write an if statement that assigns deliverycomplete with 1 if bricksdelivered is equal to bricksexpected.\

Answers

Answer 1

Using the knowledge in computational language in python it is possible to write a code that write an if statement that assigns deliverycomplete with 1 if bricksdelivered is equal to bricksexpected.

Writting the code:

%Define the function CheckDelivery()

function deliveryComplete = CheckDelivery( brickDelivered, bricksExpected)

%Start the if-else statements to check if delievery is completed.

%Delievery completed

if ( brickDelivered == bricksExpected)

deliveryComplete = 1;

%Delievery not completed.

else

deliveryComplete = 0;

%End of if-else

end

%Print the result.

fprintf("deliveryComplete: %d\n",deliveryComplete);

%End of the function.

end

%demo.m

%Call the function for the output 0.

CheckDelivery(10,11);

%Call the function for the output 1.

CheckDelivery(10,10);

function deliveryComplete = CheckDelivery(bricksDelivered, bricksExpected)

   deliveryComplete = 0;

   if bricksDelivered == bricksExpected

       deliveryComplete = 1;

   end

end

See more about python at brainly.com/question/18502436

#SPJ1

Write An If Statement That Assigns Deliverycomplete With 1 If Bricksdelivered Is Equal To Bricksexpected.\

Related Questions

ull be my american girl american girlr

Answers

Answer:

Wuuut

Explanation:

you crazy

A mixed reality application detects the spatial layout of a room and is able to overlap or hide a virtual object based on its position in the image. what effect makes this possible?
modeling
occlusion
tethering
virtualization

Answers

The effect that makes it possible for a mixed reality application to detect the spatial layout of a room and overlap or hide a virtual object based on its position in the image is called occlusion.

In computer vision, occlusion is the act of hiding or obstructing an item or object from view. Occlusion is used in augmented and mixed reality systems to conceal virtual objects that are obstructed by real objects in the environment. It gives the appearance that virtual objects are interacting with the real world by obscuring objects behind or in front of them.

A mixed reality application is an application that allows users to experience a combination of the real and virtual worlds. It detects and maps the physical world to construct a mixed reality environment. Mixed reality applications can overlay digital images, videos, and animations onto real-world objects, as well as provide interactive experiences for users.

Learn more about Computer Vision: https://brainly.com/question/14471845

#SPJ11

PC Shopping Network may upgrade its modem pool. It last upgraded 2 years ago, when it spent $115 million on equipment with an assumed life of 5 years and an assumed salvage value of $15 million for tax purposes. The firm uses straight-line depreciation. The old equipment can be sold today for $80 million. A new modem pool can be installed today for $150 million. This will have a 3 -year life, and will be depreciated to zero using straight-line depreciation. The new equipment will enable the firm to increase sales by $25 million per year and decrease operating costs by $10 million per year. At the end of 3 years, the new equipment will be worthless. Assume the firm's tax rate is 35 percent and the discount rate for projects of this sort is 12 percent. What are the Free Cash Flows, the NPV and IRR of the replacement project? Note: There is double jeopardy on this problem. If you miss a free cash flow, you will miss the NPV and the IRR. (6 points) FCF 0

= FCF 1

= FCF 2

= FCF 3

= NPV= IRR=

Answers

The replacement project involves upgrading the modem pool of PC Shopping Network. The old equipment was purchased 2 years ago for $115 million, has a 5-year assumed life, and a salvage value of $15 million.

The old equipment can be sold today for $80 million. The new equipment can be installed for $150 million and has a 3-year life. The new equipment is expected to increase sales by $25 million per year and decrease operating costs by $10 million per year. The tax rate is 35% and the discount rate is 12%. We need to calculate the Free Cash Flows (FCFs), the Net Present Value (NPV), and the Internal Rate of Return (IRR) of the replacement project.

To calculate the FCFs, we need to determine the cash inflows and outflows associated with the project. In this case, the cash inflows are the increase in sales ($25 million) and the decrease in operating costs ($10 million) each year. The cash outflows include the initial investment in the new equipment ($150 million) and the tax savings resulting from depreciation expense. By subtracting the cash outflows from the cash inflows for each year, we can calculate the FCFs.
The NPV of the project is the present value of the FCFs, discounted at the given rate of 12%. By summing up the present values of the FCFs, we can calculate the NPV. If the NPV is positive, the project is considered financially viable.
The IRR is the discount rate at which the NPV of the project becomes zero. It represents the project's internal rate of return or the rate of return that the project is expected to generate. The IRR is calculated iteratively until the NPV reaches zero.
To obtain the specific values of FCF0, FCF1, FCF2, FCF3, NPV, and IRR, the calculations need to be performed based on the given information and formulas for each year.

learn more about salvage value here

https://brainly.com/question/28387066



#SPJ11

true or false: each page within a website/domain has a unique url.

Answers

True. Each page within a website/domain typically has a unique URL (Uniform Resource Locator) that identifies its specific location on the internet.

The URL serves as an address for accessing and referencing a specific webpage, allowing users to navigate to different pages within a website or SHARE the URL to direct others to a particular page.A URL (Uniform Resource Locator) is a specific web address that is used to locate and access resources on the internet. It provides a standardized way to identify the location of a web page, file, or any other resource. A URL consists of several components:1. Protocol: The protocol specifies the rules and procedures that determine how data is transferred between the client (web browser) and the server. Common protocols include HTTP (Hypertext Transfer Protocol), HTTPS (HTTP Secure), FTP (File Transfer Protocol), etc.

2. Domain Name: The domain name identifies the specific website or server hosting the resource. For example, in the URL "https://www.example.com," "www.example.com" is the domain name.

3. Path: The path specifies the specific location or directory within the website where the resource is located. It follows the domain name and is separated by slashes (/). For example

Learn more about URLs here:

https://brainly.com/question/32369651

#SPJ11

_______ codes are supplemental codes used to help researchers collect data, track illness and disease, and measure quality of care

Answers

Answer:

Category II CPT codes are supplemental tracking codes, also referred to as performance measurement codes. These numeric alpha codes [e.g., 2029F: complete physical skin exam performed] are used to collect data related to quality of care.

how are client computers usually configured to access a wsus server?

Answers

Client computers can usually be configured to access a WSUS (Windows Server Update Services) server in a few different ways. One way is through Group Policy.

To do this, the following steps can be followed:

Open the Group Policy Management Console (gpmc.msc) and create a new policy or edit an existing one.

Navigating to Computer Configuration -> Policies -> Administrative Templates -> Windows Components -> Windows Update.In the right pane, double-click the "Specify intranet Microsoft update service location" policy.

Select the Enabled option and input the URL of the WSUS server (e.g. http://servername or http://servername.domain.com).

If the WSUS server is configured to use SSL, select the "Set the intranet update service for detecting updates" and "Set the intranet statistics server" policies as well and specify the URLs with HTTPS instead of HTTP.

Learn more about windows update at:

https://brainly.com/question/32143979

#SPJ11

Client computers can be configured to access a WSUS server by setting the WSUS server address in the Group Policy settings deployed to the client computers.

Client computers are usually configured to access a WSUS server through the following steps:

Group Policy Configuration: Group Policy is commonly used to configure client computers to connect to a WSUS server. An administrator creates a Group Policy Object (GPO) and configures the WSUS settings within it. The GPO is then linked to the appropriate Organizational Unit (OU) in Active Directory, containing the client computers that need to connect to the WSUS server.

WSUS Server Address: In the Group Policy settings, the WSUS server address is specified. The client computers need to know the URL or IP address of the WSUS server to establish a connection. This address is typically provided in the "Specify intranet Microsoft update service location" policy setting.

Group Policy Deployment: The Group Policy with the WSUS settings is deployed to the client computers within the targeted OU. The Group Policy refresh interval ensures that the settings are applied to the client computers periodically.

Automatic Updates Configuration: The client computers' Automatic Updates settings are configured through Group Policy. This includes settings such as update installation schedule, reboot behavior, and whether to check for updates automatically or allow users to choose.

By configuring the appropriate Group Policy settings and providing the WSUS server address, client computers can be effectively configured to access and receive updates from the WSUS server.

To know more about Client computers visit:

https://brainly.com/question/14753529

#SPJ11

What is a menu?
another name for a window
a section that allows you to choose settings
a set of commands that provides quick access to a tool
a list of commands and options for working with a program

Answers

Answer:

a list of commands and options for working with a program

Explanation:

Allie is choosing a URL for her band’s website, which is the best method of making the URL easy to understand?

Answers

Answer:

Making a URL that is readable by humans. That is the best way and if it will be readable like that, it will meet the URL protocol requirements as well.  

Hope this helps!

Answer:

Making a URL that is readable by humans.

An operating system is an interface between human operators and application software

Answers

It is true that an operating system is an interface between human operators and application software.

What is a software?

Software is a collection of instructions, data, or computer programmes that are used to run machines and carry out particular activities.

Hardware, on the other hand, refers to a computer's external components. Applications, scripts, and programmes that operate on a device are collectively referred to as "software."

An operating system is a piece of software that serves as a conduit between the user and the hardware of a computer and manages the execution of all different kinds of programmes.

An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.

Thus, the given statement is true.

For more details regarding software, visit:

https://brainly.com/question/985406

#SPJ9

What are these brain points for?

Answers

Answer:

to ask questions of your own

So you can ask questions

which of the following certifies when an os meets unix requirements? ieee unix users group the open group suse group

Answers

The organization that certifies when an operating system meets Unix requirements is The Open Group.

UNIX is an operating system that was developed in the late 1960s by Bell Labs as a multiuser, multitasking operating system. It was one of the first operating systems created by developers. UNIX is an operating system designed for the sole purpose of making it easier to use, and it provides a command-line interface that can be used to perform operations.

The Open Group is an organization that certifies that an operating system meets the requirements of the UNIX 03 specifications. In addition, the Open Group maintains and publishes the Single UNIX Specification. This specification is designed to ensure that operating systems that follow it are compliant with the UNIX standard.

To gain compliance certification, an operating system must go through a rigorous testing process, which includes verification that it meets the standard's requirements, and it is compatible with other UNIX systems.

You can learn more about UNIX at: brainly.com/question/2274690

#SPJ11

7 materials we use in technology and raw material​

Answers

Answer:

natural re-sources chromium, tin, copper, platinum metals, germanium, indium, tantalum, niobium, antimony, cobalt and industrially utilized rare earths.

Explanation:

can I have brainliest

We consider these five processes in the following four questions: Processes P1,...,Ps arrive at a processor at time 0, 1, 4, 6, 8 and the lengths of their CPU bursts are 3, 7,5, 1, 6, respectively.

Question 3 10 pts For the five processes in the above, we consider SRTF (Shortest-Remaining-Time-First) scheduling policy.
1. [5 points] Draw the Gantt Chart
2. [3 points] Determine the corresponding latency for each process:
latency P1 P2 P3 P4 P5
esponse time
waiting time
3. [2 points] In the following, we consider the context switches, which were ignored in the above. We assume that each context switch takes 0.1 time units even between the same job. What is the CPU utilization in completing all five jobs?

Answers

To draw the Gantt Chart for the SRTF scheduling policy, we consider the arrival times and CPU burst lengths of the processes. Let's start by arranging the processes in order of their arrival times:



Process:   P1      P2      P3      P4      P5
Arrival:    0       1        4       6        8
Burst:       3        7        5       1        6
Now, let's calculate the remaining burst times for each process at each time unit until all processes are completed. The process with the shortest remaining burst time is given the CPU at each time unit.

At time 0, P1 arrives and has a burst time of 3.
At time 1, P2 arrives and has a burst time of 7.
At time 4, P3 arrives and has a burst time of 5.
At time 6, P4 arrives and has a burst time of 1.
At time 8, P5 arrives and has a burst time of 6.
Now, let's fill in the Gantt Chart using the SRTF scheduling policy:
Time:       0       1        2       3       4       5       6       7       8       9       10      11      12      13
Process:   P1      P1      P1      P2     P2     P3      P3      P3      P3      P3     P4      P4      P4      P4
The Gantt Chart shows the allocation of CPU to each process over time.
To know more about consider visit:

https://brainly.com/question/33390173

#SPJ11

1. What are you going to do if someone ask for your personal information online?​

Answers

Answer:

Ask them why they need such information.

Explanation:

If they can't give you a good reason, please don't share your personal info. ♥

Answer:

If someone ask my personal information online i'll  trun off  my mobile data or wi-fi  and then i'll block the user's Id

Explanation:

hope it is helpful to you

what type of scanning target would commonly have vulnerabilities due to the existence of unnecessary services and open ports?

Answers

Due to the presence of unneeded services and open ports, viral infrastructure frequently has vulnerabilities.

A vulnerability scanner is an automated tool that locates and compiles a list of all network-connected IT assets, such as servers, workstations, laptops, virtual machines, containers, switches, and printers. Along with other characteristics like open ports and user accounts, it also tries to determine operational information about each asset, such as the operating system it uses and the software that is installed on it. Organizations can use a vulnerability scanner to check their networks, systems, and apps for security flaws.

To identify security flaws in their computer systems, networks, applications, and procedures, the majority of security teams use vulnerability scanners. There are numerous tools for scanning for vulnerabilities, each of which offers a different set of capabilities.

Know more about software here:

https://brainly.com/question/1022352

#SPJ4

How does information sharing work in a closed group like your computer lab

Answers

Information sharing within a closed group like a computer lab typically happens in a few ways:

1. Direct sharing - Members directly sharing files, documents, links, etc. with each other via email, messaging, file sharing services, USB drives, etc. This allows for direct and targeted sharing of relevant information.

2. Common file storage - Having a central file storage location that everyone in the group has access to. This could be a shared network drive, cloud storage service, or other file server. People can upload and access relevant files here.

3. Collaboration tools - Using tools like Slack, Teams, SharePoint, etc. These provide channels, messaging, file sharing and other features tailored for group collaboration. Members can post updates, files, links and discuss relevant topics here.

4. Regular meetings - Holding in-person or virtual meetings on a regular basis. This allows for face-to-face sharing of information, discussions, updates and coordination on projects, issues, events, etc.

5. Team communication - Encouraging an open culture where members feel comfortable asking questions, bringing up issues, posting updates and other information that would be relevant for the rest of the group to know. This informal communication helps build awareness.

6. Email lists/newsletters - Some groups use email lists, newsletters or announcements to share periodic updates, important information, events, deadlines and other things that all members should be aware of.

7. Collaboration tools for projects - Using tools like Slack, Asana, Trello or SharePoint to manage projects, tasks, files and communications specifically related to projects the group is working on together.

Those are some of the common ways information tends to get shared within a closed, collaborative group. The specific tools and approaches used often depend on the nature, size, needs and culture of the particular group. But open communication and providing multiple channels for sharing information are key.

How would I search snowboarding outside of Minnesota in my browser?

Answers

The way to search for snowboarding outside of Minnesota in your browser is to use the search tool to type likely words such as  Popular Downhill Skiing Destinations and then you will see different options to choose from.

What does browsing entail?

When you're searching, you want to finish a task; when you're browsing, you can be seeking for ideas, entertainment, or just additional information. When you are searching, you are actively looking for solutions, whereas when you are browsing, you are merely viewing the results.

An application program known as a browser offers a way to see and engage with all of the content on the World Wide Web. Web pages, movies, and photos are included in this.

Note that by typing key words using your browser such as snowboarding, you will see defferent result.

Learn more about Browser search from

https://brainly.com/question/22650550

#SPJ1

Hi! Is anyone really good at making pretty schedules and designs? I don't have any money, but I could give points. I'll give a small number of points on this answer, but if you make the schedule I'll give you lots of points! (I'll send you the actual parts of the schedule I just need someone to make it look pretty) Thank you so much!

Answers

Could I see what you would like it to look like?

I’ll give Brainly if u answer all please
ASAP

Ill give Brainly if u answer all please ASAP

Answers

Answer:

Answers are: 38, 135, 23, 209, 53 & 181 respectively

Explanation:

I can''t find my phone and it''s dead. Is there an app or something that you search on your computer and it can help you find it? I''ve been looking for it everywhere!

:(

Answers

Find my iphone on another phone

Need answer ASAP!!!!

They’re not in the right spots just showing you where they can be placed

Need answer ASAP!!!! Theyre not in the right spots just showing you where they can be placed

Answers

Answer:

I am looking at it. Of course I can't  move anything. But I think relationship matches cardinality and entity matches entity name. Entities and entity relationships were what we used years ago when I was involved with designing hierarchical databases.

you will get a 8 out of 10 score for this

 

difference between tablet and smart phone

Answers

Answer:

What is the difference between tablets and smartphones? The main difference is the size of the screen. Smartphones usually have screen sizes between 4″/10cm and 7″/17cm, a tablet is anything over this. When it comes to processing power and available apps—they usually share the same capabilities.

Explanation:

Tablets are overwhelmingly used to play games and access entertainment (67 per cent), while smartphones are divided between games, social networking, and utilities (to name a few). Basically, tablets are seen as an entertainment platform, while smartphones are considered mostly a communications device.

A data analyst wants to quickly create visualizations and then share them with a teammate. They can use _____ for the analysis.

Answers

A data analyst could use Tableau for quickly creating visualizations and sharing them with a teammate. Tableau is a data visualization and business intelligence software that allows users to connect to various data sources, create interactive dashboards and reports, and share them with others.

Tableau has a drag-and-drop interface and a wide range of built-in chart types, making it easy for users to create professional-looking visualizations with minimal coding experience. Additionally, Tableau has a feature called Tableau Public, which enables users to share their visualizations with the public, making it a great tool for data analysts who want to share their findings with their colleagues or the wider community.

Learn more about tableau, here https://brainly.com/question/25531734

#SPJ4

Once you upload information in online,Where it is stored in?​

Answers

Answer:

It depends. It could be in database, in your files, or it could just be thrown away.

Explanation:

When you upload information online, it is stored in data centers spread throughout the world. These data centers have become increasingly important especially in recent years with the world’s population relying on them more and more.

Source :
(1) Your Online Data is Stored in These Amazing Places - Guiding Tech. https://www.guidingtech.com/61832/online-data-stored-amazing-places/.
(2) Where are uploaded files stored? - SharePoint Stack Exchange. https://sharepoint.stackexchange.com/questions/14226/where-are-uploaded-files-stored.
(3) Where is the data saved after a form is submitted?. https://techcommunity.microsoft.com/t5/microsoft-forms/where-is-the-data-saved-after-a-form-is-submitted/td-p/1169617.

what class of arthropods is mainly involved in the pollination process?​

Answers

Answer:

Insects

Explanation:

insects are the most pollinating arthropods.

"fifa uncovered," a documentary exploring the behind-the-scenes workings of soccer’s global governing body debuts nov. 9 on which network?.

Answers

Answer:

Netflix

Explanation:

This does not require an explanation, it has been announced that it will be streaming only on Netflix.

Exercise 3.6.7: Odd and Even

The program in this starter code does NOT work as intended. Your job is to find out why and fix the issue.

The program asks the user for two positive integers and will determine if both numbers are odd, if both numbers are even, or if one number is odd and the other number is even. Test and run the program to see how it behaves BEFORE diving into resolving the issue.

Take notes as you work. You'll need to answer the following questions in the free response that follows.

1. What was wrong with the program?

2. What expression was the programmer trying to use that gave the error?

3. How did you resolve the error?

——————————————————————————————————————————

import java.util.Scanner;



public class OddEvenTester

{

public static void main(String[] args)

{

//Ask user to input 2 positive integers

Scanner input = new Scanner(System.in);

System.out.println("Enter 2 positive integers");

int num1 = input.nextInt();

int num2 = input.nextInt();



//Call bothOdd method in OddEven class to determine if both

//numbers are odd

if(OddEven.bothOdd(num1, num2))

{

System.out.println("Both numbers are ODD.");

}



//Call bothEven in the OddEven class to determine if both

//numbers are even

else if(OddEven.bothEven(num1, num2))

{

System.out.println("Both numbers are EVEN.");

}



//Print out that one must be odd and one must be even since

//they are not both odd or both even

else

{

System.out.println("One number is ODD and one number is EVEN.");

}



}

}

——————————————————————————————————————————

public class OddEven

{

// Determines if num1 and num2 are both ODD

public static boolean bothOdd(int n1, int n2)

{

return !(n1 % 2 == 0 || n2 % 2 == 0);

}



// Determines if num1 and num2 are both EVEN

public static boolean bothEven(int n1, int n2)

{

return !(n1 % 2 == 0) && !(n2 % 2 == 0);

}



}

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that asks the user for two positive integers and will determine if both numbers are odd, if both numbers are even, or if one number is odd and the other number is even.

Writting the code:

import java.util.Scanner;

public class OddEvenTester {

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 System.out.println("Enter 2 positive integers");

 int num1 = input.nextInt();

 int num2 = input.nextInt();

 if(OddEven.bothOdd(num1,num2)){

  System.out.println("Both Odd");

 }

 else if(OddEven.bothEven(num1,num2)){

  System.out.println("Both Even");

 }

 else{

  System.out.println("One is Odd and one is Even");

 }

}

}

public class OddEven{

public static boolean bothOdd(int n1,int n2){

 return (n1%2==1 && n2%2==1);

}

public static boolean bothEven(int n1,int n2){

 return (n1%2==0 && n2%2==0);

}

}

See more about JAVA at brainly.com/question/19705654

#SPJ1

Exercise 3.6.7: Odd and Even The program in this starter code does NOT work as intended. Your job is

Mention any three features of an antivirus software? ​

Answers

Answer:

Real-time Scanning

Automatic Updates

Protection for Multiple Apps

Auto-Clean

Fights Against All Types of Malware

HOPE I HELPED

PLS MARK BRAINLIEST  

DESPERATELY TRYING TO LEVEL UP

✌ -ZYLYNN JADE ARDENNE

JUST A RANDOM GIRL WANTING TO HELP PEOPLE!

                     PEACE!

The three attributes of antivirus software include auto-cleaning, automatic updates, and real-time scanning.

The information regarding the three attributes of antivirus software is as follows:

The work of the antivirus software discovered malicious software. In the auto-cleaning, it rid of the viruses that could come in the laptops.In real-time scanning, it regularly checks whether there is any malicious software or not due to this the laptop does not damage.The antivirus software required regular updates so that they could track the new threats if any also at the same time it protects your laptops.

Therefore we can conclude that the three attributes of antivirus software include auto-cleaning, automatic updates, and real-time scanning.

Learn more about the software here: brainly.com/question/15937118

Mention any three features of an antivirus software?

Based off a rudimentary periodic table,
was Mendeleev able to accurately predict
the properties of the newly discovered
element discussed here?

Answers

No, he was not able to accurately predict the properties of the newly discovered element.

What is element?
An interesting chance to look at the link that now exists between chemists & philosophers in chemistry is the topic of the conceptual nature of a term "element." The English scientist Robert Boyle was the one who first proposed the chemical element. He stated that an element is a substance that is "incapable of breakdown" and added the prophetic through any means that we are now familiar with, just like a good scientist. Boyle's definition is remarkably accurate in terms of current theory. In today's laboratories, elements have been altered, though not chemically.

To learn more about element
https://brainly.com/question/18096867
#SPJ1

how do you give brianliest

Answers

Answer:

When you ask a question in brainly, two helpers will answer it, then on each answerer you'll find "mark as brainliest" button which looks like a crown.

Hope this helps :)

Other Questions
concerns surrounding how to avoid labeling or stigmatizing people are most immediately relevant to the of a psychological disorder. What is the term for the measurement of how well a machine converts inputwork into output work?OA. MachineryOB. PowerOC. Mechanical efficiencyOD. Work PLEASE HELP I WILL MAKE BRAINLIEST! You choose two different movies on a list at random. Out of 12 movies on the list, 4 are action movies. The first movie you choose is an action movie. What is the probability that the second movie is also an action movie? PLEASE HELP MEEEE ASAP...What does the Bible say about empathetic listening? ....need a Reference to Using a Short Run Aggregate Supply-Aggregate Demand diagram, what is the effect of a decrease in government spending on equilibrium average price level and output? a Increase in equilibrium average price level, increase in equilibrium output b Decrease in equilibrium average price level, increase in equilibrium output c Increase in equilibrium average price level, decrease in equilibrium output d Decrease in equilibrium average price level, decrease in equilibrium output Solve the following problems: 1. A reciprocating compressor draws in 500ft 3/min. of air whose density is 0.079lb/ft 3 and discharges it with a density of 0.304lb/ft 3. At the suction, p1=15psia; at discharge, p2 = 80 psia. The increase in the specific internal energy is 33.8Btu/lb, and the heat transferred from the air by cooling is 13Btu/lb. Determine the horsepower (hp) required to compress (or do work "on") the air. Neglect change in kinetic energy. 2. The velocities of the water at the entrance and at the exit of a hydraulic turbine are 10 m/sec and 3 m/sec, respectively. The change in enthalpy of the water is negligible. The entrance is 5 m above the exit. If the flow rate of water is 18,000 m3/hr, determine the power developed by the turbine. 3. A rotary compressor draws 6000 kg/hr of atmospheric air and delivers it at a higher pressure. The specific enthalpy of air at the compressor inlet is 300 kJ/kg and that at the exit is 509 kJ/kg. The heat loss from the compressor casing is 5000 watts. Neglecting the changes in kinetic and potential energy, determine the power required to drive the compressor. Plz help By today evening Mr. K, a 57-year-old man, presents w/CC of bilateral claudication provoked by moderate exercise. Pt also states extended sitting w/o support of lower extremities results in bilateral lower extremity erythema and occasional pedal paresthesia. Contributing Social hx: Smoker: 30 pack years; little to no regular exercise.Physical examination reveals an overweight male appearing his stated age. Hyperthermia and anterolateral alopecia noted bilaterally in the lower extremities. Blood Tests:HypercholesteremiaHypertriglyceridemiaDifferential Diagnosis: Peripheral atherosclerosis, CHF, and peripheral vascular disease.Questions1. Explain how the disease process and development of atherosclerosis resulted in the presentation and lab results of Mr. K.2. Discuss the complications that might develop in Mr. K. 3. Identify possible plan of care options that may include patient education, treatment options, necessary referral(s) and/or further diagnostic testing for Mr. K. please can anyone explain congruent triangles Find the derivative of the following: a. f(x) = 3x4 - 5x + 17 b. f(x) = (3x + 5x)(4x - 7) c. f(x) = x(4+ 3x) 1/6 (12x - 30) + 4x (needs to be simplified) Evaluate the integral phi/60 82 (y cos x + 5) dydx. alfred adler emphasized _____ as an important motivating factor for personality development. group of answer choices Find the slope of the equation that goes through:(-4,-14) and (-10,6) Woojin believes his union will protect him from getting fired, and he believes that the only way to get a promotion is if the person above him retires or dies. Woojin has _____. what type of plate margin moves apart??? pls answer asap I need help!!! 15 points up for grabs Whats 3/5 of 6 hours :/ Exercise 1 Underline the correct pronoun. Identify the case by writing nom. (nominative) or obj. (objective) in the blank. Some sentences have more than one pronoun to identify.The contestants, Conrad and (I, me), were both nervous. Put the following portions in order from least to greatest 30% 1/5 75% 5/6 Pls help me guys ..................