Question No: 02 202123n1505 sa subjective question, hence you have to write your answer in the Text-Field given below. 76610 If a random variable X is distributed normally with zero mean and unit standard deviation, the probability that 0SXSx is given by the standard normal function (x). This is usually looked up in tables, but it may be approximated as follows: p(x)=0.5-r(at+bt²+ct³) where a=0.4361836; b=-0.1201676; c-0.937298; and r and t is given as r=exp(-0.5x²)/√√271 and t=1/(1+0.3326x). Write a function to compute (x), and use it in a program to write out its values for 0

Answers

Answer 1

Python is a high-level programming language known for its simplicity and readability.

To compute the standard normal function (x) using the given formula and values of a, b, c, r, and t, you can write a function in a programming language. Here's an example in Python:

python

import math

def compute_standard_normal(x):

   a = 0.4361836

   b = -0.1201676

   c = -0.937298

   r = math.exp(-0.5 * x**2) / math.sqrt(2 * math.pi)

   t = 1 / (1 + 0.3326 * x)

   p = 0.5 - r * (a * t + b * t**2 + c * t**3)

   return p

# Calculate and print the values of (x) for 0 <= x <= 5

for x in range(6):

   result = compute_standard_normal(x)

   print(f"(x) for x={x}: {result}")

This program calculates the values of the standard normal function (x) for x values ranging from 0 to 5 using the given formula and the provided values of a, b, c, r, and t. It uses the math module in Python to perform the necessary mathematical operations.

Note: The above code assumes that the values of a, b, c, r, and t are correct as given in the question. Please double-check these values to ensure accuracy.

To learn more about Python visit;

https://brainly.com/question/30391554

#SPJ11


Related Questions

file:///media/fuse/drivefs-0142e6928396ed2afff070ead0fbbbcd/root/JerooLessonFourLabA_1.pdf
my teacher told said to clean the whole map in jeroo and plant the flowers all around how do i do it?

Answers

Answer:

it says page does not exist

Explanation:

True or False, spam sent by scammers often uses spoofed email addresses.

Answers

The statement "spam sent by scammers often uses spoofed email addresses" is true.

Spoofing is a popular way of forging email addresses to deceive recipients into accepting a message that appears to originate from a different source than it actually does.

The aim is to trick the receiver into believing that a message came from someone they know, like their bank or a colleague, to trick them into divulging sensitive information such as account numbers, passwords, and credit card details.

Spoofing is a prevalent way for spammers and other bad actors to target their victims using email addresses.

Spam is unsolicited bulk messages sent to a group of people.

Spam has various forms: it might be an advertisement or a message with a phishing attempt that attempts to trick the receiver into divulging their sensitive information.

Spammers often use social engineering tactics to make their messages seem genuine and trustworthy to entice the receiver to click on a link or submit confidential information to the sender.

Know more about scammers here:

https://brainly.com/question/23021587

#SPJ11

River designs a program that will make a cartoon baby jump up and down. But when it is run, the baby appears but doesn’t move. What should River do?

a create a Boolean question
b move code to the editor
c run the program
d check for bugs

Answers

D, check for bugs i think

write common ICT tools​

Answers

computers laptops printers scanners software programsdata projectorsand interactive teaching box.

____ are characterized as records or rundowns of individual's instruction, proficient experience, capabilities, and aptitudes utilized as a component of an employment form. Select one: O a. LINKEDIN b. c. RESUME O d. PROFILE API

Answers

The term that is characterized as records or rundowns of an individual's instruction, proficient experience, capabilities, and aptitudes utilized as a component of an employment form is c. RESUME.

A resume is a concise summary of an individual's education, work experience, credentials, and skills. It is a crucial document utilized by employers to evaluate job candidates. A resume should include information such as job history, educational background, and professional accomplishments. It should be tailored to the job for which the candidate is applying.

For writing a resume,

Pick the Right Resume Format & Layout.

Mention Your Personal Details & Contact Information.

Use a Resume Summary or Objective.

List Your Work Experience & Achievements.

Mention Your Top Soft & Hard Skills.

Include Additional Resume Sections (Languages, Hobbies, etc.)

Learn more about resume: https://brainly.com/question/862477

#SPJ11

What consists of nonvolatile memory chips that can be used for storage?

Answers

Nonvolatile memory chips consist of semiconductor devices that can retain stored data even when there is no power source. This include Flash Memory, Electrically Erasable Programmable Read-Only Memory (EEPROM), Ferroelectric Random-Access Memory (FeRAM), Magnetic Storage.

Flash memory is a widely used nonvolatile memory technology. It retains data even when the power is turned off. Flash memory chips are commonly found in USB flash drives.EEPROM is a nonvolatile memory that allows for electrical modification of individual memory locations. It can be written and erased electronically, making it suitable for storing small amounts of data that need to be changed infrequently.FeRAM is a nonvolatile memory technology that combines the advantages of both DRAM (dynamic random-access memory) and EEPROM. It offers fast read and write speeds, high endurance, and nonvolatility.Magnetic Storage: Although magnetic storage is not typically referred to as "chips," it is a nonvolatile storage technology commonly used in hard disk drives (HDDs).

These are some examples of nonvolatile memory chips used for storage, each with its own characteristics and applications.

To learn more about memory: https://brainly.com/question/26551765

#SPJ11

Off distance grid cut off is characterized by which of the following.?
A. The top of the image is underexposed
B. Both sides of the image are underexposed
C. One side of the image is underexposed
D. The bottom of the image is underexposed

Answers

Off distance grid cut off is characterized by one side of the image being underexposed. Therefore, the correct answer is option C.The term "cut off" refers to a situation where the film, plate, or sensor area has failed to receive the entire image projection; the light from one or both edges of the camera lens does not reach it.

There is a partial loss of the visual data on one side of the resulting image. This issue is primarily seen in the case of aerial photographs that have been taken from a plane or other remote location where the camera is mounted and triggered automatically.In summary, the off distance grid cut off is a type of photographic error that is caused by one side of the image being underexposed.

To know more about characterized visit:

https://brainly.com/question/30241716

#SPJ11

who was the programmer for charles babbage's analytical engine?

Answers

The programmer for Charles Babbage's Analytical Engine was Ada Lovelace.

Who was Ada Lovelace

Ada Lovelace, born as Augusta Ada King, Countess of Lovelace, was an English mathematician and writer. She is often considered the world's first computer programmer due to her work on Babbage's Analytical Engine.

Ada Lovelace worked closely with Charles Babbage and was introduced to his designs for the Analytical Engine. She not only understood the potential of the machine for performing complex calculations but also recognized its capability for creating more than just numbers.

Read more on Charles Babbage here https://brainly.com/question/28378247

#SPJ4

int[] firstArray = { 1, 3, 7 };int[] secondArray = { 2, 4, 6, 8, 10 };int[] result = zipArrays(firstArray, secondArray);for (int i = 0; i < result.length; i++) {System.out.println(result[i]);}}public static int[] zipArrays(int[] firstArray, int[] secondArray) {// Your code here}

Answers

The code snippet zips together the elements from two arrays, `firstArray` and `secondArray`, and stores the result in the `result` array. It then prints each element of the `result` array.

The code snippet provided demonstrates the concept of "zipping" two arrays together. The `zipArrays` method, which takes two arrays (`firstArray` and `secondArray`) as parameters, is called to perform the zip operation. Inside the `zipArrays` method, the code implementation for the zip logic is missing and needs to be written.

The expected functionality of the `zipArrays` method is to combine the elements from both arrays in an alternating manner. For example, if `firstArray` contains [1, 3, 7] and `secondArray` contains [2, 4, 6, 8, 10], the expected result should be [1, 2, 3, 4, 7, 6, 8]. The specific implementation of the `zipArrays` method would involve iterating through both arrays and combining their elements according to the desired logic. After the `zipArrays` method is implemented, the resulting array is printed using a loop that iterates through the `result` array and displays each element using the `System.out.println()` method.

learn more about array here:

https://brainly.com/question/13261246

#SPJ11

COMPUTER ACTIVITY

help guys thank you so much!!​

COMPUTER ACTIVITYhelp guys thank you so much!!

Answers

A type of flowchart called an Entity Relationship (ER) Diagram shows how "entities" like people, things, or ideas relate to each other in a system.

What exactly is a ER diagram?

A type of flowchart called an Entity Relationship (ER) Diagram shows how "entities" like people, things, or ideas relate to each other in a system. In the fields of software engineering, business information systems, education, and research, ER Diagrams are most frequently utilized for the design or debugging of relational databases. They use a defined set of symbols like rectangles, diamonds, ovals, and connecting lines to show how entities, relationships, and their characteristics are interconnected. They follow grammatical structure, using relationships as verbs and entities as nouns.

To learn more about databases visit :

https://brainly.com/question/6447559

#SPJ1

Who do you like more?

Lolbit

-or-

Mangle

Who do you like more?Lolbit-or-Mangle

Answers

Answer: lolbit

Explanation: she is my glitchy idol along with the shadows and Mr. Afton's cult.

Who do you like more?Lolbit-or-Mangle

Answer:

Mangle

Explanation: just because.

Which of the statements indicates that Shane & Co. is an ethical organization?
Shane & Co. deal in manufacturing plastic cups. Despite three years of operations, they haven’t been able to even break even. The irate investors are eagerly waiting for the next financial report that is due. Shane & Co. can manipulate the figures to show growth, however they choose to display the facts as it is. They are sure to lose some of the investors on board but are willing to take the risk.
Shane & Co. deal in manufacturing plastic cups
Despite three years of operations, they haven’t been able to even break even
Shane & Co. can manipulate the figures to show growth
however they choose to display the facts as it is
They are sure to lose some of the investors on board
but are willing to take the risk

Which of the statements indicates that Shane &amp; Co. is an ethical organization?Shane &amp; Co. deal

Answers

Answer:

however they choose to display the facts as it isbut are willing to take the risk

Which of the following statements are true regarding abstraction? Select 3 options.

1.The level of abstraction needed depends on the situation and your goals.

2.Creating a model must occur before abstraction.

3.Abstraction is a process where details are added to further define the problem.

4.Abstraction provides a way to see a complex situation more clearly.

5.Refinement is the opposite of abstraction.

Answers

Answer:

1) Abstraction provides a way to see a complex situation more clearly.

2)Refinement is the opposite of abstraction.

The level of abstraction needed depends on the situation and your goals.

Explanation:

cuz it is, look at the attachment i put

Which of the following statements are true regarding abstraction? Select 3 options.1.The level of abstraction

1) Abstraction provides a way to see a complex situation more clearly.

2)Refinement is the opposite of abstraction.

The level of abstraction needed depends on the situation and your goals.

Abstraction and refinement are used in application/system development in the field of computing. Abstraction is used to abstract the details from the model. It means that displaying only essential information about the the model and hiding other details.

While refinement is the idea that is used in software development by moving through each level of abstraction and incrementally refining each level of abstraction, providing more detail at each increment. Refinement is the inverse of abstraction.  

Learn more about refinement on:

https://brainly.com/question/32323284

#SPJ6

Which graph is the solution to the system 2x – 3 and y < 2x + 4?

Answers

Answer:

B

Explanation:

Answer:

Explanation:

Edge 2021

Which graph is the solution to the system 2x 3 and y &lt; 2x + 4?

amelia sees a post on social media about a government official who has made a controversial statement. which of the following strategies should she use to make sure the post is trustworthy?

evaluate source credibility
fact check
listen to her gut
look for authenticity

Answers

Answer:

Fact check

Explanation:

I dont know but I did the test and got it right

Answer:

look for authenticity

Explanation:

an interactive voice response (ivr) system permits a caller to interact with a database of stored information by pressing keys on a telephone pad or speaking words into the phone. True or False

Answers

True. An Interactive Voice Response (IVR) system permits a caller to interact with a database of stored information by pressing keys on a telephone pad or speaking words into the phone.

Interactive voice response, or IVR, is an automated telephone system that combines pre-recorded messages or text-to-speech technology with a dual-tone multi-frequency (DTMF) interface to engage callers, allowing them to provide and access information without a live agent.  If the IVR system cannot retrieve the information that the caller is looking for, the programmed menu options can provide assistance in routing callers to the appropriate representative for help. By integrating computer and telephony technologies, IVR software can improve call flow and reduce wait times, leading higher overall customer satisfaction.

Moviefone was one of the most famous and successful uses of IVR technology in the 1990s. Since the internet wasn’t as accessible then as it is today, movie-goers would call in and provide their zip code to get a list of available movie theaters near them with their respective movies and show times. While Moviefone is a product of the past, its underlying technology is still leveraged, primarily within call centers, to provide customer support and reduced call volume for customer service representatives.

learn more about Interactive Voice Response (IVR) system here:

https://brainly.com/question/28465085

#SPJ11

The statement "An Interactive Voice Response (IVR) system permits a caller to interact with a database of stored information by pressing keys on a telephone pad or speaking words into the phone" is true.

An Interactive Voice Response (IVR) system is an automated system that allows callers to interact with a computer-controlled phone system by pressing keys on their phone's keypad or speaking words into the phone. The IVR system interacts with a database of pre-recorded or synthesized speech prompts and stored information to provide the caller with the required information or assist them in navigating the system to the desired destination.

For instance, a typical IVR system may ask callers to choose from a menu of options, such as "Press 1 for customer support," "Press 2 for billing," "Press 3 to speak with a live representative," and so on. The caller's input is then recorded and processed by the IVR system, which provides the appropriate response or connects the caller to the desired department or person.

Learn more about IVR here:

https://brainly.com/question/28465085

#SPJ11

write a method named getmin that takes two int parameters and returns the lesser of the two values (assume the two values will never be equal). then write a second method getmin3 that takes 3 int parameters and returns the minimum of all three values (again assume none of the three parameters will be equal to each other). in your second method, be sure to call the first method (getmin) to accomplish the result.

Answers

The minimum value in the current stack, 18, should be returned by the call to getMin(). We create a variable called minEle that keeps track of the stack's current lowest element.

Create a data structure called SpecialStack that supports all stack operations, including push(), pop(), isEmpty(), and isFull(), as well as the extra method getMin(), which should return the SpecialStack's bare minimum element. All of these SpecialStack operations must have an O time and space complexity (1).

The current minimum element in the stack is kept in the variable minEle that we define. How to handle the situation when the minimum element is eliminated is now the intriguing aspect. To address this, we push "2x - minEle" into the stack rather than x so that the current minimal element and its value may be used to recover the prior minimum element.

To know more about stack click on the link:

https://brainly.com/question/12071175

#SPJ4

During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of

Answers

Since the client requested that her database application be moved to a separate network drive, this an example of: Local network hosted.

In Computers and Technology, cloud computing refers to a type of computing that requires the use of the following shared computing resources over the internet:

Network (web) servers.Computer power.Cloud storage (data storage).  Software programs (applications).

A hosted software can be defined as a software program (application) that is installed, hosted and accessed by end users (clients) entirely from a remote  location, network drive or server.

Read more: https://brainly.com/question/18369405

assume we use the illustrated neural network for the regression of values of humidity y1 and temperature y2at different positions x

Answers

Using the illustrated neural network, we can perform regression to predict the values of humidity (y1) and temperature (y2) at different positions (x). In this network, the input layer takes the position data (x), and through multiple layers of interconnected neurons, it processes and learns the relationships between the positions and the corresponding humidity and temperature values.

The network's output layer will provide the predicted values for humidity (y1) and temperature (y2) based on the given position (x). To ensure the accuracy of the predictions, the neural network will need to be trained using a dataset that contains historical humidity and temperature data for various positions.During the training process, the network adjusts its weights and biases using optimization techniques like gradient descent or backpropagation to minimize the difference between the predicted values and the actual values in the training dataset. Once the network is sufficiently trained, it can then provide accurate predictions for humidity (y1) and temperature (y2) at new, unseen positions (x).
In conclusion, the illustrated neural network can be utilized to predict the values of humidity (y1) and temperature (y2) at different positions (x) by learning the underlying relationships between the variables through a training process. This can be helpful in various applications such as climate modeling, weather forecasting, and environmental monitoring.

Learn more about interconnected here

https://brainly.com/question/30007026

#SPJ11

By default, tables are sorted in ascending order by this.


What’s the answer?

By default, tables are sorted in ascending order by this.Whats the answer?

Answers

Answer:

Record number

Explanation:

It simply can't be "data type" as there cant be more than one data type in a field. It won't be "primary key field" either as primary keys only set the field as unique. You can test this by changing the primary key to a different field. But for simplicity's sake, I did this experiment for you.

As you can see in the first and second attachments, ID is the primary key, set default by the program.

But when I set Field 8 as the primary key, shown in the third attachment, field 8 doesn't sort, shown in the fourth attachment.

By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?
By default, tables are sorted in ascending order by this.Whats the answer?

Answer:

By default, tables are sorted in ascending order by record number.

Technician A says that OBDI and OBDII use different DLC connectors. Technician B says that OBDII standardizes the designations for diagnostic trouble codes (DTCs). Who is correct? Technician A Technician B Both Technician A and Technician B Neither Technician A nor Technician B

Answers

Answer:

The answer is "Technician B"

Explanation:

The OBDII is a standardized, automated framework which the USA EPA had approved and installed into its whole year of modeling (MY) 1996 and then into modern light-duty vehicles and trucks, recognized as "on-board diagnostics II."  

The DTC framework is a set of problematic diagnostic codes that used alert you if a vehicle is unable to operate using an on-board Diagnostic System. If the system of the automobile identifies a problem, a special DTC code is generated as well as a position sensor is sent to the instrument cluster, that's why Technician B is correct.

TRUE OR FALSE: It is possible to style elements uniquely no matter what class they belong to

Answers

I believe it is true.

pls, help it's urgent... 44 points plsssssssssssssssss

Write an algorithm and Flowchart for reversing a Number eg. N=9486.

Answers

The steps to reverse a number is given below:

The Algorithm

Step 1 Start

step 2 Read a number n

Step 3 a=n/1000

step 4 calculate b=(n%1000)/100

step 5 calculate c= (n%100)/10

step 6 calculate d = n%10

step 7 calculate reverse = a+(b*10)+(c*100)+(d*1000)

step 8 display reverse

step 9 stop

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

Which one of the following pairs of variables would be BEST-SUITED for a contingency table?
Hours studies and test grade
miles per gallon and car weight
favorite color and gender
size of house and price of house

Answers

The BEST-SUITED pair of variables for a contingency table would be "favorite color and gender". A contingency table is a table that shows how frequently two variables occur together.

It is frequently used in statistics to study the relationship between two variables. These variables can be qualitative or quantitative. The variables "favorite color" and "gender" are both qualitative variables. It is critical that both variables are categorical or qualitative so that a contingency table can be created.

The other three pairs of variables contain at least one quantitative variable, so they would not be suitable for a contingency table: Hours studies and test grade - Both variables are quantitative variables. Miles per gallon and car weight - Both variables are quantitative variables. Size of house and price of the house - Both variables are quantitative variables.

You can learn more about contingency tables at: brainly.com/question/30920745

#SPJ11

list the steps involved in cutting and pasting in a different document​

Answers

To cut or copy, hold down Ctrl and press X or C. Choose Paste from the menu bar when you right-click the item's destination. You can right-click almost anywhere, including inside a document or folder. To paste, hold down Ctrl and press V on the keyboard.

you are an administrator of a growing network. you notice that the network you've created is broadcasting, but you can't ping systems on different segments. which device should you use to fix this issue? answer network hub access point range extender network bridg

Answers

As an administrator of a growing network, if you notice that the network you have created is broadcasting, but you can't ping systems on different segments, you should use a network bridge to fix theA network bridge is a network device used to connect two or more network segments.

It works at the data link layer of the OSI model and connects two different physical LANs as if they were a single logical LAN. It forwards data only to the intended destination network segment and prevents unnecessary data from being sent over the entire network. Therefore, it reduces the amount of network traffic and prevents network congestion. Thus, a network bridge is the device that an administrator of a growing network should use to fix the issue of broadcasting the network, but unable to ping systems on different segments.

Learn more about  network  here:

https://brainly.com/question/15002514

#SPJ11

is it safe to buy cheap windows keys from websites, like digitalcodes.in? i'm using one and the keys are working.

Answers

It is not safe to buy cheap windows keys from websites. This is because most of the websites selling keys at cheap rates are either fake or they are selling counterfeit keys. Such keys may work for a while, but after some time, they may get blacklisted by the Windows update or may stop working altogether. Therefore, it is recommended to buy keys from trusted sources like the official Microsoft website or authorized retailers.

Windows keys refer to the unique series of characters that are required to activate a copy of Windows operating system on a computer. These keys are essential to prove that the copy of Windows you are using is genuine and has been legally purchased. The keys are usually provided on a label or a card inside the Windows package or can be obtained through authorized retailers or the official Microsoft website.To check if a Windows key is genuine, follow the steps given below:

Step 1: Open the Command Prompt by pressing the Windows key + X and selecting Command Prompt (Admin).

Step 2: Type the command "slmgr /dli" in the Command Prompt window and press Enter.

Step 3: A pop-up window will appear showing the license information for your Windows copy. If the license status is "Licensed", the key is genuine. If the status is "Notification", "Not Genuine", or "Unlicensed", the key is not genuine or may have been used on multiple devices.

To learn more about Windows; https://brainly.com/question/27764853

#SPJ11

A data breach is the protection of secure data in an unsecured environment.
True
False

Answers

Answer: i think its true

Explanation: have a good day!

What type of data uses numbers that can be used in the arithmetic operations?

Answers

Answer:

Numerical data uses numbers that can be used in arithmetic operations.

your company plans to migrate all its data an resources to azure the omapnys migration plan states that the only platform as a service (paas) solutions must be used to azure you need to deploy an azure envirment that meets the company migration plan soulution you create an azure app serive and azure storage accounts will this work?

Answers

Whenever you create an Azure app service and Azure storage account, it will really function. According to the company's migration strategy, Azure can only be utilized for a service platform (PaaS) solutions.

By data, what do you mean?

Data is information that's been transformed into a format that is useful for transfer or processing in computers. Data is information that has been transformed into binary digitally for use with modern computers and communication mediums.

What are an example and data?

Text, observations, figures, photographs, statistics, graphs, and symbols are just a few examples of the many diverse ways that data can be presented. For instance, data may include precise prices, weights, names, names, ages, climates, dates, or lengths. Data on its own is a raw type of knowledge.

To know more about Data visit :

https://brainly.com/question/11941925

#SPJ4

Other Questions
________is not only unethical, it is also illegal.A.Ethnocentrismb. PlagiarismC. Interpersonal conflictd. Criticism An architect designs a rectangular flower garden such that the width is exactly two-thirds of the length. If 290 feet of Ifantique picket fencing are to be used to enclose the garden, find the dimensions of the garden.What is the length of the garden?The length of the garden is What is the width of the garden?The width of the garden is Quasi-concavity of utility functions insures that with only two goods, these goods must bea) gross substitutes.b) gross complements.c) net substitutes.d) net complements A __ is the starting point from which you describe an objects velocity The height of a door is about?A) 5 Feet B) 7 Feet C) 16 Feet D) 12 Inches E) 36 Inches Area=Help me please :( Find the moment of inertia about the x-axis of a thin plate with density bounded by the circle . then use your result to find =5 What is a if a x 4 x 7 = 70 character in the implications of river capture for human activities in South Africa you are considering whether to enter a holiday lights display contest that pays $1,000 to the winner. state whether each of the following constitutes private costs, private benefits, external costs, or external benefits. You may select more than one answer. Click the box with a check mark for correct answers and click to empty the box for the wrong answers Private costs Private benefits External costs External benefits Increased traffic congestion. Increased traffic congestion. Increased traffic congestion. Increased traffic congestion. Increased Increased Increased Increased electric bill from the holiday lights electric bill from the holiday lights electric bill from the holiday lights. electric bill from the holiday lights. Winning the Winning the Winning the Winning the holiday lights display contest. holiday lights display contest. holiday lights display contest. holiday lights display contest. Neighbors have Neighbors have Neighbors have Neighbors have difficulty parking on difficulty parking on difficulty parking on your street. difficulty parking on your street. your street. your street. After years of false starts in disappointing career paths, bruce feels happy. More than that, he feels that he is living up to his potential and doing what he is meant to do with his life. What state has bruce reached?. which of the following is not a type of electromagnetic wave with lower energy than visible light waves? microwaves| radar waves| the waves that carry AM or FM broadcasts| the sound waves coming from your transistor radio| the waves that carry television transmissions Good research generates dependable data, derived from practices that are conducted professionally which can be used reliably for managerial decision making. Explain the characteristics of scientific research methods please help me here is screenshot quick and right answers only. algebra Calculate the weight of a satellite with a mass of 2500 KG that is orbiting the earth at a height of 40,000 KM, where gravity is only 2% as strong as on earth HELP 40 points centinel wrote to Pennsylvania readers that the proposed U.S. constitution should secure which type of protection in the bill of rightsA. Freedom of speechB. Guaranteed trial by jury C. No quartering of troops in private homesD. Warrants needed for trespassing or taking property How much must be deposited today into the following account in order to have $50,000 in 7 years for a down payment on a house? Assume no additional depositsare made.An account with quarterly compounding and an APR of 5.9% French reading comprehension ASAP Have a look at Figure 1.1 and equation 1.1, and the frequency (Hertz, or cycles per second) shown for ultraviolet light. Using 10 as the frequency, and 300,000 km/sec as the speed of light in a vacuum, what is the wavelength of such light in METERS ? In nanometers (remember to multiply by 10) ? Enter your answers carefully in decimal format (0.002, for example, if less than 1). In circle J with mZHJK = 94 and HJ = 12 units find area of sector HJK. Round to the nearest hundredth. K