The Adjacent Coins Problem Published on 2017-08-30 Consider N coins aligned in a row. Each coin is showing either heads or tails. The adjacency of these coins is the number of adjacent pairs of coins with the same side facing up. Write a program that given a non-empty zero-indexed array A consisting of N integers representing the coins, returns the maximum possible adjacency that can be obtained by reversing exactly one coin (that is, one of the coins must be reversed). Consecutive elements of array A represent consecutive coins in the row. Array A contains only 0s and/or 1s:

Answers

Answer 1

Answer:

Here is the JAVA code:

public class Main{

public static int solution(int[] A) { //method that takes non-empty array A consisting of 0s and 1s

           int N = A.length; // number of 0s and 1s in array A

           int r = 0; //result of adjacency

           for (int i = 0; i < N - 1; i++;   )   { // iterates through A

               if (A[i] == A[i + 1])  //if i-th element of A is equal to (i+1)th element

                   r = r + 1;   }     //add 1 to the count of r

           if (r == N-1)   //for test cases like {1,1}

           {return r-1; }

           int max = 0; //to store maximum possible adjacency

           for (int i = 0; i <N; i++)   { //iterates through array

               int c = 0;

               if (i > 0)    { //starts from 1 and  covering the last

                   if (A[i-1] != A[i]) //checks if i-1 element of A is not equal to ith element of A

                       c = c + 1;    //adds 1 to counter variable

                   else

                      c = c - 1;   } //decrements c by 1

               if (i < N - 1)     {//starting with 0

                   if (A[i] != A[i + 1])  //checks if ith element of A is not equal to i+1th element of A

                       c = c + 1; //adds 1 to counter variable

                   else

                       c = c - 1;   }      //decrements c by 1        

               max = Math.max(max,c);   }  //finds the maximum of max and c

           return r + max;         } //returns result + maximum result

        public static void main(String[] args) {

   int[] A = {1, 1, 0, 1, 0, 0}; //sample array to test the method

   System.out.println(solution(A));} } //calls the method passing array to it

Explanation:

The program works as follows:

A[] = {1, 1, 0, 1, 0, 0}

N = A.length

N = 6

The A has the following elements:

A[0] =  1

A[1] = 1

A[2] = 0

A[3] = 1

A[4] = 0

A[5] = 0

Program iterates through array A using for loop. Loop variable i is initialized to 0

if condition if (A[i] == A[i + 1]) checks

if (A[0] == A[0 + 1])

A[0] =  1

A[0 + 1] = A[1] = 1

They both are 1 so they are equal

r = r + 1;  

Since the above if condition is true so 1 is added to the value of r Hence

r = 1

At each iteration of the loop the if condition checks whether the adjacent elements of A are equal. If true then r is incremented to 1 otherwise not.

So after all the iterations value of r = 2

if (r == N-1) evaluates to false because r=2 and N-1 = 5

So program moves to the statement:

for (int i = 0; i <N; i++)

This loop iterates through the array A

if (i > 0) condition checks if value of i is greater than 0. This evaluates to false and program control moves to statement:

if (i < N - 1) which makes if(0<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1])  which means:

if (A[0] != A[0 + 1]) -> if (A[0] != A[1])

We know that

A[0] =  1

A[1] = 1

So this evaluates to false and else part is executed:

value of c is decremented to 1. So c=-1

max = Math.max(max,c) statement returns the max of max and c

max = 0

c = -1

So max = 0

value of i is incremented to 1 so i = 1

At next step:

if (i < N - 1) which makes if(1<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1]) which means:

if (A[1] != A[1 + 1]) -> if (A[1] != A[2])

A[1] = 1

A[2] = 0

So the statement evaluates to true and following statement is executed

c = c + 1; The value of c is incremented to 1. So

c = -1 + 1

Hence

Hence c= 0, max = 0 and i = 2

next step:

if (i < N - 1) which makes if(2<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1]) which means:

if (A[2] != A[2 + 1]) -> if (A[2] != A[3])

A[2] = 0

A[3] = 1

So the statement evaluates to true and following statement is executed

c = c + 1; The value of c is incremented to 1. So

c = 0 + 1

c = 1

Hence

The statement max = Math.max(max,c) returns the max of max and c

max = 0

c = 1

So max = 1

Hence  c= 1, max = 1 and i = 3

next step:

if (i < N - 1) which makes if(3<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1]) which means:

if (A[3] != A[3 + 1]) -> if (A[3] != A[4])

A[3] = 1

A[4] = 0

So the statement evaluates to true and following statement is executed

c = c + 1; The value of c is incremented to 1. So

c = 1 + 1

c = 2

Hence

The statement max = Math.max(max,c) returns the max of max and c

max = 1

c = 2

So max = 2

Hence c= 2, max = 2 i = 4

next step:

if (i < N - 1) which makes if(4<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1])  which means:

if (A[4] != A[4+ 1]) -> if (A[4] != A[5])

A[4] = 0

A[5] = 0

So this evaluates to false and else part is executed:

value of c is decremented to 1. So c=1

max = Math.max(max,c) statement returns the max of max and c

max = 2

c = 1

So max = 2

value of i is incremented to 1 so i = 5

next step:

if (i < N - 1) which makes if(5<5) This evaluates to false

if (i > 0) evaluates to true so following statement executes:

if (A[i-1] != A[i])

if (A[5-1] != A[5])

if (A[4] != A[5])

A[4] = 0

A[5] = 0

This statement evaluates to false so else part executes and value of c is decremented to 1

Hence

max = 2

c = 0

So max = 2

value of i is incremented to 1 so i = 6

The loop breaks because i <N evaluates to false.

Program control moves to the statement:

return r + max;

r = 2

max = 2

r + max = 2+2 = 4

So the output of the above program is:

4

The Adjacent Coins Problem Published On 2017-08-30 Consider N Coins Aligned In A Row. Each Coin Is Showing

Related Questions

Which of the following is true about sorting functions?
A. The most optimal partitioning policy for quicksort on an array we know nothing about would be selecting a random element in the array.
B. The fastest possible comparison sort has a worst case no better than O(n log n)
C. Heapsort is usually best when you need a stable sort.
D. Sorting an already sorted array of size n with quicksort takes O(n log n) time.
E. When sorting elements that are expensive to copy, it is generally best to use merge sort.
F. None of the above statements is true.

Answers

Answer: Option D -- Sorting an already sorted array of size n with quicksort takes O(n log n) time.

Explanation:

Sorting an already sorted array of size n with quicksort takes O(n log n) time is true about sorting functions while other options are wrong.

Which is an appropriate strategy for using a workplace blog?

A. Use a professional tone.

B. Use an informal tone in internal blogs.

C. Treat internal blogs as personal communication.

Answers

Answer:

a

Explanation:

An approprbiate strategy for using a workplace blog is to use a professional tone. The correct option is a.

What is a professional tone?

Professional writing is a sort of writing that aims to quickly communicate information and ideas in a professional setting. It is straightforward and succinct. Professional writing aims to inform or persuade a reader about the business and work worlds.

Business writers should aim for an overall tone that is assured, respectful, and sincere; that employs emphasis and subordination effectively; that contains nondiscriminatory language; that emphasizes the "you" attitude.

It is written at a degree of difficulty that is suitable. Internal corporate communications, legal documents, business reports, governmental regulations, and scripts for the entertainment sector are typical examples of professional writing.

Therefore, the correct option is A. Use a professional tone.

To learn more about professional tone, refer to the link:

https://brainly.com/question/1278496

#SPJ2

Write a CREATE VIEW statement that defines a view named InvoiceBasic that returns three columns: VendorName, InvoiceNumber, and InvoiceTotal. Then, write a SELECT statement that returns all of the columns in the view, sorted by VendorName, where the first letter of the vendor name is N, O, or P.

Answers

Answer:

CREATE VIEW InvoiceBasic  AS

SELECT VendorName, InvoiceNumber, InvoiceTotal  

FROM Invoices JOIN Vendors ON Invoices.InvoiceID = Vendors.VendorID  

WHERE left(VendorName,1) IN ('N' , 'O ' , 'P' )

Explanation:

CREATE VIEW creates a view named InvoiceBasic  

SELECT statements selects columns VendorName, InvoiceNumber and InvoiceTotal   from Invoices table

JOIN is used to combine rows from Invoices and Vendors table, based on a InvoiceID and VendorsID columns.

WHERE clause specified a condition that the first letter of the vendor name is N, O, or P. Here left function is used to extract first character of text from a VendorName column.

Universal Containers will be using multiple environments to manage the development, testing, and deployment of new functionality to sales users. Which deployment tool can be used to migrate metadata across Salesforce environments

Answers

Answer:

1. Force.com IDE

2. change sets

Explanation:

1. Force.com IDE is an integrated development environment. It is useful for creating applications on the force.com using metadata. it uses text based files to constitute the different parts of Salesforce.

2. change sets:

these can send configuration from one between different Salesforce organizations. It migrates changes in metadata between different organizations.

var tax = .07;

var getCost = function(itemCost, numItems) {

var subtotal = itemCost * numItems;

var tax = 0.06;

var total = subtotal + subtotal * tax;

return (total);

}

var totalCost = getCost(25.00, 3);

alert("Your cost is $" + totalCost.toFixed(2) + " including a tax of " +

tax.toFixed(2));


Which variable represents the function expression?


a. totalCost

b. getCost

c. itemCost

d. total

Answers

Answer:

b. getCost

Explanation:

Javascript is a multi-purpose programming language, used in applications like web development, software development and embedded system programming, data visualization and analysis, etc.

Its regular syntax defines variables with the "var" keyword and with additional ecmascript rules, the "let" and "const" keywords as well. function definition uses the keyword "function" with parenthesis for holding arguments. The code block of a function is written between two curly braces and returns a value stored in a variable with the return keyword.

The variable can now be called with the parenthesis and required arguments. Note that only anonymous functions can assigned to a variable.

list three components of a computer system​

Answers

Central Processing Unit,
Input devices and
Output devices.

why is Touchpad used in the laptop computer​

Answers

Answer:

in controlling the mouse or cursor

Explanation:

as is it known tha a cursor is a poniting device. and the only way to control it without a mouse is the touchpad

What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior gatewayExterior gateway

Answers

Explanation:

Exterior gateway protocol are the routing protocols that are used on the internet for exchanging routing information among the autonomous system. These autonomous systems can be gateway protocol, vector routing protocol.

The protocol that communicates data between routers representing the edges of autonomous systems is called Exterior Gateway Protocol (EGP).

Here,

An autonomous system (AS) is a collection of routers that are under a single administrative domain and have a common routing policy. These autonomous systems can be Internet Service Providers (ISPs), large organizations, or even smaller networks.

EGP is specifically designed to exchange routing information between routers that are at the edges of these autonomous systems. It allows routers in different autonomous systems to communicate with each other and share information about the best paths to reach various network destinations.

Know more about Autonomous system,

https://brainly.com/question/30240559

#SPJ6

I keep getting this error: postfix.cpp: In function ‘double RPN_evaluation(std::string)’: postfix.cpp:42:26: error: cannot convert ‘__gnu_cxx::__alloc_traits > >::value_type {aka std::basic_string }’ to ‘char’ for argument ‘1’ to ‘int isOperand(char)’ if(isOperand(expr.at(g))){ ^ postfix.cpp:96:1: warning: control reaches end of non-void function [-Wreturn-type] } I am not sure what I am doing wrong, help please

Answers

Answer:

expr.at(g) returns a string, not a char. They are not the same thing and that is what the compiler is complaining about.

9. If you want to change the Header text of any Form then which property will you use
a) Header b) Text c) Name d) Font

Answers

Answer:

header

Explanation:

i would use header

1. Trình bày các mô hình mối đe dọa trong hệ thống viễn thông

Answers

Explanation:

please subscribe to my mom channel please

i request you

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0

Answers

Answer:

def pyramid_volume(base_length,base_width,pyramid_height):

      return base_length * base_width * pyramid_height/3

length = float(input("Length: "))

width = float(input("Width: "))

height = float(input("Height: "))

print("{:.2f}".format(pyramid_volume(length,width,height)))

Explanation:

This line declares the function along with the three parameters

def pyramid_volume(base_length,base_width,pyramid_height):

This line returns the volume of the pyramid

      return base_length * base_width * pyramid_height/3

The main starts here

The next three lines gets user inputs for length, width and height

length = float(input("Length: "))

width = float(input("Width: "))

height = float(input("Height: "))

This line returns the volume of the pyramid in 2 decimal places

print("{:.2f}".format(pyramid_volume(length,width,height)))


Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
A. 100
B. 200
C. 300
D. 400

Answers

Answer:

the answer is 300 feet in the daytime

what was the main purpose of napiers bone?​

Answers

Answer:

Napier's bones is a manually-operated calculating device created by John Napier of Merchiston, Scotland for the calculation of products and quotients of numbers. The method was based on lattice multiplication, and also called 'rabdology', a word invented by Napier.

Answer:

The main purpose of napiers bone is to fine products and quotient of divisions.

Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20

Answers

Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20?

a. It is required you have an endorsed/signed I-20 when Customs and Border Patrol or police ask for it

b. We only keep an unsigned digital copy and cannot sign an I-20 after the fact

c. It is against U.S. regulations to send digital (signed or not) DS-2019s and must treat I-20s the same

d. You will need all signed original I-20s to make copies to apply for OPT, STEM and H-1B in the future, so get them now!

e. It is the student’s choice to request each term, however, we cannot go back retroactively to provide past copies

f. We can only provide a signed copy of current I-20 and if changes occur from previous semesters that information will not show

g. The original endorsed I-20 signed by a DSO will be destroyed after 30 days of issuance if not picked up, and it cannot be replicated

h. The cost to have I-20 shipped may go up at any time

i. All the above

Answer:

i. All the above

Explanation:

DSO means designated school officials and they have to do with Student and Exchange Visitor Program (SEVP)-certified schools where students have to get a Form I-20, “Certificate of Eligibility for Nonimmigrant Student Status which provides information about the student's F or M status.

What a student must request for from his DSO signed I-20 ship are all the above options.

Class B { Public: Void b1(); Protected: Void b2(); }; Class A : public B { Public: Void a1(); Protected: Void a2(); }; Class C: public A { Public: Void c1(); }; Void main () { B temp1; A temp2; C temp3; } a) Name all member functions of all classes visible through temp1 in the main function? b) Name all member functions of all classes visible through temp2 in the main function? c) Name all member functions of all classes visible through temp3 in the main function? d) Which class is the parent of class A? e) Which class is the child of class A?​

Answers

Answer:

write the questions a little clear we can't read it

Pleaseeeeee helppppp meeeeeeee
Tomorrow is my examination.​
Please don't ignore.

Answers

Answer:

Floppy disk

Pendrive

sd card

CD

Router

Explanation:

Hope it is helpful

What is the output of the following Python program? try: fin = open('answer.txt') fin.write('Yes') except: print('No') print('Maybe')

Answers

(<ANSWER RETRACTED>)

A technique that uses data that is labeled to train or teach a machine.
Reinforcement
Unsupervised
Supervised

Answers

Answer:

computer.

Explanation:

it uses data that is labeled to train.

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Answers

Complete Question:

In which type of hacking does the user block access from legitimate users without actually accessing the attacked system?

Group of answer choices

a. Denial of service

b. Web attack

c. Session hijacking

d. None of the above

Answer:

a. Denial of service

Explanation:

Denial of service (DOS) is a type of hacking in which the user (hacker) blocks access from legitimate users without actually accessing the attacked system.

It is a type of cyber attack in which the user (an attacker or hacker) makes a system or network inaccessible to the legitimate end users temporarily or indefinitely by flooding their system with unsolicited traffic and invalid authentication requests.

A denial of service is synonymous to a shop having a single entry point being crowded by a group of people seeking into entry into the shop, thereby preventing the legitimate customers (users) from exercising their franchise.

Under a DOS attack, the system or network gets stuck while trying to locate the invalid return address that sent the authentication requests, thus disrupting and closing the connection. Some examples of a denial of service attack are ping of death, smurf attack, email bomb, ping flood, etc.

Your task is to write and test a function which takes one argument (a year) and returns True if the year is a leap year, or False otherwise. The seed of the function is already sown in the skeleton code in the editor. Note: we've also prepared a short testing code, which you can use to test your function. The code uses two lists - one with the test data, and the other containing the expected results. The code will tell you if any of your results are invalid.

Answers

Answer:

function isLeapYear( aYear ){

   var confirmYear=  year % 400 === 0 || (year % 100 !== 0 && year % 4 === 0);

   return confirmYear ? True : False;

}

Explanation:

The javascript function above requires an argument which is the year when it is passed, it is analyzed, counting the number of days in that year and a boolean value of true or false is dynamically assigned to the variable 'confirmYear'.

The ternary operator would logically select the right value, which is outputted to the user. To test the function, use the console to call the function with an argument.

console.log( isLeapYear( 1999 ) );

Say you have a long string and you want to collect all of the letters within it without storing duplicates. What would be the most appropriate type to store the letters in?
a. a set
b. a list
c. the original string
d. a dictionary

Answers

A set because sets do not allow duplicated elements

Assign a variable solveEquation with a function expression that has three parameters (x, y, and z) and returns the result of evaluating the expression Z-y + 2 * x. 2 /* Your solution poes here */ 4 solveEquation(2, 4, 5.5); // Code will be tested once with values 2, 4, 5.5 and again with values -5, 3, 8

Answers

Answer:

The programming language is not stated;

However, the program written in Python is as follows

def solveEquation(x,y,z):

     result = z - y + 2 * x

     print(result)

x = float(input("x = "))

y = float(input("y = "))

z = float(input("z = "))

print(solveEquation(x,y,z))

Explanation:

This line defines the function solveEquation

def solveEquation(x,y,z):

This line calculates the expression in the question

     result = z - y + 2 * x

This line returns the result of the above expression

     print(result)

The next three lines prompts user for x, y and z

x = float(input("x = "))

y = float(input("y = "))

z = float(input("z = "))

This line prints the result of the expression

print(solveEquation(x,y,z))

CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output for the given program Gus Bob Ann 1 short_names- Your solution goes here 2 # print names 4 print(short_names[0]) 5 print(short names [11) 6 print(short_names[2])

Answers

Answer:

short_names = ["Gus", "Bob", "Ann"]

print(short_names[0])

print(short_names[1])

print(short_names[2])

Explanation:

There are some typos in your code. In addition to the missing part of the code, I corrected the typos.

First of all, initialize the list called short_names. The list starts with "[" and ends with "]". Between those, there are must be the names (Since each name is a string, they must be written between "" and there must be a semicolon between each name)

Then, you can print each name by writing the name of the list and the index of the names between brackets (Index implies the position of the element and it starts with 0)


​what are the morals and ethics of computer

Answers

Answer:

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct. Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into three primary influences:

The individual's own personal code.

Any informal code of ethical conduct that exists in the work place.

Exposure to formal codes of ethics.

Explanation:

Write a job back with my best Interest

Answers

Answer:

be a doctor

Explanation:

u will help people and save them and get paid

Suppose that the tuition for a university is $10,000 this year and increases 4% every year. In one year, the tuition will be $10,400. Write a program using for loop that computes the tuition in ten years and the total cost of four years’ worth of tuition after the tenth year.

Answers

Answer:

The programming language is not stated; however, I'll answer using Python programming language (See attachment for proper format)

tuition = 10000

rate = 0.04

for i in range(1,15):

tuition = tuition + tuition * rate

if i <= 10:

print("Year "+str(i)+" tuition:",end=" ")

print(round(tuition,2))

if i == 14:

print("Tuition 4th year after:",end=" ")

print(round(tuition,2))

Explanation:

The first 2 lines initializes tuition and rate to 10000 and 0.04 respectively

tuition = 10000

rate = 0.04

The next line iterates from year 1 to year 14

for i in range(1,15):

This line calculates the tuition for each year

tuition = tuition + tuition * rate

The next 3 lines prints the tuition for year 1 to year 10

if i <= 10:

print("Year "+str(i)+" tuition:",end=" ")

print(round(tuition,2))

The next 3 lines prints the tuition at the 4th year after year 10 (i.e. year 14)

if i == 14:

print("Tuition 4th year after:",end=" ")

print(round(tuition,2))

An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. Which of the following would BEST meet this goal?a. Split tunnelb. Full tunnelc. IPsec using Tunnel moded. IPsec using Transport mode

Answers

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

7. Which control is used to display multiple records in List Form
a) Data Grid View b) Textbox c) Label d) Button

Answers

Answer:

I think a is correct answer.

Answer:

A

Explanation:

Where in the Formula tab on the ribbon would you find the Use in Formula function?
Function library
Formula Auditing
Calculation
Defined Names

Answers

Answer:

Defined Names

Explanation:

Just did it on Edg 2020

The Formula tab on the ribbon can be found in Defined Names in formula function. The correct option is D.

What is formula tab?

The formula tab is where you can insert functions, outline the name, generate the name, review the formula, and so on.

The Formulas tab on the ribbon contains critical and useful functions for creating dynamic reports. Function Library, Defined Names, Formula Auditing, and Calculation are all included.

The Formula tab is where we insert functions, define names, create name ranges, and review formulas. The Formulas tab in the ribbon contains very important and useful functions for creating dynamic reports.

The Formula command is located in the Data group on the Table Tools, Layout tab. When you open a document that contains a formula in Word, the formula automatically updates.

The Formula tab on the ribbon can be found in the formula function's Defined Names.

Thus, the correct option is D.

For more details regarding formula tab, visit:

https://brainly.com/question/20452866

#SPJ5

Other Questions
The five-number summary for the number of touchdowns thrown by each quarterback in the British Football League is shown in the following table. About what per cent of quarterbacks in the British Football League threw more than 13 touchdowns? Which polynomial function has zeros when ? A: B: C: D: 21. Evaluate f(x) = 3x + 8 for x = 1. On January 1, 2018, Martinez Inc. granted stock options to officers and key employees for the purchase of 22,000 shares of the companys $10 par common stock at $23 per share. The options were exercisable within a 5-year period beginning January 1, 2020, by grantees still in the employ of the company, and expiring December 31, 2024. The service period for this award is 2 years. Assume that the fair value option-pricing model determines total compensation expense to be $340,800.On April 1, 2019, 2,200 options were terminated when the employees resigned from the company. The market price of the common stock was $33 per share on this date.On March 31, 2020, 13,200 options were exercised when the market price of the common stock was $41 per share.Prepare journal entries to record issuance of the stock options, termination of the stock options, exercise of the stock options, and charges to compensation expense, for the years ended December 31, 2018, 2019, and 2020. (Credit account titles are automatically indented when amount is entered. Do not indent manually. If no entry is required, select "No Entry" for the account titles and enter 0 for the amounts.)DateAccount Titles and ExplanationDebitCreditJan. 1, 2018Dec. 31, 2018April 1, 2019Dec. 31, 2019Mar. 31, 2020Jan. 1, 2018Dec. 31, 2018April 1, 2019Dec. 31, 2019Mar. 31, 2020Jan. 1, 2018Dec. 31, 2018April 1, 2019Dec. 31, 2019Mar. 31, 2020Jan. 1, 2018Dec. 31, 2018April 1, 2019Dec. 31, 2019Mar. 31, 2020Mar. 31, 2020 Name one real-world object that suggests A. Points B. Lines and C. Planes The question is to rewrite the following text in the imperfect indicative to tell how life used to be. Estoy mug ocupado los sabados. Siempre voy al cine y veo una pelicula. Tambien salgo a comer. Mis amigos y yo comemos y hablamos hasta la medianoche. Mi mejor amigo siempre paga la cuenta. Que suerte! Please help to solve this.Find sin5x,if sinx+cosx=1,4 a baseball is given an initial velocity with magnitude v at the angle beta above the surface of an incline which in turn inclined at angle teta above horizontal calculate the distance measured along incline from the launch point to where the baseball strike the incline As captain of the school sports team, you hv been instructed by the school Head to write a report explaining why you failed to fulfill a fixture against Chipenzo High school .Using the following notes addingIntroduction A loop of wire in the shape of a rectangle rotates with a frequency of 143 rotation per minute in an applied magnetic field of magnitude 2 T. Assume the magnetic field is uniform. The area of the loop is A = 2 cm2 and the total resistance in the circuit is 7 .1. Find the maximum induced emf. e m fmax = 2. Find the maximum current through the bulb. Imax Which of the following choices best describes the purpose of the Sugar Act? do you go...school...foot or...bike Evaluate the following expression. 8 (10) 7 1/1 Suppose that the cost of renting a snowmobile is $37.50 for 5 hours. a. If c represents the cost and represents the hours, which variable is the dependent variable?b. What would be the cost of renting 2 snowmobiles for 5 hours? please and thanks ( i"ll give brainiest ) Here are the ages (in years) of 10 professors at a college. , 47, 44, 48, 43, 35, 65, 56, 37, 7351 What is the percentage of these professors who are younger than 50? What is 15+(-11) simpyfied 1. What is the basic economic problem that societies must solve?A Who will consume the goods and services?B How will the goods and services be produced?C What goods and services should be produced?D How to allocate resources in order to best satisfy the needs and wants of people.2.In which economic system are price signals, resulting from supply and demand forces, the only determining factor for the goods and services that the economy produces?A a market economyB a traditional economyC a mixed economyD a command economy3.How do property rights influence the exchange of goods and services in the market?A Property rights determine ownership of resources among businesses, individuals, and governments.B Property rights prevent market failures from arising in an economy.C Property rights allow consumers' wants and needs to control the output of producers.D Property rights prevent producers from exhibiting profit-seeking behavior.4.A traditional economy is an economy where ____________A economic decisions are based on price signals from supply and demand forces.B economic decisions are based on traditions, culture, and beliefs.C economic decisions are made by the government.D economic decisions are made by the government for some resources and are based on supply and demand forces for others.5. Which economy has the highest level of consumer sovereignty?A command economyB market economyC mixed economyD traditional economy What is the answer -13.62-(27.9) According to Aristotle, poetry is a form of Find the sum of 2 5/10 and 5 4/15. Then, in two or more complete sentences, explain the steps you used to add the mixed numbers.