Create a brief program that demonstrates use of a Java exception. For example, you could use InputMismatchException and ask the user to input an integer and show that the program executes correctly if they enter an integer and also show that the exception is thrown and a proper error message is displayed to the user if they input a string of letters. You may want to try it with and without a try catch block for practice, but either one will be sufficient for credit.

Answers

Answer 1

Answer:

Here is the program that demonstrates the use of JAVA exception:

import java.util.Scanner;  //to accept input from user

public class Main {  //class name

   public static void main(String[] args) {  //start of main method

      Scanner input = new java.util.Scanner(System.in);  //creates Scanner class object to accept input from user

       int number1 = 0;  //stores the first integer value

       int number2 = 0;  //stores the second integer value

       while(true) {  //keeps looping until user enters integer value

           System.out.println("Enter 2 integers to perform addition: "); //prompts user to enter two integer values

           try {  //defines a chunk of code to check for errors        

               number1 = input.nextInt(); //reads input integer 1

               number2 = input.nextInt(); //reads input integer 2                  

               break;             }  

           catch (java.util.InputMismatchException e) { // defines a code chunk to execute if an error occurs in the try code chunk

              System.out.println("Input must be an integer "); //displays this message if user enters anything other than an integer value

              input.nextLine();              }         }  // reads input from user again until user enters both integer type values

       System.out.println("The sum is: " + (number1+number2));      }  } //if user enters 2 integers then computes and displays the sum of two integer values

Explanation:

The program uses InputMismatchException exception and asks the user to input two integers and computes the sum of two integers if user enters  integers otherwise an exception InputMismatchException is thrown and a error message Input must be an integer is displayed to the user if they input a string of letters instead o f integer values. Here while loop is used which keeps executing until user enters both the integer values. After the user enters correct values, the sum of the two integers are computed and result is displayed on output screen. The screenshot of program and its output is attached.

Another program asks the user to input an integer and the program executes correctly if they enter an integer but exception InputMismatchException is thrown with an error message that is is displayed to the user if they input a string of letters. Here is the program:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       Scanner input = new java.util.Scanner(System.in);

       int number1 = 0;          

       while(true) {

           System.out.println("Enter an integer value: ");        

           try {

               number1 = input.nextInt();  

               break;             }  

           catch (java.util.InputMismatchException e) {

              System.out.println("Input must be an integer ");

              input.nextLine();             }        }  

       System.out.println("The program executed correctly!");  } }

Create A Brief Program That Demonstrates Use Of A Java Exception. For Example, You Could Use InputMismatchException
Create A Brief Program That Demonstrates Use Of A Java Exception. For Example, You Could Use InputMismatchException

Related Questions

Alejandro wants to post an animation on his social media page that shows a series of slightly different images displayed in sequence. What type of animation should he select?

A.) Animated gif
B.) HTML 5
C.) Adobe Flash
D.) Adobe animate cc

Answers

Answer:

Adobe Flash

Explanation:

From the list of given options, Adobe Flash answers the question.

Adobe Flash are basically multimedia animations that are created to include numerous images which are displayed in sequence.

Other options such as Adobe animation cc is a software used to create flash animations, html5 is a web language, animated GIF are short animations.

The type of animation he  should select is A.) Animated gif

Animated gif are picture which are in Graphic interchange format (GIF) .

Animated gif  are very easy to download because they download quickly.

Animated gif are picture that always move non stop when displayed  on a computer screen or other device as the picture changes from one picture to another picture.

They can always be found on the internet and they are mostly used as an advertisement pictures that is embedded on web pages which help to showcase a company product.

Inconclusion The type of animation he  should select is A.) Animated gif.

Learn more about Animated gif here:

 https://brainly.com/question/15057611

What can amber do to make sure no one else can access her document?

Answers

To make sure that no one else can access her document, Amber can  do the following

Use strong passwordsEncrypt the document

What is the document about?

The use of passwords that are challenging to speculate or break. To create a strong password, it is advisable to use a combination of capital and lowercase letters, as well as numbers and special symbols.

Lastly, Secure the document via encryption in order to prevent any unauthorized access. The majority of word processing software includes encryption functionalities that enable the encryption and password safeguarding of documents.

Learn more about Encrypt  from

https://brainly.com/question/20709892

#SPJ1

How does Accenture work to build trust in Artificial Intelligence (AI)?

Answers

This question has already been asked on Brainly.

https://brainly.in/question/35275070

Accenture work to build trust in Artificial Intelligence (AI) through investing in differentiated intellectual property.

What is a  differentiated intellectual property?

Intellectual property serves as a creations of the mind as well as inventions that is bee used in commerce.

With the creation of this  differentiated intellectual property, it help the Accenture to be able to establish trust because there is a law that protect any intellectual property in the the country.

Read more on intellectual property here: https://brainly.com/question/1078532

#SPJ2

what is the extension of excel worksheet​

Answers

Answer:

Excel file formats

Format Extension

Excel Workbook .xlsx

Excel Macro-Enabled Workbook (code) .xlsm

Excel Binary Workbook .xlsb

Template .xltx

explain the advantage and disadvantage of using css.​

Answers

Explanation:

When discussing the advantage/dis- of CSS, its important to note the two types of CSS

Inline and External CSS.

Inline CSS allows for on the spot changing of the style of whatever.

External CSS allows for site wide changes to the style of whatever.

When it comes to UX, External CSS creates a longer load time of the webpage, especially if there's a large amount of styles for things.

Inline CSS causes problems when you want Javascript oriented design as Javascript overwrites Inline. when coded in a specific way.

Use the drop-down menu to identify which command is used to do the activities.

Saving updates on a workbook:

Saving a workbook on OneDrive:

Changing the file name of an existing workbook:

Saving an existing workbook in a different location:

Assigning an initial location for the workbook to be saved:

Answers

Answer:

1. Both

2. Save As

3. Save As

4. Save As

5. Both

Explanation:

got the question right

The value you choose—typically the display text—will be saved as the default “Dropdown list” data-type. Instead of saving the text, the “Dropdown list with published keys” instead saves the Revalue ID (from the database).

What is use of a drop-down menu to identify a command?

A drop-down menu, also known as a list of options, appears when a button or a piece of text is clicked. Users can decide a value from a list by selecting it from a graphical representation of this method.

People can select an item from a list you generate using drop-down menus. In a new worksheet, type the selections you want to appear in your drop-down list. Your list items should ideally be in an Excel table.

A closed-ended inquiry known as a dropdown allows respondents to select one response option from a set of options displayed in a dropdown menu.

Therefore, 1. Both 2. Save As 3. Save As 4. Save As 5. Both.

Learn more about drop-down here:

https://brainly.com/question/4379717

#SPJ2

3
User input is required in an iterative program.

A.
True

B.
False

Answers

Answer:

B

Explanation:

An iterative program could work with or without user input. It really just depends on the type of program you're creating. Hope this helps.

Momentous events in Philippine history where ICT played a huge role in making it a success?

Answers

Answer:

I hope this answer is correct

Explanation:

MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.

MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.EDSA People Power II, as it came to be known, was a series of protests held from January 16 to 20, 2001, against former president Joseph Estrada who was then facing plunder charges. The protests eventually triggered Estrada’s downfall – and paved the way for Gloria Macapagal-Arroyo, his vice president, to enter the spotlight in the political scene.

MANILA, Philippines – Sixteen years ago, Filipinos gathered at the historic thoroughfare EDSA, where freedom was once won against a dictator in 1986.EDSA People Power II, as it came to be known, was a series of protests held from January 16 to 20, 2001, against former president Joseph Estrada who was then facing plunder charges. The protests eventually triggered Estrada’s downfall – and paved the way for Gloria Macapagal-Arroyo, his vice president, to enter the spotlight in the political scene.But Arroyo would later face her own share of troubles during her administration. Both former presidents seemed to follow the same track in politics: they were both vice presidents before assuming the highest seat of the land, and both have been accused of criminal offenses. Despite these, Estrada and Arroyo have managed to retain positions in government today.

Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key K, then Bob could impersonate Carol to Alicia (actually any of three can impersonate the other to the third). Suppose instead that each had their own secret key, so Alice uses KA, Bob uses KB, and Carol uses KC. This means that each one, to prove his/her identity, responds to a challenge with a function of his/her secret key and the challenge. Is this more secure than having them all use the same secret key K? (Hint: what does Alice need to know in order to verify Carol’s answer to Alice’s challenge?)

Answers

Answer:

No. This is not more secure.

Explanation:

this is not more secure than having all of Carol, bob and Alice having the same key.

alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.

any of these 3 would have to know someone else's secret key to verify answers to any challenge.

the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.

Should spreadsheets be used to track time worked at a job?

YES
NO

Answers

Answer:

Yes

Explanation:

Spreadsheets should be used to track time worked at a job because it would make it easier to use and see rather than another platform.

Your boss has asked you to create a program that calculates the total cost of an item
after a discount and sales tax have been applied. You have been testing the program
using a cost of $10.00, a discount of 50%, and 10% sales tax. You know the answer
should be $5.50 but the program returns $16.50. What type of error is most likely
causing the problem?

Answers

Answer:

Have you tried debugging the text? It shows the line by line process of the final answer

4. How many times will the print statement be executed within the following nested for loops? Briefly explain how or show the math to calculate that number of iterations.

for (int h = 1; h <= 12; h++) {
for (int m = 0; m <= 59; m++) {
for (int s = 0; s <= 59; s++) {
System.out.printf(“%d:%02d:%02d%n”, h, m, s);
}
}
}

Answers

Print statements are used to display outputs

The number of times the nested loop will be executed is 43200

What are nested for loops?

Nested for loops are loops that are placed within another loop or loops

From the statement, we have the following loop conditions:

h = 1; h <= 12, m = 0; m <= 59 and s = 0; s <= 59

The above means that:

h = 12 --- the outer loop will be executed 12 timesm = 60 --- the middle loop will be executed 60 timess = 60 --- the inner loop will be executed 60 times

So, the number of times the nested loop will be executed is:

[tex]Count = 12*60 *60[/tex]

[tex]Count = 43200[/tex]

Hence, the number of times the nested loop will be executed is 43200

Read more about loops at:

https://brainly.com/question/14284157

What will be displayed as a result of executing the following code?
int x = 6;
String msg = "I am enjoying this class.";
String msg1 = msg.toUpperCase();
String msg2 = msg.toLowerCase();
char ltr = msg.charAt(x);
int strSize = msg.length();
System.out.println(msg);
System.out.println(msg1);
System.out.println(msg2);
System.out.println("Character at index x = " +
ltr);
System.out.println("msg has " + strSize + "characters.");
A) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = e msg has 24 characters.
B) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = e msg has 25 characters.
C) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = n msg has 24 characters.
D) I am enjoying this class. I AM ENJOYING THIS CLASS. i am enjoying this class. Character at index x = n
msg has 25characters.

Answers

Answer:

d

Explanation:

Complete the sentence. Privacy of means that our data should not be automatically available to others.

Answers

The term Privacy means that our data should not be automatically available to others and there should be a measure of restriction for people in accessing it.

What is privacy of data?

Data privacy is known to be the right of  people to have control over how their personal information as to when or if it can be collected or used.

Data protection is known to be part of privacy. This is due to the fact that protecting user data and sensitive information is a initial step to keeping user data private.

Learn more about Privacy of means from

https://brainly.com/question/1189272

What is a spreadsheet macro?

A) A small program which performs several steps, which can be recorded and activated using a hot key combination.

B) A tool used to create charts.

C) A feature inside excel that makes your work look better.

D) A formula to complete calculations.

Answers

Answer:

Macros are code that automate work in a program—they let you add your own tiny features and enhancements to help you accomplish exactly what you need to do, quickly with just a click of a button.

Explanation:

Kris Allen runs a pet daycare center. She needs to keep track of contact information for her customers, their animals, the services provided (such as walking and grooming), and the staff who are assigned to care for them. She also must send out invoices for payment each month. What features of spreadsheets and/or database software might she use to facilitate her business

Answers

for easy data management i recommend SQL

The features of spreadsheets and/or database software might she use to facilitate her business are:

Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions.

What is Spreadsheet?

A spreadsheet is known to be a kind of computer application that is often used for computation, organization, and others.

Note that The features of spreadsheets and/or database software might she use to facilitate her business are:

Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions.Data filteringAccounting.Analytics, etc.

Learn more about spreadsheets from

https://brainly.com/question/27119344?answeringSource=feedPublic%2FhomePage%2F20

#SPJ2

Observation and screening data should not influence curriculum development true or false?

Answers

Answer:true

Explanation: we cant rely on computers

The given statement about the importance of observation and screening in curriculum development is false.

What is curriculum development?

Curriculum development is given as the process of development of the systematic process of learning for the students. The process of curriculum development is comprised of the steps that evaluate the development of the students.

Observation and screening play an important role in the development of the curriculum as is signifies the development. Thus, the given statement is false.

Learn more about curriculum development, here;

https://brainly.com/question/10686364

#SPJ2

Which should be your first choice for the most efficient and successful job search method?

visiting a career center

performing an online search

networking person-to-person

checking newspapers and other publications

Answers

Answer:

C

Explanation: Source: trust me bro

Answer:

C

Explanation: Edge 2022

One of the leading causes of serious injuries and deaths in this country is single-vehicle crashes into roadside obstacles and hazards.

True
False

Answers

Answer:

True

Explanation:

Just took the quiz on edginuity

Good luck

Discuss how the use of standard web component layouts and templates influences the visual design of a web page. In your opinion, do these approaches limit creativity and originality in web page design? Support your response by suggesting contexts in which using a standard layout or template may be especially helpful or unhelpful.

Answers

Answer: The standard web component layouts and templates makes the web page seem like many others but could also make it easier for users to interact and use the web page without much trouble. The approaches do limit creativity and originality in web page design but its better to have an easy to use web page that can still look good rather than something that is confusing for the users.

Explanation:

Standard web component layouts and templates make the website look generic, but they may also make it simpler for visitors to engage with and navigate the website.

What is web component?

A group of functions known as Web Components offer a common component model for the Web, enabling the encapsulation and interchange of individual HTML components.

A collection of technologies called Web Components enables you to develop reusable bespoke elements for use in web projects that have their functionality isolated from the rest of your code.

Although standard web component layouts and templates give the website a basic appearance, they may also make it easier for visitors to interact with and navigate the site.

The methods do place restrictions on uniqueness and creativity in web page design, but it is preferable to create a web page that is simple for users to navigate while still looking nice.

Thus, the use of standard web component layouts and templates influences the visual design of a web page.

For more details regarding web components, visit:

https://brainly.com/question/21848424

#SPJ2

1.Give single word
a. A computer never gets tired or bored while working for a long time ..........
b. A computer doesn't make any mistake ..........
c. A computer can perform billions of calculations in a second .........
d. A computer can perferm several tasks such as drawing pictures,playing games,etc.......

Answers

Answer:

A. Versatile

B. Accuracy

C. High speed

D. Animation.

Write a C++ program to Calculate the value of π from the infinite series Print a table that shows the value of π approximated by computing the first 200,000 terms of this series. How many terms do you have to use before you first get a value that begins with 3.14159?

Answers

The C++ program is an illustration of loops and conditional statements

How to analyze the infinite series

The infinite series is given as:

[tex]\pi = 4 - \frac 43 + \frac 45 - \frac 47 + \frac 49 -\frac 4{11} + ....[/tex]

The above series shows that, the addition and the subtraction signs are interchanged, and the denominator of the fractions increase by 2 while the numerator remains the same

The main program

The program written in C++, where comments are used to explain each line is as follows:

#include <iostream>

using namespace std;

int main(){

   //This initializes the value of pi to 0

   double pi = 0;

   //This iterates from 1 to 200000

   for(int i = 0; i< 200000; i++){

       //The following conditions determine the value of pi

       if(i%2==0){

           pi+=4.0/(1.0+2.0*i);

       }

       else{

           pi-=4.0/(1.0+2.0*i);

       }

   }

   //This prints the value of pi

   cout<<pi;

   return 0;

}

Read more about loops and conditional statements at:

https://brainly.com/question/24833629

Benchmark test compare similar systems performing in which tasks
A) similar tasks
B) different tasks
C) related tasks
D)identical tasks

Answers

Benchmark test compare similar systems performing in identical tasks.

What is Benchmark in the act of  Performance Testing?

A Benchmark Testing is  known to be a kind of  metric or one that is used as a kind of point of reference against a software products or services and it is one that can be compared to know the quality feature.

This kind of test is one where there is a set standard that aid  one in knowing  the quality of software product or service. One  can benchmark a identical  product to know its quality.

Learn more about Benchmark test from

https://brainly.com/question/226804

What is 3+5?*

(Hint: is it not 8)

Answers

Such a confusing question:)

Explanation:

mark me brainliest

List four useful spreadsheet functions and explain what they do.

Answers

Answer:

SUM, AVERAGE, MAX,MIN

Explanation:

Sum: The SUM function is categorized under Excel Math and Trigonometry functions. ... The function will sum up cells that are supplied as multiple arguments. It is the most popular and widely used function in Excel. SUM helps users perform a quick summation of specified cells in MS Excel.

Average: The AVERAGE function in Excel does exactly what you think it should. It computes the mathematical average of a set of numbers. In other words, it adds up a set of numbers and then divides the sum by how many numbers are being averaged.

Max: he MAX function will count numbers but ignore empty cells, text, the logical values TRUE and FALSE, and text values. In financial analysis, MAX can be useful in calculating the highest score, the fastest time, the highest expense or revenue amount, etc.

Min: will return the minimum value in a given list of arguments. From a given set of numeric values, it will return the smallest value. Unlike the MINA function, the MIN function ignores numbers, text, and logical values TRUE and FALSE and text values. In financial modeling.

You are a Network administrator for a company whose IP address is 199.199.10.0/24. Your company has two departments. Research needs 13 hosts and Marketing needs 31 hosts. Using VLSM; what is the network address of the second subnet?

Answers

Answer:

Explanation:

VLSM is Variable Fixed Length Subnet Mask which  creates subnets with varying sizes with a variable number of hosts.

Arrange the different subnets with descending number of hosts required. So the first subnet will be for Marketing and the second will be for Research.  The second subnet will have the second higher IP available which is 199.199.10.0/26. It has 64 IP addresses that can be assigned to 13 hosts required by Research.

Assignment 5B : Maze Game! 2D Arrays can be used to store and represent information
about video game levels or boards. You will use this knowledge to make an interactive game where players attempt to move through a maze. You will start by creating a pre-defined 2D array with the following values:
{"_","X","_","X","X"}
{"_","X","_","X","W"}
{"_","_","_","X","_"}
{"X","X","_","_","_"}
{"_","_","_","X","X"}
You will then set the player (represented by "O") at index 0, 0 of the array, the top-left
corner of the maze. You will use a loop to repeatedly prompt the user to enter a
direction ("Left", "Right", "Up", or "Down"). Based on these directions, you will try to
move the player.
• If the location is valid (represented by "_"), you will move the player there
• If the location is out of bounds (e.g. index 0, -1) or the command is invalid, you
will inform the player and prompt them to enter another direction
• If the location is a wall (represented by "X"), you will tell the user they hit a wall
and the game is over.
If the player did not lose, you will print out the current state of the map and ask them for
a new direction. You will keep doing this until they lose or they reach the end
(represented by the "W").
Sample Output #1:
[Maze Game]
O.X._.X.X.
_.X._.X.W.
_._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Up
You can't move there - it's out of bounds!
Which direction do you want to move? Down
_.X._.X.X.
O.X._.X.W.
_._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Down
_.X._.X.X.
_.X._.X.W.

O._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Down
You hit a wall - Game Over!
Sample Output #2:
[Maze Game]
O.X._.X.X.
_.X._.X.W.
_._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Eleventy
That's not a valid direction!
Which direction do you want to move? Down
_.X._.X.X.
O.X._.X.W.
_._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Down
_.X._.X.X.
_.X._.X.W.
O._._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Right
_.X._.X.X.
_.X._.X.W.
_.O._.X._.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Right
//Skipping ahead (This line is not part of the output)
_.X._.X.X.
_.X._.X.W.
_._._.X.O.
X.X._._._.
_._._.X.X.
Which direction do you want to move? Up
You win!

Answers

Answer:

yes

Explanation:

A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . Group of answer choices analysis integrity masquerade encryption

Answers

hello!

the answer is encryption!

i hope this helps! :]

Three-dimensional models are constructed using two-
dimensional profiles.
True or false

Answers

Answer:

False.

It would be true for pyramids, but not true for other shapes, like spheres and cubes.

Which of these is a quicker way to add onto the value previously held by the variable “a” in in Python? A. a == a + 20 B. a += 20 C. a + 20 D. a/20

Answers

Answer:

b

Explanation:

B. a += 20 exists a quicker way to add onto the value formerly carried by the variable “a” in Python.

What is Python?

Python exists as a high-level, interpreted, general-purpose programming language. Its design philosophy highlights code readability with the use of substantial indentation. Python exists dynamically typed and garbage-collected.

Python exists as a computer programming language often utilized to build websites and software, automate tasks, and perform data analysis. Python exists as a general-purpose language, meaning it can be utilized to create a variety of various programs and isn't specialized for any distinctive problems.

A Python variable exists as a symbolic name that exists as a reference or pointer to an object. Once an object exists allocated to a variable, you can direct it to the object by that name.

Hence, B. a += 20 exists a quicker way to add onto the value formerly carried by the variable “a” in Python.

To learn more about Python refer to:

https://brainly.com/question/26497128

#SPJ2

Other Questions
Consider the market for meekers in the imaginary economy of Meekertown. In the absence of international trade, the domestic price of meekers is $40. Suppose that the world price of meekers is $39. Assume that Meekertown is too small to influence the world price of meekers once it enters the international market. If Meekertown allows free trade, then it will meekers. Given current economic conditions in Meekertown, complete the following table by indicating whether each of the statements is true or false. Statement True False Meekertownian consumers were worse off without free trade than they are with it. Meekertownian producers were worse off without free trade than they are with it. Read this table of contents. CONTENTS 2. Preface 5. Introduction 15. What Is a Coral Reef? 22. Extremely Fragile 36. Dangers Posed to Fish 40. Environmental Concerns 51. In Great Danger 70. Measures Taken 87. What Can You Do? ? Based on information found in this table of contents, what is the subject of this book? the life cycle of coral reefs the many benefits of coral reefs the dangers faced by coral reefs the fish that live in coral reefs. 56:01Fish, poultry, lean meats, and nuts should be consumed for which of the following nutrients?A calciumB. carbohydratesC. proteinD vitamin DPlease select the best answer from the choices provided B DSave and ExitNextSubmitMark this and return what is the maximum force required to prevent a ball weighing 17.3 lb from rolling down a ramp which is inclined at 24.3 degrees with the horizontal PLS PLS PLS HELP ME!!! DULCE ET DECORUM ESTRead the poem slowly aloud, and notice the rhythm of thelines. Every other syllable is emphasized, as if the beat was:"da DUM da DUM da DUM da DUM da DUM." How does thisrhythm, like a drumbeat or a heartbeat, contribute to theoverall meaning of the poem? A figure with two right triangles is shown below. What is the distance between A and B ? caracteristicas abuela libro koi ezequiel dellutri 4+2b=5+5(b+4)Help pleasee What is thebest explanationfor why the red bacteria are able to survive the antibiotics? A A random mutation occurred in their genes that gave them resistance B They chose to mutate and develop resistance C They learned how to avoid the antibiotic by watching other bacteria do it Mrs. Rodger got a weekly raise of 145. If she gets paid every other week, write an integer describing how the raise will affect her paycheck. john and caraline go out for a drive one day. this graph reprresents the distance they travlled over time during what part of time are they not moving. x-9/3=28Solve for x. A smooth. Weaved mats made of Buri or Raffia leaves is called? does anyone know this i tried for hours and cant figure it out Please answer! I beg of you. Could you help me please!! The value of 8 in 5.18 is. of the value of 8 in 5.81 What type of appeal would help you to illustrate a point using reason? answer this i will give u brainliest and pts