginning and creates an object for each user.
a. Design a User class that contains the properties and methods of the users.
b. The application parses the USERS.txt file and converts its content into an array of users objects.
2. A given file "MENU.TXT" contains the details of the available dishes in the restaurant such as (type, price, imageName, calories ...etc).
a. Design a Dish class that contains the properties and methods related to the restaurant dish.
b. The imageName property associated with each dish will point to an image file that the application will show in the panel.
c. The app reads the file and creates the menu in a GUI allowing the users to select the items they wish to order. 3. The app calculates the total price of the selected items and exports the order bill into a file.
4. Before closing the app, the app exports the inventory showing all the orders that have been ordered during that session.

Answers

Answer 1

Object-oriented programming (OOP) is a programming style that utilizes objects to accomplish tasks. This program comprises object-oriented principles for constructing and implementing a graphical user interface application that makes use of JavaFX.

It is a food ordering program in which a user logs in to the system using a given username and password and is presented with a primary panel that displays the available meal menu items. The user picks the items they want to order, and the app produces a bill showing the order information. The program has several features, including reading and parsing two given files to generate an array of user and dish objects, calculating the total price of the selected items, and generating an order bill file. At the end of the session, the program saves all of the orders produced during that session in an inventory file.

To know more about programming visit:

https://brainly.com/question/11023419

#SPJ11


Related Questions

what needs to be changed on the server to make a shared directory read-only? hint: you will need to consult the manpage for /etc/exports.

Answers

To make a shared directory read-only, you should add the "ro" option to the entry for that directory in the /etc/exports file. The "ro" option stands for "read-only" and restricts write access to the shared directory.

Here's an example of how the entry in the /etc/exports file might look like:

/path/to/shared/directory  client_IP(ro)

After making changes to the /etc/exports file, you need to restart or reload the NFS (Network File System) service for the changes to take effect. This can typically be done using the following command:

sudo systemctl restart nfs

Learn more about Network File System here:

brainly.com/question/31596271

#SPJ11

Ballet was originally created for the wedding celebration of Louis XVI and Marie Antoinette. (True or False)

Answers

Answer:

true

Explanation:

How to change capital letters to lowercase in word.

Answers

Answer:

To change the case of selected text in a document, do the following:

Select the text for which you want to change the case.

Go to Home > Change case  .

Do one of the following:

To capitalize the first letter of a sentence and leave all other letters as lowercase, click Sentence case.

To exclude capital letters from your text, click lowercase.

To capitalize all of the letters, click UPPERCASE.

To capitalize the first letter of each word and leave the other letters lowercase, click Capitalize Each Word.

To shift between two case views (for example, to shift between Capitalize Each Word and the opposite, cAPITALIZE eACH wORD), click tOGGLE cASE.

Explanation:

You are the newly hired networking administer and technician for the law firm Dewey, Cheatem and Howe, which is a large firm with over 100 attorneys and staff. DCH has just moved to a newly constructed building where it occupies three floors. At the previous location, each of the workstations on its network had Internet access, but there was relatively little resource and To this point in time, any networking of shared documents has largely been "sneakernet".


In its new offices, you are being asked to implement the networking with consideration for future growth or expansion. Your first task is to decide on the IP addressing scheme you will implement. Which IP address standard (IPv4 or IPv6) is your choice? Why did you make this choice?

Answers

It's recommended to use IPv6 as the IP addressing scheme because of its features and backward compatibility with IPv4.

In this case, the choice of the IP address standard depends on the number of hosts, scalability, and future expansion plans. Given that the law firm has just moved to a newly constructed building and there is consideration for future growth or expansion, it's recommended to use IPv6.

IPv6 was created to address the limitations of IPv4, which includes the depletion of IPv4 addresses because of the huge increase in the number of internet-connected devices. IPv6 uses a 128-bit addressing system compared to IPv4's 32-bit addressing system. This means that IPv6 can provide almost limitless IP addresses to the network.

IPv6 features include:

Support for multicast traffic. 128-bit source and destination IP addresses. Automatic address configuration. No need for DHCP in most environments. Better security and encryption features. Simplified header format.

IPv6 also provides backward compatibility with IPv4, allowing for easy migration to the new protocol while still maintaining backward compatibility with IPv4 networks.

As a result, it's recommended to use IPv6 as the IP addressing scheme because of its features and backward compatibility with IPv4.

Learn more about IP address: https://brainly.com/question/14219853

#SPJ11

? Assessment
2/10
Who are some of the team members involved in designing and developing a game?

Answers

Answer: Game designer, sound engineer, software engineer, writer, quality assurance tester

Write a description of the photograph to someone who cannot see the photograph. Be sure to include the title of the photograph and photographer credit in your response.

Answers

Answer:

I do not have a photo as a example but you could explain the feeling that it gives you and if its gloomy or happy go lucky you can also explain the main colors in the photo as well as the charters and/or type of object/s are in the photo

Which type of join is used to show all the entries in the table containing the primary key regardless of whether that
ID has an entry in the second table?

O left outer join
O right outer join
O Inner join
O self join

Answers

Which type of join is used to show all the entries in the table containing the primary key regardless of whether that ID has an entry in the second table

left outer join

Which is an organizational unit that is useful for collecting and aggregating similar data on separate forms

Tab pages

Barbara is enabling password protection on a database. Which option is not a secure password

apples

Which file type is used when forwarding a contact as a business card to another user to share their information

VCF

Which statement accurately describes the Clutter feature in Outlook 2016

It analyzes a user’s interaction with particular messages to provide a more focused inbox.

Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create to increase efficiency for these searches

Search folder

Which term refers to the use of expressions to check consistency in relation to other fields in the same record

record validation

Which statement best describes the Tell Me feature in PowerPoint 2016?

It is primarily used to locate options in the menu.

Which option is created specifically for giving a slide presentation in front of an audience and works when the speaker is utilizing multiple monitors or a projector

presenter view

Which type of query should be used to select fields from one or more related tables in a database

simple

Which command group on the Format tab of the SmartArt Tools contextual tab allows a user to change the fill and outline of SmartArt shapes

Shape and style

Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which option should he configure

Show archive folder in folder list

Which option should Gina click to edit the text contained in a text box on a slide in her presentation

text box

Which feature refers to a combination of colors, fonts, and effects that a user can define and apply to slides, slide masters, and slide layouts

custom theme

Which option is used to collaborate with other authors by comparing different versions of the same document

Revisions

An Access table contains rows of table data that contain a complete set of data for a single entity. Which term is used for a row of table data

record

Which sensitivity level is not a default available in Outlook 2016

Company Only

Which option is used to determine whether information that should remain private is included in the final version of a PowerPoint presentation

Document Inspector dialog box

Which option is the easiest way to configure macros in Access 2016

Use the Macro Builder.

Which tab on the ribbon is used to access the global Access 2016 options

Database Tools

Which option in PowerPoint allows users to configure the number of columns and rows manually, using numerical values

Insert Table dialog box

Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across

Accessibility Checker

Which tab group is used to modify the background of a chart that is contained in a PowerPoint presentation

Chart styles

Which type of control has its source of data found in a field in a table or query

bound

Shantel is trying to implement the use of data bars on a report that she created. She has selected the Conditional Formatting Rules Manager dialog box. What should she do next

Create a rule.

Lynn would like to insert a hyperlink into an email message without using the ribbon. What is the keyboard shortcut to do so

Control k

Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure that the video will play even if an internet connection is not active during the presentation. What should he do

Use the Video from my PC command in the Media group.

Which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint presentation

Picture Styles gallery

Hoda is creating a report in Access using the Report Wizard. Which option is not available for adding fields using the wizard

reports

What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitions and captions

Photo Album feature

Which type of VBA code is common for grouping statements that perform a certain task

procedure

Kathy would like to export a report that she created into an easy-to-use file format that is supported on multiple platforms and will retain the image quality of the report. Which option should she choose

PDF

Instead of manually moving an item on a slide, which command on the Shape Options tab can be used to determine location on the slide

Size and properties

Janis needs to select all the text in a single bullet point. Which action describes the easiest method to perform this task

Triple-click the text in the bulleted item

which database encryption method can you use to encrypt data at rest?

Answers

Answer:

Transparent Data Encryption

Explanation:

Which data type is –7?

int

single

string

float

Answers

Answer:

Int

Explanation:

Good Luck!

in internet of things (iot), information technology (it) can be distinguished from operational technology (ot) in the following ways (choose two)

Answers

In internet of things (iot), information technology (it) can be distinguished from operational technology (ot) in the two ways: IT is based on queries and IT uses data at rest. So the options 1 and 3 are the correct answer.

IT is based on queries: Information Technology(IT) systems in IoT often involve querying and retrieving data from various sources, including databases, APIs, and other data repositories. IT processes in IoT utilize query-based operations to extract specific information based on predefined criteria.IT uses data at rest: IT systems in IoT work with data at rest, which refers to stored or static data that is collected and stored for later analysis or processing. IT processes in IoT often involve accessing and manipulating this stored data to derive insights, generate reports, or perform analytics.

On the other hand, operational technology (OT) typically focuses on managing and controlling physical processes and devices in industrial or operational settings. OT deals more with real-time data in motion rather than static data at rest.

By distinguishing IT in terms of query-based operations and working with data at rest, it highlights the difference between IT's focus on retrieving and processing stored information and OT's focus on real-time monitoring, control, and management of physical processes.

So the correct answers are option 1 and 3.

The question should be:

in internet of things (iot), information technology (it) can be distinguished from operational technology (ot) in the following ways (choose two)

Is based on queriesUses data in motionUses data at restIs based on events

To learn more about information technology(IT) :https://brainly.com/question/12947584

#SPJ11

10. A computer program that runs in a Web Browser is known as a ____ _____________. I NEED HELP NOWWWWWWW

Answers

A web applicant i think, hope this helps;)

Answer:

web application

Explanation:

A web application (or web app) is application software that is accessed using a web browser.

show an example of how you can obtain the minimal tie sets of a reliability network starting

Answers

To obtain the minimal tie sets of a reliability network, one can use the cut-set method.

This method involves identifying all possible cut-sets in the network, which are the minimal sets of components that, if removed, would disconnect the network into two or more separate components.

The minimal tie sets can then be derived by complementing the cut-sets, which gives the sets of components that must be operational for the network to function. For example, consider a simple network consisting of three components A, B, and C connected in series.

The cut-sets of this network are AB and BC, as removing either of these sets would disconnect the network. Therefore, the minimal tie sets are AC (the complement of AB) and ABC (the complement of BC), which are the sets of components that must be operational for the network to function.

Learn more about networks at https://brainly.com/question/32095686

#SPJ11

Choose the types of work a person in the network systems administration field might do on a regular

basis. Check all of the boxes that apply.

troubleshooting the network when there are problems with connectivity

improving the speed of the network

helping users install word-processing software

developing video games

DONE

Answers

Answer:troubleshooting the network when there are problems with the connectivity ||||||| improving network speed

Explanation:

Answer:

a and b

Explanation:

Guy above was right :)

Suppose a computer using direct mapped cache has 232 byte of byte-addressable main memory, and a cache of 1024 blocks, where each cache block contains 32 bytes. How many blocks of main memory are there?

Answers

In direct mapped cache, each block of main memory can only be stored in one specific cache block. This means that if we have a 1024 block cache, we can only store 1024 blocks of main memory at any given time.

We are given that the main memory is 232 bytes, which means that there are 2^32 (4294967296) total addresses in the memory. To find the number of blocks of main memory, we need to divide the total memory size by the block size. Each cache block contains 32 bytes, so we can divide the memory size by 32 to find the number of blocks:
(2^32 bytes) / (32 bytes/block) = 134,217,728 blocksThis means that there are 134,217,728 blocks of main memory, but we can only store 1024 of them in the cache at any given time. This highlights the trade-off between the size of the cache and the size of the main memory - a larger cache can improve performance by storing more frequently accessed data, but it also comes at the cost of being able to store less of the overall memory.

For such more questions on block

https://brainly.com/question/14065401

#SPJ11

this new system will need to rely on select technology so it can analyze extensive documentation to identify and rate the relevance of verbiage specific to health insurance compliance concerns.

Answers

In order to analyze large amounts of documentation and evaluate the importance of language unique to health insurance compliance issues, this new system will need to rely on BLANK technology. The correct option is A.

What is NLP?

Computers can converse with people in their own language and perform other language-related activities more efficiently thanks to natural language processing.

NLP, for instance, enables computers to read text, listen to and understand voice, gauge moods, and identify important details. NLP stands for Natural Language Processing, which is a branch of AI (AI).

Therefore, the correct option is A. NLP.

To learn more about NLP, refer to the link:

https://brainly.com/question/25578967

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A. NLP

B. CBR

C. Forward chaining

D. Backward chaining

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer (ranging from 1 to 3, inclusive) to a variable sum that is initially 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that organizes and synchronizes the programs that will run on the computer.

Writting the JAVA code as:

import java.util.concurrent.ExecutorService;

import java.util.concurrent.Executors;

public class Main

{

Integer sum=new Integer(0);

Main(){

ExecutorService e=Executors.newFixedThreadPool(1000);

final Sum s = new Sum();

for(int i=0;i<1000;i++){

e.execute(s);

}

e.shutdown();

while(!e.isTerminated()){

}

System.out.println(sum);

}

public static void main(String[]args){

new Main();

}

class Sum implements Runnable{

public void run() {

m();

}

public void m(){

sum=sum+1;

}

}

}

See more about JAVA at brainly.com/question/12978370

#SPJ1

(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer

What is the difference between an html opening tag and a closing tag?.

Answers

The only difference between an opening tag and a closing tag is the forward slash "/". You label content by putting it between an opening tag and a closing tag. HTML is all about elements.

what tasks should a laptop accomplish?

Answers

Answer:

general & personal used for computing.

1. (a) A computer enthusiast has a collection of 35 computers, on each of which he has installed at least one of Windows, Linux and Android operating systems. If 16 have Windows, 18 have Android, 12 have Linux, 6 have Windows and Android, 4 have Android and Linux and 3 have Windows and Linux, how many have Windows but neither of the other two operating systems? (5 marks)

Answers

The number of computers that have Windows but neither of the other two operating systems is 3.

Computers are available in the collection of a computer enthusiast. On each of these computers, one or more of the Windows, Linux, and Android operating systems have been installed. In total, there are 35 computers in the collection.There are 16 Windows computers in the collection. There are 18 Android computers in the collection. There are 12 Linux computers in the collection. There are 6 computers in the collection that run both Windows and Android. There are 4 computers in the collection that run both Android and Linux. Finally, there are 3 computers in the collection that run both Windows and Linux. We need to determine how many computers in the collection run Windows but neither of the other two operating systems. The Windows-only computers comprise those computers that are only running Windows and those computers that are running both Windows and another operating system, but not Linux or Android. Only 3 computers are running Windows and Linux, so there are no computers running Windows and neither Linux nor Android. Therefore, the number of computers that run Windows but neither of the other two operating systems is 3.

Learn more about Windows here:

https://brainly.com/question/33363536

#SPJ11

Complete each sentence

To complete step 3, select ____ under table tools.
In step 5, each existing column is split in ____. In this table, the ____ rows cells are blank.
To use the options listed in step 9, click ____

Answer choices: first sentence (design,layout,merge) second (sixths,thirds,half) and (first,second,third) last sentence (design,layout,merge)

Answers

Answer:

Complete each sentence.

To complete Step 3, select LAYOUT under Table Tools.

In Step 5, each existing column is split in HALF In this table, the SECOND

row’s cells are blank.

To use the options listed in Step 9, click DESIGN.

Hope this helped. Please Mark me Brainliest!

An instance variable refers to the data value that :

Answers

An instance variable refers to the data value that is associated with a specific instance of a class.


In object-oriented programming, a class is a blueprint or template for creating objects, which are instances of that class. Each instance of a class can have its own set of instance variables, which are used to store data specific to that instance.

For example, consider a class called "Car" with instance variables for "make", "model", and "year". Each instance of the Car class would have its own values for these instance variables. One instance might have a make of "Honda", a model of "Civic", and a year of "2010", while another instance might have a make of "Toyota", a model of "Camry", and a year of "2015".

Instance variables are typically declared at the top of a class and are usually private, meaning they can only be accessed by methods within the same class. They are also usually initialized in the constructor of the class.

Here is an example of a class with instance variables in Java:

```
public class Car {
 private String make;
 private String model;
 private int year;
 
 public Car(String make, String model, int year) {
   this.make = make;
   this.model = model;
   this.year = year;
 }
 
 // getter and setter methods for instance variables
}
```

In this example, the instance variables "make", "model", and "year" are declared at the top of the class and are initialized in the constructor. The class also includes getter and setter methods for accessing and modifying the values of the instance variables.

Learn more about instance variable here:

https://brainly.com/question/28265939

#SPJ11

Consider the following code: x = 9 y = -2 z = 2 print (x + y * z) What is output? 9 13 14 5

Answers

Answer:

5

Explanation:

x = 9

y -2

x = 2

expression = (x + y * z)

Apply BODMAS rule.

= 9 + (-2 * 2)

= 9 + (-4)

= 9 - 4

= 5

In HTML, an opening tag and its closing tag must appear on the same line. True Or False​

Answers

Answer:

the answer is true, you cannot break the element apart EVERR!!!!!

WILL GIVE Brainliest!!!!
Select the six criteria for a baseline.
goal

future

defines

assessment

desired

beginning

score

progress

broad

start

Answers

Answer:

start

Explanation:

Answer:

desired

goal

progress

start

defines

future

Explanation:

Suppose t represents the number of seconds logan has been running. write an expression (in terms of t t) to represent how long shane has been running (in seconds).

Answers

The expression t + 100 represents how long Shane has been running in seconds.

To represent how long Shane has been running in seconds, we can use the expression t + 100.

This is because the terms given in the question state that Logan has been running for t seconds, and we need to find an expression for Shane.

It is mentioned that Shane has been running for more than 100 seconds, so we add 100 to t to represent Shane's running time.
In conclusion, the expression t + 100 represents how long Shane has been running in seconds.

To know more about number visit;

brainly.com/question/3589540

#SPJ11

Select all of the reasons Windows 95 increased the popularity of Windows.

enhanced multitasking

improved GUI

information could be accessed and shared faster

an updated file management system

a finder included

backward compatibility

ability to use longer filenames

Answers

Answer:

The following lead towards the reason why Windows 95 become popular:

enhanced multitasking  

information could be accessed and shared faster

an updated file management system

a finder included

backward compatibility

Explanation:

Answer:

Explanation:

enhanced multitasking  information could be accessed and shared fasteran updated file management systema finder includedbackward compatibility

One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data

Answers

Answer:

Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers

Explanation:

Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only  certain limited number of sites are available.

Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible

Hence, option A is correct

A user submitted a support ticket that states all of the printouts from a laser printer appear to have double images imposed on them. A review of past printer support tickets shows that a maintenance kit has not been installed in more than a year. Which of the following printer consumables is MOST likely causing the issue?

A. Separation pad
B. Transfer roller
C. Ink cartridge
D. Fuser

Answers

The printer issue described in the support ticket - double images on printouts - is a symptom of a problem with the printer's fuser. The fuser is responsible for melting the toner onto the paper to create a permanent image, and if it's not working properly, it can cause double images or smudging.

The fact that a maintenance kit has not been installed in over a year is also a clue that the fuser may be the cause of the problem. Maintenance kits typically include replacement parts for the fuser, such as a fuser roller or heating element, which can wear out over time and cause printing issues.

Therefore, the correct answer is D. Fuser.

Option d is correct, Fuser is the printer consumables which is most likely causing the issue.

The issue described, where printouts have double images imposed on them, is a common symptom of a faulty fuser in a laser printer.

The fuser is responsible for bonding toner to the paper, and if it is not functioning properly, it can cause double images or smudging on the printouts.

Given the lack of maintenance kit installation for over a year, it is highly likely that the fuser needs to be replaced or repaired.

To learn more on Fuser click:

https://brainly.com/question/14902244

#SPJ2

Other Questions
What is the primary difference between OSHA and NIOSH in a hydraulic turbine-generator system, turbine's efficiency is 83 percent and generator's efficiency is 90 percent. the generator produces 1 mw of electric power. determine the mechanical energy decrease of the fluid per unit time in the turbine-generator system. To paint a house, a painting company charges a flat rate of $500 for supplies, plus $50 for each of labor. The value of 7y2 is 10 more than the value of 2yPlease Do Help How does military sonar affect whale behavior? Mass strandings of whales occur on beaches near military exercises where sonar is used, raising concerns about the effects of human-generated underwater sounds on animal behavior. Scientists are collecting behavioral data on several species of whales to find out how sonar affects them. Part A Using the graph, estimate the number of minutes of foraging per hour before and after the sound exposure. Then predict the effect of sonar on the fitness of blue whales. Explain your reasoning Breathing 50 5 100 150 Sound exposure 200 Foraging 03 20 40 60 8 100120 Time (minutes) Source: Goldbogen, J. A., B. L Southall, S. L DeRuiter, et al. 2013. Proceedings of the et al. 2013. Proosedings of the Royal Society B 280 : 2013.0657 Is this answer correct? Please help Can someone help me please 8. Name three push factors for pioneers9. Name three pull factors for pioneers A hydrated iron chloride compound was found to contain 20.66% Fe, 39.35% Cl, and 39.99% water. Determine the empirical formula of the hydrated compound Jose earned 45 points in a video game. He lost 40 points, earned 85 points, then lost 35 more points. Enterand evaluate an expression to find his final score in the video game.An expression to find Jose's final score isJose's final score in the video game ispoints. how do various childrens toys help to improve the cognitive (and sometimes physical and social) development of those children? ubmissions until Thursday, October 6,2022 at 11:30 am Show instructions Question 16 (1 point) Which of the following situations will not preclude an injured person from pursuing compensation after signing a waiver and reading a disclaimer on a sky diving ticket? a gross negligence by the adventure attraction operator b. fundamental breach of contract by an adventure attraction operator c duress created at the time of signing due to late arrival d A, B and C e B and C A piece of copper bus bar is 0. 75 millimeter by 100 millimeters in cross section. What is the cross-sectional area in square centimeters? Mr. Jordan's class is having a pizza party with the $100 they earned in a competition. A cheese pizza costs $10, and a pepperoni pizza costs $15. They must order atleast 2 pepperoni pizzas. They also must order at least twice as many cheese pizzas as pepperoni pizzas.What is the greatest total number of pizzas Mr. Jordan's class can order?7 Excel Online Structured Activity: Required annuity paymentsYour father is 50 years old and will retire in 10 years. He expects to live for 25 years after he retires, until he is 85. He wants a fixed retirement income that has the same purchasing power at the time he retires as $60,000 has today. (The real value of his retirement income will decline annually after he retires.) His retirement income will begin the day he retires, 10 years from today, at which time he will receive 24 additional annual payments. Annual inflation is expected to be 5%. He currently has $165,000 saved, and he expects to earn 8% annually on his savings. The data has been collected in the Microsoft Excel Online file below. Open the spreadsheet and perform the required analysis to answer the question below.Open spreadsheetHow much must he save during each of the next 10 years (end-of-year deposits) to meet his retirement goal? Do not round your intermediate calculations. Round your answer to the nearest cent. In 5-6 complete spanish sentences, describe the things in nature that you like most. why do you like those particular things? a complete cessation of ovulation and menstruation for 12 months is known as . a. postmenarche b. perimenopause c. the nonreproductive stage d. menopause e. menarche 300 60 1D. The least prime that is the sum of four different prime numbers is 17 because 17 = 2 + 3 + 5 + 7. What is the least prime greater than 17 that is the sum of four different prime numbers? (Meme attached for you.)The following original section of DNA is replicated, and a mutation occurs in the sequence. Compare the original sequence to the copied sequence. Which type of mutation occurred?The original DNA.TTACGGCCTAThe copied DNA.TTACGCCTA1. Physical 2. insertion3. Deletion 4. substitution