Answers

Answer 1

Answer:

no it is not true i think that


Related Questions

What is meaning of lunch bar

Answers

A lunch bar is a restaurant where the public may purchase cold meals in containers, cold wrapped sandwiches, drinks, or items retrieved through coin operated compartments for consumption on or off the premises.

Gabriel wants brain food for dinner the night before his final exam. What is best for him to eat? fried chicken and onion rings burgers and ice cream pizza and cookies grilled chicken and vegetables.

Answers

This is a good inquiry, especially applicable to the study of computers and technology.
It sounds like a prediction problem, in terms of measuring multiple variables calculating their betas and outputting the probability of choosing the following given we have a final the next day.

So let’s start by declaring variables for our model:

Calories: quantitative variable
Consumption time: time to eat the given food also quantitative
Cooking time: quantitative
Baking necessary: categorical 0 = no 1 = yes
Frying necessary: categorical 0 = no 1 = yes
Satisfaction brought: quantitative
Healthy: categorical 0 = no 1 = yes

Now create a data table for implementing our multinominal logistical regression function
I’ll be using 1 serving size for each measure
Fried chicken and onion rings
Cal: 320 (half chicken) + 240 (9 rings) = 560
Consumption time: 10 minutes (avg of sampling data with SD of 2.1 minutes)
Cooking time: 90 minutes + 20 minutes = 110 minutes (based on compiled recipes)
Baking: 0
Frying: 1
Satisfaction(max 10): 9 (-1 for oiliness)
Healthy: 0

Burgers and ice cream
Cal: 354 + 137(1/2 cup) = 491
Consumption time: 8 (mean with sd of 3.2)
Cooking time: 23 minutes (recipe) + 30 minutes (travel time to store and from) = 53 minutes
Baking: 0
Frying: 0
Satisfaction(max 10): 10
Healthy: 0

Pizza and cookies
Cal: 570 (2 slices) + 142 (1 cookie) = 712
Consumption time: 9 minutes (avg of sampling data with SD of 1.3 minutes)
Cooking time: 50 minutes + 72 minutes = 122 minutes (based on compiled recipes)
Baking: 1
Frying: 0
Satisfaction(max 10): 8 (not lactose intolerant friendly)
Healthy: 0

Grilled chicken and vegetables (roasted)
Cal: 162 (chicken breast) + 147 (1 cup) = 309
Consumption time: 9 minutes (avg of sampling data with SD of 1.46 minutes)
Cooking time: 30 minutes + 45 minutes = 75 minutes (based on compiled recipes)
Baking:1
Frying: 0
Satisfaction(max 10): 6 (cause chicken breast is dry and vegetables are nasty)
Healthy: 1

Now to develop our prediction model.
With training and validation data I was outputted the following beta coefficients.

X-int = 2.74
B1: -2.35 with p value of 0.002
B2: -0.72 with p value of 0.038
B3: -0.6 with p value of 0.047
B4: -1.2 with p value of 0.371
B5: -0.81 with p value of 0.016
B6: 2.91 with p value of 0.000
B7: 0.2 with p value of 0.007

Now building our prediction model we combine beta values with their coefficients then take e^x of each of the given options to find the probability of choosing each.

Answer:

Grilled Chicken and Vegetables

Explanation:

these are the two healthiest options for you body and mind

A file named "dogs. Txt" exists and has 60 lines of data. You open the file with the following line of code.

aFile = open("games. Txt", "W")

You write 10 lines to the file in the program. How many lines are in the file when you close your file?

Answers

The wc command can be used to determine a file's line, character, word, and byte counts. We add the -l option to wc in order to count the number of lines. This will provide the file's name and the total amount of lines.

What lines are in the file when you close your file?

This is the simplest method for counting the lines in a text file in Python. Read all lines from a file and save them in a list using the readlines() function.

The length of the list, which is simply the total number of lines in a file, may then be determined using the len() function.

To see a file's initial few lines, use the head command. The head command will only print the first 10 lines by default. The coreutils package.

Therefore, already installed on our machine, is included with the head command. Be aware that spaces, tabs, and newlines all count as additional bytes.

Learn more about file here:

https://brainly.com/question/16379582

#SPJ2

How does iteration help the engineering design process?

A.
It lets engineers know how to complete their experiments.

B.
It provides proof positive that an engineer’s plan will work.

C.
It encourages engineers to revisit past steps in the process.

D.
It ensures that all ideas or discoveries are communicated clearly.

Answers

The way that iteration helps the engineering process is that; C.

It encourages engineers to revisit past steps in the process.

What is the importance of the iteration process?

The engineering design process contains a series of steps that helps engineering teams in solving problems.

When we say that design process is iterative, it means that we repeat the steps as many times as required, by making improvements along the way as we learn from previous failure and uncover new design possibilities that help us to arrive at great solutions.

Read more about iteration at; https://brainly.com/question/24793921

Consider the following code, which is a portion of SomeClass. The instance variable is initialized by the constructor. The method is supposed to multiply the value passed as a parameter by the instance variable and update the value of the instance variable. However, there is a problem. Re-write this code, without renaming any variable names, to resolve the problem.

private int number;

public void multiplyNumbers(int number)

{

number = number * number;

System. Out. Println("The local variable is: " + number);

System. Out. Println("The instance variable is: " + number);

}

Answers

Use the knowledge of computational language in JAVA to write a code which is a portion of SomeClass.

How to write code that uses a file?

To make it simpler the code is described as:

SomeClass

private int number;

public void subtractNumbers(int number)

{

   number = number − number;

   System.out.println("The local variable is: " + number);

   System.out.println("The instance variable is: " + number);

}

See more about Java at  brainly.com/question/2266606

Answer:

Correct code (For everyone confused):

private int number;

public void multiplyNumbers(int number) {

 this.number = this.number * number;
 System.out.println("The local variable is: " + number);
 System.out.println("The instance variable is: " + this.number);

}

Explanation:

the this. command allows the instance variable of the class to be called instead of the variable in the constructor which as shown can stay the same while still changing the instance variable of the same name. Allowing for the code to be, say if int number was 5. Then the instance variable would be, 5 + 5, which would print:

The local variable is: 5
The instance variable is: 10

How has the Internet of Things affected business

Answers

Answer:

With better information about the consumers and the market, the productivity of any business can be increased notably. IoT devices can be connected to each other and controlled to improve efficiency, which in turn has direct effects on the productivity of the business. More can be done in less time.

Explanation:

Answer: Business equipment can be continually adjusted based on analysis of data

Explanation: Took the test.

A _____ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

Answers

Answer:

A host-based intrusion prevention system is a type of IDPS that monitors characteristics of a single host and the events occurring within that host for suspicious activity (NIST SP 800-94, February 2007; p.9). Page 3 National Archives and Records Administration

Explanation:

Imagine that a school decided to use a database to track television shows that students are watching. What would be some of the advantages and disadvantages of tracking students in this way? what is something to type? please hurry

Answers

Answer:

It would cause a discussion upon privacy and the validity of the information

There is also the variable of watching multiple tv shows consecutively on one day. Hope this helped

Explanation:

3. credence is a student in college.
a. what hardware tool would you suggest for his computing system? include an explanation and the cost.

b. what software program would you suggest? include an explanation and the cost.


c. what operating system might you suggest (mac, windows, ios, android, etc) and why?

Answers

Answer: Hardware info this is a free software to read your CPU RAM GPU temp and usage

i would suggets get win rar as a zip un packer and its free

Windows 10, easy to work with and its free

Explanation:

There are they mainly are the suggested the computer system are the RAM, CPU, are the add-on the cost. Adobe, was the mainly in the used are the no cost was the included. Windows 10, was the repeatedly in the used are the easy.

What is computer?

The term computer refers to the main work of the input, processing, and the output. The computer was the based on the binary language as the data was the converted to the human language. The computer was the great invention. The computer is the mostly in the used are the main purposes.

Hardware was the main tool in the computer they are the mainly in the RAM, CPU, are the usage was the add-on the cost. The best software program was the Adobe is the best software there are the no cost was the included. The Windows 10 was the easy to use and the systematically programme.

Learn more about on computer, here:

https://brainly.com/question/21080395

#SPJ5


Explain the Paragraph tag and its attributes.

Answers

Answer:

Attribute Value Description

align left right center justify Obsolete Specifies the horizontal alignment of the text within a paragraph. Use the CSS text-align property instead.

how do i use marketing in my everyday life

Answers

1. Subscribe to more emails
2. Look at billboards
3. Stop muting those pesky commercials
4. Listen to music
5. Step away from your work

A Flexible Manufacturing System (FMS) is able to efficiently adapt to changing
needs.
Which of the following developments in the manufacturing industry is said to have
directly contributed to FMS technology?

Answers

Answer:

easily adapt to changes in the type and quantity of the product being manufactured

Explanation:

1.5 code practice question 4

Answers

Answer:

Do you know what the question is for this?

Explanation:

Do you know What the question is?

What should you do when you are working on an unclassified system and receive an email.

Answers

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

I need help please I just need the code to pass

Answers

Answer:

I don't know where is a code on your computer so sorry. :(

Explanation:

_________ attacks include eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted

Answers

Answer:

Passive attacks

Explanation:

A passive attack can listen to network traffic but does not interact with the packets.

Hope this helps :)

Determine if the given software is system software or application software.

Answers

Answer:

system software: system software maintain the system resource and give the path for application software to run

application software: application software is built for specific task

Explanation:

if you think the answer in your opinion correct then mark me as brain list

Answer:

I believe this to be the answer to the question you refer.

Explanation:

System software:

-data recovery

-macOS

Application software:

-presentation

-spreadsheet

Answers are cut short for convenience so do not worry if they are not the exact same answers from your question.

Also, if these answers do not even apply to your question then you have a different question. Good luck.

what is meant by internet surveillance?....ONLY ANSWER IF YOU KNOW​

Answers

Answer:

As a brief definition, Internet surveillance refers to your computer and online activity, online and offline data, and Internet traffic being monitored and logged by government agencies, ISPs, and – potentially – cybercriminals.

Explanation:

can I have brainliest

Answer: I LIKE EM BIG AND JUCIY

Explanation:

What is.the web usually called?

Answers

Answer:

the internet?

Explanation:

Despite how well you might take care of your computer, problems can always arise. When troubleshooting problems you encounter, at what point should you engage a professional for assistance

Answers

You should engage a professional for assistance when you encounter internal hardware issues during troubleshooting.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

Generally, an end user should always engage a professional for assistance when internal hardware components of a computer are faulty.

Read more on computer here: brainly.com/question/959479

What is the type of data in the list [103, 405, 527, 396, 503]?

A.
Booleans
B.
strings
C.
integers
D.
alphanumeric

Answers

D. Alphanumeric.

Alphanumeric, also known as alphameric, simply refers to the type of Latin and Arabic characters representing the numbers 0 - 9, the letters A - Z (both uppercase and lowercase), and some common symbols such as @ # * and &.

Hope Helps! :)

Special web browsers, called _______ browsers, are designed to run on portable devices such as smartphones and tablets

Answers

Answer:

Special web browsers, called mobile browsers, are designed to run on portable devices such as smartphones and tablets

Special web browsers, called mobile browsers, are designed to run on portable devices such as smartphones and tablets.

Mobile browsers are web browsers specifically optimized and designed to operate on portable devices such as smartphones and tablets. These browsers are tailored to meet the unique requirements and constraints of mobile devices, including smaller screens, touch-based input, and limited processing power.

Mobile browsers offer a user-friendly interface that accommodates the smaller screen size of mobile devices, allowing users to navigate websites and access web content efficiently. They often incorporate features like pinch-to-zoom, gesture-based controls, and responsive design support to enhance the browsing experience on mobile devices

To learn more on Mobile browsers click:

https://brainly.com/question/19561587

#SPJ6

Which command prints partial or full environment variables?.

Answers

Answer:

printenv command

The command that prints partial or full environment variables is known as "printenv" command.

How can one print all the variables of the environment?

One can definitely print all the variables of the environment with the help of using env command. This env command is generally utilized by shell scripts in order to launch the correct interpreter but you can also use the env command to list available environment variables.

The env command if applied without any arguments and options, will print all the available environment variables. Apart from this, the env command also displays the values of environment variables specified in the context of the question.

Therefore, the "printenv" command is a type of command that prints partial or full environment variables.

To learn more about Computer commands, refer to the link:

https://brainly.com/question/25808182

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

Which command prints partial or full environment variables?

printenv.printvar.printgov.

What is the value of sum after the code segment is executed?

Answers

Answer:

16

Explanation:

16  is the value of the sum after the code segment is executed.

What is a code segment?

An encryption method in computation is a chunk of a file or the equal area of the virtual addresses of the program that includes active instructions. It is sometimes referred to as a text or plain text.

An executable section of a memory chip designated to a certain operation is referred to as a function code segment. The implementation of Process Conferred Verification compares.

Let's follow the plan for the segment of the code that is to be executed in this particular if and else execution.

6 < 4 will be termed False

The following will take place

num3=num2=4

So,

num2 >= num 3 will be termed False

There is no other statement available

Currently, the values are

num1=6

num2= 4

num3= 10

Sum=

= 6+2+ 10

= 16

Learn more about  code segment, here:

https://brainly.com/question/30592934

#SPJ3

How can I log Into the instagram app if this pop up appears?

Answers

Answer:

tou sex die sojdifnfidjd7dhubdud

You could try changing your password

What is the relationship of temperature to density?

Answers

Answer:

Density is directly proportional to pressure and indirectly proportional to temperature. As pressure increases, with temperature constant, density increases. Conversely when temperature increases, with pressure constant, density decreases.

difference between manual formatting and formatting in word processor​

Answers

Editing refers to making quick modification to a document using editing tools such as find and replace spelling and grammar checkers, copy and paste or undo redo features.

Formatting refers to changing the appearance of text in a document such as text formatting or page formatting or paragraph formatting.

You can tell that parseInt() is a(n) ____ method because you use it with the class name and not with an object.

Answers

Parse Int() is a(n) static method because you use it with the class name and not with an object.

Is parseInt a static method?

The term or computer language (Java - parse Int() Method) is known to be a method that is often used to get back the primitive data type of a particular String.

Conclusively, the  parse Xxx() is known to be a static method and one can use it to make or have one or more argument.

Learn more about object from

https://brainly.com/question/24445340

Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Answers

Coding:

def main():

 name = input("Enter your name: ")

 age = input("Enter your age: ")

 color = input("Enter you favorite color: ")

 birth = input("Enter your birthday: ")

 print(name + " is "+age+" year(s) old.")

 print(name + "'s favorite color is "+color)

 print(name + " was born on "+ birth)

main()

Explanation:

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

________, also known as mini notebooks, are lighter and thinner with longer battery life than most laptops.

Answers

Netbooks or Ultrabook  also known as mini notebooks, are lighter and thinner with longer battery life than most laptops.

What is mini notebook computer?

This is a term that is also called Netbooks.  They are regarded as  “small form” computers.

Ultrabook is known to be a small and very portable laptop that is known to be very light and thin and also has a longer battery life than other kinds of laptops.

Learn more about books from

https://brainly.com/question/17506968

Other Questions
What are the solutions to the equation?x^2 + 6x = 40 Which element has seven energy levels the only one valence electron What are some examples of specific values carried on through generations?Pass down expensive jewelry.Go on costly family vacations.Participate in special mealtimes and celebrations.Attend the same university as family members. how would you characterize wallaces idea that "the life of wild animals is a struggle for existance." 1.Do characters always have to be humans? Why did the Jim Crow laws end 1111111x2000 pls help What is the central idea of "The Boy"? in The midwife's Apprentice Will anyone help me for 18 points? Beans, peaches, and tomatoes are all in the same group of plants. What do these plants have in common? Using the slope equation m = y2y1x2x1 and given the points (0, 4) and (2, 1), find the slope What makes a story different from other forms of writing? How is it different from anewspaper story, recipe, math text, or blog post? What do you think? 8. ) After turning your wheels right, you should back up until you are ____ in the spot Find the sale price when the original price is $91.00 and the discount rate is 13% please help me asap Please help, WILL GIVE BRAINLEST IF U SHOW UR WORK IF U DONT SHOW WORK ILL REPORT how is moment calculated in different conditions? How can chaos be demonstrated with art what genre depicts a solo killer stalking and attacking his victims in a horrific manner? How many tonnes of carrot do china make annuallya) 21,482,971b) 120,900,355c) 10,470,555d) 1,190,830