PLS PAK I ANSWER NITO KAILANGAN LANGPO​

PLS PAK I ANSWER NITO KAILANGAN LANGPO

Answers

Answer 1

1. E-gro.up

2. Faceb.ook

3. Gm.ail

4. Go to www.gm.ail.com

5. Gm.ail

6. Go to www.faceb.ook.com

These are the answers.


Related Questions

What has happened (or is still happening) to make this speech occur? armageddon

Answers

Answer:

Are you talking about the bruce willis is superman basically? Because if so i don't think so because that is a future event that hasn't happened yet also that film sucks.

Explanation:

In this lab, you complete a prewritten C++ program that computes the largest and smallest of three integer values. Instructions Two variables named largest and smallest are declared for you. Use these variables to store the largest and smallest of the three integer values. You must decide what other variables you will need and initialize them if appropriate. Your program should prompt the user to enter 3 integers. Write the rest of the program using assignment statements, if statements, or if else statements as appropriate. There are comments in the code that tell you where you should write your statements. The output statements are written for you. Execute the program by clicking the Run button at the bottom of the screen. Using the input of -50, 53, 78, your output should be: The largest value is 78 The smallest value is -50

Answers

Answer:

The program in C++ is as follows

#include <iostream>

using namespace std;

int main(){

   int n1, n2, n3, largest, smallest;

   cin>>n1>>n2>>n3;

   if(n1 >= n2 && n1>=n3){        largest = n1;    }

   else if(n2 >= n1 && n2>=n3){        largest = n2;    }

   else{        largest = n3;    }

   if(n1 <= n2 && n1<=n3){        smallest = n1;    }

   else if(n2 <= n1 && n2<=n3){        smallest = n2;    }

   else{        largest = n3;    }

   cout<<"Smallest: "<<smallest<<endl;

   cout<<"Largest: "<<largest<<endl;

   return 0;

}

Explanation:

Declare all variables

   int n1, n2, n3, largest, smallest;

Get input for the three numbers

   cin>>n1>>n2>>n3;

Check if n1 is the largest

   if(n1 >= n2 && n1>=n3){        largest = n1;    }

Check if n2 is the largest

   else if(n2 >= n1 && n2>=n3){        largest = n2;    }

Otherwise, n3 is the largest

   else{        largest = n3;    }

Check if n1 is the smallest

   if(n1 <= n2 && n1<=n3){        smallest = n1;    }

Check if n2 is the smallest

   else if(n2 <= n1 && n2<=n3){        smallest = n2;    }

Otherwise, n3 is the smallest

  else{        largest = n3;    }

Print the smallest

   cout<<"Smallest: "<<smallest<<endl;

Print the largest

   cout<<"Largest: "<<largest<<endl;

Identify the hardware components in your own computer. If you don't have a computer, use a friend's, or one at work or in an NVCC lab. The following list shows the components you should identify and how to find the information on a Windows computer. Describe model computer: type (laptop, desktop, notebook, tablet, etc.) Indicate your manufacturer (HP, Apple: iPad, MacBook Air, etc., Lenovo, Dell, etc.) of the computer. Input devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Output devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Storage devices (include internal and external devices, and how much data each can hold) - Open Windows Explorer and right click on a drive name to open its properties. Amount of RAM - Open System Properties in the Windows Control Panel. Type and speed of CPU - Open System Properties in the Windows Control Panel. Ports (number and type) - Look for jacks into which a connector can be plugged on the front, back and sides of the machine. Compare the jacks to pictures in your textbook.

Answers

Solution :

A friend of mine have an old version of computer PC having the following components :

Input devices

Model name of the keyboard -- PUNTA , model number -- P-KB515

Model name of the mouse -- PUNTA, model number -- P-KB515

Output devices

Speaker : COMPAQ

Monitor : ACER,  Model Number  --- EB192Q

Storage : 500 MB capacity hard disk

RAM : 2 GB

Processor : Intel Pentium dual E1260 at the rate 1.80 GHz

It is provided with audio jacks

job evaluation for technical consultant​

Answers

There is no question. Why is this telling me incorrect
There is no question

The following program generates an error. Why? #include #include using namespace std; class Arcade { public: Arcade(); Arcade(string name, int r); void Print(); private: string arcName; int rating; }; Arcade:: Arcade() { arcName = "New"; rating = 1; } Arcade:: Arcade(string name, int r) { arcName = name; rating = r; } void Arcade:: Print() { cout << "Name is: " << arcName << endl; cout << "Rating is: " << rating << " stars" << endl; } int main() { Arcade myArc(Games Ablaze, 5); myArc.Print(); }

Answers

Answer:

The object creation should be Arcade myArc("Games Ablaze",5);

Explanation:

Required

Why does the program generate an error?

The class definition is correctly defined and implemented;

The methods in the class are also correctly defined and implemented.

The error in the program is from the main method i.e.

int main() {  

       Arcade myArc('ames Ablaze, 5);  

       myArc.Print();  

   }

In the class definition;

Variable name was declared as string and variable rating was declared as integer

This means that, a string variable or value must be passed to name and an integer value or variable to rating.

Having said that:

Arcade myArc(Games Ablaze, 5); passes Games Ablaze as a variable to th function.

Game Ablaze is an incorrect string declaration in C++ because of the space in between Game and Ablaze

Also, no value has been assigned to the variable (assume the variable definition is correct).

This will definitely raise an error.

To correct the error, rewrite the object creation as:

Arcade myArc("Games Ablaze",5); where "Game Ablaze" is passed as string

You are the owner of a small business. In the last year, you have started to hire employees and you now have 5 employees. Each has his or her own personal computer and you have hired a consultant to establish a local area network for your business. You realize that you should draw up a user access agreement and a code of conduct for your employees. Which of the three documents listed below should you create first?

a. The user access agreement
b. The code of conduct
c. The professional association code of ethics

Answers

Answer:

a. The user access agreement

Explanation:

The first document that should be created would be the user access agreement. This is a document that holds all of the policies and guidelines that the employees of a company need to follow when using the companies equipment, software, or network. This includes behavior on the internet such as browsing specific sites, illegal activity, or personal hobbies during work hours, as well as offline such as using company hardware for personal gain. This is a document that is absolutely required for every company in order to protect the company from the consequences of certain employee activity.

Thành phần bên trong nào thực hiện các tính toán và các phép toán logic?
a. Bộ vi xử lý
b. ROM_BIOS
c.Các chip RAM
d. Bo mạch chủ

Answers

Answer:

A

Explanation:

Regarding the role played by the “victim” in deadlock resolution, give an example of such a deadlock in real life and explain your answers to these questions.

a. Describe how you might choose the victim to be removed and the consequences, both positive and negative, of that removal.

b. Describe the fate of the victim and the chances of eventually completing its processing.

c. Describe the actions required, if any, to complete the victim’s tasks. ​

Answers

Answer:

Here the answer is given as follows,

Explanation:  

The real-life situation of a deadlock resolution where a role is played by the victim is given as follows:  

Example: An example of such a situation are often a one-way lane where the flow of traffic is merely in a method. Thus, on just one occasion, the flow of traffic can enter one direction only. Each entrance/exit gate is often considered a resource. during this case, if two cars are coming from both the entrances and that they are often considered as two tasks, then one among the cars must copy or we will say hand over its resource in order that the opposite car gets the prospect to first cross the lane or we will say the opposite task gets executed.  

 a)  Victim: The steps which describe how a victim is chosen are given as follows :  

   The task which is terminated so as to interrupt things of deadlock is taken into account because of the victim.

There are often a variety of job pools that will be under a deadlock situation and therefore the victim is usually a low-priority task in order that the performance isn't affected that much and termination of this task doesn't cause any effect on the opposite jobs.

the main positive effect of selecting and terminating a victim is that things of deadlock are resolved and every one of the tasks can execute now.

The negative effect is that the task that's chosen because the victim is terminated and is executed at the previous. This whole process for choosing a victim then terminating it then restarting it again may consume some longer also.

b)  An easy deadlock priority is often set. this suggests that the victim’s task or the task is often terminated so as to interrupt the deadlock and other jobs can finish executing. After this, the task which is terminated are often later restarted and every one of the tasks can then execute without a deadlock.

 c) When employment gets terminated, the knowledge associated with it's stored. Are often This is often done in order that the work can be restarted again and therefore the information in it's not lost. Since the progress of the victim is stopped. Thus, the sole thanks to complete the victim’s task would be to start out it again. But before restarting the task, this must be considered that the victim’s task doesn't cause any deadlock within the system.  

When you have access to a multiuser computer system, what responsibilities do you have when selecting your password?

Answers

Answer:

The responsibilities you have are Use characters other than just AZ. If passwords are chosen from the letters AZ, there are only 26 possibilities for each character. Adding digits expands the number of possibilities to 36. Using both uppercase and lowercase letters plus digits expands the number of possible characters to 62

Explanation:

Hoped this helped you :3

pleeeese help me for these questions

Answers

1 Account

2 online

3 access

4 password

5 internet

6 email

what's the difference between pseudo code and natural language​

Answers

Answer:

The pseudo-code describes steps in an algorithm or another system in plain language. Pseudo-Code is often designed for human reading rather than machine reading with structural conventions of a normal language of programming.

Natural languages consist of phrases, usually declarative phrases, with a sequence of information.

Explanation:

Pseudo-Code is often designed for human reading rather than machine reading with structural conventions of a normal language of programming. It usually omits information that is essential to the understanding of the algorithm by the machine, for example, variable declarations and language code.Easily human, but not machines, use the natural languages (like English).Natural languages also are creative. Poetry, metaphor, and other interpretations are permitted. Programming permits certain style differences, but the significance is not flexible.The aim of using pseudo-code is to make it easier for people to comprehensibly than standard programming language code and to describe the key principles of an algorithm efficiently and environmentally independently. It is usually used for documenting software and other algorithms in textbooks and scientific publications.

Which one of these statements about digital signatures is true? A digital signature:
a. Is used to add a personal touch to e-mail messages.
b. Automatically encrypts the contents of an e-mail.
c. Is a scanned image of your real signature.
d. Is used to verify the identity of the sender of a message.​

Answers

Answer:

A. Is used to add a personal touch to e-mail messages.

Explanation:

A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). ... Digital signatures are significantly more secure than other forms of electronic signatures.

Given 4 floating-point numbers. Use a string formatting expression with conversion specifiers to output their product and their average as integers (rounded), then as floating-point numbers. Output each rounded integer using the following: print('{:.0f}'.format(your_value)) Output each floating-point value with three digits after the decimal point, which can be achieved as follows: print('{:.3f}'.format(your_value))

Answers

Answer:

The program is as follows:

prod = 1

isum = 0

for i in range(4):

   num = float(input())

   prod*=num

   isum+=num

avg = isum/4

print('{:.0f}'.format(prod))

print('{:.3f}'.format(avg))  

Explanation:

This initializes the product to 1

prod = 1

..... and sum to 0

isum = 0

The following iteration is repeated 4 times

for i in range(4):

Get input for each number

   num = float(input())

Calculate the product

   prod*=num

Add up the numbers

   isum+=num

This calculates the average

avg = isum/4

Print the products

print('{:.0f}'.format(prod))

Print the average

print('{:.3f}'.format(avg))  

Functions should contain only the code that performs a single task.
O True
O False

Answers

Answer:

false

Explanation:

function should contain more codes

Write a single Python regular expression for each of the following. Note: For each problem, you must use only ONE regular expression.
Matches a string that has both the substring dog and cat in the string in either order. For instance, both of the following strings match: 'The dog chased the cat' and 'xxcatxxdogxx'.

Answers

Matches a string that has both the substring dog and car in the string in either order

Write a c++ program to find;
(I). the perimeter of rectangle.
(ii). the circumference of a circle.

Note:
(1). all the programs must allow the user to make his input .
(2).both programs must have both comment using the single line comment or the multiple line comment to give description to both programs.​

Answers

Answer:

Perimeter:

{ \tt{perimeter = 2(l + w)}}

Circumference:

{ \tt{circumference = 2\pi \: r}}

Just input the codes in the notepad

Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented here. Write a program called primes.js that implements this algorithm. Have the program find and display all the prime numbers up to n = 150.
Sieve of Eratosthenes Algorithm
To Display All Prime Numbers Between 1 and n
Step 1: We need to start with all the numbers representing the range of numbers that are possible candidate primes. So, create an array of consecutive integers from 2 to n: (2,3,4,..n). I wouldn't hand-code this. I would use a loop to populate the array.
Step 2: At each step we select the smallest number and remove all it's multiples. So we'll start with an outer loop that goes from 2 to n. initially, let p equal 2, the first prime number.
Step 3: In an inner loop we need to iterate over all the numbers that are multiples of p, i.e for 2, that's 2,4,6,8 etc. Each time, setting it's value to false in the original array.
Step 4: Find the first number greater than p in the list that is not marked False. If there was no such number, stop. Otherwise, let p now equal this number( which is the next prime), and repeat from step 3.
When the algorithm terminates, all the numbers in the list that are not marked False are prime
Example: Let us take an example when n = 50. So we need to print all print numbers smaller than or equal to 50. We create list of all numbers from 2 to 50.
2 3 4 5 6 7 8 9 10
11 12 13 14 15 16 17 18 19 20
21 22 23 24 25 26 27 28 29 30
31 32 33 34 35 36 37 38 39 40
41 42 43 44 45 46 47 48 49 50

Answers

Answer:

const MAXNR=150;

let candidates = {};

for(let i=2; i<=MAXNR; i++) {

   candidates[i] = true;

}

for(let p=2; p <= MAXNR; p++) {

   if (candidates[p]) {

       process.stdout.write(`${p} `);

       // Now flag all multiples of p as false

       i=2;

       while(p*i <= MAXNR) {

           candidates[p*i] = false;

           i++;

       }

   }

}

Think about that the C, B and S parameters of a Cache. Think about what happens to compulsory, capacity, conflict misses, if only each of the following parameter changed (the other two are kept the same)?
(i) C is increased (S, B same)
(ii) S is increased (C, B Same)
(iii) B is increased (C, S Same)

Answers

Answer:

(i) C is increased (S, B same)

Explanation:

Cache are items which are stored in the computer at a hidden place. These are sometimes unwanted and they may hinder the speed and performance of the device. They exist to bridge speed gap.

Saved In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity? Select all that apply. There must be a maximum of one attribute instance. There must be many instances of the attribute There must be at most one entity instance that each attribute instance describes. There must be at least one instance of the attribute. There must be zero or more instances of the attribute. Question 2 (2 points) True or false: A singular attribute is also known as a unique attribute. True False Question 3 (3 points) Saved Relationship names and types of relationship maxima or minima that each could have are listed below. Match each relationship in the list below to the type of relationship maxima or minima. Instructions: Choose your responses from the drop-down menus below. Response options cannot be used more than once. Minima is One-Zero 1 Person-Assigned Social SecurityNumber 4 Minima is Zero Zero 2 CubicleNumber-Assigned-to- Employee per shift 2 Maxima is One-Many 3. Birthdate-Recorded-for-a Person 1 Maxima is One One 4. Women-Bearing-Children Question 4 (2 points) Saved A ride-sharing app's discount system for riders is configured such that a ride discount is triggered only if at least two RiderlDs book a ride in the same Card at the same time. Which of the following is true of the relationship Ride Discount-is-Applicable?
The relationship minimum is Many-One.
The relationship minimum is Two-One.
The relationship maximum is One-Two.
The relationship minimum is One-Two.

Answers

Answer:

Saved In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity:

There must be a maximum of one attribute instance.

There must be many instances of the attribute.

There must be at most one entity instance that each attribute instance describes.

There must be at least one instance of the attribute.

A singular attribute is also known as a unique attribute. True

Saved Relationship names and types of relationship maxima or minima that each could have are listed below. True

Explanation:

what are the physical aspect of a presentation​

Answers

Answer:

1. It has a clear objective.

2. It's useful to your audience.

3. It's well-rehearsed.

4. Your presentation deck uses as little text as possible.

5. Your contact information is clearly featured.

6. It includes a call-to-action.

Explanation:

interpret the following SQL create table persons (person I'd int, last name varchar (255) first name varchar (255) address varchar (255) city varchar (255)​

Answers

Answer:

Kindly check explanation

Explanation:

The SQL statement above could be interpreted as follows :

create table command is used to create a table named 'persons' with five columns which are labeled :

person I'd : whose data type is an integer

last name column with a variable character data type with maximum length of 255

first name column with a variable character data type with maximum length of 255

address column with a variable character data type with maximum length of 255

city column with a variable character data type with maximum length of 255

The VARCHAR data type is ideal since we expect the column values to be of variable length.

An array A[0..n - 2] contains `n-1` integers from 1 to `n` in increasing order. (Thus one integer in this range is missing.) Design an algorithm in $\Theta(\log n)$ to find the missing integer. Your algorithm should be given in **pseudo code**. For example, the array `A` could be `{1, 2, 3, 4, 6, 7, 8, 9, 10}` in which `5` is missing.

Answers

Answer:

I do not understand anything

In which type of class methods is it typically necessary to filter bad arguments (either directly or indirectly with the help of validators) in order to protect private data of your class

Answers

Answer: hello your question is incomplete attached below is the complete question

answer :

A set() method (non-constructor mutator). ( B )

Explanation:

The type of class methods that is necessary to filter bad arguments to protect private data of your class using validators is :

A set() method (non-constructor mutator)

How is an API different from a web application?

Answers

Answer:

Web services (web application) are an API type to be accessed via a network connection. While APIs are application interfaces, this means standardized communication between one application and another application.

Explanation:

Web service is used for communication with REST, SOAP, and XML-RPC.

        While API for all communication styles is used.

The APIs are all web services. Whereas web services are not APIs.The Web application has no lightweight design, needs a SOAP agreement for sending or receiving system information. While the architecture is lightweight, API is useful for gadgets with limited transmission capacities like smartphones.The web application supports the HTTP protocol only. Whereas the API HTTP/s protocol supports: URL Request / Answer Header etc.The web application is not open source, but any customer who contains XML can devour it. While API  is open-source and has a .net framework.

Can you help me in this question

Answers

Answer:

I think the third one (or the one with monkeys).

Explanation:

2+2 does not equal 5, so the if then statement is void because both parts are wrong.

1+1 does not equal 3 even if 2+3 =5, so it is not the second answer.

3+1 does not equal 3, but monkeys do fly and it is an or option, so when one of them is correct in an or, it is correct.

Explain in details:
(i) Deadlock
(ii) File manager
(iii) Process
(iv) Multiprogramming
(v) Software Classification
(vi) Virtual memory

Answers

Answer and Explanation:

Deadlock occurs when two operating systems on the same computer are hindering each other's execution, getting blocked, waiting for each one to run first. This can happen when a preemption has not occurred, when a mutual exclusion has occurred, or when one of the systems causes the other to not execute.

File manager is software that allows a computer user to create directories and organize files inside and outside of them.

Process is the term used to determine the functioning of computer software. When a software is started, it uses its own programming code to perform a specific activity.

Multiprogramming is the term used for the moment when an operating system allows the user to run more than one software at the same time. For this to happen, the computer needs to have a high processing capacity, to handle the effort of running several software simultaneously.

Software Classification is the process that determines the composition and different aspects that make up a software. In this way, it is possible to understand the usefulness and programming of this software.

Virtual memory is the use of secondary memory for caching. This allows the user to share files more securely and quickly, in addition to alleviating the problems that limited memory presents.

different between internet and email​

Answers

Answer:

The internet allows you to connect with people and information around the world. The internet is more broad and could include searching things up or message-based websites. Emails is more specific, with it being when you send someone a message (called an email) on a mail website (that allows you to get messages from other people, websites, etc.)

Explanation:

In my answer.

After the explosion of the Union Carbide plant the fire brigade began to spray a curtain of water in the air to knock down the cloud of gas.a. The system of water spray pipes was too high to helpb. The system of water spray pipes was too low to helpc. The system of water spray pipes broked. The system of water spray pipes did not have sufficient water supply

Answers

Answer:

d. The system of water spray pipes did not have sufficient water supply

Explanation:

The Union Carbide India Ltd. was chemical factory situated at Bhopal that produces various pesticides, batteries, plastics, welding equipment, etc. The plant in Bhopal produces pesticides. In the year 1984, on the night of 2nd December, a devastating disaster occurred on the Bhopal plant which killed millions of people due to the leakage of the poisonous, methyl isocyanate. This disaster is known as Bhopal Gas tragedy.

Soon after the gas pipe exploded, the fire brigade started spraying water into the air to [tex]\text{knock down}[/tex] the cloud of the gases in the air but there was not sufficient amount of water in the water sprays and so it was not effective.

Thus the correct answer is option (d).

Alex, a web designer, is assigned the task of creating a mobile device-friendly website for a leading fashion outlet called AllStyles. A desktop version of AllStyles's website already exists. Alex can refer to this desktop version of the website to create the mobile website design The desktop version of the website contains a long list of hyperlinks and this can obstruct the view of the main content when Viewed from a mobile device. Which of the following should Alex use to hide this long list of hypertext links so that it appears only in response to a tap of a major heading in the navigation list?
a. Navigator menus
b. Pulldown menus
c. Pop-up links
d. Header links

Answers

Answer: Pulldown menus

Explanation:

Pulldown menus refer to the graphical control element, that is identical to a list box, which enables user to be bake to select one value from a list.

They're regarded as the menu of options that will appear when an item is selected with a mouse. In this case, the item that the user selected will show at the top of the display screen, while the menu appears will show below it.

Therefore, Alex should use the pulldown menus to hide the long list of hypertext links so that it appears only in response to a tap of a major heading in the navigation list.

In a paragraph, describe in detail a practical real-world example of where you would implement a singly-linked list and why a singly-linked list is best for this use. Do not list the properties of a singly-linked list....
Rather identify a real-world example or application. If you identify this through research, cite your source.

Answers

Answer:

travel

Explanation:

One real world example of a singly-linked list would be travel. Imagine that you want to take a trip to your nearest neighbor state. To do so you would need to take a 2 buses and a train, but you can't just take any or in any order you wish. You first need to take the first bus at your current location, get off at the train station, take that train to the final stop, get off and take the bus to the final destination. Meaning there is a sequence of connected events that you must follow in order to get to your destination and the same opposite sequence of events to get back. This is exactly like a singly-linked list.

Other Questions
BocODA metal has a specific heat capacity of 360J/(kgC).An object made of this metal has a mass of 2.0kg.What is the thermal capacity (heat capacity) of the object? Help with number 16 please Pls dont have much time Bari Jay, a gown manufacturer, received an order for prom dresses from China. Her cost is $32 a gown. If her markup based on selling price is 76%, what is the selling price of each gown? (Round your answer to the nearest cent.) The radius of a cylinder of volume 2970cm is 30mm. Find the volume of a similar cylinder of radius 40mm. Assume that you manage a risky portfolio with an expected rate of return of 14% and a standard deviation of 30%. The T-bill rate is 6%. Your risky portfolio includes the following investments in the given proportions: Stock A 24 % Stock B 32 Stock C 44 Your client decides to invest in your risky portfolio a proportion (y) of his total investment budget with the remainder in a T-bill money market fund so that his overall portfolio will have an expected rate of return of 13%. a. What is the proportion y? (Round your answer to 1 decimal places.) b. What are your client's investment proportions in your three stocks and in T-bills? (Round your intermediate calculations and final answers to 2 decimal places.) c. What is the standard deviation of the rate of return on your client's portfolio? What is the value of 2 + (-2/3) ^2 1/3 ?163 -20. The average daily volume of a computer stock in 2011 was =35.1 million shares, according to a reliable source. A stock analyst believes that the stock volume in 2018 is different from the 2011 level. Based on a random sample of 40 trading days in 2018, he finds the sample mean to be 31.8 million shares, with a standard deviation of s=14.6 million shares. Test the hypotheses by constructing a 95% confidence interval.(a) State the hypotheses for the test.(b) Determine if the researcher will reject the null hypothesis. 1 - Replace the letter with the appropriate tense of the verbs in parentheses to complete the sentences about the history of the radio.James Clerk Maxwell A ________________ (not/create) the first radio.He B________________ (develop) the first radio-wave mathematical formula.In 1888, Heinrich Hertz C________________ (test) Maxwells assumption.The radio D ________________ (be) a subdivision of telecommunication.When E ________________Oliver Lodge F ________________ (name) the coherer? In 1894.In 1888, Temistocle Calzecchi-Onesti G ________________ (demonstrate) that a tube with iron filings conducted an electrical current.Radio communication H ________________ (involve) the transmission of electromagnetic waves.Before the 19th century, many scientists I ________________ (try) to invent something like the radio.Marconi J ________________ (notice) that electromagnetic waves K ________________ (travel) between two points separated by an obstacle. Write a single Python regular expression for each of the following. Note: For each problem, you must use only ONE regular expression. Matches a string that has both the substring dog and cat in the string in either order. For instance, both of the following strings match: 'The dog chased the cat' and 'xxcatxxdogxx'. Select the correct text in the passage.Which word or group of words best helps to clarify the meaning of block printing in the last paragraph?from "The Printing Press"in Great Inventions and Discoveries by Willis Duff Piercy1 "Except a living man," says Charles Kingsley, "there is nothing more wonderful than a booka message to us from the deadfrom human souls whom we never saw, who lived perhaps thousands of miles away; and yet these, on those little sheets of paper, speak to us, amuse us, vivify us, teach us, comfort us, open their hearts to us as brothers. We ought to reverence books, to look at them as useful and mighty things." Milton calls a good book "the precious life blood of a master spirit, embalmed and treasured up on purpose to a life beyond life." Cicero likens a room without books to a body without a soul. Ruskin says, "Bread of flour is good; but there is bread, sweet as honey, if we would eat it, in a good book." And Thomas Carlyle exclaims: "Wondrous, indeed, is the virtue of a true book! O thou who art able to write a book, which once in two centuries or oftener there is a man gifted to do, envy not him whom they name city-builder, and inexpressibly pity him whom they name conqueror or city-burner!"2 For centuries the traditions, stories, and songs of men were handed down orally from father to son and were preserved only in the memory. The poems of Homer, the great Greek bard, were recited by readers to large audiences, some of them numbering probably twenty thousand. By and by men felt the need of perpetuating their thoughts in some more permanent way than by memory, and there grew up a rude system of writing.3 The early Greeks and Romans used for their books tablets of ivory or metal or, more commonly, tablets of wood taken from the beech or fir tree which was then followed by a material called parchment. This was made from the skins of animals, particularly sheep or lambs. About the end of the ninth century or the beginning of the tenth, after Christ, parchment and vellum as material for books gave way to paper. Initially paper produced, was made of cotton, but during the twelfth century it was produced from linen. It is not known who invented linen paper, but its introduction was the first great catalyst to book making. About the beginning of the fifteenth century after Christ, there came over the world an enormous wave of intellectual awakening.4 The human intellect began to awake, to stretch itself, to go forth and conquer, which hence brought about the invention of printing. Before this time, ever since man began to record his thoughts, whether on plank, stone, or papyrus, on bark of tree, skin of animal, or tablet of wax or paper, every letter was made by hand. The process was necessarily slow, books were rare and costly, and only the few could have them. But with the advent of a process that would multiply books andmake them cheap, learning wasmade accessibleto the legion. Before theinventionof printing with movable, metal types, a kind of block printing was used. The words or letters were carved on a block of wood; the block was applied to paper, silk, cloth, or vellum, and thusimpressionswere made. Factor each trinomial completely. A. 2x^2 + 17x + 21B. 3x^2 - 17x + 10 What previous legislation did Jim Crow laws closely resemble?Select the best answer from the choices provided.A. the Civil Rights Act of 1875B. the grandfather clauseC. the Northwest OrdinanceD. the Black Codes Earth's seasons are caused by itsO A. precessionO B. rotationO C. revolutionO D. ecliptic Please help Ill give brainliest Define the word phytoplankton! What is the value of U if a loaf of bread coast 1.52 how much change will you get from 10 if you buy 4loaves Write the 3 informal "tu" commands If k = 23 and m-14, what is k + m?Submit