What is one feature that differentiates social media information systems (SMIS) from Web site applications? A user has to login to a Web site to use the special features. SMIS do not use browsers. A user can comment on a Web site. SMIS has more users than a Web site. SMIS has connection data

Answers

Answer 1

Answer:

A user has to login to a Web site to use the special features.

Explanation:

This is true because, even though website could be able to give the required information needed at that particular point in time, in order to use the special features found in the website, there is need to login into the website.

For example, Brainly which is a website needs the students to login in-order to ask his or her questions where not clarified with an expected answer gotten from the website.


Related Questions

Type the correct answer in the box. Spell all words correctly.
Julio Is a manager in an MNC. He has to make a presentation to his team regarding the life cycle of the current project. The life cycle should
follow a specific sequence of steps. Which style of presentation is best suited for Julio's purpose?
Jullo should make a presentation
Reset
Next
s reserved.

Answers

Answer:

Julio is a manager at an MNC. He has to make a presentation to his team regarding the life cycle of the current project. The life cycle should follow a specific sequence of steps. Which style of presentation is best suited for Julio's purpose? Jullo should give a speech.

Explanation:

Answer: linear

Explanation:

Just got it right.  Linear presentations are sequential.

Which type of photographer documents plants and weather in their natural habitat?

a
Portrait

b
Nature

c
Product

d
Scientific

Answers

B, plants and weather are part pf nature.

wap to calculate the simple interest for the given PTR​

Answers

Answer:

➢ C#include<stdio.h>int main(){float P , R , T , SI ;P =34000; R =30; T = 5;SI = (P*R*T)/100;printf("\n\n Simple Interest is : %f", SI);return (0);

\(Aiko \: Mizuki...\)

#CarryOnLearning

The top left corner of the Excel UI contains commands that are frequently used and is customizable. What is the name
of this area?
O window controls
O status bar
O ribbon
O Quick Access toolbar

Answers

Answer:

Explanation:

The "Office" button is located in the upper left corner of the window. Clicking the button displays a menu of basic commands for working with files, a list of recent documents, and a command for configuring application settings (for example, Excel Options).

Why would sheltering in place under one of these desks be a poor choice in the event of a tornado?

Answers

Answer:

The desks are flimsy. A massive amount of ammonia gas has been accidentally released near your office. You have a room without windows and relatively tightly sealed doors.

Explanation:

basically the desks can fly off easily because they are lightweight

Sheltering in place under one of these desks be a poor choice in the event of a tornado because the desks are light.

What is a tornado?

This is known to be a kind of destructive rotating column of air that is said to move from the bottom of a thunderstorm and way down into the ground.

Note that in the scenario above, Sheltering in place under one of these desks be a poor choice in the event of a tornado because the desks are light and it can be easily carried out by the wind.

Learn more about tornado from

https://brainly.com/question/2826797

#SPJ2

What does it mean, when a patch is displayed with a “key-shaped” symbol?

Answers

The patch needs to be purchased from the vendor, according to an icon in the shape of a key. Most of the fixes that are listed on the Patches tab can be patched using Qualys.

A security patch is what?

If you use an Android device, security updates tailored to that platform are frequently released. These upgrades, which resemble standard patches, are intended to increase security and correct any flaws. An Android security update often doesn't include any new features, at least not ones you'd notice.

What's the process for Qualys patch management?

Your remediation response time can be improved by automatically correlating vulnerabilities and patch data using Qualys Patch Management. due to the Qualys Cloud Agent's use in Qualys Patch Management.

To know more about Patches visit:-

https://brainly.com/question/30458260

#SPJ1

What advantages would there be to using both subsystems and logical partitions on the
same machine?

Answers

Answer:

Explanation:

Advantages of using subsystem and logical partitions on same machine

Subsystems and logical partitions on the same machine reduces the data backup function.Hence there is no need to take the backup regularly.It increases the hardware utilization.Resource availability is high and it provides security to the resources.

A cookie that lasts only until the browser is closed is called a ________ cookie. 1. session 2. persistent 3. temporary 4. timed

Answers

Answer:

Session Cookie

Explanation:

A session cookie is a file containing an identifier (a string of letters and numbers) that a website server sends to a browser for temporary use. When the browser closes at the end of a session, the file is deleted.

A session cookie is a document holding an identification, which would be a string of numbers and letters, that a web server sends to a browser for temporary use during a set period.

This file gets erased when the browser is closed after a transaction. The temporary cookie is also known as a transitory cookie.These cookies are only ever retained on a device until the web browser shuts down. Permanent cookies remain on your device after you have completed your browsing session until they expire or are erased, therefore A session cookie lasts till the browser was closed.

Therefore, the answer is "Option 2".

Learn more about the session cookie:

brainly.com/question/804307

What characteristics are common among operating systems

Answers

The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.

Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.

1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).

2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.

3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.

4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.

5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.

6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.

This includes user authentication, access control mechanisms, and encryption.

7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.

These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.

For more such questions characteristics,click on

https://brainly.com/question/30995425

#SPJ8

8. Give regular expressions with alphabet {a, b} for
a) All strings containing the substring aaa
b) All strings not containing the substring aaa
c) All strings with exactly 3 a’s.
d) All strings with the number of a’s (3 or greater) divisible by 3

Answers

Answer:

i think its C

Explanation:

What happens after the POST?

Answers

After the POST, the computer is ready for user interaction. Users can launch applications, access files, browse the internet, and perform various tasks depending on the capabilities of the operating system and the installed software.

After the POST (Power-On Self-Test) is completed during a computer's startup process, several important events take place to initialize the system and prepare it for operation. Here are some key steps that occur after the POST:

1. Bootloader Execution: The computer's BIOS (Basic Input/Output System) hands over control to the bootloader. The bootloader's primary task is to locate the operating system's kernel and initiate its loading.

2. Operating System Initialization: Once the bootloader locates the kernel, it loads it into memory. The kernel is the core component of the operating system and is responsible for managing hardware resources and providing essential services.

The kernel initializes drivers, sets up memory management, and starts essential system processes.

3. Device Detection and Configuration: The operating system identifies connected hardware devices, such as hard drives, graphics cards, and peripherals.

It loads the necessary device drivers to enable communication and proper functioning of these devices.

4. User Login: If the system is set up for user authentication, the operating system prompts the user to log in. This step ensures that only authorized individuals can access the system.

5. Graphical User Interface (GUI) Initialization: The operating system launches the GUI environment if one is available. This includes loading the necessary components for desktop icons, taskbars, and other graphical elements.

6. Background Processes and Services: The operating system starts various background processes and services that are essential for system stability and functionality.

These processes handle tasks such as network connectivity, system updates, and security.

For more such questions on POST,click on

https://brainly.com/question/30505572

#SPJ8

What unit on a digital camera gives added illusions

Answers

Vfx used for visual effects in the creation on any screen.. imagery that does not physically exist in life. Vfx also allow makers of films to create environments, objects, creature,ect..

.A card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables is called

Answers

Answer: Network interface controller

Explanation:

A network interface controller is also referred to as the network adapter or LAN adapter. It is simply a component of the computer hardware that is used to connects a computer system to a particular network.

It is a card that connects directly to the motherboard of the computer and has external sockets so that the computer can be connected to a network via cables.

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

CORRECT ANSWER GETS BRAINLIEST. HELP ASAP

What is the computer toolbar used for?

Groups similar icons together
Holds frequently used icons
Organizes files
Sorts files alphabetically

Answers

Answer:

holds frequently used icons

Answer:

gives you quick access to certain apps

A ______ can hold a sequence of characters such as a name.

Answers

A string can hold a sequence of characters, such as a name.

What is a string?

A string is frequently implemented as an array data structure of bytes (or words) that records a sequence of elements, typically characters, using some character encoding. A string is typically thought of as a data type. Data types that are character strings are the most popular.

Any string of letters, numerals, punctuation, and other recognized characters can be stored in them. Mailing addresses, names, and descriptions are examples of common character strings.

Therefore, a string is capable of storing a group of characters, such as a name.

To learn more about string, refer to the link:

https://brainly.com/question/17091706

#SPJ9

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art. You could, for example, change the brightness and blur it. Or you could flip colors around, and create a wavy pattern. In any case, you need to perform at least two transforms in sequence.

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art.

Answers

Attached an example of how you can modify the code to apply brightness adjustment and blur effects to the image.

What is the explanation for the code?

Instruction related to the above code

Make sure to replace   "your_image.jpg" with the path to your own image file.

You can   experiment with different image processing techniques, such as color manipulation, filtering,edge detection, or any other transformations to create unique artistic effects.

Learn more about code at:

https://brainly.com/question/26134656

#SPJ1

Add code to ImageArt to start with your own image and "do things to it" with the goal of making art.

4.2 Code Practice: Question 1
Help

4.2 Code Practice: Question 1Help

Answers

total = 0

nums = 0

while total <= 100:

   num = int(input("Enter a number: "))

   nums += 1

   total += num

print("Sum: {}".format(total))

print("Numbers Entered: {}".format(nums))

I hope this helps!

TCPDump is used by Wireshark to capture packets while Wireshark own function is:

a. to provide a graphical user interface (GUI) and several capture filters.
b. to act as an intrusion prevention system (IPS) by stopping packets from a black-listed website or packets with payloads of viruses.
c. to defend the network against TCP SYN Flooding attacks by filtering out unnecessary TCP packets.
d. yet to be defined.

Answers

Answer:

a. to provide a graphical user interface (GUI) and several capture filters

Explanation:

TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text

Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.

Which is more, 6 yards or 15 feet?​

Answers

Answer:

6 yards

Explanation:

if to convert 15 feet into yards it would 15/3 = 5

6 Yards because each yard is equivalent to 3 feet. 6 yards would be 18 feet which is more than 15 feet.

d' Explain each of the following i 100 Base-CX (10GBase-T Ethernet standards

Answers

Note that 100Base-CX is an Ethernet standard for 100 Mbps over short distances. While,

10GBase-T  - Ethernet standard for 10 Gbps over copper cables up to 100 meters.

How do they work?

1. 100Base-CX  -   It is an Ethernet standard that defines the specifications for transmitting data at a rate of 100 Mbps over a short distance using copper twisted pair cables with a maximum segment length of 25 meters.

It uses a balanced signaling scheme and is commonly used for connecting devices within a confined area, such as in-building networks.

2. 10GBase-T  -   It is an Ethernet standard that allows for data transmission at a rate of 10 Gbps over twisted pair copper cables. It utilizes advanced signaling techniques and supports a maximum cable length of 100 meters.

10GBase-T is widely used for high-speed network connections in data centers, enterprise networks, and other applications requiring high bandwidth.

Learn more about Ethernet standards at:

https://brainly.com/question/31063222

#SPJ1

Simplify the stated 5 Variable Boolean Expression using the Karnaugh Map method.
F(A,B,C,D,E)=∑▒〖(1,3,5,7,9,11,13,15,17,19,21,23,25,27,29,31)〗
With the following Don’t CareConditions
F(A,B,C,D,E)=∑▒〖(2,6,10,14,18,22,26,30)〗

Answers

To simplify the given 5-variable Boolean expression using the Karnaugh Map method, we need to create a Karnaugh Map with the variables A, B, C, D, and E.

The Karnaugh Map for a 5-variable expression would have 2^5 = 32 cells. We will represent the binary values of A, B, C, D, and E on the Karnaugh Map.

The given minterms in decimal representation are:

F(A,B,C,D,E) = ∑ (1,3,5,7,9,11,13,15,17,19,21,23,25,27,29,31)

The given don't care conditions in decimal representation are:

F(A,B,C,D,E) = ∑ (2,6,10,14,18,22,26,30)

To simplify the expression, we need to identify groups of adjacent 1s on the Karnaugh Map. The goal is to combine these groups to form simplified terms.

After mapping the given minterms and don't care conditions onto the Karnaugh Map, we can identify the following groups:

Group 1: A'CD'E' (minterms 1,3,17,19)

Group 2: A'CDE (minterms 5,7,21,23)

Group 3: AB'C'D'E' (minterms 9,11,25,27)

Group 4: ABCD'E' (minterms 13,15,29,31)

Now, we can combine these groups to simplify the expression:

F(A,B,C,D,E) = A'CD'E' + A'CDE + AB'C'D'E' + ABCD'E'

Simplifying further using Boolean algebra and simplification rules, we can simplify the expression as:

F(A,B,C,D,E) = A'CD'E' + A'CDE + AB'D'E'

Therefore, the simplified expression using the Karnaugh Map method is:

F(A,B,C,D,E) = A'CD'E' + A'CDE + AB'D'E'

For more questions on Boolean

https://brainly.com/question/30634817

#SPJ11

Kevin owns a toy company. How should he ensure that his customers are receiving a high-quality product Question 1 options: Offer a discount on future purchases to customers Repair products that have been sold to customers and are broken Survey customers and ask for suggestions Test a prototype

Answers

To ensure that his customers are receiving a high-quality product, Kevin can take a number of steps.

One option is to test a prototype before launching the final product to ensure that it meets the desired quality standards. Additionally, he can use customer feedback to improve the quality of the product. He can survey customers and ask for suggestions to understand their needs and preferences. Kevin can also offer a warranty or guarantee on his products and repair or replace products that have been sold to customers and are broken. By doing so, he can demonstrate his commitment to customer satisfaction and improve his company's reputation for producing high-quality products.

To know more about prototype visit:

https://brainly.com/question/28370530

#SPJ1


Self-Checkout Machine Software

Learning aim, A: Examine the computational thinking skills and principles of computer
programming

You are a junior programmer working for a software development company called CodeFirst
based in Burnley. You have been asked to design and develop a software that runs on a self-checkout machine at ASDA supermarket.

The software must be able to determine how much change to provide when the shopper
pays for a purchase with cash.
The program should begin by reading a number of pennies from the user as an integer.

Then the program should compute and display the denominations of the coins that should be
used to give that amount of change to the shopper. The change should be given using as
few coins as possible. Assume that the machine is loaded with 1 penny, 2 penny, 5 penny, 10 penny, 20 penny, 50 penny, 1 pound, and 2 pounds.

Answers

Answer:

This function takes as input the number of pennies owed to the shopper and returns a list of coins that should be used to give that amount of change to the shopper. The change is given using as few coins as possible.

a democratic government has to respect some rules after winning the elections. Which of these points is not a part of those rules

Answers

After coming to power, a democratic administration is bound to follow certainrules and regulations. And Office-bearers are not accountable is not a part of those   rules.

How is this so?

In a democratic administration,office-bearers are indeed accountable as they are bound by rules and regulations.

The accountability ensures transparency,ethical conduct, and adherence to the principles of democracy.

Office-bearers are expected to uphold the laws and serve the interests of the people they represent.

Learn more about  democratic administration at:

https://brainly.com/question/31766921

#SPJ1

You will need to convert the following binary numbers to hexadecimal. Table 1 contains 16 problems. The first one is completed for you.

Answers

Answer:

where is the table pls.........???..????

determine the socket to which the ip address is beaconing. the password to the 7-zip file is infected

Answers

A Web beacon is an invisible, “graphic,” but nonetheless concealed image that gets downloaded to your computer. These minute "objects," which are implanted, are “activated” when you visit the website or open the email.

What IP address is beaconing?

Beaconing is the process by which malware contacts a C2 server to request instructions or exfiltrate data at specified asynchronous intervals.

Malware communicates with a C2 server via “beaconing” to obtain instructions or exfiltrate data at predetermined asynchronous intervals.

Therefore, The malware's instructions are hosted on the C2 server, where they are later carried out on the infected machine.

Learn more about IP address here:

https://brainly.com/question/16011753

#SPJ1

Write a program in python that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:


As long as x is greater than 0

Output x % 2 (remainder is either 0 or 1)

x = x // 2


Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.


Ex: If the input is:


6


the output is:


110


The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.

def int_to_reverse_binary(integer_value)

def string_reverse(input_string)


1:Compare output

2 / 2

Input

6

Your output

110

2:Unit test

0 / 2

Convert 19 to binary using int_to_reverse_binary() and string_reverse()

Your output

10011

Test feedback

string_reverse(user_input) did not return a value.

Your function may be missing a return statement.

3:Unit test

0 / 3

Convert 255 to binary using int_to_reverse_binary() and string_reverse()

Your output

11111111

Test feedback

string_reverse(user_input) did not return a value.

Your function may be missing a return statement.


def int_to_reverse_binary(int_number):
# print('i', int_number)
a = []
while int_number > 0:
a.append(int_number % 2)
int_number = int_number // 2
# print('a', a)
return a

def string_reverse(input_string):
print(''.join([str(i) for i in input_string])[::-1])



if __name__ == '__main__':
x = int(input())
# a = int_to_reverse_binary(x)
string_reverse(int_to_reverse_binary(x))

Answers

Answer: def int_to_reverse_binary(int_number):

   a = []

   while int_number > 0:

       a.append(int_number % 2)

       int_number = int_number // 2

   return a

def string_reverse(input_string):

   return ''.join([str(i) for i in input_string])[::-1]

if __name__ == '__main__':

   x = int(input())

   print(string_reverse(int_to_reverse_binary(x)))

Explanation:

The program in python that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary is in the explanation part.

What is python?

Python is a general-purpose, high-level programming language. Its design philosophy prioritises code readability by employing significant indentation.

Here's the program in Python:

def decimal_to_binary(n):

   binary_string = ""

   while n > 0:

       binary_string += str(n % 2)

       n = n // 2

   return binary_string[::-1]

# test the function

print(decimal_to_binary(13))  # output: "1101"

Thus, in this program, the decimal_to_binary function takes a positive integer n as input and returns a string of 1's and 0's representing n in binary.

For more details regarding python, visit:

https://brainly.com/question/30427047

#SPJ1

Of the following field which would be the most appropriate for the primary key in a customer information table?

A: Customer Name B: Customer Number C: Phone Number D: Customer Address

Answers

Answer:

Customer Number

Explanation:

Use the drop-down menus to describe how to add a data bar to a report.
1. Open the table in view.
2. Click the column of the desired numerical field.
3. Click the conditional tab Format, then .
4. In the Rules Manager dialog box, click .
5. Select to “compare to other records,” and determine whether you want the value and bar to show at the same time.
6. Adjust the desired length of the bar and the color. Click OK.
7. Once satisfied with your rule, click and then OK.

Answers

Answer:

1. layout

3. conditional formatting

4. new rule

7. apply

Explanation:

just did it on edge

Other Questions
Rachel Canada's physical features contains jewelry,precious metal,and coins? What did Western Europe consist of after the fall of the Roman Empire?A. several city-statesB. many small kingdomsC. several empiresD. independent nation-states please solve this it an urgent maths question x+7 Evaluate dx. We can proceed with the substitution u = x + 7. The limits of integration and integrand function are updated as follows: XL = 0 becomes UL = Xu = 5 becomes uy = x+7 becomes (after a bit of simplification) 1+ x+7 The final value of the antiderivative is: x+7 [ dx = x+7 If someone can do this ily Lines 19-24 how does the use of passive voice affect the meaning of these lines? from of plymouth plantation what information is necessary to compare a machine's current ice production to the manufacturer's chart for that machine? in each of the following scenarios, researchers plan to conduct either a hypothesis test for a population mean or for the difference in two population means. are the conditions for use of a t-model met? Someone Help me please Brummitt Corporation is evaluating a new 4-year project. The equipment necessary for the project will cost $2,300,000 and can be sold for $293,000 at the end of the project. The asset is in the 5-year MACRS class. The depreciation percentage each year is 20.00 percent, 32.00 percent, 19.20 percent, 11.52 percent, and 11.52 percent, respectively. The company's tax rate is 21 percent. What is the aftertax salvage value of the equipment? Multiple Choice O O O $193,380 $293,000 $238,423 $314,932 $271,068 The function = 3describes the volume of a cube, , in cubic inches, whose length, width, and height each measure inches. Find the (instantaneous) rate of change of the volume with respect to when = 3 . Read the sentence.The Great Barrier Reef attracts thousands of visitors.Select the sentence that is expanded with a prepositional phrase. (2 points)Afterall, the Great Barrier Reef attracts thousands of visitors.As many people know, the Great Barrier Reef attracts thousands of visitors.During Australia's summer, the Great Barrier Reef attracts thousands of visitors.For one main reason, the Great Barrier Reef attracts thousands of visitors. i need help finding all of this stuff Consider a small country that is closed to trade, so its net exports are equal to zero. The following equations describe the economy of this country in billions of dollars, where C is consumption, DI is disposable income, I is an investment, and G is government purchases:C = 100 + 0.75 times DIG = 50I = 80Initially, this economy had a lump-sum tax. Suppose net taxes were $40 billion so that disposable income was equal to Y - 40, where Y is real GDP. In this case, this economy's aggregate output demanded was __________.Suppose the government decides to increase spending by $10 billion without raising taxes. Because the spending multiplier is __________, this will increase the economy's aggregate output demanded by __________.Now suppose that the government switches to a proportional tax on the income of 5%. Because consumers retain the remaining 95% of their income, disposable income is now equal to 0.95Y. In this case, the economy's aggregate output demanded is __________.Under a proportional tax on the income of 5%, the spending multiplier is approximately __________. Therefore, if the government decided to increase spending by $10 billion without raising tax rates, this would increase the economy's aggregate output demanded by approximately __________.A $10 billion increase in government purchases will have a larger effect on output under a __________. The force F keeping the moon in its orbit round the earth is inversely proportional to the square of the distance r from the earth. If F=6*10^5KN, and r=8*10^8m. Find I. The value of F when r=16*10^8m Generally, who defines morals in society? And, do you think these morals are objective (universal, unrelated to ones input), subjective (subject to ones input), or some combination of both? hellllllllp me plzzzzzz Find the sum of the first 6 terms of the given sequence. The sequence is either arithmetic or geometric.-1, 7, -49, ... Assume ideal gas properties, consider a 500 mL cylinder that contains a mixture of heptane and air at 350K, and 1 atm.7H16 + 11272 + 8H2The oxygen is at 10% excess.1.How many moles of oxygen, nitrogen and heptane are in the cylinder? A transmission shaft is supported between two bearings, which are 1 m apart. Power is supplied to the shaft through a coupling, which is located to the left of the left-hand bearing. Power is transmitted from the shaft by means of a belt pulley, 300 mm in diameter, which is located at a distance of 400 mm to the right of the left-hand bearing. The weight of the pulley is 300 N and the ratio of the belt tension of tight and slack sides is 2:1. The belt tensions act in vertically downward direction. The shaft is made of steel (Syt=380 N/mm2) and the factor of safety is 4. It transmits 7 kW power at 520rpm from the coupling to the pulley. The factors kb and kt of ASME code are 2.0 and 1.5, respectively. Calculate the shaft diameter using the ASME code. Assume Ssy =0.577 Syt.