Match 1-16 with bullet points below. 1) Very typically associated with the design choices of Distributed system 2) Concepts of transactions. Distributed transactions are often necessary but harder to design because a process may be required to manage shared resources in critical section 3) Hardware support for implementing a semaphore that allows only only one process at a time into a critical section. Not for distributed systems that don’t share memory. 4) Since we don’t have this is Distributed System, we must send messages to coordinate among processes instead. 5)If we had this, we probably wouldn’t need a class in distributed systems because most of the problems would be solved. 6)Universally Unique Identifiers-- UUIDs. Also known as GUIDS. 7) Something that we don’t typically consider is true of URLs, but which XML takes advantage of. 8)Middleware. 9) Receiver’s buffer is full, receiver is offline, can get lost, can be delayed can arrive out of order... 10) In classic Producer-Consumer coordination we uses these devices so that readers and writers know when to block and when to proceed. 11) There are many types of the second, but one type of the first. 12) Probably the most important central question about data when designing a Distributed System for wearable medical sensing devices. 13) A program that is executing. The operating system might keep thousands of pieces of information about it in a control block 14) Interfaces are publicly available. Are not under arbitrary control of any one firm. 15) No process has complete information about the system state. Processes make decisions based on local information. 16) Commonly overlooked but often the most challenging problem when scaling up a Distributed System because the algorithms often have to change and throwing resources at the problem won’t help -Workable, fast globally shared memory for distributed processes -A process. -A string of bits that is long enough and random enough and it is unlikely that anyone else in the unfolding history of mankind will ever get the same string. -Test and set instruction -Because in standard use they point to exactly one physical location on earth they happen to be UUIDS. In the case they "belong" to the owner of a file system, giving us a partition of the unique names.. -Some problems that can occur with messages, but we have to use them anyway in Distributed Systemes. -Present a uniform interface upwards toward supported applications(for the benefit of application programmers) that is mostly independent of the underlying operating system or virtual machine -There is almost always a compromise to make. A Distributed System expert will be educated about what the best compromise will be. -Read points and write pointers that an be seen/evaluated by both processes, implemented as shared memory via interprocess communication (IPC) -Fully defined so that all vendors can work within the same framework. Relatively stable over time. -Distributed Administration -Inter-process communication IPC -Synchronous calls wherein the caller waits, and asynchronous calls were the caller continues at some point without waiting for the processing response -Failure of any one process does not ruin the algorithm. There is no assumption that a global clock exists. -Rollback, commit, checkpoint, before state, after state. -Keep it at the user site, or keep it at the central site. There are pros and cons of each choice.

Answers

Answer 1

The terms listed correspond to a set of bullet points that describe various aspects of designing and implementing distributed systems. The first point emphasizes the importance of design choices in creating distributed systems, while the second highlights the challenges of managing shared resources across multiple processes.

The third point discusses the use of hardware support for semaphores, which is not available in distributed systems without shared memory. The fourth point notes the need for messaging to coordinate processes in distributed systems. The fifth point suggests that some of the difficulties associated with distributed systems could be solved with the implementation of a single solution.

The sixth point describes UUIDs, which are unique identifiers used to identify resources. The seventh point notes a difference between URLs and XML in how they handle certain aspects of data. The eighth point highlights the importance of middleware in creating a uniform interface for distributed systems. The ninth point lists several issues that can occur with message delivery. The tenth point discusses the use of read and write pointers in coordinating producers and consumers.

The eleventh point distinguishes between different types of processes and resources. The twelfth point identifies data management as a critical issue in designing distributed systems for wearable medical devices. The thirteenth point describes a control block used by the operating system to manage processes. The fourteenth point emphasizes the importance of standardized, publicly available interfaces for distributed systems.

The fifteenth point notes that processes in distributed systems must make decisions based on local information, without complete knowledge of the system state. Finally, the sixteenth point highlights the difficulty of scaling distributed systems and the importance of finding the right balance between resources and algorithms.

Learn more about design here:

https://brainly.com/question/14035075

#SPJ11


Related Questions

State one criteria that makes a piece of malware a virus.

Answers

Answer: Self replication

Explanation: Malware is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs.

Define bit, nibble, byte, binary

Answers

Answer: , a group of 4 bits is called a nibble

Explanation:

When we read code and predict its output, it is called tracing code.

For this lesson, you will come up with your own challenging algorithm for other students to trace. It must contain at least 5 if statements and use at least one AND or OR boolean condition.

Note: Elif or else statements will not count - your statements must be if statements. Each if statement should use a unique variable name.

For this challenge, try reading 3 or 4 of your classmates' code as well. Trace their code and predict what it will output, then check the code by running it to see if you got it right, and submit your work for a grade.

Answers

Answer:

Answer:

PYTHON

a = 2

b = 0

c = 4

d = -1

e = 9

g = 77

if -1 < a < 2:

print(a % 2)

if not c and b:

print(c//a)

if 50 >= d or 2 <= d >= 8:

print(d*d)

if 0 == e and e < 100:

print(e**e)

if g and g > 77:

print(g)

The program involves tracing the possible output of the code which contains a total of 5 variables. The program is written in python 3 ;

a , b, c, d, e = (10, 5 , 6, 2, 9)

#using tuple unpacking, assigns values to the variables a, b, c, d, e

if a > b:

#first if statement, tests if variable a is greater than b

e = b + 1

#if it is. Set variable e = b + 1

if b > c :

#if the above check is false, then check if b > c

e = b * 2

#if it is, set variable e = b×2

if c > d :

#if the above is false, check if c >d

e = c /2

#if it is, set, variable e to c divided by 2 ; if not

if (d>e) or (d > c):

#if either condition is true,

e = d -2

#set e to d - 2 ; if not

if e < a :

#Check if e > a

e = e * 5

# set e to e multiplied by 5

print(e)

#display the final value of e

Learn more on python programs :https://brainly.com/question/14786286

what is role can ICT play in helping school take part in social responsibility

Answers

Answer:

The answer is below

Explanation:

Given that Social responsibility deals with ideas that individuals or groups of people are expected or bound to work in alliance with other individuals or groups of people in favor of the generality of society.

Hence, some of the role ICT can play in helping school take part in social responsibility are:

1. Helps students to have independent access to knowledge

2. It assists the students with special needs

3. It helps the teachers to teach outside the comfort of the classroom only.

4. It exposes teacher and students to more knowledge and opportunities

5. The school governing body can access people and the community's opinions about ways to improve the school better.

6. It exposes the school to more ideas and opportunities.

7. It can be used to assist the school in improving the quality of education, both for the teachers and students side.

Write the code necessary to convert the following sequence of ListNode objects:
list -> [1] -> [2] -> [3] -> null
which already exists into the following sequence of ListNode objects:
list -> [0] -> [1] -> [3] -> null
Your solution can create one new node and can manipulate links between nodes, it should NOT change the data in any of the existing nodes.
Assume that you are using the ListNode class as defined in the textbook:
public class ListNode {
public int data; // data stored in this node
public ListNode next; // a link to the next node in the list
public ListNode() { ... }
public ListNode(int data) { ... }
public ListNode(int data, ListNode next) { ... }
}

Answers

The given sequence of List Node objects is:

list -> [1] -> [2] -> [3] -> null and we need to convert it into the sequence of List Node objects as shown below:

list -> [0] -> [1] -> [3] -> null We can achieve this by creating one new node and manipulating links between nodes. We are not allowed to change the data in any of the existing nodes. Here is the code to implement the same:

List Node temp = new List Node(0, list);

list = temp;

while (list != null) {if (list.data == 2) {list.next = list.next.next;

}

list = list.next;

}

The above code creates a new List Node object named temp with data 0 and a link to the existing list. Then, we traverse through the list and check if the data in the current node is 2. If it is, we manipulate the link to skip the next node. Finally, we return the modified list node.

To know more about sequence visit:

https://brainly.com/question/30262438

#SPJ11

In the case of composition, use the ____ name to invoke its own constructor. composite member object composition class

Answers

In the case of composition, we use the name of the composite member object to invoke its own constructor. Composition is a technique in object-oriented programming where a class is composed of one or more objects of other classes.

To invoke the constructor of a composite member object, we use the name of that object followed by parentheses. This will call the constructor of that object and initialize it. By invoking the constructor of each composite member object, we ensure that all the objects within the composite class are properly initialized.

This approach allows us to create a composition of objects, where each object can have its own behavior and attributes. It helps in achieving code reusability and maintainability by dividing the functionality into smaller, independent objects.

To know more about composite visit:

https://brainly.com/question/13253422

#SPJ11

Okay im spamming but help me again please

Okay im spamming but help me again please

Answers

Answer: for 5 its b and for 6 i may be wrong but i think its also b

Explanation:

Which of the following explains different types of efficiency? (1 p
O Code length refers to the number of characters in the code. Code cc
O Code complexity refers to the number of characters in the code. Coc
O Time complexity refers to the amount of memory used. Space compl
O Space complexity refers to the amount of memory used. Time comple

Answers

Answer:

the third one os the second one

Explanation:

PLEASEEE HELP HURRY

PLEASEEE HELP HURRY

Answers

To start searching for a scholarly article on G. o. ogle Scholar, you should:

"Type the title of the article or keywords associated with it." (Option A)

What is the rationale for the above response?

Here are the steps you can follow:

Go to Go. o. gle Scholar website In the search box, type the title of the article or relevant keywords associated with it.Click the "Search" button.Browse through the search results to find the article you are looking for.Click on the title of the article to view the abstract and other details.If the article is available for free, you can download or access it directly from the search results page. If not, you may need to purchase or access it through a library or other academic institution.

Note that you can also use advanced search options and filters available on Go. ogle Scholar to narrow down your search results based on various criteria, such as publication date, author, and journal.

Learn more about G. o. ogle at:

https://brainly.com/question/28727776

#SPJ1

all audio compression formats use a technique known as to compress the audio file size.

Answers

All audio compression formats use a technique known as data compression to reduce the size of audio files by "Lossy Compression".

Data compression is a process that removes redundant or unnecessary information from the audio file, resulting in a smaller file size without significantly compromising the quality of the sound.

This is achieved by identifying patterns or redundancies in the audio data and representing them in a more efficient way.

Lossy Compression:

This technique achieves higher compression ratios by selectively discarding or reducing certain parts of the audio data that are less perceptually important.

The discarded information may be frequencies that are outside the range of human hearing or sounds that are masked by other sounds.

Since Lossy compression formats, such as MP3 (MPEG-1 Audio Layer III) and AAC (Advanced Audio Coding), aim to maintain good audio quality while significantly reducing file size.

To learn more about Audio Here:

brainly.com/question/24228690

#SPJ4

The complete question is;

all audio compression formats use a technique known as to compress the audio file size. explain about the method for audio compression.

How to use multi processing with a class in python.

Answers

Answer:

from multiprocessing import Process def display(): print ('Hi !! I am Python') if __name__ == '__main__': p = Process(target=display) p.start() p.join() In this example, at first we import the Process class then initiate Process object with the display () function.

Explanation:

Charli D'amelio bought her followers.

True or true? ;)​

Answers

Answer:

I Think its true

Explanation:

because it's TRUE

The answer is True, if real people liked her they wouldn't follow her...Exactly why I don't follow her!

What has become ubiquitous in our society

Answers

Ubiquitous means "that they/it seem to be everywhere."

So an example would be people using the internet. That's Ubiquitous.

Did it surprise you that supply chain logistics could benefit so
much from Lean?

Answers

No, it doesn't surprise me that supply chain logistics can benefit greatly from Lean principles. Lean is a philosophy and methodology that focuses on eliminating waste, improving efficiency, and optimizing processes.

Supply chain logistics involves the movement of goods, information, and resources across various stages, and it is inherently complex with multiple interconnected activities.

Lean principles, such as just-in-time inventory management, continuous improvement, and value stream mapping, can help streamline supply chain logistics by identifying and eliminating non-value-added activities, reducing lead times, improving flow, and enhancing overall efficiency. By implementing Lean practices, organizations can minimize inventory holding costs, reduce transportation and storage waste, and enhance responsiveness to customer demands.

Furthermore, Lean principles promote collaboration, communication, and problem-solving within the supply chain, fostering better coordination and synchronization between different stakeholders and improving overall performance. Lean's focus on customer value and waste reduction aligns well with the goals of supply chain logistics, which aim to deliver products and services efficiently and effectively.

Overall, Lean provides a systematic approach to optimize supply chain logistics, enhance operational performance, and drive customer satisfaction. Its ability to reduce waste, increase efficiency, and improve overall flow makes it a natural fit for improving supply chain operations.

Learn more about philosophy here

https://brainly.com/question/21527655

#SPJ11

how to fix your computer when its laggy and super laggy

Answers

Answer:

1. Check your computer for viruses and malware. Run a full system scan with an anti-virus program to make sure your computer is free of any malicious software.

2. Close any unnecessary programs and windows. If you have multiple programs running at once, it can cause your computer to slow down.

3. Update your operating system and other software. Outdated software can cause your computer to run slowly.

4. Check your hard drive for errors. Use a disk utility program to check for errors and repair any that are found.

5. Increase your RAM. Adding more RAM can help your computer run faster and smoother.

6. Clean up your hard drive. Delete any unnecessary files and programs to free up space on your hard drive.

7. Defragment your hard drive. This will help organize your files and make them easier for your computer to access.

8. Check your internet connection. If your internet connection is slow, it can cause your computer to lag.

Write a python code to generate the following shape

Write a python code to generate the following shape

Answers

Hello, you should first install the library of PyTurtle. You can type in terminal if you've GNU/Linux.

sudo apt-get install -y python3-wxgtk4.0

And then, you can use this code. Good luck!

import turtle

# Defining instance of turtle

pen = turtle.Turtle()

wn = turtle.Screen()

#Initial position is setting

pen.penup()

pen.setposition(-275.0,-150.0)

pen.pendown()

#Red diamond shape

pen.color("red")

pen.left(60)

pen.forward(200)

pen.left(60)

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.right(120)

pen.forward(200)

pen.right(120)

pen.forward(200)

pen.right(120)

pen.forward(200)

#Go to draw circle

pen.color("white")

pen.right(90)

pen.forward(170)

pen.left(90)

pen.forward(175)

#Draw circle

pen.color("black")

pen.circle(175)

#Go to green diamond

pen.color("white")

pen.forward(175)

pen.left(90)

pen.forward(175)

pen.right(90)

#Draw green diamond

pen.color("green")

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.left(60)

pen.forward(200)

pen.left(120)

pen.forward(200)

pen.left(120)

pen.forward(200)

#Always-on-display

wn.mainloop()

Write a python code to generate the following shape

Order: nefazodone hydrochloride PO: Day 1: 200 mg in two divided doses; Day 8: 400 mg in two divided doses. Available: nefazodone hydrochloride 100 mg tablet How many tablets will the client receive on Day 1

Answers

On Day 1, the client is prescribed a total dose of 200 mg of nefazodone hydrochloride, which is divided into two equal doses.

Since each tablet contains 100 mg of the medication, the client will need to take one tablet in each of the two divided doses. This means they will receive a total of two tablets on Day 1. Dividing the total dose into two smaller doses helps ensure a more consistent and sustained release of the medication throughout the day. By following the prescribed dosage regimen, the client can achieve optimal therapeutic effects and maintain a steady concentration of the medication in their system. It is important for the client to adhere to the prescribed dosage instructions and consult their healthcare provider if they have any questions or concerns.

Learn more about hydrochloride here;

https://brainly.com/question/30228657

#SPJ11

Python projectstem 3.6 code practice
Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.

Sample Run
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3

Answers

Answer:

python

Explanation:

list_of_numbers = []

count = 0

while count < 6:

   added_number = int(input("Enter a number: "))

   list_of_numbers.append(added_number)

   list_of_numbers.sort()

   print(f"Smallest: {list_of_numbers[0]}")

   count += 1

Changes in computer technology have an effect on _____.

Answers

Answer: Changes in computer technology have an effect on everyone.

Plaintext is transformed into ciphertext using two keys and a decryption algorithm. true false

Answers

False. Plaintext is transformed into ciphertext using a single key and an encryption algorithm, not two keys and a decryption algorithm.

The encryption algorithm applies various mathematical operations to the plaintext using the key to produce the ciphertext. The resulting ciphertext is unreadable and unintelligible without the corresponding decryption key and the decryption algorithm.

In symmetric encryption, the same key is used for both encryption and decryption. This means that the sender and the receiver must share the same key. In asymmetric encryption, also known as public key encryption, there are two separate keys: a public key used for encryption and a private key used for decryption. The public key can be freely shared, while the private key is kept secret.

To summarize, plaintext is transformed into ciphertext using a single key and an encryption algorithm, not two keys and a decryption algorithm.

Learn more about encryption algorithm: https://brainly.com/question/31807283

#SPJ11

Select the correct answer.

Susan is writing a program that organizes weather data into a table using conditional phrases. If she wants to operate on the results of these conditional phrases, what must she do?

A use Boolean values for the results

B. use the results in more conditional phrases

C. use logical operators on the results

D use either >,<, or =​

Answers

Answer:

B.use the results in more conditional phrases

The __________ holds the data in the HDFS and the application connects with the __________ to send and retrieve data from the cluster.

Answers

The DataNode holds the data in the HDFS, and the application connects with the NameNode to send and retrieve data from the cluster.

The Hadoop Distributed File System (HDFS) is a distributed file system that stores data across multiple machines in a Hadoop cluster. In HDFS, data is divided into blocks and replicated across several nodes in the cluster for fault tolerance. The component that holds the data in the HDFS is called the DataNode. Each DataNode is responsible for storing data in its local file system and serving read and write requests from clients. When a client wants to read or write data, it communicates with the DataNode that has a copy of the data. The component that the application connects to send and retrieve data from the HDFS is called the NameNode. The NameNode is the master node in the HDFS that manages the file system namespace and the metadata about the data stored in the cluster. The NameNode keeps track of which blocks of data are stored on which DataNodes and coordinates data access requests from clients.

Learn more about DataNode here-

https://brainly.com/question/31273694

#SPJ11

(d) What other services beside cloud-based software may be provided by Internet hosts?[1]

Answers

Answer:

Internet

(Some have Cable TV)

Which tab on the Ribbon contains the command to show the slide show from the current slide?

A.Home

B.Slide Show

C.File

D.View

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is B: Slide Show.

You can use the Slide Show tab on the ribbon that contains commands to show the slide show from the current slide. As you click on the Slide Show tab on the ribbon, you see a group of commands name "Start Slide Show", in these group of command, there is an option to start slide show From Current Slide. when you will click this option the slide show will start from your current slide.

Other options are not correct because:

The home tab on the ribbon contains commands related to slide, font, paragraph, editing, etc. File tab contains commands related to opening new or existing presentation documents and saving them, etc. While the View tab on the ribbon has a group of commands related to presentation view, master, zoom, etc. These tabs are used to show the slide show from the current slide.  

your javascript encountered a runtime error. check your console for more information.what does that mean khan academy

Answers

Remember to save your changes and refresh the page after making any modifications to your code. When you encounter the message "your JavaScript encountered a runtime error" and are advised to check your console for more information, it means that there is an issue with your JavaScript code that is causing it to crash or fail to run properly.

The console is a tool in the web browser's developer tools that displays error messages and other information about the code. To troubleshoot the error, follow these steps:
1. Open the web page where the error occurs.

2. Right-click on the page and select "Inspect" or "Inspect Element" to open the browser's developer tools.
3. Look for a tab called "Console" in the developer tools window.
4. Check for any error messages or warnings in the console. The error message should provide you with more specific details about the problem, such as the line of code where the error occurred or a description of the error itself.

5. Review the code in the area indicated by the error message and try to identify any mistakes, such as syntax errors, undefined variables, or incorrect function calls.
6. Fix the identified issues in your JavaScript code and save the changes.
7. Refresh the web page to see if the error has been resolved.

To know more about modifications visit:

https://brainly.com/question/33318424

#SPJ11

How can you open a link in a new tab/browser window?.

Answers

Answer:

Press the + at the top of your brower, or New Tab button.Copy-paste it into the top of the browser, the main search bar.

                                     \(Steps~also~in~pictures~below.\)

How can you open a link in a new tab/browser window?.
How can you open a link in a new tab/browser window?.
How can you open a link in a new tab/browser window?.
How can you open a link in a new tab/browser window?.

URGENT HTML5 can support videos and audio playback, but not 2D and 3D graphics.

A. True
B. False

Answers

Answer:

False I think.

Explanation:

Which protocol is used to handle delivery of information from one network to another?.

Answers

Transmission Control Protocol (TCP)  is used to handle the delivery of information from one network to another.

In the field of computer and technology, a Transmission Control Protocol  (TCP) can be described as a kind of internet protocol that ensures establishing conversations between computing devices. Information can be delivered from one network to another using the Transmission Control Protocol (TCP). It transmits information in the form of pockets of data.

The usage of TCP ensures that a stable is made between digital networks for proper end-to-end data delivery.

The Transmission Control Protocol  (TCP) protects the integrity of the data shared between the net sources and before transmission of data, it ensures that a connection has been built between the source and the delivery system.

To learn more about Transmission Control Protocol (TCP), click here

https://brainly.com/question/14280351

#SPJ4

Albilad Bank decides to install 2 ATMs near to its one of the full services branches in Dammam. Each ATM costs 35000SAR to the bank. ATM Installation cost is 16000SAR for each machine. Each ATM has a projected life of 10 years. Both ATMs are expected to handle 50,000 cash transaction collectively and, on an average, bank can save 0.40SAR on each transection in teller expenses. If Albilad bank has a 12% cost of capital, should the bank go ahead with this Investment in 2 ATMs. [4 Marks] Note: If using Excel, Students must provide the table of calculations.
Previous question

Answers

the NPV is positive, Albilad bank should go ahead with the investment in 2 ATMs.

To determine if Albilad bank should go ahead with this investment in 2 ATMs, we will calculate the Net Present Value (NPV) of the investment. The formula for NPV is:NPV = Σ (Ct / (1+r)t) - CoWhere,Ct = net cash inflow during the period tCo = total initial investment costsr = discount rate (i.e., cost of capital)t = number of time periodsThe first step is to calculate the net cash inflows for each year. Here's a table showing the calculation:YearCash TransactionTeller ExpensesSaved CashTransactionRevenueCost of ATMNet Cash Inflow01250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR20000SAR2500000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR21800SAR3125000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR23600SAR4250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR25400SAR5250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR27200SAR6250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR28960SAR7250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR30720SAR8250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR32480SAR9250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR34240SAR10250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR36000SARTotal income over the life of the ATMs (10 years) = 171,960SARNow we can calculate the NPV using the formula.NPV = Σ (Ct / (1+r)t) - CoNPV = (20000 / (1+0.12)^1) + (21800 / (1+0.12)^2) + (23600 / (1+0.12)^3) + (25400 / (1+0.12)^4) + (27200 / (1+0.12)^5) + (28960 / (1+0.12)^6) + (30720 / (1+0.12)^7) + (32480 / (1+0.12)^8) + (34240 / (1+0.12)^9) + (36000 / (1+0.12)^10) - 115000SARNPV = 1333.42

Learn more about NPV here :-

https://brainly.com/question/33284820

#SPJ11

what was the first computer name brand

Answers

Answer: Electronic Controls Company and was founded in 1949 by J. Presper Eckert and John Mauchly.

hope this helps!

The first computer name brand was MITS and the computer was named The Altair.

Explanation:

Hope this help! Jesus loves you!  

Have a great day!

Other Questions
how should the underlined lists in the sentence be punctuated? they should be punctuated in the same way. both lists should use commas to separate items. they should be punctuated in the same way. both lists should use semicolons to separate items. How are herbivore and carnivore alike daniel webster the mothers of a civilized nation work not on frail and perishable matter, but on the immortal mind, molding and fashioning beings who are to exist forever. they work not on the canvas that shall perish, or the marble that shall crumble into dust, Plz helppppppppppppppppppppppppppppppp meeeeeeeeeeeeeeeeeee fasttttttttttttttt What is 0=3x^2-16x +15 solved for x? there should be two numbers suppose the charge on the inner conducting sphere is 4 c, while 8 c of charge is deposited on the conducting shell. (a) Find the surface charge (in C) on the inner surface of the shell. (b) Find the surface charge (in C) on the outer surface of the shell. Help! Spanish! (I keep getting the answers wrong) I will follow you please give me correct answer The equation of a parabola is y=x28x+14. Write the equation in vertex form. what german monk believed that christians had to live by faith alone and depend on the mercy of god? What is the volume of the cube below? Determine the values of a for which the system has no solutions, exactly one solution, or infinitely many solutions. x+2y3z=32xy+2z=34x+3y+(a 2 13)z=a+6 For a= there is no solution. For a= there are infinitely many solutions. For a= the system has exactly one solution. 100 points, this question is SUPER EASY, but I don't really have the brainpower to think it through. Do you think it's necessary to believe your own argument when delivering a speech? Explain your answer. At an animal rescue facility, 9 dogs eat 27 pounds of food in one week. At this rate, how many pounds of food would 45 dogs eat in one week? Planets A and B have the same mass, but planet A is half the size of planet B.Which statement correctly explains the weight you would experience on eachplanet?A. You would weigh the same on both planets because the massesof the planets are the same.B. You would weigh less on planet A because the distance betweenyou and the planet's center of gravity would be smaller.C. You would weigh the same on both planets because your masswould be the same on both.O D. You would weigh more on planet A because the distance betweenyou and the planet's center of gravity would be smaller. What is the longest river in the United States called? Math on the Spot The distance between Professor Burger's house and Chris' house is 12 miles. Lila's house is on the way from Professor Burger's house to Chris' house. The distance between Lila's house and Chris' house is 5 miles. Write and solve an equation to find the distance x between Professor Burger's house and Lila's house. When witchcraft accusations began in Salem,how did thePuritan religion reinforce the idea that Were these accusations real? Find the odd-one out *O CopperO AluminiumIronWoodThe accumulation of excess electric charge on an object is calledElectric dischargeStatic electricityCircuitResistance f(x) = x2+ 10x 2Find f(-5)