Write multiple if statements. If car_year is 1969 or earlier, print "Few safety features." If 1970 or later, print "Probably has seat belts." If 1990 or later, print "Probably has antilock brakes." If 2000 or later, print "Probably has airbags." End each phrase with a period and a newline. Sample output for input: 1995 Probably has seat belts. Probably has antilock brakes.

Answers

Answer 1

Answer:

import java.util.Scanner;

public class Hggg {

       public static void main (String [] args) {

           System.out.println("Enter the car make year");

           Scanner in = new Scanner(System.in);

           int car_year = in.nextInt();

           if (car_year<1969){

            System.out.println("Few safety features.");

           }

           else if (car_year>=1970 && car_year<1990){

               System.out.println("Probably has seat belts.");

           }

           else if (car_year>=1990 && car_year<2000){

               System.out.println("Probably has seat belts.");

               System.out.println("Probably has antilock brakes.");

           }

           else if (car_year>=2000){

               System.out.println("Probably has seat belts.");

               System.out.println("Probably has antilock brakes.");

               System.out.println("Probably has airbags.");

           }

       }

   }

Explanation:

In this solution, multiple if statements have been used to accomplish each step. Observe that there are more than one print statements when year is greater than 1990 because the condition applied to year greater than 1970 holds true for every year greater than 1970 (1990, 2000 etc)


Related Questions

Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.

Answers

Answer:

The above statement is FALSE

Between which zones and a DMZ should firewalls be placed? Choose two answers.
Remote
Segregated
Internal
External

Answers

Answer:

DMZ is placed between Internal and External separated by firewalls.

Explanation:

DMZ is demilitarized Zone, that is used to enhance the security feature of the local area network of the organization of firm from other networks exist on the internet. Few organizations need more security from the users that tries to access the resources and information from outside the organization. These users may steal some confidential information or tries to hack the network.

There are three major zones in these types of network, Internal, DMZ and External zones. Internal Zones is separated by DMZ with the help of firewall. The traffic that tries to access the internal network from DMZ checked through this security firewall. The external zone is also separated through a firewall from DMZ, used to monitor the external traffic tries to access the the network.

Each device with a NIC contains a unique identifier, known as a(n) ___ address, which distinguishes it from any other network-connected device in the world.

Answers

Answer:

Media Access Control (MAC)

Explanation:

Every device that has a network interface card (NIC) contains a unique identifier called MAC address which differentiates it from other networking devices all over the world. It is also called a physical or hardware address. MAC addresses are integrated into the NIC of networking devices.

MAC addresses are a 12-digit hexadecimal number usually separated by a colon.

Note that a 12-digit hexadecimal implies also that it is a 6-byte (or 48-bit) number.

An example of a MAC address (in hexadecimal) is as follows;

00:0A:D8:12:E5:13

Final answer:

Each device with a NIC has a unique MAC address which is a hardware identifier that ensures correct data packet delivery. It is distinct from other identifiers such as IP addresses, which can change; the MAC address usually remains constant.

Explanation:

Each device with a Network Interface Card (NIC) contains a unique identifier, known as a MAC address, which distinguishes it from any other network-connected device in the world. The MAC address, which stands for Media Access Control address, is a hardware identifier that uniquely identifies each device on a network. MAC addresses are used for various network technologies, including Ethernet and WiFi.

When a device, such as a computer, smartphone, or printer, attempts to connect to a network, its NIC provides the MAC address to the network to establish the connection. The unicity of the MAC address ensures that each device's data packets are delivered correctly in the midst of network traffic. Internet Protocol (IP) addresses are often discussed in conjunction with MAC addresses, but while IP addresses can change, for example when a device moves between networks, the MAC address typically remains the same unless it is spoofed or altered by the user.

Given the following function definition, what modifications need to be made to the search function so that it finds all occurrences of target in the array?int search(const int array[], int target, int numElements){int index=0;bool found=false;while((!found) && (index < numElements)){if(array[index] == target)found=true;elseindex++;}if(found==true)return index;elsereturn -1;}a. Add another parameter to indicate where to stop searchingb. Add another parameter to indicate where to start searchingc. This already can find all occurrences of a given targetd. Have the function return the whole array

Answers

Answer:

D. have function return the whole array

Explanation:

the given function only return first occurrence of target. In order to get all occurrences of target we have to change condition in while loop to check whole array even if first occurrence of target found and plus add another parameter of type array that will store different  indexes of occurrence of target and return that array

Which Windows Server 2016 feature allows a user to utilize a software environment in which an application can run but is isolated from much of the rest of the operating system and other applications?

Answers

Answer:

Windows containers is the correct answer.

Explanation:

Windows containers provide permission to the users to make use of a software or an application environment with that they individually execute because of the many other operating system and other applications. Windows containers is also the feature of the Windows server operating system. That's why the following answer is correct.

____________ describes all the communication channels that allow community-based input, interaction, content-sharing and collaboration?

Answers

Answer:

Social media.

Explanation:

The social media is an online platform that provides its users with the web application interface for easy communication. Since it is online, the user must subscribe to a ISP service, create an account on the social media website, and optionally download it's application on the device for easy access.

User accounts are secured with a username and password. The user on the site can share graphic, video, audio and text content, interact with friends etc.

The systems support and _____ phase begins when a system becomes operational and continues until the system reaches the end of its useful life.

Answers

Answer:

Security

Explanation:

The SDLC or system development life cycle is a process of which all systems must go through from planning to the end of the system.

Implementation of system requires creating the system based on the planned design, once it is implemented, it is verified by testing the system. The security of the system prevent intruders from accessing the system from the verification of the functionality to the end of the system's life cycle.

Question 8 :You are currently editing a Web document in a GUI HTML editor. You want to specify a background color for the page. To do this in a GUI editor, what should you do first?

Answers

Answer:

Create the html tag container and then create CSS file with the value of the html and body background attribute specified.

Explanation:

Web development is the creation of web pages. It requires standard web development tools like HTML, CSS and JavaScript.

The web page is made up of the header, the body and footer, which are all inside a html file. On the header, body and footer tags must be contained within a html opening and closing tags.

The CSS file styles the markup language tags. To give a background color to the entire page, the html and body elements are referenced and given a background color value.

.doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection against each differ?

Answers

Answer/Explanation:

Skilled hacker knows what do to and how to do. He makes his own scripts and codes which he uses for hacking. He knows where to exploit the script and where to attack whereas, an unskilled hacker isn't an expert in programming languages, codes, etc.A skilled hacker is a pro in programming languages, codes etc. whereas, an unskilled hacker doesn't know what to do.An unskilled hacker uses the scripts and codes of skilled hacker. He has to face failure more often then a skilled hacker.

Jody would like to find a solution that allows real-time document sharing and editing between teams. Which technology would best suit her needs?
A) Collaboration
B) Voice over IP (VoIP)
C) Audio conferencing
D) Video conferencing

Answers

Answer:

Option A: Collaboration

Jody should adopt collaboration technology that allows real-time document sharing and editing between teams.

Explanation:

Collaboration can also be defined as groupware. It is the technology that makes it easy for people working together to work together anywhere anytime. Hence collaboration allows remote communications so that one may not be left behind tied to work desk. It is time and cost efficient technology that is being adapted so widely in offices.

Collaboration consists of collaborative tools that help to customize the work in group so that it could be completed, edited or shared by everyone who is the part of the group.

I hope it will help you!

Supplemental security software (such as anti-virus [anti-malware]) is: Generally considered essential for all desktops and laptops. An optional addition. Already included by the manufacturer on all computers. Generally considered essential for personally-owned devices only.

Answers

Answer:

Explanation:

With an anti-virus, we can search, detect, and delete malware like spyware, worms, Trojans, rootkits, pseudoviruses, etc.

An anti-virus can detect virus with several methods like:

Digital signatureHeuristic detectionBehavior detectionSandbox detection

Is necessary for personal laptops and desktops, even in companies hardware.

What is an objective of state-sponsored attackers?
1.To sell vulnerabilities to the highest bidder
2.To spy on citizens
3.To amass fortune over of fame
4.To right a perceived wrong

Answers

Answer:

The correct answer is 2. To Spy on citizens

Explanation:

State-sponsored attackers have particular objectives aligned with either the political, commercial or military interests of their country of origin. Investigation shows that “the reality is that if a determined, state-sponsored adversary wants your data, they’re going to get it unless another state-sponsored entity helps you defend it.”

Write a definition of the function printDottedLine, which has no parameters and doesn't return anything. The function prints to standard output a single line consisting of 5 periods (".").

Answers

Final answer:

The function printDottedLine is a void function that prints a line consisting of 5 periods.

Explanation:

The function printDottedLine is a void function, meaning it does not return any value. It is defined without any parameters, so it can be called without passing any arguments. To print a line consisting of 5 periods, we can use a loop to iterate 5 times and print a period on each iteration. Here is the code for the printDottedLine function in Python:

def printDottedLine():
   for i in range(5):
       print('.', end='')

Final answer:

The function printDottedLine is designed to output a dotted line consisting of five periods with no parameters and no return value. The function is suitable for programming practices and is easy to implement in many different programming languages. Irrelevant descriptions regarding the dot positions are not applicable to the function's definition.

Explanation:

The student is tasked with defining a function named printDottedLine which adheres to certain specifications. This function does not require any parameters and does not return any value. Instead, the primary objective of printDottedLine is to output a straight line made up of five period characters (".") to the standard output, which is typically the console or terminal screen. This function is used in programming languages like Python, Java, or C++.

Here is an example of how the function might be written in Python:

def printDottedLine():
   print(".....")
When called, printDottedLine() will simply print the characters "....." to the screen. Notice that the description "The fifth dot is about one and two-third perpendicular hash marks to the right of the center bottom perpendicular hash mark." is not relevant to the definition of the function and can be ignored.

In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that is tested.A) True B) False

Answers

Answer:

Option A(True) is the correct answer for the above question.

Explanation:

The flowchart is used to give the solution of a problem through the diagram in a step by step processor. It helps the user to understand the solution easily. For diagram, it uses many types of symbols that are fixed for every sequence just like An oval symbol represents the start and end of the flowchart which is fixed for every flowchart.So for the decisions in a flowchart, the diamond symbol is used which is to make the decisions and it has two sides-- one is true and the other is false. The decisions are used also to represent the loop structure which is also called the repetition structure because the loop is controlled by the help of decisions so the diamond box is also used for the loopThe above question-statement says that the decisions-controlled is used for the loop and for the decisions which are true because it is also described above.

Final answer:

The statement that both the decision structure and the repetition structure use the diamond symbol to represent the condition that is tested is true as diamond symbols represent conditions in both decision and repetition structures in flow charts, leading to branching paths or loops based on the condition’s outcome.

Explanation:

The statement is true. It flow chart diagrams, the diamond symbol commonly signifies a branching point where a condition is evaluated to true or false, leading to different sequences of actions.

The branches represent different paths the flow can take based on the outcome of this condition. In the case of a decision structure, this branching leads to a single execution of different paths. Meanwhile, for a repetition or loop structure, the branching can lead to repeated execution of a certain path (e.g., a while loop) until the condition is no longer met.

What do reservations do?
Connect users to the Internet
Keep a spot open for specific individuals using a device
Set aside IP addresses so that they are assigned to specific devices
Connect devices to modems

Answers

Answer:

Reservations Set aside IP addresses so that they are assigned to specific devices.

Option C is correct answer.

Explanation:

Reservation is one of the efficient features granted by the protocol called DHCP (Dynamic host control Protocol). A device following reservation feature gets its IP address reserved every time a router gets started. This is done by the router that it sets aside the very first IP address from the pool of addresses or the device(s) who are reserved.

I hope it will help you!

For wired network cards that get their IP addresses through DHCP, what can be set manually?
APIPA
Default gateway
DHCP server
DNS server

Answers

DNS server because that can be changed manually to googles( or many others) aswell as the default

For wired network cards using DHCP for IP addresses, you can manually set the Option B) Default Gateway and Option D) DNS Server.

For wired network cards that get their IP addresses through DHCP, certain settings can still be configured manually. These include the Default Gateway and the DNS Server. These options allow you to ensure the network card can correctly route traffic and resolve domain names even if it is obtaining its IP address automatically.

Default Gateway: This is the IP address of the router or gateway that connects the local network to other networks, most often the internet. By setting this manually, you ensure that the network card knows where to send requests that are outside the local network.

DNS Server: This is the IP address of the server that resolves domain names (like www.example.com) into IP addresses. Setting this manually can be useful if you prefer to use a specific DNS server, such as Goo-gle's Public DNS or another trusted DNS provider.

Other options mentioned, like DHCP Server and APIPA (Automatic Private IP Addressing), typically do not require manual configuration in this context. APIPA is a fallback for when DHCP is unavailable, automatically assigning an IP address from a specific range.

What is output?
x = 21
if (x > 21):
print (1)
elif (x < 21):
print (2)
else:
print (3)

Answers

Answer:

The output of the following code is 3.

Explanation:

In the following Python Programming Language, the output is 3 because the variable x is equal to 21, then the user check the condition is the variable x is greater than 21 then print it print 1, otherwise the user check that the variable x is less than 21 then print 2, otherwise it print 3. So, the variable x is not greater than 21 or not less than 21, it is equal to 21. That's why the code execute the else block and print 3.

The set of Visual Basic instructions that tells an object how to behave after an action by the user (such as clicking a button) is referred to as a(n) _________.

Answers

Answer:

Event procedure

Explanation:

Whenever a user perform certain action, such as press a button on the keyboard or click the mouse, etc. such action are called an event. when an event occurs, Visual Basic looks for BASIC instructions to tell the object in the program how to behave to the user event. The Visual Basic instructions that responds to this specific event is called an event procedure.

A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is likely responsible for the attack?

Answers

Answer:Hacktivist group is most likely to responsible for this.Explanation:

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

I hope it will help you!

If an unsorted list of numbers is to be searched for a particular number only once, which of the following is more efficient (faster)? Group of answer choices Do not sort the list. Do a bisection search. Sort the list first, then do a bisection search. Do not sort the list. Do a linear search. Sort the list first, then do a linear search.

Answers

Answer:

Sort the list first, then do a bisection search

Explanation:

In bisection search method, we divide the array of numbers in two equal parts. Then we check that the number is exist in first half or second half. It is necessary to perform this operation that array should sorted. This is the fast searching algorithm as compared to Linear search. In linear search Algorithm we have to check every element in the array until we find the required number. The bisection search method is faster as compare to linear search. This follows following steps top complete the operation of searching.

Sort the arrayDivide the total array in two equal partsCheck that the required number that we want to search is in first half or second halfIf the number is found in first half then second half of array will be discarded.Then repeat step 2 and 3 until not found the required element.

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by what service?

Answers

Answer:

Active Directory (AD)

Explanation:

The centralized directory database that contains user account information and security for the entire group of computers in a network.

The service that manages the process of allowing a user to sign on to the network from any computer and access resources is authentication, involving account policies and possibly VPNs.

In a domain, the process of allowing a user to sign on to the network from any computer on the network and get access to resources is managed by authentication, account policies, and often involves the use of a Virtual Private Network (VPN).

These services ensure that users are authenticated first and then given access to the organizational resources which they are authorized to access, while maintaining the security of their devices and credentials.

In the context of Microsoft Windows, the account policies can include Password Policies, Account Lockout Policies, and Kerberos Policies, which are a subset of the domain's security policy stored in the Active Directory.

Email security, both within the corporate network and for users who need to access their corporate email remotely. Which protocols can you use to accomplish this?

Answers

Answer:

TCP and SMTP Protocol

Explanation:

In corporate network as well as remote access to corporate email, both TCP (Transmission Control Protocol) and SMTP(Simple Mail Transfer Protocol) can be used to achieve the email security.

Discuss the textbook's recommendations for improving business-IT communication. Provide examples from your own experience to support your ideas.

Answers

Answer:

Make the importance of effective communicationWork with HR to develop new Skills  expectations and rolesMaking Oral ReportsUsing the TelephoneGive Direction and Feedback

Explanation:

Good communication skill is the most important skill for having a good relationship with business and that is why nowadays companies are making it must-have skill for every IT employee. They are also including it into performance appraisals so that way employees are giving it a topmost priorityCompanies are creating the jobs having titles such as "technology relationship manager", "IT Business Analyst" and "business technology specialist" where the titles suggest that the main focus of such titles is IT-Business relationship. One another way companies are trying to adopt is moving IT employees temporary for some time in business so that they can learn the business and enhance the relationship with them. You will need to make oral reports to other staff, such as the executive chef or restaurant manager. For example, you might have to report on the condition of some equipment or explain your actions regarding a problem with a restaurant supplier. You will also need to make oral reports to people who work under you, such as apprentices or salad preparation staff. For example, you might have to explain the preparation of a new menu item. An effective oral report has the same parts as an effective written report, namely an introduction, a body (or explanation), and a conclusion. Communicating on the telephone can be more difficult than speaking in person because many of the non-verbal cues are missing. When dealing with guests and other outsiders, it is particularly important to create a good first impression of your business. This first impression is created almost solely by your voice. For example, if you pick up the phone and bark “Yo” into the receiver, the caller is likely to be put off by your offhand manner and tone of voice. The caller may wonder whether he or she has reached the right number.A form of oral report that you will have to make if you supervise other people feedback on others’ performance. Feedback can be constructive or destructive. As these words imply, only constructive feedback serves any useful purpose. Take an example where the apprentice under your supervision is making pastries. Destructive feedback would be, “Are you stupid or something? The oven needs to be preheated before you put the pastries in to bake!” Do not use blaming words or indulge in name calling (“You are so…”). When people feel blamed, they often tune out of the discussion and do not hear your positive suggestions for improvement.

When you call a ____________ method, it executes statements it contains and then returns a value back to the program statement that called it.

Answers

Answer:

The answer is a VOID method.

Explanation:

A void method is one that simply performs a task and then terminates.

I think it is called value-returning. Void executes it’s code and returns without passing any value back to the program statement that called it.

What has occurred if you see the message, "Chassis Intruded! System has halted." the next time you start your computer?

Answers

Answer:

The case has been opened.

Explanation:

Chassis Intruded! Fatal Error … System halted:

Due to some technical hardware issue this problem arises. most of the situations, you need to put the jumper back on the motherboard with the pin labeled chassis signal and ground.

how to get rid of this problem:

To avoid this problem you need to disable Chassis intrusion feature completely to get rid of this error message.

A set of independent computer systems interconnected by telecommunication links for the purpose of sharing information and resources is known as a computer ____.

Answers

Answer:

Network

Explanation:

A computer network is a set of computer systems also called nodes which are connected together via communication channels.  These communication links can be telephone lines, modem (in old times) and nowadays these communication links are broadband, digital subscriber line DSL, cables, radio waves etc which are the communication links used for transmitting digital signals. Every communication link has its own data transmission speed. For example Fast Ethernet can provide data rate of 100 mbps and use coaxial cables, twisted pair cables and fiber optic cables.Now what can be the nodes? These can be devices from a PC to a laptop computer or a smart phone etc.The main purpose of a computer network is to share resources, communicating electronically such as videoconferencing, access to internet and exchanging data or files between the computers. These resources can be printers, storage devices etc. Some types of networks are Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN), Internetwork (internet).

Choose all items that represent characteristics of an HTML element. used to include additional information in an attribute consists of a start tag, an end tag, and the contents they surround may sometimes contain nested elements consists of a keyword followed by an equals sign and additional information in quotes sometimes has required attributes

Answers

Answer:

its was B,C,E

Explanation:

i know becase i took it

Final answer:

An HTML element is characterized by its start and end tags, the contents it surrounds, the ability to contain nested elements, and the use of attributes which include a keyword and additional information in quotes. Attributes can sometimes be required for the element's proper functionality and accessibility.

Explanation:

The characteristics that represent an HTML element include start tag, end tag, and the contents they surround. HTML elements can also include nested elements within themselves to create complex structures. Additionally, elements feature attributes, which are used to provide additional information about the element. An attribute in HTML consists of a keyword followed by an equals sign and additional information enclosed in quotes. Some HTML elements may have certain required attributes that need to be included for the element to function correctly or convey the desired property.

For example, the <a> tag for creating links requires the 'href' attribute to specify the URL, like <a href="https://example.com">Visit Example</a>. The 'alt' attribute for <img> tags, which provides alternative text for an image, is another example of a required attribute. Such attributes play a crucial role in accessibility and proper functionality of web content.

Software that helps users to communicate with family, friends and business colleagues by posting personal information, status updates, and photos is called _________.

Answers

Answer:

Social Media

Explanation:

Answer:

Social Media

Explanation:

Social Media are applications (web or mobile applications) that allow people to communicate with family, friends and business colleagues by posting and sharing personal information, status updates and photos with them. In other words, social media allow or enable social networking.

Apart from the uses stated above, the social media also;

i. allow users to pull traffic to their website

ii. allow users to create a brand, an identity for themselves where people are able to recognize them, know what they do and follow up with them.

Examples of social media are Twitter and Instagram.

What will be the output of the following code snippet? boolean token1 = true; while (token1) { for (int i = 0; i < 10; i++) { System.out.println("Hello"); } token1 = false; }

Answers

Answer:

The output of the code snippet will be ten “Hello” messages

Explanation:

while token = true

i = 0 sends “Hello” to the screen

i = 1 sends “Hello” to the screen

i = 2 sends “Hello” to the screen

i = 3 sends “Hello” to the screen

i = 4 sends “Hello” to the screen

i = 5 sends “Hello” to the screen

i = 6 sends “Hello” to the screen

i = 7 sends “Hello” to the screen

i = 8 sends “Hello” to the screen

i = 9 sends “Hello” to the screen

 

What problem can occur when a programmer fails to specify the base case or to reduce the size of the problem in a way that terminates the recursive process?

Answers

Answer:

Inifinite loop will occur.

Explanation:

For instance the code block below will result in an infinite loop:

int prev (x){

Return prev (x-1);

}

The base case is what determine when the function should stop calling itself; if it is absent, infinite loop will occur.

In the above code, a base case of when x = 0 or x = 1 should have been added to avoid the infinite loop.

Other Questions
Use De Morgan's law to select the statement that is equivalent to: "It is not true that the employee received a large bonus and has a big office."a. The employee received a big bonus or has a big office.b. The employee did not receive a big bonus and does not have a big office.c. The employee did not receiv a big bonus or does not have a big office.d. The employee received a big bonus and has a big office Martinez Mining Company purchased land on February 1, 2020, at a cost of $1,031,100. It estimated that a total of 54,000 tons of mineral was available for mining. After it has removed all the natural resources, the company will be required to restore the property to its previous state because of strict environmental protection laws. It estimates the fair value of this restoration obligation at $99,900. It believes it will be able to sell the property afterwards for $111,000. It incurred developmental costs of $222,000 before it was able to do any mining. In 2020, resources removed totaled 27,000 tons. The company sold 19,800 tons.Compute the following information for 2020.(a) Per unit mineral cost$enter a dollar amount(b) Total material cost of December 31, 2020, inventory$enter a dollar amount(c) Total material cost in cost of goods sold at December 31, 2020$enter a dollar amount What factors should be taken into consideration when choosing the ideal solvent for the crystallization of a particular compound? Which expression is equivalent to 6 minus (negative 8)? Electronic Music began to develop in the 1940's with advances in technology. What were the two approaches to Electronic music in the 40's and 50's, and from which country did each originate? What was the 1970's evolution of these approaches? You recently set up a DHCP server and need to configure your computer to start using it. Click the IPv4 properties option that you would select to use the DHCP server to recieve IP configuration information. what is the number of times a base is multiplied by its self indicated by an exponent An empty beaker weighs 34.55 g.a) When completely filled with water, the beaker and its contents have a total mass of 440.85 g. What volume does the beaker hold? Use d =1.00 g/mL as the density of water........mLb) How much would the beaker and its contents weigh if it was completely filled with mercury? The density of mercury is d =13.5 g/mL.......... g pls help idk how to work it out The enthalpy of formation of CO2 at 25oC is -393.51 kJ/mol. What is the enthalpy of formation at 500 oC? Which of the following are the powers kept by the states under the federal system of government?A. Concurrent powersB. Enumerated powers C. Prohibited powers D. Reserved powers PLESE HELP ASAP!!!! What is the correct definition of public opinion?the ideas and feelings the people have about the government, its elected officials, and its programsthe decisions and choices the public makes when votingthe changes and improvements to the government proposed by citizens in public forumsthe issues and concerns the government decides are most important for the public to consider A specific shade of green glaze is made of 5 parts blue glaze to 3 parts yellow glaze. A glaze mixture contains 25 quarts of blue glaze and 9 quarts of yellow glaze. How can you fix the mixture to make the specific shade of green glaze? Find the value of s(t(-5)):s(x) = - 3x-2t(x)=5x - 4 The theory of plate tectonics explains the movement of the plates by convection cells in the earth's layers? Roger has severe arthritis and has been taking prednisone (a glucocorticoid) for two months. He isn't feeling well, complains of repeated "colds," and is extremely "puffy" (edematous). Explain the reason for these symptoms. Writers use humor for which of the following purposes? Select all that apply.to say something that might go against what's popularto establish ethos in how smart and creative they areto relate to the audience in a nonthreatening wayto make fun of an amusing behavior often found in society Technician A says that diesel fuel has more heat energy than gasoline. Technician B says that grade #2 is the grade recommended for normal service in Which technician is correct? A number is equal to 3 times a smaller number. Also, the sum of the smaller number and 4 is the larger number. The situation is graphed on the coordinate plane below, where x represents the smaller number and y represents the larger number. On a coordinate plane, a line goes through (0, 4) and (2, 6) and another line goes through (1, 3) and (2, 6). Which two equations represent the situation? y = one-third x and y = x minus 4 y = one-third x and y = x + 4 y = 3 x and y = x + 4 y = 3 x and y = x minus 4. Carole needs 4pounds of nuts for her granola. She has 26ounces of walnuts and 28ounces of cashews. How many ounces of peanuts should she buy so she has 4pounds of nuts? Steam Workshop Downloader