How many assignments would you have failed without brainly?

lol.

Answers

Answer 1
How many assignments would I have failed without brainy? Lol

ALL OF THEM

Related Questions

Write a program that asks the user to enter a series of single digit numbers with nothing separating them. Read the input as a C-string or a string object. The program should display the sum of all the single-digit numbers in the string. For example, if the user enters 2514, the program should display 12, which is the sum of 2, 5, 1, and 4. The program should also display the highest and lowest digits in the string.

Answers

Answer:

#include <stdio.h>

#include <string.h>

int main(){

   char number[100];

   printf("Number: ");

   scanf("%s", number);

   int sum = 0;

   for(int i =0;i<strlen(number);i++){

       sum+= number[i] - '0';

   }

           printf("Sum: %d",sum);

   return 0;

}

Explanation:

This declares a c string of 100 characters

   char number[100];

This prompts user for input

   printf("Number: ");

This gets user input

   scanf("%s", number);

This initializes sum to 0

   int sum = 0;

This iterates through the input string

   for(int i =0;i<strlen(number);i++){

This adds individual digits

       sum+= number[i] - '0';

   }

This prints the calculated sum

           printf("Sum: %d",sum);

   return 0;

The program that ask the user to enter a series of single digit number and display the sum of all the single digit number, highest number and lowest number is as follows:

x = input("input the series of number: ")

y = []

for i in x:

  y += i

integer_map = list(map(int, y))

print(sum(integer_map))

print(max(integer_map))

print(min(integer_map))

The code is written in python.

Code explanation:The first line of code ask the user for the series of numbers. The user input is stored in the variable "x"The y variable is an empty arraywe use the for loop to loop through the users series of number. Then add the looped items to the empty array.Then we map the string of list to an integersFinally, we print the sum , maximum and minimum number of the list.

learn more on python program: https://brainly.com/question/16025032?referrer=searchResults

Which plan includes procedures and processes that ensure the smooth functioning of the business even after a disaster?

A(n)

plan includes procedures and processes that ensure the smooth functioning of the business even after a

disaster

Answers

Answer:

The plan that includes procedures and processes that ensure the smooth functioning of the business even after a disaster is the:

business continuity and disaster recovery plan.

Explanation:

An entity that has good business continuity and disaster recovery plan maintains its full operational activities and processes after a business disaster.   After the business disaster, the entity may even grow bigger, because it has identified critical functions and their dependencies for continued growth.  While the period is a time of recovery, for business entities that are well-prepared, the recovery period offers a unique opportunity for innovation and rapid recovery and development on all fours: organization, processes, people, and performance.

Answer:

Business Continuity Plan

Explanation:

                                     Sincerely : Baby weeb

What hardware actually produces hard-copy documents on paper or other print media?

Answers

Answer:

Impact because dot matrix (impact) printers strike the image onto the paper, they are good printers to use when carbon-copy documents are being printed.

Explanation:

write declarations for variables p1 and p2 whose values will be addresses of memory locations in which a double can be stored

Answers

Answer:

double * p1;

double * p2;

Explanation:

A pointer is a variable that holds the address location of other variables. It is defined with the asterisk character in the middle of the variable type and name.

The p1 and p2 pointers above are pointers that hold the memory addresses of two different double or float point numbers.

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?

a. HIDS
b. NIDS
c. NIPS
d. HIPS

Answers

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

Please Help Me I Need A Better Grade.____________________________ focuses on creating engaging interfaces with well thought out behaviors.


Question 9 options:


A)Information architecture



B)Interface elements



C)Visual design



D)Informational components



E)Interaction design

Answers

Answer:

The answer you are looking for is "E.) Interaction design" This design theory focuses on how someone might interact with the system, or fix problems early- it also expresses inventing new ways of doing things.

An update anomaly can occur if A. an instance of the same data is stored in two or more places in the database. B. a data element is deleted and causes the loss of information about a different data element. C. a user incorrectly changes a value. D. a data element is left out of an update.

Answers

Answer:

A. an instance of the same data is stored in two or more places in the database.

Explanation:

Giving that Update Anomalies usually occur when the designated user person in keeping records or record master stored a particular data in more than one in a database. This is what is called duplication of data and is termed an irregularity on the part of the record keeper.

Hence, the correct answer to the question is " A. an instance of the same data is stored in two or more places in the database."

The library can store up to 100 books. Each book has information of title, author, year, and a borrowed status (true or false). The library allows adding new books to it, checking out a book, and returning a book. We assume different books have different titles in the library.

Answers

Answer:

class Books(object):

   books_count = 0

   books = {}

   #classmethod

   def book_count(cls):

       cls.books_count +=1

   #classmethod

   def add(cls, title, author, year, status):

       if cls.books_count < 100:

           cls.book_count()

           cls.books[title] = [author, year, status]

       else:

           print("Book register has reached it's limit.")

   #classmethod

   def check(cls, book_name):

       return cls.books.get(book_name)

please replace the '#' with the 'at' sign.

Explanation:

The python class defines several class methods namely; add, check and book_count. The add method adds books to the book dictionary in the class as a class attribute, the check method check for the presents of a book title in the book dictionary while the book_count method adds one to the books_count class variable which checks the dictionary size.

What is PCM system? essay

Answers

A PCM system consists of a PCM encoder (transmitter) and a PCM decoder (receiver). The essential operations in the PCM transmitter are sampling, quantizing and encoding. All the operations are usually performed in the same circuit called as analog-to digital convert Early electrical communications started to sample signals in order to multiplex samples from multiple telegraphy sources and to convey them over a single telegraph cable. The American inventor Moses G. Farmer conveyed telegraph time-division multiplexing (TDM) as early as 1853. Electrical engineer W. M. Miner, in 1903, used an electro-mechanical commutator for time-division multiplexing multiple telegraph signals; he also applied this technology to telephony.

Time-division multiplexing (TDM) for telegraphs was first introduced in 1853 by an American inventor named Moses G. Farmer. W. M. Miner, an electrical engineer, developed an electro-mechanical commutator in 1903 to time-division multiplex many telegraph signals. He later used similar technology for telephone.

What best define about PCM system?

An encoder (transmitter) for PCM and a decoder for PCM make up a PCM system (receiver). Sampling, quantization, and encoding are the three key processes in the PCM transmitter.

Typically, a circuit known as an analog-to-digital converter is used to carry out all the processes. To multiplex samples from many telegraphy sources and transmit them over a single telegraph line, early electrical communications first started to sample signals.

Therefore, a digital approach where the measured amplitude of an analogue signal is coded into a string of binary values after periodically sampling the signal.

Learn more about PCM system here:

https://brainly.com/question/28599250

#SPJ2

Write code that will copy the contents of the file into an array. You can assume that the file will only have 5 data values

Answers

Answer:

Explanation:

The following code is written in Java. It is a function that reads the file in the URL that is given in the parameter. It then places the file into a String and assumes that each element is separated by a space (" "). It then loops through that string adding each element into the created local ArrayList. Finally, It prints the contents of the ArrayList and returns the ArrayList.

public static ArrayList<String> toArray (String file) throws IOException {

               ArrayList<String> myArr = new ArrayList<>();

               BufferedReader reader = new BufferedReader(new FileReader(file));

               String readFile = reader.readLine();

               reader.close();

               for (int x = 0; x < readFile.length(); x++) {

                       int start = 0;

                       if (readFile.charAt(x) == ' ') {

                               myArr.add(readFile.substring(start,x));

                               start = x + 1;

                       }

               }

               for (String x : myArr) {

                       System.out.println(x);

               }

               

               return myArr;

       }

You are an IT technician for your company. One of your employees has a computer that continually reboots when it is powered on. He has asked you to fix it. You suspect that the power supply may be failing. Which of the following is the BEST way to determine whether the power supply is causing the reboots

a. Replace the power supply.
b. Listen for POST code beeps to determine the error's cause
c. Verify that the fan on the power supply is spinning
d. Use a multimeter to the power supply.

Answers

Answer:

D: Use a multimeter to test the power supply

Explanation:

We want to determine whether the power supply is causing the reboots. Now, the most ideal thing to do will be to connect a multimeter to help in testing the source of power supply. This is because a multimeter measures the major factors in power which are voltage, current and resistance and as such it is therefore a standard diagnostic tool used widely by technicians in the electrical & electronic industries.

Which question should the user ask when determining whether a closing tag is needed

Answers

Answer:

What is element definition in the HTML specification?

Explanation:

The question a user should ask when determining whether a closing tag is needed is "What is element definition in the HTML specification?"

This is because the specification of an element determines how the elements can be used in HTML in accordance with the rules such as distinguishing which elements can have a closing tag.

Hence, in this case, the correct answer is "What is element definition in the HTML specification?"

We define the ___________ of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps. This is a common measure of the efficiency of an algorithm. a. time complexity b. one-way function c. OAEP d. timing attack

Answers

Answer:

a. time complexity

Explanation:

An algorithm can be defined as a standard formula or procedures which comprises of set of finite steps or instructions for solving a problem on a computer.

We define the time complexity of an algorithm to be f(n) if, for all n and all inputs of length n the execution of the algorithm takes at most f(n) steps. This is a common measure of the efficiency of an algorithm.

Hence, the time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the input.

1. Write a SELECT statement that returns these columns: The count of the number of orders in the Orders table The sum of the TaxAmount columns in the Orders table

Answers

Answer:

SELECT

COUNT(SN), SUM(TaxAmount)

FROM ORDERS  

or

SELECT

COUNT(SN) AS NumOrder, SUM(TaxAmount) As TotalTax

FROM ORDERS

Explanation:

Finding it difficult to add my explanation. So, I used an attachment instead

What is a primary difference between the header section of a document and the body
The body is displayed on the web page and the header is not.
The header is displayed on the web page and the body is not
The tag for the body is self-closing, but the tag for the header must be closed.
The tag for the header is self-closing, but the tag for the body must be closed.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The header and body are parts of the web page. As, you know that in the header section, we define mostly script and title information for the page. While the body section contains the page content.

In this question, the given options are:

The body is displayed on the web page and the header is not. The header is displayed on the web page and the body is not The tag for the body is self-closing, but the tag for the header must be closed. The tag for the header is self-closing, but the tag for the body must be closed.

The correct answer to this question is 1:

The body is displayed on the web page and the header is not.

While the other options are not correct because:

The body always displays the content of the page while the header does not display on the web page. And, also all body and header tags must be closed.

Consumers who pay more than the minimum payment on credit cards...
are crazy, why pay more than you need to?
O pay less interest in the long run.
O see their credit scores decrease.
are able to buy more things.

Answers

Pay less interest in the long run

Microsoft Excel is an example of a(n) application.

Answers

Answer:

Yes, it is an example of an app. It's downloadable (like apps normally are)

and it works through some of the same coding as an app.

-----------------------------------------------------------------------------------------------------------------Have a nice day person

<3

Microsoft created and released Excel, a spreadsheet program. It is a component of the Microsoft Office productivity software package.

What is the main use of Microsoft Excel?

Spreadsheets can be formatted, organized, and computed by Microsoft Excel users.

By structuring data using programs like Excel, data analysts and other users may make information easier to study when it is added or changed. In Excel, the rectangular containers are known as cells, and they are organized into rows and columns.

It has calculating or computing capabilities, graphing tools, pivot tables, and the Visual Basic for Applications macro programming language (VBA). The Microsoft Office program package includes Excel.

Therefore, Microsoft produced Microsoft Excel, a spreadsheet, for Windows, macOS, Android, and iOS.

Learn more about Microsoft Excel here:

https://brainly.com/question/24202382

#SPJ2

11.How would you characterize the relative range of paths forecasted by the various computer models on August 25

Answers

Answer:

Following are the solution to this question:

Explanation:

There is some difference between both the path expected by different computer simulations on 25 August. There is also some variance between 50 km to 500 km in the predicted route but the path is also unique in each model evaluation. It might be because any and every possible situation is repeated by the computer program. Many simulations will focus mostly on variations of strain, one might focus on the temperature variation, or one might concentrate on certain variables. But each model suggests all and every parameter which is inserted during a very photographer's encoding. There are therefore several possibilities of variability in forecasting the Hurricane's course. Here and some forecasts have shown that hurricanes would pass through Florida fully, and also some models have shown that hurricanes would pass thru the Gulf Coast, accompanied by the areas of Mississippi or Louisiana. This is the real difference in the direction of these models.

Redis can be configured to meet different requirements by editing the configuration settings in __________.

Answers

Answer:

redis.conf

Explanation:

Redis is an open-source licensed application, that acts as a database configurator. In other words, Redis is one of the ideal tools for database operations.

Hence, the redis.conf is the configuration file used to specify how the application would run to meet different requirements.

Drag the tiles to the correct boxes to complete the pairs.
Brian, a math Instructor, needed to make a quick announcement to his students. Since he was in a hurry, he asked a student named Rob to jot
down the points and mail it to the student malling list. Later in the day, when the students checked their email, they found Brian's
announcement mail sent to them by Rob. Match the components to their duties as per the communication systems model.
Brian
students
announcement
email
Rob
channel
sender
message

Answers

Answer:

The answer to the question is given in the explanation section.

Explanation:

We have given

Brian, student, announcement, email, rob, channel, sender, message

These are 8 pairs we have to combine the corresponding two.

Brain : sender

Rob: Student

Channel: Announcement

Email: Msg

Answer:

ANSWER: Channel: Email. Sender: Brian. Message: Announcement. Transmitter: Rob. Receiver: Students

Explanation:

Just posting what's in the comments giving full credit to them though

Edmentum/Plato 2021

5. If you upgrade the RAM (Random Access Memory) of you computer, what kind of enhancements will you notice? (Pick one or more choices)
(A) My computer will become faster, if I am maxing out the computer memory usage.
(B) I will be able to store and save more data and files on the computer (Example: photos, videos, documents, movies and music)
(C) I will be able to open up and work on multiple applications and software on my computer simultaneously (without making the computer lagging and slow). I will be able to open multiple tabs on the browser.
(D) I will be able to randomly use my laptop anytime I want.

Answers

A

Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code. A random-access memory device allows data items to be read or written in almost the same amount of time irrespective of the physical location of data inside the memory.

RAM allows your computer to perform many of its everyday tasks, such as loading applications, browsing the internet, editing a spreadsheet, or experiencing the latest game. Memory also allows you to switch quickly among these tasks, remembering where you are in one task when you switch to another task.

b) Write Java code for sorting the Actors’ musical skills in ascending order

Answers

Answer:

bxnxjxksoapowowe is a a o v loser player of the year to same time with me in fig

i need help look at pic

Answers

Answer:

ok

Explanation:

where is the pic that u want us to have a look at

What kind of variable will be created by a line of code that reads num1 = input("Please enter your favorite
number.")?
O a string
O a float
O an integer
O a generic

Answers

Answer:

Since the input isn't specified, it would be string.

Explanation:

When input isn't specified, it's a string by default.

hope this helped :D

what are the applications of computer in the field of study​

Answers

Answer: it is what it is

Explanation:

To do assignments

Compute is used by teachers to make reports and presentations

Jaina is a big fan of a popular comic book series and is so inspired that she decides to write her own story. She starts her own web comic using the same characters from her favorite comic, but with her original art and story writing. To design the rest of her website, Jaina scans a few pictures from her copies of the popular comic and recolors them slightly. Nowhere on the website does Jaina mention the original comic book authors. Jaina believes that she is not plagiarizing since she has created original work based simply based on pre-existing ideas.

What kind of consequences might result from Jaina's actions?

Answers

Answer:

She probably go to jail for a few

Write a function shuffle that takes as input parameter arguments two vectors of integer values and returns a vector of integer values that combines the two input vectors by alternating between values from each of the two vectors.

Answers

Answer:

This question is answered using C++

vector<int> shuttle(vector<int> vect1 , vector<int> vect2)  {  

  vector<int> result;

  for(int i=0;i<vect1.size();i++) {

      result.push_back(vect1[i]);

      result.push_back(vect2[i]);

  }

  return result;

}  

Explanation:

This defines the vector function with two vector arguments

vector<int> shuttle(vector<int> vect1 , vector<int> vect2)  {  

This declares result as an integer vector

  vector<int> result;

The following iterates through the vector arguments

  for(int i=0;i<vect1.size();i++) {

The next two lines combine the two input parameters into the result vector declared above

      result.push_back(vect1[i]);

      result.push_back(vect2[i]);

  }

This returns the vector of both input vectors

  return result;

}  

See attachment for complete program that include the main method

The function which combines two different vector variables is written in python using the Numpy module. The program goes thus :

import numpy as np

#import the Numpy module

vec1 = np.arange(3)

#a 1 - d vector array with 0, 1, 2

vec2 = np.arange(4,7)

#a 1 - d array vector array with 4, 5, 6

def shuffle(vector_1 , vector_2):

#initialize a function named shuffle which takes tow parameters

return np.concatenate((vec1, vec2))

#return a combined array of the vectors using the concatenate function

print(shuffle(vec1, vec2))

#A sample run of the program

Learn more : https://brainly.com/question/22288029

Use a spreadsheet to solve this business problem. The owners of an electronics store want to find which of their products makes the most profit during the past month.


A. 60 televisions at $700 with a profit of 22%

B. 40 DVD players at $350 with a profit of 38%

C. 200 computer monitors at $280 with a profit of 29%

D. 100 MP3 players at $200 with a profit of 40%

Answers

The answer to that is A because 22% of 700 is 154, the largest profit out of all of them

PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
________________________________________
Output: Your goal

You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses. ________________________________________
Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Write your pseudocode here:










________________________________________

Part 2: Code the Program
Use the following guidelines to code your program.
1. Use the Python IDLE to write your program.
2. Using comments, type a heading that includes your name, today’s date, and a short description.
3. Set up your def main(): statement. (Don’t forget the parentheses and colon.)
4. Conclude the program with the main() statement.
5. Include at least two print statements and two variables.
6. Include at least four input prompts.
7. Use concatenation to join strings.
8. Follow the Python style conventions regarding indentation in your program.
9. Run your program to ensure it is working properly. Fix any errors you may observe.

Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!

When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE.
When you submit your assignment, you will attach this Python file separately.
________________________________________
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?



How could your program be useful in the real world?



What is a problem you ran into, and how did you fix it?



Describe one thing you would do differently the next time you write a program.

btw don't talk unless you are answering the question

Answers

Answer:

i can only give you pseudocode my fren

Explanation:

# information about me

def main():

MyName =  “malaki”

print(myName)

myInfo = “I was born in wichita, Kansas U.S. I live in japan. I love hotdogs.”

print(myInfo)

main()

sorry if this did not help :( i tried

In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

What is pseudocode?

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

Pseudocode is a description of the steps in an algorithm using simple or everyday language. In essence, a pseudocode uses straightforward (concise) words and symbols to summarize the steps taken during a software development process.

Consequently, the following are some characteristics of a pseudocode as the Pseudocode needs to be clear, Pseudocode ought to be ending. Executable pseudocode is required.

Therefore, In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

Learn more about language on:

https://brainly.com/question/20921887

#SPJ2

The owner of a candle shop has asked for your help. The shop sells three types of candles as shown below:


Type Price Burn Time (hours)
1 $2.50 5
2 $3.75 7
3 $5.99 12

The owner wants you to write a program to perform certain calculations when customers buy different numbers of the candles.

Required:
a. Develop an algorithm to satisfy the following requirements:

Prompt the user to enter the number of candles of each type the customer wants to buy. Since you can’t buy a fraction of a candle, the input for each type of candle must be an integer. (You may assume that only integer values between 0 and 10 will be entered when this program is tested.)
Calculate the total price of all the candles bought using the information in the table above. For example, two Type 1 candles and one Type 2 candle would have a total price of $8.75.
Calculate the total burn time of all the candles if they were burned consecutively (i.e., one after the other). For example, one Type 1 and one Type 3 candles would burn for 17 hours.
Calculate the cost-per-minute for that purchase.
Output some kind of meaningful display that includes the number of candles of each type bought, the total price, the total burn time, and the cost-per-minute. You can be as creative as you want with this!
Write the pseudocode for the algorithm and store it in a file (file format can be text, pdf or doc) with the name CandleShopSteps.

b. Write the code (20 points)

Once you've written your algorithm it is time to turn it into a Java program. that can be executed (run). Here are some things to keep in mind:

the class should be name CastleShop.
the program will need to import the Scanner class from the Java util package.
the class should have a main method that will include the logic for the algorithm you developed in Part A. You may choose to add additional methods that are called in the main method.

Answers

Answer:

import java.util.Scanner;

public class Main {

 public static void main(String[] args) {

   double total = 0;

   double fPrice, sPrice, tPrice;

   int firstN = 0, secdN = 0, thirdN = 0, fTime, sTime, tTime;

   int totalT = 0;

   isEnd = "n";

   for (;;){

       if (isEnd == "y"){

           break;

       }

       Scanner in = new Scanner(System.in);

       int option = in.nextInt();

       switch (option){

         case 1:

             fPrice = 2.50;

             fTime = 5;

             System.out.print("Enter number of items: ");

             firstN += in.nextInt();

             totalT += fTime * firstN;

             total += fPrice * firstN;

             break,

         case 2:

             sPrice = 3.75;

             sTime = 7;

             System.out.print("Enter number of items: ");

             secdN += in.nextInt();

             totalT += sTime * secdN;

             total += sPrice * secdN;

             break,

         case 3:

             tPrice = 5.99;

             tTime = 12;

             System.out.print("Enter number of items: ");

             thirdN += in.nextInt();

             totalT += tTime * thirdN ;

             total += tPrice * thirdN;

             break,

        default:

             System.out.println("Looking forward to the Weekend");

       }

       System.out.print("Do you want to end the order? y/n: ");

       isEnd = in.nextLine();

   }

   System.out.println("Number of Type 1 candles bought : "+firstN);

   System.out.println("Number of Type 2 candles bought : "+secdN);

   System.out.println("Number of Type 3 candles bought : "+thirdN);

   System.out.println("Total cost is : "+total);

   System.out.println("Total burn time is : "+totalT);

   double costPerBurn = (totatT * 60) / total;

   System.out.println("Cost per minute : "+ costPerBurn);

 }

}

Explanation:

The Java program creates a continuous for-loop statement that gets the candle type, price and amount ordered from a switch and accumulates the total cost and burn time of the candles bought and the cost per minute burn of the candles consecutively.

Other Questions
What type of bone is arranged in concentric layers whats the plural of la pantalla Which statement best completes the diagram? The ratio of boys to girls at a movie is 4:7. If there are 21 girls, how many boys are ar the movie? 5. Identify the circumstance that led to New Imperialism2 pointsEuropeans needed new markets where they could sell their manufactured productsA demand for larger markets in which to sell the surplus slave labor.O New agricultural techniques required Europe to find farmable land overseas. Eliza fell asleep at 9:35PM. She awoke 8 hours 45 minutes later. What time did Eliza wake up? any one :( can help2/7n < 4 Which best describes Darwins studies that led to the theory of evolution?A.extensive research of an individual organism within a short periodB.extensive research of an individual organism over many yearsC.observations and data collected within a short periodD.observations and data collected over many years One check that the legislative branch has over the judicial branch is __________.. Can somebody plz help answer all the questions correct thanks!! WILL MARK BRAINLIEST WHOEVER ANSWERS FIRSTT :DD one species dna differs from others in its ? *5. Evaluate 4.7j - 6.8k when j=5 and k=3Enter your answer Jacob says that this figure is a rectangle because he found that opposite sides arecongruent and the two diagonals are congruent.Mary says that this figure is a rectangle because she found that opposite slopes areparallel and consecutive slopes are perpendicular.Assuming they both did their math correctly, who is right?A. BothB. Only Jacob C. Only Mary A line passes through the point (-8, 2) and has a slope of -5/4.Write an equation in slope-intercept form for this line.(Picture above) HELP PLS ASAP!!!!!!Maria wrote the following steps in the formation of igneous rocks.Step 1: Rocks pushed under Earth due to movement of tectonic plateStep 2: Rocks meltStep 3: Molten rocks are heatedStep 4: Rocks solidifyWhich step contains an error? To compare and contrast the themes of two different literary works, you should follow a specific process. What is the FIRST step in the process? Select one: a. Determine the theme of each work, and state it in your own words. b. Analyze the effects of setting and word choice in each work. c. Explain the differences between the two works, in terms of the effect of form on theme. d. Make a list of the literary elements found in both works. Help please Im taking a final Sally had some marbles. After buying 12 more marbles, she had 25 marbles. How many marbles did Sally have before she bought more? 37 12 13 25 The "be yourself" approach to intercultural communication in which a person is not conscious of differences and does not feel the need to act or adapt in any particular way is known as _____. ??????????????????????????????????????