Which statement is correct? a. choice of metric will influence the shape of the clusters b. choice of initial centroids will influence the result c. in general, the merges and splits in hierarchical clustering are determined in a greedy manner d. All of the above

Answers

Answer 1

Answer: the answer is c

Explanation:in general, the merges and splits in hierarchical clustering are determined in a greedy manner

Answer 2

Which statement is correct is that All of the above options are correct. Check more about metric below.

What is metric?

Metrics are known to be a unit that is often used in the measurement of quantitative works that are often used for comparing, tracking performance, etc.

Note that  Metrics can be used in a lot of purposes and as such, the  choice of metric will affect the shape of the clusters  and the use of merges and splits in hierarchical clustering are set up in a greedy manner.

Learn more about metric form

https://brainly.com/question/229459


Related Questions

Broken computers are being eco-recycled by the user. Which stage of the hardware lifecycle does this scenario belong to

Answers

Answer:

Decommission, E-cycle & Disposal

Explanation:

The life cycle of every hardware starts from its architectural design and ends when the hardware is being disposed of.

The reason for disposal could be as a result of when hardware becomes broken down (as stated in the question) or got outdated or out of place.

However, the stage that this belongs to is called "Decommission, E-cycle & Disposal" stage of the hardware lifecycle.

What type of switch is used to combine multiple network connections into a single link?a. core switchb. gateway switchc. aggregation switchd. access switch

Answers

Answer:

C. Aggregation switch.

Explanation:

Aggregation switch is a type of switch used to combine multiple network connections into a single link.

In Computer Networking, Aggregation switches are primarily designed to be used for connecting the Top-of-Rack (ToR) switches to a core switch or router, as the case may be.

Generally, the core switch is typically placed at the top of the data center network architecture topology.

An aggregation switch is usually designed to be large in size and has a lot of interfaces or ports for the connection of multiple networks into a single logical link.

Additionally, the connections are mainly done in parallel in order to prevent total downtime or redundancy in a network, as well as to enhance the throughput than what is obtainable in a single network.

The SmoothWall open source firewall solution uses colors to differentiate networks. Which color indicates the private, trusted segment of a network

Answers

Answer:

Green

Explanation:

The Green color indicates the private, trusted segment of a network.

The Smoothwall open source firewall solution makes use of colors in order to differentiate networks. Other colors like red denote connection to the internet, purple and orange are used to designate DMZs for wireless access points.

Smoothwall is usually configured via web-based GUI and does not really require much knowledge to install or use.

A mixture of benzene and toluene are to be separated in a flash tank. The pressure in the flash tank is 800 mm Hg. The units for Antoines equation are mm Hg and ◦C for pressure and temperature, respectively.
xB(Psat B) + (xT)(Psat T) = P
log10(Psat B) = 6.905 − (1211/ (T + 221))
log10(Psat T) = 6.953− (1344/ (T + 219 ))
At what temperature should the tank be operated to get the highest purity toluene in the liquid phase (maximizing xT)?

Answers

Answer:

At the temperature of 112.859°C

Explanation:

suppose xT denotes the amount of toluene in the mixture

xT ∈ (0,1)   xB = 1 -xT

substituting the value of xB and re-arrange to solve for xT, we have:

[tex]xT = \dfrac{P-Psat \ B}{P sat \ T - P sat \ B}[/tex]

For xT to be maximum, P needs to be equal to Psat T

∴ P = Psat T

or

Psat T = 800

log10 P sat T = log 10(800)

Using MATLAB code to solve the value of T (T_val), the code is inputed as:

syms T

equation = 6.953− (1344/ (T + 219 )) = log 10(800)

T_val = solve (equation,T);

T_val = double T_(val)

T_val= 112.859

definition of a network, what three components are used to create a network?

Answers

Answer:

There are three primary components to understanding networks: 1. Physical Connections; 2. Network Operating System; and 3. Application Component. ... However, the whole network stops if the main cable or bus is severed or disconnected.

Explanation:

3.19 LAB: Seasons In C++ Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day. Ex: If the input is: April 11 the output is: Spring In addition, check if the string and int are valid (an actual month and day). Ex: If the input is: Blue 65 the output is: Invalid The dates for each season are: Spring: March 20 - June 20 Summer: June 21 - September 21 Autumn: September 22 - December 20 Winter: December 21 - March 19

Answers

Answer:

#include <iostream>

#include <string>

using namespace std;

int main() {

  string mth;

int dy;

cin >> mth >> dy;

if ((mth == "January" && dy >= 1 && dy <= 31) || (mth == "February" && dy >= 1 && dy <= 29) || (mth == "March" && dy >= 1 && dy <= 19) || (mth == "December" && dy >= 21 && dy <= 30))

cout << "Winter" << endl;

else if ((mth == "April" && dy >= 1 && dy <= 30) || (mth == "May" && dy >= 1 && dy <= 30) || (mth == "March" && dy >= 20 && dy <= 31) || (mth == "June" && dy >= 1 && dy <= 20))

cout << "Spring" << endl;

else if ((mth == "July" && dy >= 1 && dy <= 31) || (mth == "August" && dy >= 1 && dy <= 31) || (mth == "June" && dy >= 21 && dy <= 30) || (mth == "September" && dy >= 1 && dy <= 21))

cout << "Summer" << endl;

else if ((mth == "October" && dy >= 1 && dy <= 31) || (mth == "November" && dy >= 1 && dy <= 30) || (mth == "September" && dy >= 22 && dy <= 30) || (mth == "December" && dy >= 0 && dy <= 20))

cout << "Autumn" << endl;

else

cout << "Invalid" << endl;

  return 0;

}

Explanation:

Answer: sorry this is in coral

integer inputMonth

integer inputDay

inputMonth = Get next input

inputDay = Get next input

if (inputMonth == 1 and inputDay >= 1 and inputDay <= 31)

Put "winter" to output

elseif (inputMonth == 2 and inputDay >= 1 and inputDay <= 29)

Put "winter" to output

elseif (inputMonth == 3)

if (inputDay >= 1 and inputDay <= 19)

Put "winter" to output

elseif (inputDay > 19 and inputDay <= 31)

Put "spring" to output

elseif (inputDay >=32)

Put "invalid" to output

elseif (inputMonth == 4 and inputDay >=1 and inputDay <= 30)

Put "spring" to output

elseif (inputMonth == 5 and inputDay >=1 and inputDay <= 31)

Put "spring" to output

elseif (inputMonth == 6)

if (inputDay >=1 and inputDay <= 20)

Put "spring" to output

elseif (inputDay >= 21 and inputDay <= 30)

Put "summer" to output

elseif (inputDay >=31)

Put "invalid" to output

elseif (inputMonth == 7 and inputDay >=1 and inputDay <= 31)

Put "summer" to output

elseif (inputMonth == 8 and inputDay >=1 and inputDay <= 30)

Put "summer" to output

elseif (inputMonth == 9)

if (inputDay >=1 and inputDay <=21)

Put "summer" to output

elseif (inputDay >= 22 and inputDay <=30)

Put "autumn" to output

elseif (inputDay >=31)

Put "invalid" to output

elseif (inputMonth == 10 and inputDay >=1 and inputDay <= 31)

Put "autumn" to output

elseif (inputMonth == 11 and inputDay >=1 and inputDay <= 30)

Put "autumn" to output

elseif (inputMonth == 12)

if (inputDay <= 0)

Put "invalid" to output

elseif (inputDay >= 1 and inputDay <= 20)

Put "autumn" to output

elseif (inputDay >=21 and inputDay<=31)

Put"winter" to output

else

Put "invalid" to output

Explanation:

Briefly explain how developers use a distributed version management system. You may assume that a master repository has been set up.

Answers

Answer:

Using version control tools like Git and Github.

Explanation:

Version control is a vital tool in programming in recent times. it helps to prevent loss of source codebase and creating unwanted folders for storing multiple codebases to prevent excess storage usage and time consumption.

Git and Github is a platform that handles version control and collaboration between co-workers. When a repository is created, its initial branch is called the master branch and when a staged code is committed, the commit is recorded. These records can be retrieved using the commit hash value and resetting the current unstaged file or code. A new branch can created to hold a different version of an application and merged later with the master branch.

For additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to:___________.

Answers

Answer:

Identify any program or services that you do not need.

Explanation:

As a network administrator, one of the preventive measures that could be adopted to complement your security system or architecture is to identify all the software applications or services that you do not need in an organization. This is because some of these programs might be a spyware, rootkit or compromised software which are used to gain unauthorized access to the network system. Also, you should identify the unused or unwanted programs or services in order to prevent redundancy and to optimize the performance of critical machines or processes in the organization's network.

Hence, for additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to identify any programs or services that you don’t need.

What are three subject areas that are key to successfully working in the field of robotics

Answers

The brain ( computer science engineering)

The nervous system ( electrical engineering)

The body ( Mechanical engineering). The mechanical engineer is in the charge of the physical system that makes up the robot.

Aside from the malicious link, there are also several other indicators on the email that shows it is likely a phishing email. Can you identify anything else that looks suspicious in the email?

Answers

Answer:

The senders email domain.

Explanation:

The senders email address is from a different email domain than the receivers email domain. The senders has a hyphen whereas the recipients does not.

Which tool encrypts entire drives, rendering them unusable unless one possesses the correct key to unlock the drive?

Answers

Answer:

Whole disk encryption.

Explanation:

Whole disk encryption, also known as, the full disk encryption is a tool that encrypts the entire drive. The whole disk encryption protects the whole hard drive from unwanted visitor to enter into your system.

This tool protects your entire data, softwares, files, etc stored in the hard drive. Whole disk encryption cedes the entire hard drive unusuable untill correct key is entered to unlock the drive.

Thus the correct answer is 'whole disk encryption.

A series of nested _____________ statements can be used to process the menu selections in lieu of the case statement

Answers

Answer: If-Else statement or If-Then-Else statement depending on the language.

Explanation: Although it's not recommended to nest a hundred if statements into each other, you can use them instead of a switch/case.

A series of nested If-Else statements can be used to process the menu selections in lieu of the case statement.

What is a menu selection?

The menu selection parameter needs to be created before utilizing a While loop to periodically evaluate a user's menu choices. Processing a user's menu choice always requires an iteration loop.

If a certain value is satisfied, the if/else sentence causes a block of code to be executed. An additional block of code can indeed be run if the condition is false. If you want to tell a block of code to run only if a certain expression is met, use the if statement.

f the same circumstance is false, use else to declare that a different block of code should be run. If the first conditions is false, use else if to define a new state to test. To provide a variety of different code blocks to be performed, use a switch.

Learn more about menu selection, Here:

https://brainly.com/question/29479833

#SPJ5

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port. Which two mandatory options are used to configure a VLAN interface? (Choose two.)

Answers

Incomplete question. Here's the full question:

Which two mandatory options are used to configure a VLAN interface?  

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port.

Which two mandatory options are used to configure a VLAN interface? (Choose two.)

A. Virtual router

B. Security zone

C. ARP entries

D. Netflow Profile

Answer:

A. Virtual router

B. Security zone

Explanation:

According to the networking protocol to create a virtual local area network (VLAN) you must:

1.  Have a configured Virtual router

2.  Create or configure a Layer 2 Security Zones.

Although there are other network requirements to successfully create VLAN but this are the basic ones needed.

Research and discuss web navigation.
Include discussion of web site navigation design patterns.
Please, use your own words.

Answers

Answer:

Answered below

Explanation:

Web navigation is the pattern in which information can be accessed through the navigation of a network of resources on the web. A good web navigation design enhances usability and ease of finding information, and as a result, improves user experience.

In hierarchical web navigation, the website navigation is structured in a general to specific order.

Global navigation shows all the main sections of the website such as home, about, contacts etc.

Local navigation provides links within the pages of the website where users can navigate to other related pages of the website.

Design uses styles such as navigation bar, drop-down menu, site map and fly-out menu to create user interfaces that enhance navigation.

CONVERT to C# C# C# C# Just need C and Dpublic class Patterns { public static void main(String[]args) { char[][] arr=new char[10][10]; int starCount = 10; for(int i=0; i }}Need this code converted to "C# C# C# C# C# Just need C and D

Answers

Answer:

following are converted C# code:

using System; //import System

class Patterns //defining class Pattern

{

public static void Main() //defining main method

{

char[,] arr=new char[10,10];//defining char array  

int starCount = 10;//defining integer variable starCount that holds value

int c=starCount;//defining integer variable c that holds starCount value  

for(int i=0; i<c;i++,starCount--)//defining loop for column  

{

for(int j=0; j<i; j++)//defining loop for rows

{

arr[i,j]='_'; //holds underscore value

}

for(int k=i; k<c; k++)//defining loop for rows  

{

arr[i,k]='*';//holds asterik value

}

}

for(int a=0; a<c; a++)//defining loop for print column value

{

for(int b=0;b<c;b++) //defining loop for print row value

{

Console.Write(arr[a,b]);//print value

}

Console.WriteLine();//print space value

}

}

}

Output:

please find the attachment.

Explanation:

In the above given C# language code, firstly we import the package system, in the next step, Patters is declared, inside the class a char array "arr" and integer variable "starCount" is declared, that store integer value and the main method is declared.

In the method, for loop is defined, inside the loop, it stores "underscore and asterisk" value in the array.

Outside to loop another loop is defined, which uses the print method to print its value.    

Suppose you are implementing the Comparable interface in a class representing a Book, where the ordering is based on the number of pages in the book. Write a compareTo method for this class. You may assume that in the Book class there is an instance variable called numPages and a method called getNumPages.

Answers

Answer:

Following are the code to this question:

public class Book implements Comparable<Book> //defining a class that inherits the interface

{

int numPage; //defining integer variable numPage

int getNumPage()//defining a method getNumPage

{

return numPage; //use return keyword to return numPage value

}

int compareTo(Book b)//defining a method compareTo that uses Book instance b

{

   //using multiple conditions

if (getNumPage() > b.getNumPage())//defining if block that checks getNumPage method value is greater then instance of getNumPage  

{

return 1; //return value 1

}

else if (getNumPage() == b.getNumPage())//defining else if block that checks method and its instance value is euqal    

{

return 0;//return 0

}

else //defining else block

{

return -1;//return value -1

}

}

}

Explanation:

In the above-given code, a class book is defined, that inherits the interface that is "Comparable<Book>". Inside the class, an integer variable "numPage" and a method "getNumPages" is defined, that returns the "numPage" value.

In the next step, the "compareTo" method is declared, which uses an instance of the book and use the conditional statement.

In the if block, It checks the "getNumPages" method value is greater than the instance of the "getNumPages" method if the value is true, it will return "1", otherwise goto else if block. In this block, it will check both "method and instance of method" values are equal, if the condition is true, it will return "0". In the else block, if the above condition is false, it will return the value that is "-1".  

After a merger between two companies a security analyst has been asked to ensure that the organization’s systems are secured against infiltration by any former employees that were terminated during the transition. Which of the following actions are MOST appropriate to harden applications against infiltration by former employees? (Select TWO)
A. Monitor VPN client access
B. Reduce failed login out settings
C. Develop and implement updated access control policies
D. Review and address invalid login attempts
E. Increase password complexity requirements
F. Assess and eliminate inactive accounts

Answers

C and F would be the ones to pick :)

Identify and define the root in the word belligerent HELP ME PLZ

Answers

The root belli means war and in war opposing spillers are very hostile or aggressive with each other. So belli means war and the definition is hostile or aggressive.

Answer:

belli

Explanation:

belli means war

Which of the following are screen objects used to maintain, view, and print data from a database?
A. Form.
B. Field.
C. Data files.
D. Entities.

Answers

The answer is Forms. hope this helped

Which of these statements regarding the computer platform is true?

A.computer game titles are more expensive than their console counterparts.

B. The computer platform is proprietary.

C. Requirements vary depending on the game title.

D. computer monitors have a lower resolution than television screens.

Answers

Answer:

i would say c.

Explanation:

some of the new AAA games that are made with higher graphics will require a better graphics card. and usually require a higher core cpu and more RAM.

It c but I hope is correct

The system administrator in your office quits unexpectedly in the middle of the day. It's quickly apparent that he changed the server password and no one knows what it is. What might you do in this type of situation?

Answers

Answer:

You should use an effective password cracker.

Explanation:

Since the system administrator decided to quit unexpectedly and apparently, he changed the server password and no one knows what it is. What you might do in this type of situation is to use an effective password cracker.

A password cracker can be defined as a software application or program used for retrieving passwords from stored locations or computer data systems. This simply means that, a password cracker is used to recover passwords in order to gain access to a computer system that is protected by authentication.

Some examples of commonly used passwords cracker are ElcomSoft, Aircrack, Hashcat, John the Ripper, Hydra, Cain and Abel, DaveGrohl, Ophcrack etc.

Double-clicking any failed logon attempt in the Even Viewer will open the:______.

Answers

Answer:

Event property window

Explanation:

The event property window can be used to know who signed into your computer without your knowledge. This feature will have to be enabled and configured by the owner of the system so as to be able to monitor unauthorized activities on your system which includes to find out who has been using your device without permission, troubleshoot certain problems, among other things..

The architecture in which the database resides on a back-end machine and users access data through their workstations is

Answers

Answer:

Client-server

Explanation: The client-server model is a type of model or architecture in which a client (Customer) requests for services from another known as the server which serves as the service provider.

In the client-server architecture, the database resides in the back end machine, from where services can be rendered to the client or users.

Answer:

Client-Server Model

Explanation:

The Client-Server model structure divides tasks between clients, which are the the requesters of services, and servers, which are the providers of services or resources.

Information or data, is usually stored securely in the backend or server machine. Users then access these information by communicating with the server over a computer network.

Example is when a user requests a webpage using a website's address. The server gets the request from the client and finds the page in the database residing in the backend, then serves it up to the user when found.

Recall that at a high level, categories of inter-process communication (IPC) facilities include those that share memory and those that transfer data. Which of the following statements are correct about IPC facilities?
A. Facilities that use data transfer, such as FIFO, can only be used between a parent process and a child process.
B. Facilities that share memory require more care in synchronizing data sharing.
C. Facilities that share memory can communicate a lot faster.

Answers

Answer:

Facilities that share memory require more care in synchronizing data sharing (B) and facilities that share memory can communicate a lot faster ( C )

Explanation:

The true statements about IPC facilities are : Facilities that share memory require more care in synchronizing data sharing  and facilities that share memory can communicate a lot faster.   this is because facilities that require the sharing of memory between themselves require more care in the synchronization of data and  also copying of messages is prohibited which in turn makes it faster for the facilities to communicate a lot faster.

Fiber deployment architectures include all of the following except:
A. Free space optic (FSO).
B. Mesh.
C. Ring.
D. Point to multipoint (PMP).

Answers

Answer:

C

Explanation:

The answer should C.

The information gathered by a probe, analyzed locally, and transmitted to a remote network management, is called

Answers

Answer:

Remote Network Monitoring (RMON)

Explanation:

The information gathered by a probe, analyzed locally, and transmitted to a remote network management, is called Remote Network Monitoring (RMON).

The Remote Network Monitoring (RMON) was developed in the early 1990s by Internet Engineering Task Force (IETF), which comprises of operators, network designers, researchers and vendors, saddled with the responsibility of designing, developing and promoting internet standards. It is a standardized method for monitoring, analyzing and troubleshooting network traffic on a remote ethernet transport (typically, through its port) to find network connection issues such as network collisions, dropped packets, and traffic congestion. A Remote Network Monitoring (RMON) is an extension of the Simple Network Management Protocol (SNMP) used to gather and manage informations or data about network systems performance.

In order to remotely monitor and gather informations about networks, a RMON probe which can either be a software or hardware is embedded into a network device with a Transmission Control Protocol and Internet Protocol (TCP/IP) such as a switch or router.

Basically, there are two (2) main versions of the Remote Network Monitoring (RMON);

1. RMON 1.

2. RMON 2.

In the Access Query window, the upper portion of the window contains the design grid.a) trueb) false

Answers

Answer:

b) false

Explanation:

Access Query Window comprises of two major parts which are:

1. Upper part: this is otherwise referred to as Show Table. It is the top part of the window which displays tables, fields, or subqueries that can be utilized in the query.

2. Lower part: this is otherwise referred to as the Design Table/Grid. It is the bottom part of the window which displays columns that can be utilized to create fields by the users.

Hence, the right answer is Option B: False

A high school in the United States has a relationship with a high school in Japan. all the students in each school are assigned to a student at the other school. The students write messages to each other week, describing what they did in school that week. This program is most strongly repeated to which aspect in life? Society, culture, ethics, or economy?

Answers

Answer:

Culture

Explanation:

Culture is defined as the way of life of a particular group of people.

The Japanese have their unique culture and the Americans also have their own unique culture, so if there is an exchange of message between a student from the United States and a student in Japan, and they write each other messages every week, describing what they did in school that week, then the program is most strongly repeated to the cultural aspect in life.

UC is trying to switch from legacy CRM to salesforce and wants to keep legacy CRM and salesforce in place till all the functionality is deployed in salesforce. The want to keep data in synch b/w Salesforce, legacy CRM and SAP. What is the recommendation

Answers

Answer: suggesting MDM solution and also linking MDM to both the salesforce and sap. More so, integrating SAP with both Salesforce and legacy CRM.

NB: Don't ever integrate legacy CRM to Salesforce

Explanation:

It should be noted that the best recommendation that could be given in order to keep data in synch b/w Salesforce, legacy CRM and SAP is by suggesting MDM solution and also linking MDM to both the salesforce and sap. More so, integrating SAP with both Salesforce and legacy CRM.

NB: Don't ever integrate legacy CRM to Salesforce

Which of the following is the general term used to describe software code that isdesigned to cause damage to a computer system?
A) Virus
B) Malware
C) Adware
D) Madware

Answers

Answer:

B. Malware

Explanation:

Malware is the general term used to describe software code that is designed to cause damage to a computer system

Malware also known as malicious software. It is a single term which refers to virus, trojans, adware spy ware, rogue, scare ware, worm etc.

They are intentionally designed to cause damage to a computer system.

Other Questions
what instrument will we use to find liquid volume Company expected to incur $9,450 in manufacturing overhead costs and use 4,500 machine hours for the year. Actual manufacturing overhead was $9,400 and the company used 5,050 machine hours. 1. Calculate the predetermined overhead allocation rate using machine hours as the allocation base. _______ / _________ = Predetermined overhead allocation rate ________/ __________ = ____ per machine hour 2. How much manufacturing overhead was allocated during the? year? ________ x ________ = overhead allocated ________ x _________ = ____________ ACA Section 1557, and the Final Rule interpreting it as drafted by the Obama Administration, differs from earlier legislation in providing broader protection against discrimination based on Estimate. Then find the difference 300,980 -159,000 .3% of what number is 4.8? Solve for x30 = 5(x + 1) YOU HAVE 30 GALLONS OF GAS AND YOU USE 5 GALLONS ER DAY FOR D DAYS Pestiferous Manufacturing produces a chemical pesticide and uses process costing. There are three processing departmentslong dashMixing, Refining, and Packaging. On January 1, the first departmentlong dashMixinglong dashhad no beginning inventory. During January, 47,000 fl. oz. of chemicals were started in production. Of these, 38,000 fl. oz. were completed, and 9,000 fl. oz. remained in process. In the Mixing Department, all direct materials are added at the beginning of the production process, and conversion costs are applied evenly throughout the process. At the end of January, the equivalent unit data for the Mixing Department were as follows: UNITS Equivalent Units Equivalent Units Units to be accounted for Direct Materials Costs Conversion Costs Completed and transferred out 38,000 38,000 38,000 Ending workminusinminusprocess* 9,000 9,000 3,960 47,000 47,000 41,960 * Percent complete for conversion costs: 44% In addition to the above, the cost per equivalent unit were $ 1.35 for direct materials and $ 5.20 for conversion costs. Using this data, calculate the full cost of the ending WIP balance in the Mixing Department. The weightedminusaverage method is used. A. $ 63,450 B. $ 41,960 C. $ 32,742 D. $ 12,150 Explain the difference between observed frequency and expected frequency as it relates to Chi-Square test. what is the answer to -1/8-2/7 someone answer this for me please .. find the area of the triangle given a = 14, c=21, and B=87. Round your answer to the nearest tenth. What is a biome and why is it important to protect all kinds of biomes? Im confused how do you simplify 25-9 The scale of a map is 1 : 100,000. The distance between two houses on the map is 3.2 cm. Find the actual distance, in kilometers, between the two houses? What evidence indicates that a chemical change took place when the iron and sulfur combined to form iron sulfide?A. The change is only temporary.B. The elements can be separated with a magnet.C. The change resulted in a new property.OD. During the change, gases are released. You are at a family reunion and the cooler contains ten bottles of soda; four Sprite, three Dr. Pepper, and three Cherry Coke. Three times, you randomly pick up a drink for your grandmother. The first time, you get a Cherry Coke. The second and third times, you get Dr. Pepper. What is the probability of getting Dr. Pepper the fourth time and then an Cherry Coke the fifth time without replacement? Pam has 35 bags of coins. Some of the bags contain 6 gold coins, and the rest contain 8 silver coins. If Pam has 240 coins in all, how many bags of each type of coin does Pam have? About how many times greater is the density of a neutron star compared to a white dwarf? How Many son does NBA youngboy have