In the space below, write MATLAB code that defines a variable avedogsperyear that contains the average number of dogs born each year.

Answers

Answer 1

Write a MATLAB code for calculating the average number of dogs born each year. Here's the code and a brief explanation:

```matlab
totalDogsBorn = 1000;
totalYears = 5;
aveDogsPerYear = totalDogsBorn / totalYears;
```

In this example, we have defined a variable `totalDogsBorn` which represents the total number of dogs born over a certain period. We then define another variable `totalYears`, representing the number of years in that period. Finally, we calculate the average number of dogs born each year by dividing `totalDogsBorn` by `totalYears`, and store the result in the variable `aveDogsPerYear`.

Step-by-step explanation:

1. Define the `totalDogsBorn` variable by setting it to a specific value (e.g., 1000). This represents the total number of dogs born during the given time frame.
2. Define the `totalYears` variable by setting it to a specific value (e.g., 5). This represents the number of years in the given time frame.
3. Calculate the average number of dogs born each year by dividing `totalDogsBorn` by `totalYears`. Store the result in a new variable called `aveDogsPerYear`.

This code provides a simple way to calculate the average number of dogs born each year using MATLAB. You can change the values of `totalDogsBorn` and `totalYears` as needed to get different results.

Know more about the code click here:

https://brainly.com/question/31228987

#SPJ11


Related Questions

You need a(n) _____ to play an mp3 audio file on a desktop or laptop computer

Answers

You need a stand alone player to play an mp3 audio file on a desktop or laptop computer.

What is a stand alone player?

The standalone player is known to be a device that gives room for a person or is one that allows a Blender game to be able to run without one trying to load the Blender system.

Note that in the above, You need a stand alone player to play an mp3 audio file on a desktop or laptop computer.

Learn more about laptop computer from

https://brainly.com/question/13213990

#SPJ1

In which directory would a system administrator store scripts that should be run monthly by the cron daemon?

Answers

Answer: /etc/cron.monthly

Explanation:

What is the purpose of installing updates on your computer?

Answers

The purpose of adding updates to your computer are as follows:

Making sure your computer hardware can run the newest software programsEnsuring the built-in virus protection software is up to dateRemoving bugs and glitches from your operating systemAllowing your computer to run as fast as possible

Anonymity on the internet has lowered the cost of rudely confronting people. what has happened to the supply of rude confrontations?

Answers

The thing that has happened to the supply of rude confrontations is that  The supply has increased, shifting down and to the right.

What supply means in economics?

Supply in economics is known to be seen as the full amount of a given product or service that a given  supplier is known to offers to consumers at a specific point in time and a given price level.

Hence, The thing that has happened to the supply of rude confrontations is that  The supply has increased, shifting down and to the right because Anonymity on the internet has lowered the cost of rudely confronting people.

See full question below

Anonymity on the Internet has lowered the cost of rudely confronting people. What has happened to the supply of rude confrontations? a) The supply has decreased, shifting up and to the left. b) The supply has increased, shifting up and to the left. C) The supply has decreased, shifting down and to the right. d) The supply has increased, shifting down and to the right. Question 46 (1 point) Figure: Supply Shift Saved Price $100-

Learn more about Anonymity from

https://brainly.com/question/3980546

#SPJ1

Mary and Billy are moving away to college and both know in their hearts that they need to end their relationship. They move away with a mutual agreement to breakup and leave peacefully. What is this called

Answers

In the case of Mary and Billy, the above is called Negotiated farewell.

What is Negotiated farewell?

In the case of  Negotiated Farewell, one can say that couples are knonw to jointly create the story of the end to what we say their marriage.

Note that Negotiated Farewell is one that is made for emotionally immature or any kind of combative people. hence, In the case of Mary and Billy, the above is called Negotiated farewell.

Learn more  about relationship from

https://brainly.com/question/10286547

#SPJ1

Deploying an application across multiple __________________ can help build a robust architecture for an application that needs to have an up-time of at least 99.5

Answers

Deploying an application across multiple regions can help build a robust architecture for an application that needs to have an up-time of at least 99.5.

What is multi-region deployment?

The Multi-Region Infrastructure Deployment is known to be one that aids customers a lot to be able to easily control updates in regards to infrastructure needed for applications that are said to be deployed in all of primary and secondary Regions.

Hence, Deploying an application across multiple regions can help build a robust architecture for an application that needs to have an up-time of at least 99.5.

Learn more about architecture  from

https://brainly.com/question/9760486

#SPJ1

find_cow(name, cows) Given a name and a Python list of Cow objects, return the Cow object with the specified name. If no such Cow object can be found, return None.

Answers

Using the computational knowledge in python it is possible to write a code that Given a name and a Python list of Cow objects

Writting the code in python:

def load_cows(filename):

     cow_dict = dict()

   f = open(filename, 'r')

   for line in f:

       line_data = line.split(',')

       cow_dict[line_data[0]] = int(line_data[1])

   return cow_dict

def greedy_cow_transport(cows, limit=10):

      trips = []

   cowsCopy = cows.copy()

   sortedCows = sorted(cowsCopy.items(), key=lambda x: x[1], reverse = True)

   while sum(cowsCopy.values()) > 0:

       ship = []

       total = 0

       for cow, value in sortedCows:

           if cowsCopy[cow] != 0 and value + total <= limit:

               ship.append(cow)

               total += value

               cowsCopy[cow] = 0

       trips.append(ship)

   return trips

def brute_force_cow_transport(cows,limit=10):

    trips = []

    possibilities = []

   for i in power_list:

       ship = []

       for j in i:

           ship_weights = []

           for k in j:

               ship_weights.append(cows[k])

               #print(ship_weights)

           ship.append(sum(ship_weights))

           #print(ship)

       if all(d <= limit for d in ship):

           possibilities.append(i)

     pruned_possibilities = []

   for k in possibilities:

       if k not in pruned_possibilities:

           pruned_possibilities.append(k)

   # now find the minimum list length:

   min_list_len = min(map(len, pruned_possibilities))

   for l in pruned_possibilities:

       if len(l) == min_list_len:

           return l

     

def compare_cow_transport_algorithms():

      greedy_start = time.time()

   greedy_results = greedy_cow_transport(cows, limit = 10)

   greedy_end = time.time()

   print('Greedy Algorithm time:', greedy_end -greedy_start)

   brute_force_start = time.time()

   brute_force_results = brute_force_cow_transport(cows, limit = 10)

   brute_force_end = time.time()

   print('Brute force time:', brute_force_end - brute_force_start)

   print('Greedy Algorithm results:', greedy_results)

   print('Number of trips returned by Greedy Algorithm:', len(greedy_results))

   print('Brute Force Algorithm results:', brute_force_results)

   print('Number of trips returned by Brute Force Algorithm:', len(brute_force_results))

   

See more about python at brainly.com/question/13437928

#SPJ1

Every time a user enters a different web page url into a browser, the same web page appears. what will help in this situation?atask managerbfirewallcanti-malwareddevice manager

Answers

Every time a user enters a different web page url into a browser, the same web page appears. the issue that can help is the use of firewall.

What is firewall and how it works?

The term firewall is known to be that which helps protect a person's network from attackers.

Note that A firewall shields one's network because it work in a 24/7 filter window, and this is one that often works by scanning the data that tries to enter your network and hinder anything that may act or looks suspicious from getting through.

Hence, in the case above, Every time a user enters a different web page url into a browser, the same web page appears. the issue that can help is the use of firewall.

Learn more about firewall from

https://brainly.com/question/13693641

#SPJ1

In this program you will draw some ASCII art using System.out.println(). Write a program that outputs exactly this drawing. ()_____ // O)___ // ) // _____/

Answers

This is known as ASCII Art. The program that give the above output is given below.

What is the program that give the above output?

The codes that resort to the above output are given below:


public class ASCIIArt{

public static void main(String[] args) {

System.out.println(" /)___");

System.out.println(" / o|___");

System.out.println(" / )");

System.out.println("/ )___/");

}

}

What is ASCII Art?

The 95 readable characters from the total of 128 established by the ASCII Standard from 1963 and ASCII compliant character sets with proprietary extra characters make up ASCII art, a visual design style that leverages computers for display (beyond the 128 characters of standard 7-bit ASCII).

The phrase is also figuratively used to describe all forms of text-based visual art. Any text editor may be used to make ASCII graphics, which is frequently used with free-form languages.

Learn more about ASCII:
https://brainly.com/question/17147612
#SPJ1

Full Question:

See attached image.

Every time you call a method, the address to which the program should return at the completion of the method is stored in a memory location called the ____.

Answers

Answer:

Stack

Explanation:

Every time you call a method, the address to which the program should return at the completion of the method is stored in a memory location called the stack.

At startup, Windows Server 2012 Core presents _______.

Answers

At startup, Windows Server 2012 Core presents a command window.

What is a Windows Server used for?

Windows Server is known to be a kind of a group of operating systems that is made by Microsoft that aids enterprise-level management, data storage, applications, and others.

The Command window is known to be that which gives a person  the information, it also gives instructions, and gives room for one  to be able to enter commands usually at the Command prompt.

Therefore, note that at startup, Windows Server 2012 Core presents a command window as it is the first thing that will come up.

Learn more about Windows Server from

https://brainly.com/question/25554117

#SPJ1

The security team at an organization looks to protect highly confidential servers. Which method does the team propose when protecting the servers against explosives?

Answers

The method that the team propose in protecting the servers against explosives is Physical Security.

What are the Physical Security Considerations?

Physical security is known to be a key part as it acts in network security and tends to protect an organization and employees.

Note that   An organization's physical components is one that can have vulnerabilities that need to be mitigated by using appropriate physical security measures by:

The use of Building and grounds control Fire risks control, etc.

Hence, The method that the team propose in protecting the servers against explosives is Physical Security.

Learn more about security team from

https://brainly.com/question/26035259

#SPJ1

For a direct mapped cache design with a 32-bit address, the following bits of the address are used to access the cache. assume a write through cache policy.
tag index offset
31-10 9-5 4-0
1. what is the cache block size (in words)?
2. 151 how many entries does the cache have?
3. 151 cod $5.3> what is the ratio between total bits required for such a cache implementation over the data storage bits?
address
starting from power on, the following byte-addressed cache references are recorded.
0 4 1 132 232 160 3024 30 140 3100 180 2180
4. [10 how many blocks are replaced?
5. what is the hit ratio?
6. list the final state of the cache, with each valid entry represented as a record of sindex, tag, data>

Answers

From the information given, the cache block size is 32. See explanation below.

How do we arrive at the cache block size?

Where the offset is 5 bits, the block size is given as:

2⁵ = 32.

Hence, the total number of blocks in the cache is 32.

How many entries does the cache have?

Note that

Total cache size = No. of entries (No. of tag bits + data bits + valid bit)

Hence,

= 32 x (22+ 256 +1)

= 8, 928 bits

Learn more about cache block at;
https://brainly.com/question/3522040
#SPJ1

When you group together related variables, the group is referred to as a(n) ____ of variables

Answers

Answer:

Array of variables

Explanation:

This occurs when you group together related variables

connection failed while opening file within cryptographic module - mbedtls_ssl_handshake returned -9984 ( X509 - Certificate verification failed, e.g. CRL, CA or signature check failed )

Answers

The connection that failed while opening file within cryptographic module - mbedtls_ssl_handshake returned -9984 ( X509 - Certificate verification failed, e.g. CRL, CA or signature check failed is known to be a kind of a TLS hanshake failing with EC.

What are cryptographic products?

These are known to be Software, hardware or what we call the firmware that is made up of one or a lot of cryptographic functions.

Note that a cryptographic product is one that is made up of a kind of cryptographic module and they also help to implements security functions (such as cryptographic algorithms),

Therefore, based on the above, The connection that failed while opening file within cryptographic module - mbedtls_ssl_handshake returned -9984 ( X509 - Certificate verification failed, e.g. CRL, CA or signature check failed is known to be a kind of a TLS hanshake failing with EC.

Learn more about cryptographic module  from

https://brainly.com/question/4451170

#SPJ1

Any two differences between second generation and third generation Write any generation computer.​

Answers

Answer:


The second generation computer is based on the transistor whereas the third generation computer is based on the integrated chip.

Explanation:

"necessarily is the mother of computer " justify this statement with respect to the evolution of computer.​

Answers

Explanation:

Computers in the form of personal desktop computers, laptops and tablets have become such an important part of everyday living that it can be difficult to remember a time when they did not exist. In reality, computers as they are known and used today are still relatively new. Although computers have technically been in use since the abacus approximately 5000 years ago,

________ is installed in special, read-only memory in devices like printers or communication devices.

Answers

A firmware is installed in special, read-only memory in devices like printers or communication devices.

What is firmware and give example?

Firmware is known to be a kind of software that makes or produce the basic machine instructions that gives room for the hardware to act and be able to communicate with other kinds of software that is said to be running on a device.

Note that Firmware makes low-level control in for a lot of device's hardware and its example is microcontroller which is said to be an aspect of the microprocessor that informs the microprocessor the right actions to take.

Hence A firmware is installed in special, read-only memory in devices like printers or communication devices is the right answer.

Learn more about firmware from

https://brainly.com/question/3522075

#SPJ1

What are the three different types of hard drives? Briefly describe each, and list the possible configurations and device files for each type. Describe RAID level 5. What are the advantages of using RAID level 5 over other types of RAID?

Answers

The three different types of hard drives are:

SATASSD NVMe

What is the SATA drive?

This was said to be Introduced in the year 2003, SATA (or Serial Advanced Technology Attachment) is known to be a kind of a default interface that was made for a lot of desktop and laptop hard drives.

Hence, The three different types of hard drives are:

SATASSD NVMe

Learn more about hard drives from

https://brainly.com/question/1558359

#SPJ1

Write a short program that asks the user to enter a month & prints a message based on the month

Answers

Answer:

The Code:

def month(x):

    if (x==1):

        print ("January")

    if (x==2):

        print("February")

    if (x==3):

        print("March")

    if (x==4):

        print("April")

    if (x==5):

        print("May")

    if (x==6):

        print("June")

    if (x==7):

        print("July")

    if (x==8):

        print("August")

    if(x==9):

        print("September")

    if(x==10):

        print("October")

    if(x==11):

        print("November")

    if(x==12):

        print("December")

    if(x<1 or x>12):

        print("Wrong Input! Try again")

month = int(input("Enter the month number: "))

month(month)

Explanation:

The above program is written in the PYTHON programming language.

In this program, the user inputs the number of any month, showing the month name in the output. For example,

if user enters 1, month name = JANUARY

if user enters 5, month name = MAY

and if the user enters 13, then output = Wrong Input! try again

#SPJ2

Choose the term that matches each definition.

: increasing capacity by adding nodes or units


: increasing capacity by upgrading individual resources to be more powerful

Horizontal Scaling
Vertical Scaling

Answers

Horizontal Scaling is the act of increasing capacity by adding nodes or units while increasing capacity by upgrading individual resources to be more powerful is called Vertical Scaling.

What is vertical and horizontal scalability?

Horizontal scaling is known to be the act of  adding more nodes while vertical scaling is a term that connote the act of adding a lot of power to one's current machines.

Therefore, Horizontal Scaling is the act of increasing capacity by adding nodes or units while increasing capacity by upgrading individual resources to be more powerful is called Vertical Scaling.

Learn more about Vertical Scaling from

https://brainly.com/question/15685539

#SPJ1

Joe is examining the logs for his web server and discovers that a user sent input to a web application that contained the string WAITFOR. What type of attack was the user likely attempting

Answers

SQL Injection Attack

Write a script named copyfile.py. this script should prompt the user for the names of two text files. the contents of the first file should be input and written to the second file.

Answers

Based on the above, The  script named copyfile.py.  is written in the image attached.

What is a script?

In regards to computer programming, a script is known to be a kind of a computer  program or we can say a sequence that is known to be made up of a lot of instructions that is often seen to be interpreted or done by another program instead of the computer processor.

Note that  some languages have been birth a lot expressly and they are known to be the script languages.

Therefore, scripting language or we say script language is known to be a programming language that is is often used to alter , customize, and automate what we say the facilities of any existing system.

Hence,  Based on the above, The  script named copyfile.py.  is written in the image attached.

Learn more about script  from

https://brainly.com/question/3700565

#SPJ1

Simple statistics looks catalog 3.15 LAB: Simple statistics Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and the average as integers (rounded, then as floating point numbers Output each rounded integer using the following print (1.0).tornat (your_value)) Output each floating point value with three digits after the decimal point, which can be achieved as follows print(1.3).format(your value)) Ex If the input is 3.3 10. 5.0 the output is 20722 2071. 7. 125 ACTIVITY 3151 LAB Simple statistics 0/10 main.py 1 2 - Floatinet()) - Floatinus Fotout Flatirot)

Answers

Based on the given instructions:

1. you must set the display format for all values: %0.2f

2. use f-string in this format: f"{}" and add your value in {}

3. int: convert float to integer and round: round up the number

The given code

num1 = float(input())

num2 = float(input())

num3 = float(input())

average = (num1+num2+num3) / 3

your_value = num1*num2*num3

print('%0.0f %0.0f %0.2f %0.2f' % (int(average), int(your_value), average, your_value))

# or:

print(f"{int(average)} {int(your_value)} {round(average,2)} {round(your_value,2)}")

Read more about floating point numbers here:

https://brainly.com/question/13440970

#SPJ1

Javascript and java are really just two slightly different names for the same language.
a) True
b) False

Answers

Answer:

False

Explanation:

JavaScript is language used along with html documents.

Java is a full-fledged programming language that handles applications.

If a DBMS enforces a DELETE CASCADE option on the referential integrity constraint between SELLER and REALTOR in the HOMETOWN REALESTATE database, what will be the outcome after a user tries to delete the third record (R3, Cliff) from REALTOR

Answers

The outcome will be option b: ) CLIENT will have 6 records, AGENT will have 3 records.

What are client records?

Client record is known to be a form of a written composition of information that tells and documents the examination , diagnosis or others of a client.

Based on the above scenario, The outcome will be option b: ) CLIENT will have 6 records, AGENT will have 3 records.

Learn more about Client record from

https://brainly.com/question/238697

#SPJ1

Given five positive integers, find the minimum and maximum values that can be calculated by summing exactly four of the five integers. Then print the respective minimum and maximum values as a single line of two space-separated long integers.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that  print the respective minimum and maximum values as a single line

Writting the code in JAVA:

import java.io.*;

import java.util.*;

import java.text.*;

import java.math.*;

import java.util.regex.*;

public class Solution {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       long sum = 0;

       long max = Long.MIN_VALUE;

       long min = Long.MAX_VALUE;

       for (int i = 0; i < 5; i++){

           long n = in.nextLong();

           sum += n;

           max = Math.max(max, n);

           min = Math.min(min, n);

       }

       System.out.println((sum - max) + " " + (sum - min));

   }

}

See more about JAVA at brainly.com/question/12974523

#SPJ1

Which epolicy orchestrator component gathers the events from the managed systems and uploads them to the epo server?

Answers

The policy orchestrator component that gathers the events from the managed systems and uploads them to the epo server is mcAfee agent.

Which ePolicy orchestrator component  is enforced?

The McAfee Agent can be described as the one that is distributed component of McAfee ePolicy Orchestrator (McAfee ePO).

It helps in downloads and enforcement of policies and it executes client-side tasks.

To find  find  McAfee agent, one can follow these steps:

View McAfee Agent Status MonitorOn the managed system,  select McAfee Agent Status Monitor. Save Contents to Desktop to save the contents of the McAfee Agent log to a file.

Learn more about mcAfee agent at:

https://brainly.com/question/28070242

#SPJ1

If a few bits in an hdd sector or nvm page are corrupted, the controller can recover the correct values using ecc only if:___.

Answers

If a few bits in an hdd sector or nvm page are corrupted, the controller can recover the correct values using ecc only if option D) number of bits corrupted is low irrespective of where the corruption occurs in the sector/page.

Do hard drives have sectors?

In computer disk storage, a sector is known to be a kind of a subdivision that is made up of a track that can be seen on a magnetic disk or what we call the optical disc.

Note that Each sector is one that saves a fixed amount of what we call the user-accessible data.

Note that  the sector is seen as the smallest physical storage unit that can be found on the disk, and also on most file systems and thus when  a few bits in an hdd sector or nvm page are corrupted, the controller can recover the correct values using ecc only if option D) number of bits corrupted is low irrespective of where the corruption occurs in the sector/page.

Learn more about controller from

https://brainly.com/question/14931992

#SPJ1

See full question below

If a few bits in an HDD sector or NVM page are corrupted, the controller can recover the correct values using ECC only if

A) the bit corruption is limited to the data portion of the sector/page.

B) the bit corruption hasn't occurred in the ECC of the sector/page.

C) the bit corruption hasn't occurred in the ECC or the header of the sector/page.

D) number of bits corrupted is low irrespective of where the corruption occurs in the sector/page.

In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block bpdus?

Answers

In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.

What are BPDU used for?

A bridge protocol data unit (BPDU) is known to be a kind of a data message that is known to be often  transmitted in a local area network to be able to know or find loops in that given network topologies.

Hence, in the case above, In order to prevent ports that are serving network hosts from being considered as best paths, BPDU guard should be enabled to block bpdus.

See full question below

. In order to prevent ports that are serving network hosts from being considered as best paths, what should be enabled to block BPDUs?

a. BPDU filter

b. BPDU guard

c. root guard

d. BPDU drop

Learn more about ports from

https://brainly.com/question/10097616

#SPJ1

Other Questions
Which equation represents a linear function?A y=1/4xB y= |x| C y= x exponent 2D y= -3x exponent 3 Kayden has a collection of 120 coins. How many coins represent 5% of his collection? Decoding the Zimmerman note 4. What is the solution of the system of equations?y = 4x + 10y = 2x 6 Which excerpt from "Good Country People" best exemplifies why Joy/Hulga is a traditional Southern gothic character?One of her major triumphs was that her mother had not been able to turn her dust into Joy, but the greater one was that she had been able to turn it herself into Hulga.Hulga had learned to tolerate Mrs. Freeman who saved her from taking walks with her mother.Joy, whose constant outrage had obliterated every expression from her face, would stare just a little to the side of her, her eyes icy blue, with the look of someone who had achieved blindness by an act of will and means to keep it.Joy would get up while her mother was eating, and before long, Mrs. Freeman would arrive at the back door.Joy, whose constant outrage had obliterated every expression from her face, would stare just a little to the side of her, her eyes icy blue, with the look of someone who had achieved blindness by an act of will and means to keep it. hellppppp meeee pleasseee During the primary assessment, circulation is evaluated by assessing: Please Help! I Have Limited Time! The political communication below was created in 1960.Which statement accurately describes this political communication?A. It illustrates bias against laws for and enforcement of human rights. A voter who favors limited rights for Americans would likely support this candidate.B. It is an example of conservative propaganda. A member of the Republican party would likely support this candidate.C. It illustrates a bias in favor of the Democratic Party. A conservative voter would likely support this candidate.D. It uses symbolism to portray John Kennedy as a strong human rights leader. A voter who favors equal rights for Americans would likely support this candidate. A spinner with 4 equal sections is spun 20 times. The frequency of spinning each color is recorded in the table below.Outcome | FrequencyPink | 6White | 3Blue | 7Orange | 4What statement best compares the theoretical and experimental probability of landing on pink?A. The theoretical probability of landing on pink is one fifth, and the experimental probability is 50%.B. The theoretical probability of landing on pink is one fourth, and the experimental probability is 50%.C. The theoretical probability of landing on pink is one fifth, and the experimental probability is 30%.D. The theoretical probability of landing on pink is one fourth, and the experimental probability is 30%. Adolf hitler used fascism to create this type of government based on totalitarian ideas and was used to unite germany during the 1930s. 3. Have any of your ideas involving global warming changed because of this film? Explain why orwhy not and use examples from the movie! Before the flood NEED HELP ASAP!!!!!!! Select all the ordered pairs that are solutions to 3x - y = 1.A. (-2,-7)B. (-1,-4)C. (0, 1)D. (3,8)E. (4,2) The idiom meaning blew off his hand please answer both questions the reading is on their to help The electric flux through each of the six sides of a rectangular box are as follows:F1 = +216.0 N m2/CF2 = +243.0 N m2/CF3 = -346.0 N m2/CF4 = +175.0 N m2/CF5 = -100 N m2/CF6 = +450.0 N m2/CHow much charge is in this box?________C Learning ocean science through ocean exploration Answer the following questions in complete sentences.1. How does freeze-thaw weathering occur in a glacier? What is the direct effect of this type of weathering?2. What can be the results from abrasion? 3. How does deposition form from a glacier? What are two landforms that can be formed from glacial deposits?(giving 50 points) Although there is no denying that something killed a third of the population of Ancient Athens, there has been debate as to cause for many years. A historian who lived through it called it The Plague and so for many years, it was accepted to be Yersinia pestis, the same as the bacteria responsible for the Black Death. Recently, though, scientists have become convinced that the outbreak was actually due to typhoid. Given that this opinion of an event that occurred hundreds of years ago has only recently changed, what conclusion can be reached? A. Historians understand the language of written records more clearly and have discovered that the symptoms match typhoid. B. Scientists have been able to examine samples of human teeth found in the Athens area and isolated typhoid in the pulp. C. A recent resurgence of typhoid in the Athens area leads scientists to believe that the climate is perfect for typhoid but not for Yersinia pestis. D. There is no real reason for the change except that some scientists believe the plague is just a catch all. Help me with this chemistry question please and thank you A certain blogger has 460 followers on his social media accounts, but is losing followers at a rate of 6 people per day based on his comments. Another blogger has 128 followers on her social media accounts and gains an average of 10 new followers per day.Which equation can be used to find d, the number of days it will take before both bloggers have the same number of followers?