One of the challenges associated with legacy software development practices (i.e. not cloud), was the physical distribution of software. As a result, software upgrades across the consumer base were inconsistent and version control became a problem.

i. True

ii. False

Answers

Answer 1

The physical distribution of software was one of the issues with older (i.e., non-cloud) software development methods. It is accurate to say that as a result, software upgrades were uneven across the consumer base and version control issues arose.

Executable code is the most basic form of programming and is composed of machine language instructions that may be handled by consumer base a single processor, most frequently a central processing unit (CPU) or a graphics processing unit (GPU).

The components of machine language are collections of binary values that stand in for processor instructions that change the machine's prior state. When an instruction affects the software value stored in a particular computer storage location, one impact that is not immediately apparent to the user occurs.

Learn more about software, from :

brainly.com/question/32393976

#SPJ4


Related Questions

Write a sub program to find the factors of a supplied number

Answers

Answer:

There are two options I can think of for you,

(Qbasic Code)

To Find the Factors of Given Number:

CLS

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END

To Find the Factors of Given Number Using COMMON SHARED:

DECLARE SUB factor ()

COMMON SHARED n

CLS

CALL factor

END

SUB factor

INPUT "Enter any number"; n

FOR i = 1 TO n

   x = n MOD i

   IF x = 0 THEN

       PRINT i;

   END IF

NEXT i

END SUB

Describe how the new system could be tested prior it becoming operational

Answers

Prior to the new system becoming operational, it is essential to perform testing to ensure that it works efficiently and effectively. The testing process is crucial to identify any potential issues or errors that could impact the system's performance.

There are different types of testing that can be conducted to ensure the new system's readiness. Here are some of the methods that can be used:

1. Unit Testing: This testing method involves testing each component of the system separately to ensure that it functions correctly. This process is performed by the development team and is usually automated.

2. Integration Testing: This testing method involves testing the interactions between different system components to ensure that they work correctly when integrated. This process is performed by the development team.

3. System Testing: This testing method involves testing the entire system as a whole to ensure that all the components work together as intended. This process is performed by the quality assurance team.

4. User Acceptance Testing (UAT): This testing method involves testing the system with real users to ensure that it meets their requirements and expectations. This process is performed by the end-users.

5. Performance Testing: This testing method involves testing the system's performance under different conditions, such as high traffic or heavy load, to ensure that it can handle the expected workload. This process is performed by the quality assurance team.

Once the testing process is completed, any issues or errors that are identified should be addressed and resolved before the system becomes operational. This will ensure that the new system is ready to be deployed and will perform as expected, providing a reliable and efficient solution for the users.

Learn more about potential issues: https://brainly.com/question/31294778

#SPJ11

the following algorithm is intended to determine the average height, in centimeters, of a group of people in a room. each person has a card, a pencil, and an eraser. step 2 of the algorithm is missing.

Answers

Step 2 of the algorithm is missing. To determine the average height, each person should write their height on the card using the pencil. Then, they should add up all the heights and divide the total by the number of people in the room.


1. Each person should write their height on the card using the pencil.
2. After everyone has written their height, they should add up all the heights.
3. Finally, they should divide the total by the number of people in the room to find the average height.
Step 2 of the algorithm is missing. To determine the average height of a group of people in a room, each person should follow a few steps. First, they should take their card, pencil, and eraser. Then, they should write their height on the card using the pencil.

For example, if someone is 170 cm tall, they would write "170" on their card. After everyone in the room has written their height on their respective cards, they should add up all the heights. For instance, if there are 5 people in the room with heights 160, 165, 170, 175, and 180 cm, the total would be 850 cm.

Finally, they should divide the total by the number of people in the room. In this case, the average height would be 850 cm divided by 5 people, resulting in an average height of 170 cm.

To learn more about algorithm

https://brainly.com/question/33268466

#SPJ11

What strategies could you use if you came across a surplus for a computer parts store?

Answers

1. Discounts and promotions: One strategy for dealing with a surplus of computer parts is to offer deep discounts or promotional offers to customers. This can help incentivize customers to purchase more items, ultimately driving up revenue and reducing the surplus.

2. Bulk sales: Another strategy is to offer bulk sales discounts to resellers or businesses that could use multiple parts at once. This can help get rid of a surplus quickly and create valuable relationships with resellers.

3. Return policies: Consider revising the return policies. Certain policies such as removing the return policy for a select period or offering additional discount for no returns can offer a better deal to people.

4. Use marketplaces for computer parts: Another idea to liquidate the excess inventory is by selling them online on marketplaces or e-commerce platforms. By taking advantage of these platforms, the store can reach a wider audience and ensure the products reach the customers who really need them.

5. Partner with other businesses: Another strategy is to partner with other businesses that may be interested in buying the excess inventory in bulk. This can be particularly effective if the store has a relationship with a local repair shop or other tech-related business.

6. Donate to organizations: Finally, you can consider donating some of the inventory to non-profit organizations or charities that may be able to use the parts. Not only can this be a positive public relations move, but it can also potentially provide tax benefits.

who is the father of computer​

Answers

Answer:

Charles babbage is the father of computer

Explanation:

Charles Babbage is a father of computer

what code should replace /*missing code*/ so that the array is declared and initialized correctly?

Answers

To declare and initialize an array in most programming languages, you need to specify the data type of the elements in the array and the number of elements in the array. For example, in C++, the syntax to declare and initialize an array of integers with 5 elements would be: int myArray[5] = {1, 2, 3, 4, 5}; In this case, "int" is the data type and "myArray" is the name of the array.

The number "5" specifies the number of elements in the array. The elements of the array are initialized with the values inside the curly braces. Without knowing the specific programming language and data type that you are working with, it is difficult to provide a specific answer to your question. However, I can provide some general guidance. If you have a variable name and you want to declare and initialize an array with a specific number of elements and data type, you would use the following syntax: data_type array_name[number_of_elements] = {element1, element2, ...};

For example, if you wanted to declare and initialize an array of integers called "myArray" with 3 elements, the syntax would be: int myArray[3] = {1, 2, 3}; If you do not know the number of elements that you need in your array ahead of time, you can declare an array with a maximum size and then dynamically allocate memory for the array at runtime. This is commonly done in languages like C and C++. For example, the syntax to dynamically allocate memory for an array of integers with a maximum size of 10 in C++ would be: int* myArray = new int[10]; This creates an array of integers with a maximum size of 10 and assigns the memory address of the first element to the pointer variable "myArray". Once you have allocated memory for the array, you can assign values to each element using array notation:
myArray[0] = 1; myArray[1] = 2; myArray[2] = 3; // ... When you are finished using the array, you must remember to deallocate the memory that was allocated using the "delete" operator: delete[] myArray; In summary, to declare and initialize an array in most programming languages, you need to specify the data type of the elements in the array and the number of elements in the array. The syntax for declaring and initializing arrays can vary depending on the programming language and whether you know the number of elements ahead of time or need to dynamically allocate memory at runtime. the code that should replace /*missing code*/ so that the array is declared and initialized correctly depends on the specific programming language and context you are using. Here's an example using Java: In the Java programming language, you would declare and initialize an array by specifying the type of the elements, followed by the name of the array, and using the "new" keyword with the size of the array specified in square brackets.

To know more about programming visit:

https://brainly.com/question/31163921

#SPJ11

When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Response email C. Business card D. Calender

Answers

D:calendar is it i think

Complete the sentence.

When all the food chains are brought together, they appear like a

ASAP because it's a quiz and time limit

Answers

When all the food chains are brought together, they appear like a web.

A series of messages that have been posted as replies to each other in online discussions is a

Answers

Answer:

answer? reply? thread

Explanation:

Show the output of the following code:String[] array = {"red", "green", "blue"};ArrayList list = new ArrayList<>(Arrays.asList(array));list.add(0, "red");System.out.println(list);
A. ["red", "green", "blue", "red"]
B. ["red", "green", "blue"]
C. ["red", "red", "green", "blue"]
D. ["red", "green", "red", "blue"]

Answers

The output of the given code, String[] array = {"red", "green", "blue"};ArrayList list = new ArrayList<>(Arrays.asList(array));list.add(0, "red");System.out.println(list); is option C. ["red", "red", "green", "blue"].


This is because the code creates a String array containing the elements "red", "green", and "blue". It then creates an ArrayList and adds all the elements of the String array to it using the Arrays.asList() method.

Next, it adds the element "red" at index 0 of the ArrayList using the add() method. This shifts the existing elements to the right and inserts "red" at the beginning of the ArrayList. This is because the add() method inserts the new element at the specified index, rather than replacing the existing element.

Finally, the code prints the entire ArrayList using System.out.println(). Therefore, the output will be ["red", "red", "green", "blue"].

Learn more about ArrayList:

https://brainly.com/question/31608479

#SPJ11

in what year was the first electronic computer created?

Answers

Answer:

February 15, 1946

Explanation:

Gooloogoolooo!

What is malicious code and its types?

Answers

Unwanted files or programmes that can harm a computer or compromise data saved on a computer are known as malicious code. Malicious code can be divided into a number of categories, including viruses, worms, and Trojan horses.

A specific kind of destructive computer code or web script intended to introduce system weaknesses that could lead to back doors, security failures, information and data theft, and other potential harm to files and computing systems is referred to as "malicious code" in this context. Antivirus software might not be able to stop the risk on its own. Computer viruses, worms, Trojan horses, logic bombs, spyware, adware, and backdoor programmes are a few examples of malicious programming that prey on common system weaknesses. By accessing infected websites or clicking on a suspicious email link or file, malicious software might infiltrate a machine.

Learn more about  malicious from

brainly.com/question/29549959

#SPJ4

True or false
A compiler translates a source program one line of code at a time.

Answers

Answer:

True

Explanation:

yes It translates one line at a time to be able to confirm all information.

Answer:

True

Explanation:

I hope this helps you

The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or Voice over IP, for example.

Answers

Answer:

:L

Explanation:

Answer:

symmetric cryptography

Explanation:

Help debugging line 7 type error more arguments (5) than expected (1)

Help debugging line 7 type error more arguments (5) than expected (1)

Answers

Answer:

import random

score = 0

for i in range(5):

   num1 = random.randint(1, 100)

   num2 = random.randint(1, 100)

   prompt = "What is " + str(num1) + "+" + str(num2) + "?"

   answer = int(input(prompt))

   result = (num1, num2)

   if answer == result:

       print("Well done!")

       score += 1

   else:

       print("incorrect")

print("Your score was", score)

Explanation:

Your error is on line 7, where you are providing multiple arguments to the input function, instead of 1.

One way to solve this is to create a variable prompt and concatenate all strings and variables within that variable to use for the input.

which of the following is true? the foreign key column values in one table must have the same domain of values as the primary key column values in the related table. every table (relation) must have a foreign key. every table (relation) must have one of more primary keys.

Answers

The foreign key column values in one table must have the same domain of values as the primary key column values in the related table. It's true.

In a relational database, a foreign key is a field in one table that refers to the primary key of another table. The domain of values in a foreign key column must match the domain of values in the related primary key column. This is to ensure referential integrity, meaning that every foreign key value must correspond to an existing primary key value in the related table.

This ensures that the data in the two tables remains consistent and meaningful, even if changes are made to the data in one table. If the foreign key values did not have the same domain of values as the related primary key values, it would be possible for the foreign key values to refer to non-existent primary key values, resulting in data inconsistencies.

Learn more about a foreign key: https://brainly.com/question/13259139

#SPJ4

codes.com student/2087800/section/148661/assignment/5896092/ My See Practice 10 Exercise 5.1.4: Access for DNA Class Let's Go! For this exerce, you are going to create 2 instance variables and the structure of the constructor for the DNA dess. DNA objects contain two strings, and and a mnotype. Create the instance variables with the appropriate privacy settings. Then create the structure of the constructor to take two parameters to match the instance variables. Make sure you set the privacy settings on the constructor correctly. (You do not need to complete the constructor Note: Because there is no main method, your code will not execute (that's ok). Use the autograde to verify that you have the correct code. - Sand My Section Practice Sa Sub Continue RUN CODE Status: Not Submitted E 5.1.4: Access for DNA Class 1 public class DNA 2. 3 4) 5 FILES ONA

Answers

Make two instance variables and the DNA dess constructor's structure. There are two strings, a mnotype, and DNA objects.

Program:

private int calcSequenceSubs(int length, boolean prevFollEqual)

if (prevFollEqual){

   if (length == 1) return 3;

   else return 3 * calcSequenceSubs(length-1, false);

} else {

   if (length == 1) return 2;

   else return 2 * calcSequenceSubs(length-1, false) + calcSequenceSubs(length-1, true);

}

public static int DNAChains(String base) {

if (base == null || base.length() == 0) {

   return 0;

}

int curSequence = 0;

int totalSolutions = 1;

boolean inSequence = false;

//flag to check whether there are any sequences present.

//if not, there is one solution rather than 0

char prevChar = 'x';

char follChar = 'y';

int i = 0;

char[] chars = base.toCharArray();

//handle starting sequence if present

while (i < chars.length && chars[i] == '?') {

   curSequence++;

   i++;

}

if (curSequence > 0) {

   //exclusively ?'s needs to be treated even differently

   if (i < chars.length)

       totalSolutions *= (curSequence > 1) ? 3 * solveSequence(curSequence - 1, false) + solveSequence(curSequence - 1, true) : 3;

       curSequence = 0;

   } else {

       //result is 4*3^(length-1)

       totalSolutions = 4* ((int) Math.pow(3, chars.length-1));

   }

}

//check for sequences of question marks

for (; i < chars.length; i++) {

   if (chars[i] == '?') {

       if (!inSequence) {

           inSequence = true;

           prevChar = chars[i - 1];

           //there is at least one sequence -> set flag

       }

       curSequence++;

   } else if (inSequence) {

       inSequence = false;

       follChar = chars[i];

       totalSolutions *= solveSequence(curSequence, prevChar == follChar);

       curSequence = 0;

   }

}

//if it does, handle edge case like in the beginning

if (inSequence) {

   //if length is 1 though, there are just 3 solutions

   totalSolutions *= (curSequence > 1) ? 3 * solveSequence(curSequence - 1, false) + solveSequence(curSequence - 1, true) : 3;

}

return totalSolutions;

}//end DNAChains

private static int solveSequence(int length, boolean prevFollEqual) {

if (prevFollEqual) {

   //anchor

   if (length == 1) {

       return 3;

   } else {

       return 3 * solveSequence(length - 1, false);

   }

} else {

   //anchor

   if (length == 1) {

       return 2;

   } else {

       return 2 * solveSequence(length - 1, false) + solveSequence(length - 1, true);

   }

}

}//end solveSequence

An instance method is defined?

A section of code known as an instance method is executed on a particular class instance. A receiver object is used when calling it.

What is a case method? Is a piece of code known as an instance method called on a particular instance of an object of a class?

A piece of code known as an instance method relies only on the generic class and no particular instances (objects). By generating private fields, an instance method enhances a class's capabilities.

To know more about constructor's visit:-

https://brainly.com/question/29999428

#SPJ4

DONDE PUEDO VER LA HABITACIÓN EN ROMA?? ONLINE SIN PAGAR (ES UNA PELI)

Answers

Answer:

Sorry, Room in Rome is not available on Indian Netflix, but you can unlock it right now in India and start watching! With a few simple steps you can change your Netflix region to a country like Japan and start watching Japanese Netflix, which includes Room in Rome

Lo sentimos, Room in Rome no está disponible en Netflix indio, ¡pero puedes desbloquearlo ahora mismo en India y empezar a mirar! Con unos simples pasos, puede cambiar su región de Netflix a un país como Japón y comenzar a ver Netflix japonés, que incluye Room in Rome.

Free 35 points!!!

I'm attempting to create a game on Khan Academy using the computer coding courses, but I can't find how to program a moving background or enemies, can someone please give me pointers/suggestions?

P.S. I'm trying to make a Galaga-like game (2-Dimensional) , and it has to be in JavaScript Processing code.

Answers

Answer:

free points?? why does it have question then

Explanation:

Answer:

Well I dont use Khan Academy sorry

Explanation:

How much would it cost to get the screen replaced on a Moto G7?

Answers

If you know enough about tech you can buy a replacement screen online for like $40.00 and do it yourself or might be around like $100 to get it fixed, depends on the place you go too.

automatic configuration for work folders is based on the email address of the user. true or false

Answers

Automatic configuration for work folders is based on the email address of the user is true.

Automatic configuration for work folders relies on the user's email address to identify the appropriate server and settings.

Work folders are a feature in Microsoft Windows Server that allows users to access and synchronize their files from different devices. The configuration of work folders is typically based on the user's domain account or user profile, rather than their email address.

When setting up work folders, the administrator configures the server-side settings, such as the server URL and access permissions. The client-side configuration, on the other hand, is done by specifying the user's domain account or user profile to establish synchronization.

To know more about configuration visit: https://brainly.com/question/31794665

#SPJ11

Select the correct answer.
Which statement is true with regard to project scheduling?

O A. Scheduling in plan-based processes does not change with the progress of the project.

B.
Plan-based processes use an iterative approach for scheduling each phase of the project.

O c.
Scheduling in an agile process involves planning the short-term phases of a project.

OD
Agile processes require less detail than plan-based processes do in an initial project schedule.

Answers

Answer:

Agile processes require less detail than plan-based processes do in an initial project schedule.

The statement which is true about projectscheduling is, “Agile processes require less detail than plan-based processes do in an initial project schedule."

What is project scheduling?

Project scheduling is an activity under project management that lists and schedules all the activities, tasks, and objectives related to that particular project. The project schedule makes the work more efficient and smoother since everything is planned prior to its start.

Project scheduling is a task that is genrally used by the managers to list and make a timeline of their projects in order to complete them timely.

Thus, the claim that Agile processes require less detail than plan-based processes do in an initial project schedule. As a result, option D is the best one.

Learn more about project scheduling here:

brainly.com/question/15126136

#SPJ6

sandra has houseplants sitting on her kitchen windowsill, where it receives a lot of sunlight . what will most likely be the plant's pattern of growth?

Answers

Answer:

A. The cells on the shaded side of the plant will grow longer, causing the opposite side of the plant to grow toward the window.

Explanation:

Answer:

the cells on the shaded side of the plant will grow longer, causing the opposite side of the plant to grow toward the window.

Explanation:

Because thats how plants work.

Which computer program offers a comprehensive collection of tools for creating digital art by using a variety of shapes, lines, and letters which can be easily measured and formatted?​

Answers

Answer:

LibreOffice Draw

Explanation:

Answer:

A

Explanation:

which methodology provides a framework for breaking down the development of software into four gates?

Answers

Answer:

RUP

Explanation:

Imagine you are a team leader at a mid-sized communications company. One of your fellow team leaders is considering setting up a cloud computing system for their team to store and share files. They have begun to question the wisdom of this move, as someone has told them that security might be an issue. Security concerns aside, what would you say in order to convince them that cloud computing is a good idea? Mention at least three advantages that would benefit their team

Answers

Users can launch their applications rapidly by developing in the cloud. Data security: Because of the networked backups, hardware failures do not cause data loss.

What exactly is cloud computing in simple terms?

Cloud computing can be defined as the provision of computer services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to give scale economies, faster innovation, and flexible resources.

Which of the following encapsulates cloud computing the best?

Instead of purchasing and installing the components on their own computers, organizations and people who use cloud computing rent or lease computing resources and software from third parties across a network, such as the Internet.

To know more about loud computing visit:-

https://brainly.com/question/29737287

#SPJ4

With bluetooth printing, the computer and printer need to be within an approximate ______-foot range.

Answers

     The wireless technology used by Bluetooth printers can be set up to work with iOS, Android, and Windows devices. These systems use 2.4GHz low-power radio waves to convey data.

What does the term "wireless printer" mean?

     Wireless printers, also referred to as WiFi printers, may connect to a network without the need for a hard connection or cable. The laptops, cellphones, and tablets linked to a WiFi network can print to a wireless printer once it has been connected to the network.

     Is a Bluetooth printer available?  Inkjets, lasers, and even multifunction devices that print, scan, and copy are all options. A Bluetooth printer is the best option if you want a printer that can go anywhere you do and work with your laptop or other mobile devices.

      If the network is congested, if there is network interference, or if the signal strength is weak, Wi-Fi printers may experience lengthy print times and print problems. With Bluetooth, printing is rapid and interference-free.

     The two most common types of wireless printers are Bluetooth and Wi-Fi. Although Bluetooth is easy to set up and use, it is best suited for small offices with a small number of users. Wi-Fi can accommodate more users across a wider area, but it requires more time to set up.

To Learn more About Bluetooth printer, Refer:

https://brainly.com/question/27408724

#SPJ1

Pie charts are best used for

Pie charts are best used for

Answers

Answer:B

Explanation:Showing parts of a whole.

to maintain audience interest in a multimedia presentation, add as many animation and sound effects as possible. True or False

Answers

To maintain audience interest in a multimedia presentation, add as many animation and sound effects as possible is a false statement.

What information should be presented using multimedia?

A multimedia presentation is a standalone presentation that has data given with the help of slides, videos, or digital representations. It also includes sound, which could be in the form of narration, music, or sound effects.

Presentations using multimedia facilitate understanding of ideas and concepts more quickly than straightforward oratory explanations could ever hope to. Therefore, multimedia-based instruction ensures cheaper training session costs and raises the general caliber of such sessions.

Therefore, It's not a smart idea to use animation and sound effects just because they are readily available.

Learn more about multimedia presentation from

https://brainly.com/question/27800459
#SPJ1

what is the deffinition of a bus network topology. along with a list of benifits and disadvantages of using a bus topology with many devices attatched. will give brainliest if answer is complete and good.

Answers

Answer:

all nodes in the network are connected directly to a central cable that runs up and down the network. When there is a tiny network, it works quite well. The needed wire length is smaller than in a star topology. It's simple to add or delete devices from this network without affecting others. When compared to other network topologies such as mesh and star, it is quite cost-effective.

Explanation:

Other Questions
For the following graph , determine the coordinates of the vertex and the y intercept of the parabola. 5. This describes a defined 2-d space, represented by height and width but no depth.SpaceContrastShapeLine Which of Friar Laurences actions show that he is a mentor for Juliet? Check all that apply.He acts before thinking.He gives Juliet advice to help her situation.He refers to Juliet as daughter, taking on a parental role.He teaches her how to make a sleeping potion.He believes in faking death. In rotational motion there are three types of accelerations to consider: centripetal, angular and tangential. What effect does a constant centripetal acceleration have on the other two chlorine and bromine are in the same group in the periodic table. how many valcence elctrons o thy have? are they emtals or non metals? The most popular vehicle models in america today are __________ . light trucks suvs hybrids convertibles a) Determine whether the series 11n2 + en +32 m3 + 3n2 - 7n + 1 is convergent or 11 divergent b) Determine whether the series na Inn is convergent or divergent. n3 - 2 why was the united states unstable to cultivate good relations with fidel castro The expression 4+10h2 models the total cost in dollars for Elizabeth to rent a life jacket and share a kayak for h hours. What is Elizabeth's total cost if the kayak is rented for 3 hours? Enter your answer in the box. Question: Why do you deserve this scholarship? ...Question: What are your career goals? ...Question: Tell me about a mistake you made. ...Question: Why did you choose this school? ...Question: What activities are you involved in? ...Question: Tell me about a personal achievement that makes you proud 5Drag the tiles to the correct boxes to complete the pairs.Luke is driving from his house to the store. After driving 16 miles at a constant speed of 0.8 mile/minute, he realizes that he forgot his wallet. So,he turns around and drives all the way back to his house at the same speed. The equation below models Luke's distance, in miles, from home ashe drives for t minutes.d = -0.8t - 20 + 16Using the given equation, match the number of minutes since Luke started driving from his house to his distance from the house.12 minutes27 minutes31 minutes7 minutes10.4 miles on his return trip5.6 miles on his trip to the restaurant9.6 miles his trip to the restaurant7.2 miles on his return trip PLZZZ HELPP anyonee plzzzz What is the product in simpilest form? 3/5 x 2/3 2/5 6/15 5/8 9/10 Lee, poniendo atencin a los verbos en negrita, las frases y escoge la opcin con el verbo reflexivo, recproco o accidental incorrecto. Read paying attention to the bold type words, and choose the option with the incorrect reflexive, reciprocal or accidental verb.Mi esposa y yo no nos olvidamos de educar a nuestra hija Silvia para que ella se comporte de manera independiente. Silvia solo tiene 5 aos, pero ya se baamos sola y se duerme sola en su habitacin sin supervisin.Onos olvidamosO se comporteO se baamosOse duerme STOL0will eat the hamburgLook at the pictures. What's going to happen? Make sentences with3. I will gh it4.3.2. Exercise 8Vare going to + verb.1. It's going to rain.02.3.4.5.6.7.TEACHYouTAPANESEVES16143.3. Choosing the correct formA: Why are you working so hard these days?B: Because I'll buy /I'm going to buy a car, so I'm saving as musas I can.A: What will you buy / are you going to buy for her birthday?B: A CD.the broasane obou to fall out theteacherO Consider the elementary reaction equation H2O2(g)H2O(g)+O(g)What is the order with respect to H2O2? order:What is the overall order of the reaction? overall order:Classify the reaction as unimolecular, bimolecular, or termolecular. unimolecular bimolecular termolecular The plessy v. ferguson decision allowed continued discrimination against african americans, and it became pervasive throughout the south as? Kelsey went to the donut shop before work. The ratio of chocolate donuts to sprinkled donuts that she bought is 3 to 4. If Kelsey bought a total of 21 donuts, how many of the donuts were sprinkled Explain the difference between the two types of signalamplification (secondary messengers and phosphorylation cascades).What is the benefit of having these amplification steps? Brian invests 8500 into his bank account.He receives 5% per year compound interest.How many years will it take for Brian to have more than 10000?