What do hard disk drive use to store data

Answers

Answer 1
A hard disk stores and retrieves data using magnetic storage

Related Questions

Why is it useful to teach Karl new commands

Why is it useful to teach Karl new commands

Answers

Answer:

It's important to teach karl more commands so karl can do more tasks and create more complex algorithms

Explanation:

it’s useful because they would know what to do when you say something . example of you say turn left they would not know what to do because they have not been taught . that’s why you should teach them new commands .

What section in an ethernet frame will you find a Virtual Local Area Network (VLAN) header?
Frame Check Sequence
Payload
EtherType field
Preamble

Answers

Answer:

Preamble

Explanation:

In the computer network , the ether-net is the frame of link layer protocol data. This frame is used ether net with physical layer of transport mechanism. The ether net frame is of different type.

The ether-net IIThe Novel raw IEEE 802.3IEEE 802.2 LLCIEEE 802.2 SNAP

Each of the Ethernet frame started from Ether net header. It contains the source and the destination. The MAC address is called its first two address.

An __________ hard drive is a hard disk drive just like the one inside your, where you can store any kind of file.

Answers

An external hard drive is a hard disk drive just like the one inside your computer, where you can store any kind of file.

These drives come in various sizes, ranging from small portable drives that can fit in your pocket to larger desktop-sized drives with higher storage capacities. They often offer greater storage capacity than what is available internally in laptops or desktop computers, making them useful for backups, archiving data, or expanding storage capacity.

Overall, external hard drives are a convenient and flexible solution for expanding storage capacity and ensuring the safety and accessibility of your files.

Which of the following is a correct description of object-oriented programming (OOP)?

Answers

The correct description of object-oriented programming (OOP) is Object-oriented programming (OOP) is a style of computer programming (software design) in which the sorts of operations (functions) that can be performed on a data structure are also defined by the programmers.

What does "object-oriented programming" mean?

Programming in the object-oriented (OOP) manner identifies classes of objects that are closely related to the methods (functions) with which they are associated. It also covers the concepts of attribute and method inheritance.

Therefore, A programming paradigm known as "object-oriented programming" is built around the idea of "objects," which are capable of holding both code and data in the form of fields and procedures, respectively. Procedures related to objects are a typical characteristic.

Learn more about object-oriented programming from

https://brainly.com/question/14078098
#SPJ1

Jose is very careful about preventing malware from infecting his computer. In addition to avoiding suspicious email attachments and resisting the
temptation of clicking on pop-up ads, which of the following methods could Jose use to keep his computer safe?

Answers

Answer: There is many apps on the computer that may help Jose. Look up malware or software protection and perhaps you'll find one you like and that fits his computer. I hope this helps Jose!!!

Explanation:

Many adds pop up for safety and protection for your computer, the hard part is knowing which ones are true and which ones are false! I wouldn't risk buying any plans in that area unless your positive they are real. There are free apps that can help you without paying for them. I hope this helps!

Part A
Step 1 Starting at MIDNIGHT, (12:01am) ending 3 days later (72hr) at MIDNIGHT (11:59pm) You can start any day of the week, upto Sat Mar 04.

 For a minimum of 3 consecutive days monitor the time you spend doing the 8 different activities listed below
NOTE: Avoid using weekends only in your monitoring and try to stay with mid-week,
e.g. Tues, Wed, Thurs, where majority of days are mid-week.
 Use the attached time sheets to record blocks of time. Round off to the nearest hour. Precision isn’t the goal. e.g. 2hrs and 20 minutes, would be rounded down to 2 hours. 2 hrs and 30 minutes would be rounded up to 3 hrs.
 The full 24 hours of each day must be accounted for.
The following 8 categories are recommended to cover the majority of possible activities one might perform in the course of a day.

 Sleep
 Personal maintenance (showers, laundry, housecleaning, grocery shopping, family requirements etc.)
 Travel (to work, to school, or for appointments)
 Work hours (total hours at the workplace, excluding lunch or breaks)
 School (total hours in classes, plus time spent, studying, re-writing notes, completing assignments, time on blackboard)
 Fitness (formal or informal, attending the gym or walking home from work)
 Recreation (other than fitness related, TV, Movies, Leisure reading, online shopping, crafts, Video games, children’s sports activities, dates, coffee meet ups)
 Volunteer activities (United Way, Big Brothers/Sisters, your religious institution activities, PTA with schools)


Three day's activities
Time day day day
Activities Activities Activities
12:01-
1:00am
1:00am-
2:00am
2:00am-
3:00am
3:00am-
4:00am
4:00am
5:00am
5:00am-
6:00am
6:00am=
7:00am
7:00am-
8:00am
8:00am-
9:00am
9:00am-
10:00am
10:00am
11:00am
11:00am-
12:00pm
12:00pm
1:00pm
1:00pm-
2:00pm
2:00pm-
13:00pm
3:00pm-
4:00pm
4:00pm-
5:00pm
5:00pm-
6:00pm
6:00pm-
7:00pm
17:00pm-
8:00pm
8:00pm-
9:00pm
9:00pm-
10:00pm
10 00pm
11:00pm
11:00pm-
11:59pm

Answers

I can provide you with guidance on how to fill in the time sheets for the three-day activity monitoring.

How to fill in the time sheets

To start, divide the time sheet into 24-hour intervals for each of the three days. Label the days as Day 1, Day 2, and Day 3. Then, create a row for each of the eight activity categories listed in the instructions: Sleep, Personal Maintenance, Travel, Work Hours, School, Fitness, Recreation, and Volunteer Activities.

For each hour of the day, estimate the amount of time you spent on each activity category and record it in the corresponding box on the time sheet. Remember to round off to the nearest hour as instructed in the guidelines.

Be sure to account for the full 24 hours of each day, and try to be as accurate as possible in your estimates. The purpose of this activity is to gain insight into how you spend your time and identify any areas where you may want to make adjustments to improve your daily routine.

Read more about activity sheets here:

https://brainly.com/question/19788171

#SPJ1

Assuming there are 7.481 gallons in a cubic foot. Write a program that asks the user to enter a number of gallons, and then displays the equivalent in cubic feet.


The program must use assignment operators, cout’s, cin’s, and declaration of variables.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that asks the user to enter a number of gallons.

Writting the code:

#include <iostream>

using namespace std;

int main()

{

      float gallons, cufeet;

      cout << "\nEnter quantity in gallons : ";

      cin >> gallons;

      cufeet = gallons / 7.481;

      cout << "Equivalent in cublic feet is " << cufeet << endl;

      return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

Assuming there are 7.481 gallons in a cubic foot. Write a program that asks the user to enter a number

For this assignment, you will be writing a Deque ADT (i.e., LastnameDeque). A deque is closely related to a queue - the name deque stands for "double-ended queue." The dierence between the two is that with a deque, you can insert, remove, or view, from either end of the structure. Attached to this assignment are the two source les to get you started:

Answers

Answer:

Explanation:

The objective here is write a Deque ADT code by using Deque.java - the Deque interface; (i.e the specification we must implement) and BaseDeque.java which is  the driver for Deque testing.

For the computation of the code and its output I have written them in a word document due its long array which is much more than the 5000 character  this answer box can accommodate.

SEE THE ATTACHED FILE BELOW.

how do I make my own algorithms ​

Answers

Answer:

Step 1: Determine the goal of the algorithm. ...

Step 2: Access historic and current data. ...

Step 3: Choose the right model(s) ...

Step 4: Fine tuning. ...

Step 5: Visualise your results. ...

Step 6: Running your algorithm continuously.

Get a basic understanding of the algorithm.
Find some different learning sources.
Break the algorithm into chunks.
Start with a simple example.
Validate with a trusted implementation.
Write up your process.

help i was building my pc and i pushed the cpu into the socket really hard until there was an audible crack and it went into the socket but now my pc wont turn on. i thought it was the bromine that i spilled onto the motherboard so i took the pc to the sink, plugged it in and doused it in the stream of tap water but it still wont turn on

Answers

Try smashing it with a hammer, always helped me

Answer:

light it on fire, worked for me tbh

Assume there is a variable, h already associated with a positive integer value. Write the code necessary to count the number of perfect
squares whose value is less than h, starting with 1. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square of
another integer (in this case 3*3, 44, 55, 6*6 respectively).) Assign the sum you compute to a variable q For example, if h is 19, you
would assign 4 to q because there are perfect squares (starting with 1) that are less than h are: 1, 4, 9, 16.

Answers

Here's the code to count the number of perfect squares less than the given value h:

import math

h = 19  # Assuming h is already assigned a positive integer value

count = 0  # Initialize the count of perfect squares to 0

for i in range(1, int(math.sqrt(h)) + 1):

   if i * i < h:

       count += In this code, we use a for loop to iterate over the range of numbers from 1 to the square root of h (inclusive). We check if the square of the current number (i * i) is less than h. If it is, we increment the count variable.

After the loop, the final count of perfect squares less than h is stored in the variable count. Finally, we assign the value of count to the variable q as requested.1

q = count  # Assign the count of perfect squares to the variable q.

for similar questions on programming.

https://brainly.com/question/23275071

#SPJ8

Write some keywords about touchscreen

Answers

\({\huge{\underline{\bold{\mathbb{\blue{ANSWER}}}}}}\)

______________________________________

\({\hookrightarrow{Keywords}}\)

touchscreentouch inputmulti-touchgesturesstylusresistivecapacitivehaptic feedbacktouch latencytouch accuracytouch sensitivitytouch screen technologytouch screen interfacetouch screen displaytouch screen monitortouch screen laptoptouch screen phone

Question 18 of 20:
Select the best answer for the question.
18. Illegally downloading media such as music or movies is called
O A. plagiarism.
OB. harassment.
OC. bullying.
D. piracy.

Answers

Answer:

A is the answer

Explanation:

we don't have to bully some one if they are not nice or their skin colour

Select the correct answer. Which symbol denotes markup tags? A. {} B. < >. C. ( ) OD. [] ​

Answers

Answer:

B

Explanation:

Explain the undesirable characteristics of the DRAM that required the frequent refresh and state the effect of the refresh operation.

Answers

 The  undesirable characteristics of the DRAM that required the frequent refresh and state the effect of the refresh operation.

Memory is known to be Volatile.It slows performancePower consumption is said to be very high when compared to other options.Data in storage cells are those that needs to be refreshed.It is said to be slower when compared to SRAM.

What is the Dynamic Random Access Memory History?

The Dynamic Random Access Memory is known to be a technology that was said to have been made by Robert Dennard.

He was the one who was said to have  invented Dynamic Random Access Memory-DRAM.

It is known to be seen as  one of the most vital tool or developments in regards to computer technology as it is seen as a one-transistor Dynamic Random Access Memory (DRAM).

Therefore,   The  undesirable characteristics of the DRAM that required the frequent refresh and state the effect of the refresh operation.

Memory is known to be Volatile.It slows performancePower consumption is said to be very high when compared to other options.Data in storage cells are those that needs to be refreshed.It is said to be slower when compared to SRAM.

Learn more about DRAM from

https://brainly.com/question/26909389

#SPJ1

As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.

Answers

Answer:

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.

First, let's convert -9/2 to a decimal number: -9/2 = -4.5

Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:

1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM

Sign bit: Since the number is negative, the sign bit is 1: 1

Mantissa and exponent: Convert -4.5 into binary and normalize it:

-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2

Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)

Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101

Now, put the sign, exponent, and mantissa together: 1101 0010

So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.

B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.

To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:

Sign bit: 1

Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)

Mantissa: Smallest mantissa is 0000

The 8-bit representation is 1001 0000. Converting this to decimal:

-1 * 2^{-2} * 1.0000 which is -0.25.

The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.

C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.

To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:

Sign bit: 0

Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)

Mantissa: Largest mantissa is 1111

The 8-bit representation is 0110 1111. Converting this to decimal:

1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.

The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.

Explanation:

• List 2 examples of media balance:

Answers

Answer: balance with other life activities

spending time with family

studying / school work

Explanation:

What year was "scripting" first invented

Answers

Answer:

Late 1950's

Explanation:

I hope this helps, have a great day :)

Which vendor owns the software platform fusion?
A. Microsoft
B. Apple
C. SAP
D. Oracle

Answers

Answer:

D. Oracle is the answer.

In the program below, which variable has the same scope as strA?

def usernameMaker (strFirst, strLast):
return strFirst + strLast[0]

def passwordMaker (strA, numC):
if len(strA) > 4:
answer = dogName[0:3]
return answer + str(numC)
else:
return 'xk&' + str(numC)

Answers

Answer:

" numC " is the correct answer

Explanation:

The reason is that on line 3 of code it has "def passwordMaker (strA, numC):"

strA and numC are both in "( )" which is the scope and only things inside are varibles. Also its the only line that has  strA in it.

The scope of a variable is the extent at which the variable can be referenced.

The variable with the same scope as strA is variable numC

From the program, we have the following function definition

def passwordMaker (strA, numC):

Variables strA and numC are declared along with the function passwordMaker

This means that:

Variables strA and numC have the same scope

Hence, the variable with the same scope as strA is variable numC

Read more about scopes of variables at:

https://brainly.com/question/17102008

How are BGP neighbor relationships formed
Automatically through BGP
Automatically through EIGRP
Automatically through OSPF
They are setup manually

Answers

Answer:

They are set up manually

Explanation:

BGP neighbor relationships formed "They are set up manually."

This is explained between when the BGP developed a close to a neighbor with other BGP routers, the BGP neighbor is then fully made manually with the help of TCP port 179 to connect and form the relationship between the BGP neighbor, this is then followed up through the interaction of any routing data between them.

For BGP neighbors relationship to become established it succeeds through various phases, which are:

1. Idle

2. Connect

3. Active

4. OpenSent

5. OpenConfirm

6. Established

QUESTION 9
Alex wants to center the title and his name on his cover page. Which of the following buttons should he press?

Answers

Alex if he wants to center the title and his name on his cover page, he has to press centered.

What are  cover page?

Cover pages is known to be the page that is made up of the title of sny article, books etc. It also include the name of your school, course name, etc.

Therefore, Alex if he wants to center the title and his name on his cover page, he has to press centered so as to be in the middle top of the document.

Learn more about cover page from

https://brainly.com/question/3602860

#SPJ1

When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.

Answers

Answer:

Parameter

Explanation:

q: When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.

a: Parameter

Wrtie down some containerization technology.

Answers

Answer:

Some containerization technologies are listed as follows: Docker, Docker Enterprise, Amazon Elastic Container Service, Container Linux, Amazon's AWS, Microsoft's Azure Container, etc.

Explanation:

Containerization technology is a computer technology that packages software codes and their dependencies in isolated user spaces called containers so that the software can run uniformly and consistently on any infrastructure, using a shared operating system.  It is the modern alternative and companion to virtualization.  In simple terms, containerization is the process which packages an application with the required libraries, frameworks, and configuration files so that it can efficiently run in various computing environments.

c = 1 sum = 0 while (c < 10): c = c + 2 sum = sum + c print (sum)

Answers

Answer:

35

Explanation:

The loop runs 5 times with the following values of c: 1,3,5,7,9 at the start of the iteration, and 2 higher at the end. So the values that get added to sum are: 3,5,7,9,11, hence sum = 3+5+7+9+11 = 35.

Always look carefully at the last iteration of a loop. At the last iteration, when c equals 9, it is still valid to make another iteration. However, 11 gets added to the sum.

\(\huge \boxed{\sf 35}\)

       c = 1, sum = 0

(The loop runs)

1 < 10, c = 1 + 2, sum = 0 + 3

       c = 3, sum = 3

3 > 10, c = 3 + 2, sum = 3 + 5

       c = 5, sum = 8

5 > 10, c = 5 + 2, sum = 8 + 7

       c = 7, sum = 15

7 > 10, c = 7 + 2, sum = 15 + 9

       c = 9, sum = 24

9 > 10, c = 9 + 2, sum = 24 + 11

       c = 11, sum = 35

(The condition is false and the loop ends)

11 > 10, print sum

What can relaxation help to reduce?

body image

stress

self-control

self-respect

Answers

It can reduce stress

Create Task for AP computer science principles python

Answers

The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Thus, The more comprehensive of the two courses, AP Computer Science Principles teaches students the fundamentals of computer science while emphasizing teamwork.

Although computer science is a useful subject to study, is the exam challenging to pass.

For aspirant AP Computer Science Principles students, it's a good thing that the subject isn't ranked in the top 10 most challenging AP courses. But that doesn't make it any less difficult. Visit our AP Computer Science Principles resource page.

Thus, The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Learn more about AP program, refer to the link:

https://brainly.com/question/3121467

#SPJ1

which of the following services provides, upon network request, ip addresses to devices that need them?

Answers

(Option B.) The DHCP server is responsible for providing IP addresses to devices on a network when requested. It is used to dynamically assign IP addresses to devices in a local network, allowing the devices to communicate with each other.

Which of the following services provides, upon network request, IP addresses to devices that need them?

Option B. A DHCP (Dynamic Host Configuration Protocol) server.

The DHCP server can also be used to configure additional settings, such as the subnet mask, gateway address, and DNS server information. This allows for efficient management of IP addresses and other network settings.

The DHCP server can be incredibly useful in managing a network, as it allows for efficient assignment of IP addresses and other necessary settings. This automates the process of assigning IP addresses to devices, ensuring that the network is organized and running smoothly. Additionally, the DHCP server allows for easy changes to network settings when needed.

Since the task is not complete, here's the full answer:

Which of the following services provides, upon network request, IP addresses to devices that need them?

A. DNS ServerB. DHCP ServerC. RouterD. Firewall

Learn more about Internet: https://brainly.com/question/27003790

#SPJ4

Describe the examples of expressions commonly used in business letters and other written communications with some clearer alternatives:

Answers

When writing business letters and other written communications, it is important to use expressions that convey your message clearly and professionally.

Here are some examples of commonly used expressions in business letters along with clearer alternatives:

1. "Enclosed please find" → "I have enclosed"

  This phrase is often used to refer to attached documents. Instead, simply state that you have enclosed the documents.

2. "As per our conversation" → "As we discussed"

  Rather than using a formal phrase, opt for a more conversational tone to refer to previous discussions.

3. "Please be advised that" → "I want to inform you that" or "This is to let you know that"

  Instead of using a lengthy phrase, use more straightforward language to convey your message.

4. "In regard to" → "Regarding" or "Regarding the matter of"

  Use a more concise phrase to refer to a specific topic or issue.

5. "We regret to inform you" → "Unfortunately" or "I'm sorry to say"

  Instead of using a lengthy expression, choose simpler words to deliver disappointing news.

Remember, it is important to maintain a professional tone while also ensuring that your message is clear and easy to understand. Using simpler alternatives can help improve the readability of your business letters and written communications while still maintaining a polite and professional tone.

For more such questions on letters,click on

https://brainly.com/question/18319498

#SPJ8

Describe how the data life cycle differs from data analysis

Answers

The data life cycle and data analysis are two distinct phases within the broader context of data management and utilization.

The data life cycle refers to the various stages that data goes through, from its initial creation or acquisition to its eventual retirement or disposal. It encompasses the entire lifespan of data within an organization or system.

The data life cycle typically includes stages such as data collection, data storage, data processing, data integration, data transformation, data quality assurance, data sharing, and data archiving.

The primary focus of the data life cycle is on managing data effectively, ensuring its integrity, availability, and usability throughout its lifespan.

On the other hand, data analysis is a specific phase within the data life cycle that involves the examination, exploration, and interpretation of data to gain insights, make informed decisions, and extract meaningful information.

Data analysis involves applying various statistical, mathematical, and analytical techniques to uncover patterns, trends, correlations, and relationships within the data.

It often includes tasks such as data cleaning, data exploration, data modeling, data visualization, and drawing conclusions or making predictions based on the analyzed data.

The primary objective of data analysis is to derive actionable insights and support decision-making processes.

In summary, the data life cycle encompasses all stages of data management, including collection, storage, processing, and sharing, while data analysis specifically focuses on extracting insights and making sense of the data through analytical techniques.

Data analysis is just one component of the broader data life cycle, which involves additional stages related to data management, governance, and utilization.

To know more about life cycle refer here

https://brainly.com/question/14804328#

#SPJ11

Other Questions
The area of a rectangular room is 750 square feet. The width of the room is 5 feet less than the length of the room. Which equations can be used to solve for y, the length of the room? Select three options. y(y + 5) = 750 y2 5y = 750 750 y(y 5) = 0 y(y 5) + 750 = 0 (y + 25)(y 30) = 0 spanish translate1. She loves to go the the beach.2. She teaches physical education3. She would like to visit Australia How long does a dream typically last near the end of the sleep cycle, just before waking?A.about 5 minutesB.about 15 minutesC.about 30 minutesD.about 50 minutes pleaseeeee hurryy Select the true statement about the Thomas-Kilmann Conflict Styles Inventory.a.It is the only means of describing people's conflict styles.b.It identifies one of seven preferred conflict styles based on an individual's responses.c.It is able to account for different cultural worldviews.d.It is the best known means of describing people's conflict styles. Graph f(x) = - |x +4| - 3. Please hurry need help asap. ( Show me where the points go on paper. Not good at graphs. [ Will Mark Brainliest] Knowing that M-242 Nm, determine the maximum stress in the beam shown when the radius r ofthe fillets is 4 mm and when the radius r of the fillets is 8 mm. (Round the final answers to one decimal place.) 8 mm 2 80 mm 40 mm The maximum stress in the beam when the radius of the fillets is 4 mm i The maximum stress in the beam when the radius of the fillets is 8 mm is MPa. MPa. What did the shogun tell converted Japanese that they must do? What was a consequance if they did not obey? How were Christian Missionaries treated in Japan? What does the farmhouse in Animal Farm represent in the Russian Revolution? Sleep habits of New Yorkers. New York is known as the city that never sleeps". A random sample of 25 New Yorkers were asked how much sleep they get per night. Statistical summaries of these data are shown below. The point estimate suggests New Yorkers sleep less than 8 hours a night on average. Is the result statistically signicant? n x s min max25 7.73 0.77 6.17 9.78(a) Write the hypotheses in symbols and in words.(b) Check conditions, then calculate the test statistic, T, and the associated degrees of freedom.(c) Find and interpret the p-value in this context. Drawing a picture may be helpful.(d) What is the conclusion of the hypothesis test?(e) If you were to construct a 90% condence interval that corresponded to this hypothesis test, would you expect 8 hours to be in the interval? In OPQ, p = 9.7 inches, mQ=93 and mO=82. Find the length of q, to the nearest 10th of an inch. An object is moving through the my plane along the path: (t) = -4 + 36 cm and y(t) = ++ 1 cm where t is the time in seconds. a. Find the equation of the line tangent to the parametric equation at t = 2 sec. y b. What is the speed at t = 2 sec? speed- C. At what time is the object moving vertially at the rate of 12 cm/sec sec in the boy helow Make your own slogan on " Ascendance of Chinese Mestizos." in relation to this module.Briefly explain your slogan in not more than 200 words. project resource management is concerned with making effective use of the people involved with a project. group of answer choices true false A ball of mass 0.045kg bounces off a tile floor the velocity of the ball just before it hits the floor exerts an average force of 40.0n, find the maximum height of the ball after the impact with the floor You move out into the country and you notice every Spring there are more and more Deer Fawns that appear. You decide to try and predict how many Fawns there will be for the up coming Spring. You collect data to, to help estimate Fawn Count for the upcoming Spring season. You collect data on over the past 10 years. x1 = Adult Deer Countx2 = Annual Rain in Inchesx3 = Winter SeverityWhere Winter Severity Index:1 = Warm2 = Mild3 = Cold4 = Freeze5 = SevereRequired:Interpret the slope(s) of the significant predictors for Fawn Count (if there are any) after a 30% reduction, you purchase a dictionary for $30.80 what was the dictionary price before the reduction Consider the following facts.Robi is a humanoid robot.All humanoid robots have a master.Dodi is Robi's master.If all humanoid robots obey its master, then it is an obedient humanoid robot.Robi obeys Dodi.If all humanoid robots and its master being in the same location then it is a faithful humanoid robot.Robi and Dodi are in the central park.All faithful and obedient humanoid robots are good humanoid robots.Convert all the facts above into First Order Predicate Logic (FOPL).Based on your answer in (a), convert all predicates into clausal form.Based on your answer in (b), prove "Robi is a good humanoid robot". To what are 21st-century citizens of the world turning to in an effort to stop mans negative imprint upon the planet?Cultural teachingsThe ArtsScience and technologyAnimals What it the term for this description? Sperm cells travel through the cervix, uterus, and fallopian tubes to reach an egg. One sperm cell enters the egg. true or false? most long term care (ltc) services are provided informally by family and friends.