In python:

Assign sum_extra with the total extra credit received given list test_grades. Full credit is 100, so anything over 100 is extra credit. For the given program, sum_extra is 8 because 1 + 0 + 7 + 0 is 8.

Sample output for the given program with input: '101 83 107 90'

Sum extra: 8

Answers

Answer 1

Answer:

test_grades = []

tryagain = 'y'

while tryagain.lower() == 'y':

   grade = int(input("Grade: "))

   test_grades.append(grade)

   tryagain = input("Another Input: ")

sum_extra = 0

for i in test_grades:

   if i > 100:

       sum_extra = sum_extra + (i - 100)

print(sum_extra)

Explanation:

This line initializes an empty list test_grade

test_grades = []

This line prepares the user for input

tryagain = 'y'

The following iteration is repeated until the user stops input

while tryagain.lower() == 'y':

This prompts the user for grade

   grade = int(input("Grade: "))

This appends the grade to the list

   test_grades.append(grade)

This asks if there is another grade to be input

   tryagain = input("Another Input: ")

This initializes sum_extra to 0

sum_extra = 0

This iterates through test_grade

for i in test_grades:

The following if condition gets the grades greater than 100 and sums the extra credit

   if i > 100:

       sum_extra = sum_extra + (i - 100)

This prints the extra credit

print(sum_extra)


Related Questions

Which of the columns (A) to (I) in the truth table below is correct for the expression
¬(r *(qV ¬p))
? (Answer (J) if none of them is correct).
p q r (A) (B) (C) (D) (E) (F) (G) (H) (I)
F F F T T F T F T T T T
F F T F F T T F T F F F
F T F T T F T T T T T F
F T T T F F T T F F T T
T F F F T T F F T T T F
T F T F T T F F F F F T
T T F F T T F F T T T F
T T T F F T F F F F T T

Answers

Answer:

tftftftftftftftftftftftftftftftftftftftftftftftftftftttttftfffftftftftttttfftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfttftftftftftftftftftftftftftftftftftftftftftftftfttftftftfttfftftftftftftftftftftftftftfttttttttttttttttttttttfffffffffffffffffffftftftfttttttttftftftftftftftftftftftftftftftftftftftftfttftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfftftftftftftftftfttftftftftftftftftftftftfftftftffftftfftfftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfftfftftftftftftftftftftftftfftftftftftftftftftftftfftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfftftftffftftftfftftftftftftftfftftftftftftftftftftftftftftftftfttftftftftftgtftftgtftgtftgtftgtftfftftfftfftfftfftftftftftftftftftftftftftftftftftftftftftfftftftftftftftftftftftftftftftfftfftfftftftftfttfftftftftftftftfftftftftftftftftftftftftftftftftftftftftftftftffftftftftftftftftftftftftftftftfftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftftfftftftftftftftftftftftftftftftftfftfftftftftftftftftftftftfftftfftftftftfftftfftftftfftftftftftftftfftftttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt

Answer:

brooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo

Explanation:

Question 3 of 10
How is plagiarism both easier and harder in the Internet age?
A. It is both easier and harder because you are never sure what is
copyrighted and what is public domain.
OB It is easier because people dont really expect you to follow the
copyright regulations. It is harder to find exactly what you want.
It is easier because you there are too many sources for teachers
to know them all, it is harder because you will be caught.
Dit is easier because you have access to more information. It is
harder to get away with because anyone can conduct a word-

Answers

Answer: D is your answer

Plagiarism is copying someone's work

Plagiarism both easier and harder in the Internet age because you have access to more information. It is harder to get away with because anyone can conduct a word  D is your answer

Answer:

The answer you are looking for would be "B.) It is easier because people don't really expect you to follow the  copyright regulations, but it is harder to find exactly what you want." When you look a question up for an essay, summary, or even a test, the answer you need may not always be on the web, and you may need to visit several different websites to mash together a conclusion on your topic. However, people often copy topics nowadays, and it is easier for them to change a few words and get away with it then every before. Teachers have become much more lenient, therefore it is much easier to plagiarize something.

give me a code that draws a house with a roof in python. Please Answer!!!

Answers

import turtle

window = turtle.Screen()

tr = turtle.Turtle()

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.left(90)

tr.forward(100)

tr.back(100)

tr.left(120)

tr.forward(75)

tr.right(78)

tr.forward(60)

window.mainloop()

In my code, we use the turtle module for the graphics to draw the house with a roof.

In python:

Assign sum_extra with the total extra credit received given list test_grades. Full credit is 100, so anything over 100 is extra credit. For the given program, sum_extra is 8 because 1 + 0 + 7 + 0 is 8.

Sample output for the given program with input: '101 83 107 90'

Sum extra: 8

Answers

Answer:

Following are the code to this question:

list_val = input()#defining a integer variable for input value

test_grades = list(map(int, list_val.split()))#defining test_grades as a list

sum_extra = -999 #defining sum_extra that holds negative integer value

sum_extra = 0#defining sum_extra that holds value

for y in range(len(test_grades)):#defining a for loop to check range of list  

   if(test_grades[y] > 100):# defining if block that check list value is greater then 100

       sum_extra = sum_extra + (test_grades[y] - 100)#use sum_extra variable to hold extra value and add this value

print('Sum extra:', sum_extra)#print value

Output:

101 83 107 90

Sum extra: 8

Explanation:

In the above code a, "list_val" variable is declared, that uses an input method to input the values and declared a "test_grades" variable that uses a list method to add all values in the list.

In the next step, the "sum_extra" variable is declared, which holds some values and defines a for loop to check the range of the "test_grades", and define a if block, that checks list value is greater than 100. If the condition is true, it will remove the extra value, and add it into the sum_extera variable and add its value, and at the last use, print variable to print its value.

Editing is the process of cutting out the bad parts. True or false?

Answers

Answer:

true

Explanation:

your welcome

Answer:

ttrue ................

What are 4 apps like giggl? There are lots of portals open and it's so laggy, please give me good alternatives.

Answers

Not sure what that is, but I use Discord, if that's similar.

write a pseudocode to calculate the volume of a cylinder​

Answers

Answer:

10.50, height = 15.01, and pi = 3.1415.

To connect to devices in another country, you would need to connect to a
WAN
MAN
LAN
PAN

Answers

Answer:

WAN

Explanation:

wide area network

Answer:

To connect to devices in another country, you would need to connect to a WAN

Explanation:

WAN stands for A wide area network which can connect to other countries and broad ranges.

Claudia is allowed to work from home 3 days per week. She takes home sensitive personnel files on a flash drive for use while at home. The company does not allow remote access to the company servers, but Claudia is free to use either a cloud-based version of the application or have it installed on her home machine. Which type of application category would you recommend Claudia use at home?

Answers

Answer:

Installed software

Explanation:

Since we are told that she is often allowed to work from home 3 days in a week in which She takes home with her sensitive files that is contained in her flash drive for use while at home which means that in a situation where her company does not allow remote access to the company servers in which she is only free to either make use of a cloud-based version of the application or have it installed on her home machine the type of application category i would recommend her to use at home is for her to INSTALLED SOFTWARE on her home machine reason been she mostly work from home and secondly if software is installed on her machine it would make it more easier for her carry out her tasks from home.

An array is said to be dual if it has an even number of elements and each pair of consecutive elements sum to the same value. Return true if the array is dual, otherwise return false.

Answers

Answer:

def is_dual( array):

   if len(array) % 2 == 0:

       count = 0

       for i in range(0, len(array)//2, 2):

           if array[i] + array[i+1] == array[0] + array[1]:

               count += 1

       if count == len(array)//2:

           return True

       else:

           return False

Explanation:

The python program defines a function called is_dual that accepts an array parameter and check if the array is dual. If it meets the condition, the function returns true but returns false when the array is not dual.


8. Input device which allows you to input drawings which input device which allows you to input drawings ​

Answers

Answer:

bro is there any answers that you could provide?

if not, the only thing i can think of is the turtle program.

Explanation:

Question 5
2 pts
The type of control structure that
causes a branch forward at some
point, causing a portion of the
program to be skipped, is:
a selection structure.
O a seguential structure
a repetition structure
a loop structure

Answers

Answer:

Selection structure.

Explanation:

In a decision structure (selection structure), there is a branch forward at some point, which causes a portion of the program to be skipped. A loop structure (repetition structure) contains a branch to a previous statement in the program module, which results in a block of statements that can be executed many times.

The counter done bit for the count down instruction C5:0 is addressed as ______________________________.

Answers

Answer:

The answer is "C5 : 0/ CTD"

Explanation:

The Count Down is an instruction that counts FALSE-to-TRUE rung transitions. Rung Transitions can be brought about by occasions happening in the program, for example, parts going past an identifier or activating a cutoff switch.

The Count Down order is utilized to check down an occasion which happens consistently or remotely and places that esteem in the counter's Collector in augmentations of 1. The distinction between the Count Down is very straightforward, Count Up tallies up, Count Down checks down. The UN (Check Down Sub-current piece) is set when the aggregated worth folds over to +32, 768 (from - 32,767) and keeps tallying down from that point. The Done  bit is set when the amassed esteem is equivalent to or more noteworthy than the preset worth. Furthermore, the Compact disc (Check Down Empower) is set when rung conditions are Valid and reset when rung conditions go Bogus or when the appropriate RES order is empowered. The UN piece can be reset by the RES order or when the aggregated worth goes over +32,767.

The Count Down order utilizes similar fields as the Count Up order. They contain a counter location (C5: x) with "X" being the counter number, a Preset worth field, and a Collector esteem field. Like the clocks and Count Up the Preset and Accumulator bits are addressable and can be changed or refreshed through inner rationale.

I need a C++ program to ask the user to put in different numbers until zero is pressed then the program counts the numbers that are put in and finds the sum of the numbers and the negative numbers.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

int input = 0;

int count = 0;

int sum = 0;

int sumNegative = 0;

while (true) {

 cout << "Enter a number: ";

 cin >> input;

 if (input == 0) break;

 count++;

 sum += input;

 if (input < 0) {

  sumNegative += input;

 }

}

cout << "Count of the numbers: " << count << endl;

cout << "Sum of all the numbers: " << sum << endl;

cout << "Sum of the negative numbers: " << sumNegative << endl;

}

Explanation:

Your requirements regarding the sum and the negative numbers was a bit vague so I just did something you can probably adjust easily to your liking.

shows a document in its final form: ____ shows a document in its first form.
Final; Original Markup
Original; No Markup
Final Markup: No Markup
No Markup: Original

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

This question is about a feature in Word processing software such as ms word. This feature is related to review the document. While reviewing the document, you can keep the track of changes in the document.

There are different options available to show the markup or not.

If you want to show a document in its final form then you need to select No Markup.

If you want to show a document in its first form then you need to select Original.

So, the correct answer is:

No Markup: Original

You can find these functionalities in Ms word going through the Review tab, then under the Tracking group, and then select these options from Track changes drop down menu.

A variable of type unsigned char stores a value of 255. If the variable value is decremented, what exception will occur

Answers

Answer:

No exception will occur

Explanation:

Given

Unsigned Char

Value  = 255

Operation = Decrement

Required

What type of exception occurs?

Let's assume the variable is a.

So, we have that

a = 255

The range of values of an unsigned char a is 0 to 255

So, when a is decremented by 1, the new value of a becomes 254

254 is still within the range of 0 to 255.

Hence, no exception will (or is excepted to) occur

what is the effects of computer and internet attacks​

Answers

Answer:

ads, damage, or bugs

Explanation:

Cartesian Coordinate Robot is sometimes called? *

Answers

Answer:

rectilinear

Explanation:

please tell fast plzzzzzz​

Answers

Answer:

(1001) =9

(45)= 101101

g Write a program that allows a user to input any text in your program. Using the tools that we have discussed, your program should output how many unique words were in the input and then output how many words were unique.

Answers

Answer:

Explanation:

The following function/program is written in Java. It asks the user for a sentence as an input and then splits that sentence into an array of words. Then it creates an arrayList for all of the unique words, comparing each word in the sentence with all of those in the ArrayList. If a word is found in the ArrayList it cancels the loop and moves on the next word in the sentence. Finally, it counts all of the unique words in the ArrayList and prints that total to the screen.

public static void uniqueWords() {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter a sentence:");

       String sentence = in.nextLine();

       String words[] = sentence.split(" ");

       ArrayList<String> uniqueWords = new ArrayList<>();

       for (int x = 0; x < words.length; x++) {

           boolean exists = false;

           for (int i = 0; i < uniqueWords.size(); i++) {

               if (words[x].equals(uniqueWords.get(i))) {

                   exists = true;

                   break;

               }

           }

           if (exists == false) {

               uniqueWords.add(words[x]);

           }

       }

       System.out.println(uniqueWords.size());

   }

What is the output? x = 9 % 2 if (x == 1): print ("ONE") else: print ("TWO")

Answers

The output of the python program written will result in the console displaying ONE.

The program assigns the value of the remainder when 9 is divided by 2 to x

The value of the remainder would be 1

The program is then instructed to display ONE if the value of is one otherwise it should display TWO.

THEREFORE, since the value of x in the program is 1 ; then ONE will be displayed.

Learn more :https://brainly.com/question/4982426

With which feature or menu option of a word processing program can you make an image like this?
You can get this image using the
option of a word processing program.
Reset
Next

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is Chart.

You can insert an image like as given in the question using the Chart feature in the word processing document. This image called the bar graph chart.

You can insert a chart in your word processing document going through the Insert tab, then find the chart option under the Illustrations group of the command.

As you click on the chart, different types of charts will be shown to you. You can click on the required chart and insert it into the document. The inserted chart can be customized while double-clicking on the inserted chart.

In dynamic programming, the technique of storing the previously calculated values is called A. Saving value property B. Storing value property C. Memoization D. Mapping

Answers

Answer:

C. Memoization

Explanation:

Given that Memoization is a computing strategy that is applied in storing the previously calculated values such that values can easily be recalled to execute similar problems or further problems. It is also used in making recurring algorithms productive

Hence, in this case, In dynamic programming, the technique of storing the previously calculated values is referred to as MEMOIZATION

Consider the classes Food, Cheese, and Velveeta where Cheese is a subclass of Food and Velveeta is a subclass of Cheese. State which of the following lines of code are legal.

Cheese c =new Food( );
Velveeta v =new Food( );
Cheese c =new Velveeta( );
Food f =new Velveeta( );
Food f =new Cheese( );

Answers

Answer:

Cheese c =new Velveeta( );

Food f =new Velveeta( );

Food f =new Cheese( );

Explanation:

The super-class is the parent class from which features and attributes are inherited from while the subclass or the child class is the class inheriting from the super or parent class.

In Java, the object instance of a class is created with the syntax;

class_name instance_name = new class_name();

Food is the super or parent class of Cheese (which makes Cheese its subclass) and Cheese is the parent class of Velveeta. The extends keyword is used to denote inheritance.

i lost my account!-_-​

Answers

Answer:

and?

Explanation:

thx for the points btw

(Numerical Data Representation) How many bits per word are required to represent the following positive decimal integers: a.0 through 100b.0 through 255c.0 through 256d.0 through 10,000,000

Answers

Answer:

a. 7 bits

b. 8 bits

c. 9 bits

d. 24 bits

Explanation:

Required

Number of bits per word

The formula to get the number of bits per word is:

[tex]2^n = N[/tex]

Where

n = bits

N = numbers

Solving (a) 0 to 100

There are 101 digits between 0 and 100 (inclusive)

So:

[tex]N = 101[/tex]

Substitute 101 for N in [tex]2^n = N[/tex]

[tex]2^n = 101[/tex]

101 can not be expressed as an exponent of 2.

So, we substitute 101 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 128[/tex]

Express 128 as an exponent of 2

[tex]2^n = 2^7[/tex]

Apply law of indices

[tex]n = 7[/tex]

Hence, 7 bits are required

Solving (b): 0 through 255

There are 256 digits between 0 and 255 (inclusive)

So:

[tex]N = 256[/tex]

Substitute 256 for N in [tex]2^n = N[/tex]

[tex]2^n = 256[/tex]

Express 256 as an exponent of 2

[tex]2^n = 2^8[/tex]

Apply law of indices

[tex]n = 8[/tex]

Hence, 8 bits are required

Solving (c): 0 through 256

There are 257 digits between 0 and 256 (inclusive)

So:

[tex]N = 257[/tex]

Substitute 257 for N in [tex]2^n = N[/tex]

[tex]2^n = 257[/tex]

257 can not be expressed as an exponent of 2.

So, we substitute 257 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 512[/tex]

Express 512 as an exponent of 2

[tex]2^n = 2^9[/tex]

Apply law of indices

[tex]n = 9[/tex]

Hence, 9 bits are required

Solving (d): 0 through 10000000

There are 10000001 digits between 0 and 10000000 (inclusive)

So:

[tex]N = 10000000[/tex]

Substitute 10000000 for N in [tex]2^n = N[/tex]

[tex]2^n = 10000000[/tex]

10000000 can not be expressed as an exponent of 2.

So, we substitute 10000000 for the closest number greater than 101 that can be expressed as an exponent of 2.

So:

[tex]2^n = 16777216[/tex]

Express 16777216  as an exponent of 2

[tex]2^n = 2^{24[/tex]

Apply law of indices

[tex]n = 24[/tex]

Hence, 24 bits are required

What are two main components to using functions (there are three from you to choose from)? What do each do? Why are they important?

Answers

Answer:

function is a self-contained program segment that carries out some specific, well-defined task. Every C program consists of one or more functions. One of these functions must be called main. Execution of the program always begins by carrying out the instructions contained in main. Note that if a program contains multiple functions then their definitions may appear in any order. The same function can be accessed from several different places within a program. Once the function has carried out its intended action, control is returned to the point from which the function was accessed. Generally speaking, a function processes information passed to it from the calling portion of the program, and returns a single value. Some functions, however, accept information but do not return anything.

A function definition has two principal components: the first line (including the argument declarations), and the so-called body of the function.

The first line of a function takes the general form data-type  name(type 1  arg 1,  type 2  arg 2,  ...,  type n  arg n)

where data-type represents the data type of the item that is returned by the function, name represents the name of the function, and type 1, type 2, ..., type n represent the data types of the arguments arg 1, arg 2, ..., arg n. The allowable data types for a function are:

int       for a function which returns an integer value

double    for a function which returns an floating-point value

void      for a function which does not return any value

The allowable data types for a function's arguments are int and double. Note that the identifiers used to reference the arguments of a function are local, in the sense that they are not recognized outside of the function. Thus, the argument names in a function definition need not be the same as those used in the segments of the program from which the function was called. However, the corresponding data types of the arguments must always match.

The body of a function is a compound statement that defines the action to be taken by the function. Like a regular compound statement, the body can contain expression statements, control statements, other compound statements, etc. The body can even access other functions. In fact, it can even access itself--this process is known as recursion. In addition, however, the body must include one or more return statements in order to return a value to the calling portion of the program.

A return statement causes the program logic to return to the point in the program from which the function was accessed. The general form of a return statement is:

return  expression;

This statement causes the value of expression to be returned to the calling part of the program. Of course, the data type of expression should match the declared data type of the function. For a void function, which does not return any value, the appropriate return statement is simply:

return;

A maximum of one expression can be included in a return statement. Thus, a function can return a maximum of one value to the calling part of the program. However, a function definition can include multiple return statements, each containing a different expression, which are conditionally executed, depending on the program logic.

Note that, by convention, the main function is of type int and returns the integer value 0 to the operating system, indicating the error-free termination of the program. In its simplest form, the main function possesses no arguments. The library function call exit(1), employed in previous example programs, causes the execution of a program to abort, returning the integer value 1 to the operating system, which (by convention) indicates that the program terminated with an error status.

The program segment listed below shows how the previous program factorial.c can be converted into a function factorial(n) which returns the factorial (in the form of a floating-point number) of the non-negative integer n:

double factorial(int n)

{

 /*

    Function to evaluate factorial (in floating-point form)

    of non-negative integer n.

 */

 int count;

 double fact = 1.;

 /* Abort if n is negative integer */

 if (n < 0)

  {

   printf("\nError: factorial of negative integer not defined\n");

   exit(1);

  }

 /* Calculate factorial */

 for (count = n; count > 0; --count) fact *= (double) count;

 /* Return value of factorial */

 return fact;      

}

Explanation:

Which group scope can be used to assign permissions to resources only in the domain in which the group is created

Answers

Answer: Domain local group

Explanation:

Domain Local Group is a form of group in a Windows Server network in Microsoft which is used by an administrator to assign permissions to the resources that are in same domain.

Their scope is strictly restricted to their particular domain. It should also be noted that they've open membership which simply implies that members form other domain can be added to them. One has to first know the users that have identical job responsibilities in order to use the domain local group, then identify the network resources that are similar which users want to access.

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?

a. HIDS
b. NIDS
c. NIPS
d. HIPS

Answers

Answer:

Option b (NIDS) is the correct choice.

Explanation:

NIDS helps to detect suspicious internet activity. Throughout order to determine all congestion, along with all network packets, unfaithful user information was indeed probably recommended. They were indeed technologies that are already constructively divided up in less than service providers that ineffectively investigate traffic through the systems on something they have been located.

All those other available options aren't closely linked to the scenario in question. Therefore this obvious response is the correct one.

Microsoft Excel is an example of a(n) application.

entertainment
education
communication
productivity

Answers

Answer:

d

Explanation:

Answer:

productivity

Explanation:

u cant just say "A, B, C, or D" cause all the choices are randomized

just for future reference

Other Questions
Fill in the blank with the appropriate demonstrative pronoun.Lequel est ton crayon? ___ -ci.celuicelleceuxcellesLaquelle est ta maison?_____ - l.CeluiCelleCeuxCellesLesquels sont toi? _______-ci.CeluiCelleCeuxCellesLaquelle prfres-tu?___________ -ci.CeluiCelleCeuxCellesLesquelles veux-tu? ________ l.CeluiCelleCeuxCelles Sehila's dad, Frank, was an excellent cook. He always made dinner.Then one day, he got an exciting new job. Unfortunately, the job forcedhim to work nights. Sehila was suddenly responsible for preparingdinner. She knew she couldn't make the fancy food her father wasgood at, but after studying his recipes, she realized that there were afew that she could handle. With practice, she got really good at them.By the end of that year, her dad said that her spaghetti and meatballswere the best he'd ever had.Which statement best explains how a character's motivation leads to aconflict in the story?A. Frank's desire for gourmet food leads Sehila to believe that shecan never please her father.B. Frank's desire for a better job leads Sehila to have to take on anintimidating task.C. Sehila's desire for her father to be home more leads her to criticizehis decisions.D. Sehila's desire to make her father happy leads her to find anenjoyable new hobby. The daily rotation of Earth causes ______ and _____. *High TideLow TidesDayNightSpring TideNeap TideReally need this!! for a big grade! thank you guys ~ please help! How many acres are contained in the tract described as beginning at the NW corner of the SW1/4 SW bevelled 1 fourth, then south along the west line to the SW corner of the section, then east along the south line of the section 2,640 feet, more or less, to the SE corner of the said SW1/4 SW bevelled 1 fourth, then in a straight line to the POB? in which case would facilitated diffusion be needed?A. With large polar molecules moving against the concentrationgradientB. With very small non polar particles moving down theconcentration gradient.C. With very small polar particles moving against theconcentration gradient.D. With large non polar molecules moving down the concentrationgradient. I NEEEDD HELPPP PLEASE HELP!!!!!! Richard estimates that he can apply fertilizer to 4,486 square feet of grass in 3/4 hour. How many square feet of grass can Richard fertilize per hour? A real estate broker pays $50 to a life insurance broker for each referral that goes to closing. This arrangement is: If Allison wants to find 80% of 630, which table should she use? What is the definition of a crusade? Which part of the ocean has the lowest temperatures and highest salinity? Activities: Punnett Squares of Birds1) A black BB (codominant) bird mates with a red RR (codominant) bird. What will the offspring be? Complete the Punnett square.[][][][][][][][][]a. What is the probability of having a black bird?b. What is the probability of having a red bird?c. What is the probability of having a black and red bird?2) A black Bb (codominant) bird mates with a red Rr (codominant) bird. Both b and r are recessive for brown. What will the offspring be? Complete the Punnett square.[][][][][][][][][]a. What is the probability of having a black bird?b. What is the probability of having a red bird?c. What is the probability of having a black and red bird?d. What is the probability of having a brown bird? Joshua babysits for his sister after school. He is paid$3.00 for each hour of babysitting. He has saved $43.50and wants to buy a toy that costs $70. What is the leastamount of hours Josh needs to babysit to purchase thetoy?Plz help What is the answer to 11 (4a+ 2c + 6) The process by which organisms keep everything inside their bodies within certain limits is calledGroup of answer choices Original price: $50; Markdown: 16% The retail price? where does the energy in an ecosystem come from Jenny peddeld her bike 11 miles in 66 minuite if she traveled at the same speed how far would she travel in 2 hour You might keep your money in a bank, but have you heard of a timebank? This online service allows users to trade services with oneanother without exchanging money. For example, a hairdresser givessomeone a haircut for one hour of credit in the time bank. Thehairdresser could then use that credit to have a plumber come work forher for an hour. Time banks are useful for people who can't arrangedirect trades. The plumber might not want a haircut, but he can workfor the hairdresser and earn credit to use with someone else.How does the detail "The plumber might not want a haircut, but he can workfor the hairdresser and earn credit to use with someone else" best supportthe central idea that time banks are a convenient way to get things done? Cost of shoes: $99.99Markup: 9%Tax: 4%Find the Total