Write an application that inputs a five digit integer (The number must be entered only as ONE input) and separates the number into its individual digits using MOD, and prints the digits separated from one another. Your code will do INPUT VALIDATION and warn the user to enter the correct number of digits and let the user run your code as many times as they want (LOOP). Submit two different versions

Answers

Answer 1

Answer:

The programs are written in python:

Version 1:

n = int(input("Numbers: "))

for i in range(n):

   num = int(input("Input integer: "))

   mylist = []

   while num>0:

       mylist.append(num%10)

       num= int(num/10)

   mylist.reverse()

   for i in mylist:

       print(i,end=" ")

   print()

Version 2:

num = int(input("Input integer: "))

while num > 0:

   mylist = []

   while num>0:

       mylist.append(num%10)

       num= int(num/10)

   mylist.reverse()

   for i in mylist:

       print(i,end=" ")

   print()

   num = int(input("Input integer: "))

Explanation:

Version 1:

This gets the number of inputs from the user, n

n = int(input("Numbers: "))

This iterates through n

for i in range(n):

For each iteration, this gets the integer input from the user, num

   num = int(input("Input integer: "))

This initializes a list

   mylist = []

This loop is repeated until num is 0

   while num>0:

This gets the individual digit and appends it to a list

       mylist.append(num%10)

This gets the other numbers

       num= int(num/10)

This reverses the list

   mylist.reverse()

This prints the individual digits from the list

   for i in mylist:

       print(i,end=" ")

Print a new line for the next integer input

   print()

Version 2:

The difference in both versions are the following lines

This gets the integer input from the user

num = int(input("Input integer: "))

This loop enables the user to input as many numbers as possible. But once the user inputs 0, the program will stop

while num > 0:

Unlike version 1 where the number of inputs in known at the initial stage of the program


Related Questions

3. How do repetitions look in Full Verbatim? a. I sang- I sang a song. b. I sang - I sang a song. c. I sang-l sang a song. d. I sang -I sang a song.​

Answers

Answer:

d. I sang -I sang a song.

Explanation:

What type of file is MyFile.xlsx? data file batch file executable file helper file

Answers

Answer:

executable file. c. 3.

Explanation:

where do I go to ask help from a tech and internet expert. security and protection. I'm open to suggestions and guesses​

Answers

Answer:

from my own experience, the best place to call is your local Best Buy store. they have a group of technicians called the Geek Squad, and you can either call them for tech support or protection suggestions, or have them do maintenance on a device (both in store and at home)

All of the fallowing are statements describing normal mechanical fan clutch operation EXCEPT:

Answers

The statements above are describing normal mechanical fan clutch operation except D. A fan clutch varies fan speed according to engine speed.

Why the above option chosen?

A properly functioning or operating fan clutch will be one that alter  the speed of the fan based on the engine temperature.

Not that if the engine is cold, the fan clutch is one that has no power to turn the fan very fast, even if engine speed is brought up. As the engine warms up, the fan clutch goes up on the speed of the fan.

Therefore, based on the above, The statements above are describing normal mechanical fan clutch operation except D. A fan clutch varies fan speed according to engine speed.

Learn more about clutch from

https://brainly.com/question/13262716

#SPJ1

All of the following are statements describing normal mechanical fan clutch operation EXCEPT:

A. A fan clutch has viscous drag regardless of temperature.

B. A fan clutch varies fan speed according to engine temperature.

C. A fan clutch stops the fan from spinning within two seconds after turning off a hot engine.

D. A fan clutch varies fan speed according to engine speed.

Give an example of a function from N to N that is: Hint: try using absolute value, floor, or ceiling for part (b). (a) one-to-one but not onto (b) onto but not one-to-one (c) neither one-to-one nor onto

Answers

Answer:

Let f be a function  

a) f(n) = n²  

b) f(n) = n/2  

c) f(n) = 0  

Explanation:  

a) f(n) = n²  

This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.  

Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:

                               f(a) = f(b) ⇒ a² = b² ⇒ a = b  

The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number.  For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.  

b) f(n) = n/2  

The above function example is an onto function because every natural number, let’s say n is a natural number that belongs to N, is the image of 2n. For example:

                               f(2n) = [2n/2] = n  

The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:  

When the value of n=1, then

                                  n/2 = [1/2] = [0.5] = 1  

When the value of n=2 then  

                                   n/2 = [2/2] = [1] = 1  

c) f(n) = 0

The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image.  The above function example is also not an onto function because every positive integer is not an image of any natural number.

According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?



about.example.com


example.com/about.html


example.com.about


example.org

Answers

Answer: The answer is A. "about.example.com"

Explanation: subdomains are written like this. {SUBDOMAIN}.{DOMAIN}.{TLD}

Hope this helps!

As per the domain name system, the subdomain of the domain example.com is about.example.com.

The following information related to the domain name system is:

It is the database that named where the domain names of the internet should be located & transform into IP addresses.It maps the naming of the people that are used for locating the website with respect to the IP address which the computer could use to locating the website.

Hence, the other options are incorrect.

Therefore we can conclude that as per the domain name system, the subdomain of the domain example.com is about.example.com.

Learn more about the subdomain here: brainly.com/question/21933843

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.

Answers

Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.

Writting the code:

Assume the variable s is a String

and index is an int

an if-else statement that assigns 100 to index

if the value of s would come between "mortgage" and "mortuary" in the dictionary

Otherwise, assign 0 to index

is

if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)

{

   index = 100;

}

else

{

   index = 0;

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to

Consider the following code:
a = 3
b = 2
print (a ** b)
What is output?
A.9
B.8
C.1
D.6

Consider the following code:a = 3b = 2print (a ** b)What is output?A.9B.8C.1D.6

Answers

Answer:

C

Explanation:

*i'm really bad at explaining* the letters is going up like- a b c d e f g and the numbers are going down like- 3 2 1 0

Answer:

A. 9

Explanation:

the symbol (**) means to put to the exponent to. So in this case, 3**2 is the same as 3^2 or 3 squared, 3x3=9. So that is the answer.

which short cut command will remove selected text from a document?

Answers

To delete all text in a text file, you can use the shortcut key to select all text which is Ctrl + A . Once all text is highlighted, press the Del or Backspace key to delete all highlighted text.

add the function max as an abstract function to the class arraylisttype to return the largest element of the list. also, write the definition of the function max in the class unorderedarraylisttype and write a program to test this function.

Answers

To add the function max as an abstract function to the class arraylisttype to return the largest element of the list, check the code given below.

What is element?

A smaller component of a larger system is referred to as an element in computing.

//CODE//

#include <iostream>

using namespace std;

class arrayListType

{

public:

   bool isEmpty() const;  

   bool isFull() const;  

   int listSize() const;

   int maxListSize() const;  

   void print() const;  

   bool isItemAtEqual(int location, int item) const;  

   virtual void insertAt(int location, int insertItem) = 0;

   //F

   virtual void insertEnd(int insertItem) = 0;  

   void removeAt(int location);

   void retrieveAt(int location, int& retItem) const;

   virtual void replaceAt(int location, int repItem) = 0;

   void clearList();    

   virtual int seqSearch(int searchItem) const = 0;  

   virtual void remove(int removeItem) = 0;      

   virtual int max() = 0;

   arrayListType(int size = 100);

   arrayListType(const arrayListType& otherList);

   virtual ~arrayListType();

protected:

   int *list; //array to hold the list elements

   int length; //variable to store the length of the list

   int maxSize; //variable to store the maximum

   //size of the list

};

#endif

//UNORDEREDARRAYLIST:

#ifndef H_unorderedArrayListType

#define H_unorderedArrayListType

#include "arrayListType.h"

arrayListType::arrayListType(int size)

{

   list = new int[size];

   length = 0;

   maxSize = size;

}

arrayListType::arrayListType(const arrayListType& otherList)

{

   if (list)

       delete[] list;

   list = new int[otherList.maxSize];

   length = otherList.length;

   for (int i = 0;i < length;i++)

   {

       list[i] = otherList.list[i];

   }

}

arrayListType::~arrayListType()

{

   if (list)

       delete[] list;

   list = nullptr;

}

void arrayListType::clearList()

{

   for (int i = 0;i < length;i++)

       list[i] = 0;

   length = 0;

}

void arrayListType::removeAt(int location)

{

   for (int i = location;i < length - 1;i++)

   {

       list[i] = list[i + 1];

   }

   length--;

}

void arrayListType::retrieveAt(int location, int& retItem) const

{

   if (location >= length)

       return;

   retItem = list[location];

}

bool arrayListType::isEmpty() const

{

   return length == 0;

}

bool arrayListType::isFull() const

{

   return (length == maxSize);

}

int arrayListType::listSize() const

{

   return length;

}

int arrayListType::maxListSize() const

{

   return maxSize;

}

void arrayListType::print() const

{

   cout << endl;

   for (int i = 0;i < length;i++)

       cout << list[i] << "  ";

}

bool arrayListType::isItemAtEqual(int location, int item) const

{

   if (location >= length)

       return false;

   return list[location] == item;

}

class unorderedArrayListType : public arrayListType

{

public:

   void insertAt(int location, int insertItem);

   void insertEnd(int insertItem);

   void replaceAt(int location, int repItem);

   int seqSearch(int searchItem) const;

   void remove(int removeItem);

   // Add the function max

   int max();

   unorderedArrayListType(int size = 100);

   //Constructor

};

#endif

//UNODERERD ARRAYLISTLMP :

#include <iostream>

#include "unorderedArrayListType.h"

using namespace std;

void unorderedArrayListType::insertAt(int location,

   int insertItem)

{

   if (location < 0 || location >= maxSize)

       cout << "The position of the item to be inserted "

       << "is out of range." << endl;

   else if (length >= maxSize) //list is full

       cout << "Cannot insert in a full list" << endl;

   else

   {

       for (int i = length; i > location; i--)

           list[i] = list[i - 1];   //move the elements down

       list[location] = insertItem; //insert the item at

       //the specified position

       length++;   //increment the length

   }

} //end insertAt

void unorderedArrayListType::insertEnd(int insertItem)

{

   if (length >= maxSize) //the list is full

       cout << "Cannot insert in a full list." << endl;

   else

   {

       list[length] = insertItem; //insert the item at the end

       length++; //increment the length

   }

} //end insertEnd

int unorderedArrayListType::seqSearch(int searchItem) const

{

   int loc;

   bool found = false;

   loc = 0;

   while (loc < length && !found)

       if (list[loc] == searchItem)

           found = true;

       else

           loc++;

   if (found)

       return loc;

   else

       return -1;

} //end seqSearch

void unorderedArrayListType::remove(int removeItem)

{

   int loc;

   if (length == 0)

       cout << "Cannot delete from an empty list." << endl;

   else

   {

       loc = seqSearch(removeItem);

       if (loc != -1)

           removeAt(loc);

       else

           cout << "The item to be deleted is not in the list."

           << endl;

   }

} //end remove

// Add the definition for the function max

int unorderedArrayListType::max()

{

   int maxValue = INT_MIN;

   for (int i = 0;i < length;i++)

   {

       if (list[i] > maxValue)

           maxValue = list[i];

   }

   return maxValue;

}

void unorderedArrayListType::replaceAt(int location, int repItem)

{

   if (location < 0 || location >= length)

       cout << "The location of the item to be "

       << "replaced is out of range." << endl;

   else

       list[location] = repItem;

} //end replaceAt

unorderedArrayListType::unorderedArrayListType(int size)

   : arrayListType(size)

{

} //end constructor

int main()

{

   unorderedArrayListType list;

   list.insertEnd(1);

   list.insertEnd(-1);

   list.insertEnd(10);

   list.insertEnd(2);

   list.insertEnd(5);

   cout << "Max Value : " << list.max();

   return 0;

}

Learn more about elements

https://brainly.com/question/28565733

#SPJ4

The rectangular symbol in flowchart
is used to denote dash

Answers

Answer:

The rectangular symbol in flowchart is process box which is used to process the data.

Hope its helpful :-)

If so, please mark me as brainlist :-)

To help insure that an HTML document renders well in many web browsers it is important to included which at top of file

Answers

Answer:

<!DOCTYPE html>

Explanation:

This tells the browseer that the code is HTML5 format


A _____ address directs the frame to the next device along the network.

Answers

Answer:

When sending a frame to another device on a remote network, the device sending the frame will use the MAC address of the local router interface, which is the default gateway.

An unicast address directs the frame to the next device along the network.

What is network?

A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, the computers use standard communication protocols across digital linkages. These linkages are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a number of network topologies.

The term "unicast" refers to communication in which a piece of information is transferred from one point to another. In this situation, there is only one sender and one receiver.

To learn more about network

https://brainly.com/question/28041042

#SPJ13

Select the correct answer.
What is the real-time protection feature in antivirus software?
O A.
OB.
O C.
O D.
a feature that prevents downloading malicious files over the Internet
a feature that prevents the user from downloading malware
a feature that protects computer hardware from theft
a feature that blocks websites that are not suitable for children
Reset
Next

Answers

The real-time protection feature in antivirus software is a feature that prevents downloading malicious files over the Internet. The correct option is A.

What is an antivirus software?

Real-time protection refers to the requirement for protection whenever you use a computer. A type of software called antivirus is used to stop, scan for, find, and remove viruses from a computer.

Most antivirus programs run automatically in the background after installation to offer real-time protection against virus attacks.

Therefore, the correct option is A, a feature that prevents downloading malicious files over the Internet.

To learn more about antivirus software, refer to the link:

https://brainly.com/question/29356216

#SPJ1


4. What information is in the payload section of the TCP segments?

Answers

The actual data being transferred, such as the content of a web page, an email message, or a file transfer, is contained in the payload part of the TCP segments.

The content of a TCP segment is what?

A segment header and a data chunk make up a TCP segment. There are ten required fields and one optional extension field in the segment header (Options, pink background in table). The payload data for the application is carried in the data section, which comes after the header.

What is the TCP Wireshark payload size?

In established mode, a packet's maximum payload size is 1448 bytes (1500 - 20 IP header - 32 TCP header).

To know more about data  visit:-

https://brainly.com/question/29851366

#SPJ1

first box options: Forums, Emails, Chats

second box options: Message boards, Chats, Blogs

third box options: Forums, Blogs, Websites

first box options: Forums, Emails, Chatssecond box options: Message boards, Chats, Blogsthird box options:

Answers

Answer:

the first box is chats, the second box is message, and the third box is websites

Explanation:

The reason the first box is chats is because chats are able to let you receive and send messages. The reason the second box is messages is because when you message someone your having a conversation online. and the reason The third box is Websites is because online you can publish articles or journal entries therefore making the first box chats, the second box message, and the third box website. Hope this helps

If a coach says, “Now let’s do 30 push-ups,” what kind of statement is that?
A: Edited
B: Iterative
c: Sequential
d: Conditinal

Answers

Answer:

B. Iterative

Explanation:

The coach is expecting the person to execute one push-up followed by another push-up. This clearly shows that the same activity is being repeated over and over again. This is what an Iterative statement is. It is a repetition of the same process or something that is already known in order to arrive at a specific condition.

This case is similar to that of algorithms in which some of its steps are being repeated.

Answer:

b

Explanation:

The original creators of Android were ____________.​

Answers

Answer:

I got this from online

Explanation:

Rich Miner, Nick Sears, Chris White, and Andy Rubin.

Deb needs to add borders on the cells and around the table she has inserted into her Word document.




Insert tab, Tables group
Table Tools Design contextual tab
Home tab, Page Layout
Home tab, Format group

Answers

Answer:

Design tab

Explanation:

Select the call or table that you will like to useThen select the design tabIn the group page background select Page Borders There you will have multiple choses for where you want your borderYou can even customize your border by pressing Custom Border at the bottom of the list for Page Borders

Answer:

Table tools design contextual tab

Explanation:

List 5 Examples of specialized computer

Answers

The 5 Examples of specialized computer

A file computersGame consoles (such as PlayStation)Set-top boxSmart TVsComputerized Analysis Scanner (CAS)What are Specialized Computers?

The term Specialized computers is known to be a type of computer that is said to be custom form for specific and well designed kind of task.

Note that specialized computers are known to be powered by the use of a sealed power cell that is said to be made inside of it

Note also that are uniquely made for a special purpose and can only do those kind of task.

Therefore, The 5 Examples of specialized computer

A file computersGame consoles (such as PlayStation)Set-top boxSmart TVsComputerized Analysis Scanner (CAS)

Learn more about specialized computer from

https://brainly.com/question/24540334

#SPJ1

FILL IN THE BLANK. ___ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.

Answers

Prototyping

Design teams experiment by turning creative ideas into physical prototypes, which might span from paper to digital. Again for purpose of capturing design concepts and user testing, work together to develop prototypes with varied levels of realism.

What is Prototyping?

Prototyping is the process of creating a scaled-down or preliminary version of a product. This can be done by making a working model or a simulation of the product’s features and functions. Prototyping allows companies to test the viability of a product before investing the resources necessary to develop the full version. This process can help identify design flaws, user interface issues, or usability problems that may not have been obvious in the early design stages. By creating a prototype, companies can make sure their final product meets customer expectations. Additionally, it can provide valuable user feedback and improve the overall quality of the product.

To know more about Prototyping

brainly.com/question/7509258

#SPJ4

what is the name of the program or service that lets you view e -mail messeges?​

Answers

The program or service that allows you to view email messages is called an email client.

What is the name of the program?

An email client is a software program or service that enables users to access, manage and view their email messages. It provides user-friendly interface for reading, composing and organizing emails.

Popular examples of email clients include Micro/soft Outlook, Gm/ail, Mo/zilla Thunderbird and Ap/ple Mail. These clients allow users to connect to their email accounts, retrieve messages from email servers and display them in an organized manner for easy viewing and interaction.

Read more about email client

brainly.com/question/24688558

#SPJ1

I know nothing abt computers

I know nothing abt computers

Answers

Answer:

The answer to this question should be all A.) it is a set of step-by-step instructions, B.) It's called code, and C.) it tells the computer what to do.

If you had a job that drill holes in the earth in search of water,what career cluster would you be working in?

Answers

The occupation of drilling wells to extract groundwater falls under the realm of Agriculture, Food & Natural Resources career cluster.

Why is this so?

This area comprises multiple job roles associated with harvesting natural resources like soil scientists; geologists; hydrologists; conservationists; and environmental engineers.

Their expertise comes into effect when they study these resources to preserve them sustainably instead of depleting them blindly.

So one mustnote that their efforts shift towards formulating agriculture methods that don't harm these reserves or endanger wildlife.

Learn more about Careers:
https://brainly.com/question/30040900
#SPJ1

Write the code for a program that performs the following calculation: Examplel: C=A+B
AND
Example2: B=A+2

Answers

Answer:

Here is an example of how you could write the code for a program that performs the calculations in Example 1 and Example 2:

# Example 1

def calculate_c(a, b):

 return a + b

# Example 2

def calculate_b(a):

 return a + 2

To use these functions, you could call them like this:

# Calculate C using Example 1

c = calculate_c(5, 10)

print(c)  # Output: 15

# Calculate B using Example 2

b = calculate_b(5)

print(b)  # Output: 7

a democratic government has to respect some rules after winning the elections. Which of these points is not a part of those rules

Answers

After coming to power, a democratic administration is bound to follow certainrules and regulations. And Office-bearers are not accountable is not a part of those   rules.

How is this so?

In a democratic administration,office-bearers are indeed accountable as they are bound by rules and regulations.

The accountability ensures transparency,ethical conduct, and adherence to the principles of democracy.

Office-bearers are expected to uphold the laws and serve the interests of the people they represent.

Learn more about  democratic administration at:

https://brainly.com/question/31766921

#SPJ1

Use the class below to determine IF there is an error or if some part of the code is missing.

public class acceptInput {
public static void main (String[ ] args) {

Scanner scan = new Scanner (System.in);
System.out.println("How old are you? ");
int age = scan.nextInt();
System.out.println("Wow you are " + age + " years old. ");

}
}

- Scanner object has been declared incorrectly
- .nextInteger() should be used to accept an integer from the user.
- Age variable is not correctly printed in the sentence
- import java.util.Scanner; is missing
- Program runs as expected

Answers

Based on the given class below:

public class acceptInput {

public static void main (String[ ] args) {

Scanner scan = new Scanner (System.in);

System.out.println("How old are you? ");

int age = scan.nextInt();

System.out.println("Wow you are " + age + " years old. ");

}

}

The error that can be seen here is that the Scanner object has not been created

What is Debugging?

This refers to the term that is used to describe finding errors in a given program or system that prevents a code from properly executing and involves certain steps and processes.

Hence, it can be seen that the error in the code above is that there is the use of the Scanner object, but it is yet to be created which would return errors when the program is being run.

Read more about debugging here:

https://brainly.com/question/15079851

#SPJ1

you should always log out after using a networked computer

Answers

nooLOLLLDFWYM????????

Yes , This statement is true .

In this challenge you will use the file regex_replace_challenge_student.py to:
Write a regular expression that will replace all occurrences of:
regular-expression
regular:expression
regular&expression
In the string: This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression
Assign the regular expression to a variable named pattern
Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results
Regular Expression Replace Challenge
The Python statement containing the string to search for the regular expression occurrence is below. search_string=’’’This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression’’’
Write a regular expression that will find all occurrences of:
a. regular expression
b. regular-expression
c. regular:expression
d. regular&expression in search_string
Assign the regular expression to a variable named pattern
The Python string below is used for substitution substitution="regular expression"
Using the sub() method from the re package substitute all occurrences of the ‘pattern’ with ‘substitution’
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results
import re
#The string to search for the regular expression occurrence (This is provided to the student)
search_string='''This is a string to search for a regular expression like regular expression or
regular-expression or regular:expression or regular&expression'''
#1. Write a regular expression that will find all occurrances of:
# a. regular expression
# b. regular-expression
# c. regular:expression
# d. regular&expression
# in search_string
#2. Assign the regular expression to a variable named pattern
#The string to use for subsitution (This is provided to the student)
substitution="regular expression"
#3. Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
#4. Assign the outcome of the sub() method to a variable called replace_result
#5. Output to the console replace_results

Answers

Answer:

Please follow the code indentation for the python program.

Explanation:

In this challenge you will use the file regex_replace_challenge_student.py to: Write a regular expression

What kind of variable is measured using 2 different values

Answers

A variable that is measured using two different values can be classified as a categorical variable or a binary variable.

Depending on the nature of the values, a variable can be classified as:

1)Categorical Variable: If the two different values represent distinct categories or groups, the variable is considered categorical. In this case, the variable can take on only one of two possible values.

Examples include gender (male/female), presence/absence of a certain trait, yes/no responses, or any other classification with mutually exclusive categories.

2)Binary Variable: If the two different values represent two distinct outcomes or states, the variable can be classified as a binary variable. Binary variables are often used in statistics, machine learning, and hypothesis testing.

Examples include success/failure, true/false, 1/0, or positive/negative results.

It's important to note that the distinction between categorical and binary variables lies in the nature of the values and the underlying meaning they convey.

Categorical variables can have more than two categories, while binary variables specifically refer to variables with only two possible values.

For more questions on variable

https://brainly.com/question/28248724

#SPJ8

Other Questions
Suppose Khaled has deposited 819.2 dinar in his checkable account in the ABC bank. Which one of the following is true about the ABC bank balance sheet Question Tries rema Marked out Flag que a. The reserve will increase by 819.2 dinar b. The checkable deposits will decrease by 819.2 dinar c. The reserve will decrease by 819.2 dinar d. The securities will decrease by 819.2 dinar e. The securities will increase by 819.2 dinar Check The function f(x) = 2.5x models the amount of water, in quarts, in a bucket after x seconds. Sally needs to fill a 55-quart bucket. Which is the most appropriate domain for the function? Select all correct answersAmber is writing to an accountant that she would like to interview to gain information about the career field. What information should she include in her letter?A. A request for a list of contacts that she could also interviewB. A request to meet for 15 minutes to gain first-hand adviceC. an explanation of why she is leaving her current jobD. A list of the questions she intends to ask at the interviewE. A copy of her resumes and cover letter What is prefix in name? Using the rule of thirds places items of interest in a photograph along one of the imaginary gridlines or at the point of their intersection. True or False. he number line shows the solution set of which inequality?A horizontal number line is labeled from 51 to 52. There is a closed circle at 51.52, and the number line is shaded to the right of 51.52.A. j/4.6 > 11.2B. j/1.5 > 16.3C. j/12.7 > 19.6D. j/1.4 > 1.1 Can someone please help me with this question? appreciate it A forest covers 46,000 acres. A survey finds that 0.6% of the forest is old-growth trees. How many acres of old-growth trees are there? Hurry please! I will give the right answer brainliest! A developer has 7 1/2 acres of land to build houses on. If each house is to be built on 1/4 -acre plot, how many houses can he build? a company's general ledger shows a cash balance of $2,320. comparing the company's cash records with the monthly bank statement reveals several additional cash transactions such as deposits outstanding of $1,710, note collected by the bank on the company's behalf of $2,000, and interest earned of $26. the company also finds an error by the bank of an additional deposit of $120. calculate the correct balance of cash. ____________________ is a responsibility as well as a right. a codon like AUG consists of four nucleotides which of the following is true of the distinction between scientific journals and popular magazines? what heresy says "there was a then when the son of god did not exist." PLEASE YOU WILL BE THE BRAINLIEST!!! The colonists who developed the us government borrowed many ideas from Athenian democracy and the roman republic, but there were some characteristics of those governments they chose not to use. What is one example, and why do you think the colonists did not borrow that idea? last president of the usa 7. A Spartan warrior was told to return from warA after he married.B. after he turned 20.C with his shield or on it.D. to repay his debts. How does Ophelia changes over the course of the play?. I put D but I am not sure if that is the valid answer. Any help? Ronald Reagan's economic plan included all of the following facets except