Use struct to write a complete program according to the following description of requirements: Read in 5 ex am data (each is with a registration number (9-character string), a mid°°term and a final ex°°am scores) first, and then let the user enter a register number to find the related mid°°term, final, and average of her or his two test scores.

Answers

Answer 1

The requested program can be developed in C++ using 'struct', an essential data structure.

This program will initially read five sets of exam data, including a registration number and midterm and final scores. It will then allow the user to input a registration number, returning the associated midterm, final, and average exam scores.

In detail, a struct named 'Student' can be defined to hold the registration number, midterm score, and final score. An array of 'Student' struct can then store data for five students. After reading the data into the struct array, the program will prompt the user for a registration number. It will loop through the array to find the student's data and calculate the average score, outputting the midterm, final, and average scores.

Learn more about struct in C++ here:

https://brainly.com/question/30761947

#SPJ11


Related Questions

what is an example of analog device​

Answers

Explanation:

Thermometer. Speedometer. Analogue Clock. Seismometer. Voltmeter. Flight Simulators.

hope it helps

stay safe healthy and happy...

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

Assume x is 5, y is 6, and z is 8, and indicate if the relational expression is true or false

x == 5

Answers

Answer:

True

Explanation:

It checks whether x is equal to 5 or not

100 points asap and brainly if right
Type the correct answer in the box. Spell all words correctly.
What term describes the site-to-site VPN used by Kevin’s company?
Kevin’s company has offices located in different states. All the offices are connected to the head office through a site-to-site VPN connection. Kevin’s company is using a(n) (blank) VPN.

Answers

Kevin’s company is using an “extranet” VPN

Answer:

extranet

Explanation:

VPN stands for virtual private networkVPN is used by companies for privacyIt also helps in keeping important data safe from hackers

in this lab, you declare and initialize constants in a c program. the program, which is saved in a file named , calculates your age in the year 2050.

Answers

In this lab, you declare and initialize constants in a C program. The program, which is saved in a file named calculate_age.c, calculates your age in the year 2050. In order to calculate your age in the year 2050, we need to know the current year.

We declare a constant called CURRENT_YEAR and initialize it to the current year using the time library in C. We then prompt the user to enter their birth year, which we store in a variable called birth_year. We subtract the birth year from the current year to get the user's age. Finally, we add the difference between 2050 and the current year to the user's age to get their age in the year 2050. We store this value in a variable called age_2050 and print it out to the user. Here is the code:`

``#include #include int main() {  const int CURRENT_YEAR = 2021;  int birth_year, age, age_2050;  printf("Enter your birth year: ");  scanf("%d", &birth_year);  age = CURRENT_YEAR - birth_year;  age_2050 = age + (2050 - CURRENT_YEAR);  printf("Your age in 2050: %d", age_2050);  return 0;}```This program demonstrates how to declare and initialize constants in C, as well as how to use variables and basic arithmetic operations to perform a simple calculation.

To know more about calculates visit:

https://brainly.com/question/30781060

#SPJ11

Why is cyber security an important part of sending information using digital signals

Answers

Cyber security is an important part of sending information using digital signals. Because it keeps data safe while stored in the cloud and when they are transmitted. Option D is correct.

What are cybersecurity functions?

Analysts in cybersecurity defend an organization's hardware and network infrastructure against hackers and cybercriminals looking to harm them or steal confidential data.

When conveying information via digital signals, cyber security is a crucial component. because it protects data as it is sent and stored in the cloud.

Hence, option D is correct.

To learn more about cybersecurity  refer;

https://brainly.com/question/27560386

#SPJ1

Why is cyber security an important part of sending information using digital signals

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

Answers

Answer:

Cash-out fraudsters

Explanation:

Should Microsoft bring paid ads to its X-Box gaming space in light of the new activision deal? Is Microsoft moving to slow with it acquisition based strategy and should they look to develop solutions in house?

Answers

Key factors to keep in mind when utilizing paid advertisements within the box gaming domain, as well as effective methods for gaining new customers is User Experience.

What is the gaming space

The addition of advertisements that require payment within the box gaming world has the potential to adversely affect the user experience. Most gamers usually desire unbroken gaming and might react unfavorably towards advertisements that are intrusive or that cause disruptions.

To increase revenue on the box platform, Microsoft may consider implementing paid advertisements as a form of monetization. By making use of advertising income, there is a potential to acquire additional funds that can be utilized for various endeavors such as enhancing platform development, etc.

Learn more about gaming space from

https://brainly.com/question/24855677

#SPJ4

11.An Artificial Neural Network Is based on a) Strong Artificial Intelligence approach b) Weak Artificial Intelligence approach c) Cognitive Artificial Intelligence approach d) Applied Artificial Intelligence approach

Answers

Answer:

C.

Explanation:

The cognitive Artificial Intelligence Approach is an approach that helps to test theories concerning human minds. It is an artificial intelligence agent that is designed to think and act rationally like humans.

The artificial neural network is based on the cognitive artificial intelligence approach. With the help of this artificial intelligence, computers will be able to test theories of how humans recognize faces, for instance.

Therefore, option C is correct.

Hi, can someone please help me with this? I've been having a lot of trouble with it.

The assignment

Your job in this assignment is to write a program that takes a message as a string and reduces the number of characters it uses in two different set ways. The first thing your program will do is ask the user to type a message which will be stored as a String. The String entered should be immediately converted to lowercase as this will make processing much easier. You will then apply two different algorithms to shorten the data contained within the String.

Algorithm 1

This algorithm creates a string from the message in which every vowel (a, e, i, o, and u) is removed unless the vowel is at the very start of a word (i.e., it is preceded by a space or is the first letter of the message). Every repeated non-vowel character is also removed from the new string (i.e., if a character appears several times in a row it should only appear once at that location). So for example the string "I will arrive in Mississippi really soon" becomes "i wl arv in mssp rly sn".

After applying this algorithm, your program should output the shortened message, the number of vowels removed, the number of repeated non-vowel characters removed, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.

Algorithm 2

This algorithm creates a string by taking each unique character in the message in the order they first appear and putting that letter and the number of times it appears in the original message into the shortened string. Your algorithm should ignore any spaces in the message, and any characters which it has already put into the shortened string. For example, the string "I will arrive in Mississippi really soon" becomes "8i1w4l2a3r1v2e2n1m5s2p1y2o".

After applying this algorithm, your program should output the shortened message, the number of different characters appearing, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.

Sample Run 1
Type the message to be shortened
This message could be a little shorter

Algorithm 1
Vowels removed: 11
Repeats removed: 2
Algorithm 1 message: ths msg cld b a ltl shrtr
Algorithm 1 characters saved: 13

Algorithm 2
Unique characters found: 15
Algorithm 2 message: 4t2h2i4s1m5e2a1g1c2o1u3l1d1b2r
Algorithm 2 characters saved: 8
Sample Run 2
Type the message to be shortened
I will arrive in Mississippi really soon

Algorithm 1
Vowels removed: 11
Repeats removed: 6
Algorithm 1 message: i wl arv in mssp rly sn
Algorithm 1 characters saved: 17

Algorithm 2
Unique characters found: 13
Algorithm 2 message: 8i1w4l2a3r1v2e2n1m5s2p1y2o
Algorithm 2 characters saved: 14
Milestones
As you work on this assignment, you can use the milestones below to inform your development process:

Milestone 1: Set up a program that takes a string input and converts all the letters to lowercase. Start implementing algorithm 1: create a counter variable and iterate through the characters of the String, incrementing this each time a vowel is encountered which is not preceded by a space or is at the start of the String. So at the end of the loop this counts the number of vowels that are not at the start of a word.

Milestone 2: Add further conditions (using else if) in your loop to count any non-vowel characters which appear immediately after the same character. Make a new empty String to hold the shortened message at the start of the code, then add a final else condition in the loop to add all characters which were not vowels or repeated letters to this String. Then print the statements for algorithm 1 using your counts and shortened message.

Milestone 3: Start implementing algorithm 2 by writing code that iterates through the String and checks that each character is not a space and has not already appeared in the word before that point. You will need to use nested loops - an outer loop to iterate through the String characters and an inner loop that looks through the previous characters up to that point - and a flag variable to record if a letter was found in the inner loop. Use a counter variable to count all such "unique" characters in the String.

Milestone 4: Add a second inner loop inside the outer loop from the previous which counts all appearances of a character that passes the tests from milestone 3. Add the character and the number of times it appears to another shortened message String (which should start as blank String). Finally, print the statements for algorithm 2 using your unique character count and shortened message.

Answers

Answer:

Scanner scan = new Scanner(System.in);

System.out.println("Type the message to be shortened");

String msg = scan.nextLine();

System.out.println();

msg = msg.toLowerCase();

String newStr = "";

System.out.println("Algorithm 1");

int vowels = 0;

int repeats = 0;

for(int i = 0; i < msg.length(); i++)

{

if((msg.substring(i, i +1).equals("a") || msg.substring(i, i+1).equals("e") || msg.substring(i, i +1).equals("i") || msg.substring(i, i+1).equals("o") || msg.substring(i, i +1).equals("u")))

{

if(i != 0 && !msg.substring(i -1, i).equals(" "))

{

vowels++;

}

else

newStr += msg.substring(i, i +1);

}

else if(i != 0 && msg.substring(i, i +1).equals(msg.substring(i -1, i)))

{

repeats++;

}

else

{

newStr += msg.substring(i, i +1);

}

}

System.out.println("\nAlgorithm 1");

System.out.println("Vowels removed: " + vowels);

System.out.println("Repeats removed: " + repeats);

System.out.println("Algorithm 1 message: " + newStr);

System.out.println("Algorithm 1 characters saved: " + (vowels + repeats));

algorithm2(msg);

}

public static void algorithm2(String msg)

{

String alg2Msg = "";

int uniqueLetters = 0;

// Iterate through each letter in msg

for(int i=0; i < msg.length(); i++)

{

String ltr = msg.substring(i,i+1);

// Only process if this character is not a space

if(!ltr.equals(" "))

{

/* Check whether this character has already appeared by

* iterating through characters from start up to the current

* letter and using a boolean flag variable.

*/

boolean alreadyUsed = false;

for(int j=0; j<i; j++)

{

if(msg.substring(j,j+1).equals(ltr))

{

alreadyUsed = true;

}

}

/* If this character hasn't already appeared,

* iterate through the rest of the characters

* and count how many times it appears.

*/

if(!alreadyUsed)

{

uniqueLetters++;

int count = 0;

for(int j=i; j<msg.length(); j++)

{

if(msg.substring(j,j+1).equals(ltr))

{

count++;

}

}

alg2Msg += count + ltr;

}

}

} //end for loop

System.out.println("\nAlgorithm 2");

System.out.println("Unique characters found: " + uniqueLetters);

System.out.println("Algorithm 2 message: " + alg2Msg);

System.out.println("Algorithm 2 characters saved: " + (msg.length() - alg2Msg.length()));

} //end algorithm2

}

Explanation:

Here you go!

What are the first letters of each of the 3 main colors in javaScript? (seperate with commas)

Answers

Answer:

R, G, B

Explanation:

Red, Green, Blue

How comfortable are you relying on others to achieve your performence goals?

Answers

Answer:

Tbh I don't like to depend on people to achieve my goals but if I want to depend on someone I first have to know them really well and see if I can trust them so I'm really comfortable with people I know but if it's a a random person so I don't think I will be comfortable

Business intelligence (BI) is a narrow term that refers to specific architectures, tools, databases, analytical tools, applications, and methodologies. (True/False)

Answers

True. Business intelligence (BI) is a term that specifically refers to the various architectures, tools, databases, analytical tools, applications, and methodologies that are used to gather, store, analyze, and present business information in a way that helps organizations make more informed decisions.

True. Business intelligence (BI) refers to specific architectures, tools, databases, analytical tools, applications, and methodologies that are used to collect, analyze, and present data for better decision-making in a business context. These components work together to help organizations make more informed decisions and improve overall performance.

Business intelligence (BI) includes the techniques and strategies companies use to analyze data and manage business information. The main functions of business intelligence technology include reporting, online analytics, analytics, dashboard development, data mining, mining techniques, complex operations, performance management, metrics, data mining, predictive analytics, and analytics.

Business intelligence (BI) includes the techniques and strategies companies use to analyze data and manage business information. The main functions of business intelligence technology include reporting, online analysis, analytics, dashboard development, data mining, process mining, complex operations, performance management, measurement, data mining, forecasting, and analysis.

Learn more about the Database:

brainly.com/question/30634903

#SPJ11

character strings and dates in the where clause must be enclosed with single quotation marks (' '). true or false?

Answers

The given statement "Character strings and dates in the where clause must be enclosed with single quotation marks" is True because if you do not use single quotation marks, the database engine may misinterpret the character string or date as a column name or produce an error due to incorrect syntax.

When using character strings and dates in the WHERE clause of SQL queries, it is essential to enclose them in single quotation marks (' '). This is because SQL treats these data types differently than numerical values. Enclosing them in single quotation marks ensures that the database engine correctly interprets them as character strings or dates.

Character strings are sequences of characters, such as words or sentences, that must be treated as a single entity. Dates are specific points in time, typically represented in a standard format like "YYYY-MM-DD." Both character strings and dates are non-numeric data types and therefore need to be differentiated from numerical values in the query.

For example, when filtering records based on a character string or a date, the correct syntax would be:

SELECT * FROM tableName WHERE columnName = 'stringValue';

or

SELECT * FROM tableName WHERE columnName = 'YYYY-MM-DD';

If you do not use single quotation marks, the database engine may misinterpret the character string or date as a column name or produce an error due to incorrect syntax. Always enclosing character strings and dates in single quotation marks in the WHERE clause is a crucial step for accurate and error-free SQL queries.

Know more about Single quotation marks here:

https://brainly.com/question/30880638

#SPJ11


HELP PLEASEEEE!!!!!!!

HELP PLEASEEEE!!!!!!!

Answers

This is too little points for a question I’m sorry.

What will happen if both indent marker and tab stop applied in formatting the measurement layout of your document? Can both be applied at the same time?

Answers

Answer:

Explanation:

indent marker:

indent markers are located to the left of the horizontal ruler, and they provide several indenting options like left indent, right indent, first line indent and hanging indent. they allow you to indent paragraphs according to your requirements.

tab stop:

a tab stop is the location where the cursor stops after the tab key is pressed. it allows the users to line up text to the left, right, center or you can insert special characters like a decimal character, full stops, dots or dashed lines or can even create different tab stops for all the text boxes in a publication.

yes both can be applied at the same time. you do the settings according to the formatting of your layout.

which camera is interchangeable

freeform

hybrid

DSLR

point and shoot

Answers

Answer:

DSLR

Explanation:

Double check my answer

Which utility causes the computer to run slow? defragmentation utility OR compression utility?

Answers

Answer:

compression

Explanation:

Which tab is used to configure editing restrictions in Word 2016? Review References Security Developer

Answers

Answer:

Review Tab is the correct answer to the given question .

Explanation:

Giving the permission to file in word 2016

Click on the Review tab and select the restrict tab .Chose the option allow this type of editing .After that choose the option No changes .Pick the section of the document they want to authorize the adjustments.After that there are multiple option are seen select accordingly  as user need and press ok button .Click on the start permission there is option is seen Start enforcement and press the button option start Enforcing Protection.After that feeding the password if the user need the password is in encrypt form then press encrypt option and click ok .

If the user need to read the file

Click on the Review tab and select the restrict tab .After that choose the option "Stop Protection" .Giving the password you are feeding in the permission of file  .Finally the user will edit the document

Answer:

It's D developer!!!

Explanation:

Took the test and got it right!!!!!!!

a company has decided to leverage the web conferencing services provided by a cloud provider and to pay for those services as they are used. the cloud provider manages the infrastructure and any application upgrades. this is an example of what type of cloud delivery model?

Answers

This represents an illustration of an internet transportation paradigm that uses software as a service.

What use does conferencing serve?

Digital communication increases output, saves so much time, lowers travel costs, and fosters collaboration in general. The benefit using video conferencing is its capacity to enable all of these advantages without necessitating continuous travel for face-to-face interaction.

What are services for video conferencing?

An simultaneous, visual communication between two or maybe more distant people via the internet that mimics a face-to-face conference is known as video conferencing. Because that brings together individuals who ordinarily would never be able to interact facial expression, video conferencing is crucial.

To know more about conferencing services visit:

https://brainly.com/question/13650087

#SPJ4

Decrypt this secret message if your able to a lot will come..

Decrypt this secret message if your able to a lot will come..

Answers

dNch/dy=8000

Failure

Failure

Failure

Decrypt this secret message if your able to a lot will come..

The Decrypt message is

dNch/dy=8000FAILUREFAILUREFAILURE

To decrypt / decipher an encoded message, it is necessary to know the encryption used (or the encoding method, or the implemented cryptographic principle).

To decrypt the given message, consider the mirror image of each value as

First, the message in first line is the mirror image of alphabets as which coded as

dNch / dy = 8000

and, the remaining three lines have same values which is the mirror image of the word "FAILURE".

Learn more about Encryption here:

https://brainly.com/question/30225557

#SPJ4

What are the parts and function of computer windows​?

Answers

A title bar, menu bar, windows menu, minimise, maximise, restore, close, sizing border, client area, horizontal scroll bar, and vertical scroll bar are some of the components found in an application window.

The main window, which is always created by a graphical Windows-based application, acts as the main point of contact between the user and the programme. To complete activities connected to the primary window, most apps also produce other windows, either directly or indirectly. Each window participates in the output display and user input processes.

The system also creates a taskbar button for each application when you launch it. The application icon and title are located on the taskbar button. The taskbar button for the programme is seen pressed when it is running.

All of these elements are normally seen in the main window of an application. These elements are depicted in a typical main window in the figure that follows.

Learn more about Windows here:

https://brainly.com/question/29976015

#SPJ4

What kind of route is created when a network administrator configures a router to use a specific path between nodes?.

Answers

The kind of route which is created when a network administrator configures a router to use a specific path between nodes is known as a Static route.

What is the function of the Router?

A router is a device that effectively links two or more networks or subnetworks in order to manage traffic by forwarding data packets and information to their intended IP addresses.

A static route is a type of pathway that data packets must travel in order to reach a specific network or host. This type of route is remarkably constructed when a network administrator configures a router to use a specific path between nodes.

Therefore, a static route is a kind of route that is created when a network administrator configures a router to use a specific path between nodes.

To learn more about Router, refer to the link:

https://brainly.com/question/24812743

#SPJ1

which folder will automatically upload a file saved in it to your onedrive account? select all that apply from the list on the right, then click done. One drive, Documents, and Personal (anything under one drive)

Answers

The folder that will automatically upload a file saved in it to your OneDrive account is the OneDrive folder.

Any file saved in the OneDrive folder will automatically be uploaded to your OneDrive account. This means that the correct answer from the list on the right is "OneDrive." The "Documents" and "Personal" folders will not automatically upload files to your OneDrive account unless they are saved within the OneDrive folder. Therefore, the correct answer is OneDrive.

This means that the file is uploaded to your OneDrive account and can be accessed from any device with internet access. Any changes you make to the file on one device will be automatically synced with the version in the cloud and across all other devices linked to your OneDrive account.

Learn more about OneDrive account here:https://brainly.com/question/28334567

#SPJ11

Animal wisdom/ the last wolf .compare and contrast the overall feeling of each poem

Answers

List the poem please. I won’t be able to answer without it.

What happens if you pin a document in your Recent Documents area?

Answers

If you pin a document in your recent documents area, then the document will remain prioritized on the top of the list of documents

Answer:

A

Explanation:

A

Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called

Answers

Analysis tools such as query-by-example and a specialised programming language called SQL facilitate examining all or selected data, querying the database, and generating reports.

Data collection and analysis technologies are used to collect, evaluate, and present data for a range of applications and industries. They take unprocessed data and turn it into meaningful knowledge that businesses can use to make better choices. A data analyst may operate in a range of sectors, including operations, marketing, and finance. For instance, their findings might result in lower shipping costs. different viewpoints on consumer behaviour. Among the numerous types of data analysis tools, three categories stand out as particularly essential: Applications for Excel, R, Python, and business intelligence (BI).

Learn more about Analysis tools from

brainly.com/question/13994256

#SPJ4

what is a workbook? help please

what is a workbook? help please

Answers

Answer:

A wordbook is a book with questions for you to answer.

Explanation:

I used workbooks to learn when I was small, it's like many worksheets in a book. hop this helps :D

16
Mackenzie is the network administrator for a large security corporation. What task
might Mackenzie perform as part of her job?
O answering calls from customers who need help
9
developing a website for the corporation
12
connecting a new computer to the network
15
testing a new video game before its release

Answers

Answer:

Connecting a new computer to the network.

Answer:

C. Connecting a new computer to the network

Explanation:

That is part of the job and the test say it is correct.


You can enter more than one element of data in the same field. *

True
False

Answers

Answer:

true

Explanation:

im smart

Other Questions
a(n) _____ is any intermediary with legal authority to act on behalf of the manufacturer. sachant qu'un atome demercure possge 201 nuclons estime la masse de l'atome en explicitant les aproximatimations effectue Where does the moon get the light that it "shines" to the earth? the costs of carrying inventory include the costs of . (check all that apply.) multiple select question. delivering goods to customers spoilage theft storage obsolescence A wave traveling at 230 m/sec has a wavelength of 2.1 meters. What is the frequency of this wave? Is there a rematch after rematch Yes or no This question is about sound waves and light waves. The table shows pricing information for two pizzas. How many toppings wouldnumber 13 only A 70.0 kg astronaut is training for accelerations that he will experience upon reentry. He is placed in a centrifuge (r = 10.0 m) and spun at a constant angular velocity of 16.3 rpm. Answer the following: What is the angular velocity of the centrifuge in ? What is the linear velocity of the astronaut at the outer edge of the centrifuge? What is the centripetal acceleration of the astronaut at the end of the centrifuge? How many gs does the astronaut experience? What is the centripetal force and net torque experienced by the astronaut? Give magnitudes and directions. which activity will best help prevent the common cold? a. Washing food prep surfaces b. Covering a sneeze c. Wearing sandals in public showers d cleaning bird cage regularly ____ is the provision of the medicare part d prescription drug plan that offers pharmacists free education to improve medication use and reduce the number of adverse drug events The Treaty of Versailles forced Germany to: RKI Instruments borrowed $4,300,000 from a private equity firm for expansion of its facility for manufacturing carbon monoxide monitors. The company repaid the loan after 1 year with a single payment of $5,225,000. What was the interest rate on the loan decsribe the types of employment with relevant examples Determine the focal length of a concave mirror whichproduces an image which is 8cm behind the mirror when the object is4 cm from the mirror outline the reason for gay luccas law of volume Please help me answer! what is enthalpy? responses the heat absorbed or released during a phase change the heat absorbed or released during a phase change the heat absorbed during an endothermic reaction the heat absorbed during an endothermic reaction the heat given off during an exothermic reaction the heat given off during an exothermic reaction the heat content of a system at constant pressure Translate the short prayer taken from Chaucer's writing into Modern English.Wherefore I biseke yow mekely, for the mercy of God, that ye preye for me that Christ have mercy on me and forgeve me my giltes. Sketch a graph ofy=3(x 2)(x + 1) (x 4)ASAPP!