What is Polymorphism in java programing?​

Answers

Answer 1

Answer:

Polymorphism means "many forms".

Explanation:

Polymorphism means "many forms", and it occurs when we have many classes that are related to each other by inheritance. Like we specified in the previous chapter; Inheritance lets us inherit attributes and methods from another class. Polymorphism uses those methods to perform different tasks.


Related Questions

200 words essay about prodcating

Answers

Podcasting is a form of digital audio broadcasting that allows individuals and organizations to create and distribute their own audio content to a global audience. Podcasts can be created on a wide variety of topics, from news and current events to entertainment, education, and personal development. They can be listened to on a variety of devices, including smartphones, tablets, and computers.

What is Podcasting?

Podcasting has become increasingly popular in recent years, thanks to the widespread availability of high-speed internet and the proliferation of smartphones and other mobile devices. This has made it easier than ever for people to access and listen to podcasts, regardless of where they are or what they are doing.

Creating a podcast is relatively easy and can be done with minimal equipment and technical expertise. The most important aspect is the content, which should be engaging, informative and of good quality. Podcasts can be recorded using a computer and a microphone, and then edited using a software such as Audacity.

In summary, podcasting is a form of digital audio broadcasting that allows individuals and organizations to create and distribute their own audio content. The popularity of podcasting has grown exponentially in recent years, thanks to the widespread availability of high-speed internet and mobile devices. It's relatively easy to create a podcast, and it can be a powerful marketing tool for businesses and organizations.

Learn more about podcasting from

https://brainly.com/question/13131476

#SPJ1

Which of the following loop headers will cause an ArrayIndexOutOfBounds error while traversing the array scores? O for (int i = 1; i < scores.length; i++) O for (int i = 0; scores.length > i; i++) O for (int i = 0; i < scores.length; i++) O for (int i = 0; i <= scores.length; i++)

Answers

for (int i = 0; i <= scores.length; i++) is the loop headers will cause an ArrayIndexOutOfBounds error while traversing the array scores.

What is the header section for the loop?

A for loop consists of a header that specifies the number of iterations and a body that is run once for each iteration. In order for the body to know which iteration is being done, the loop header frequently declares an explicit loop counter or loop variable.

Sometimes referred to as the loop header, the for loop's opening line of code. The number of times the loop must execute is specified using an integer expression. The loop header is terminated by a colon: The sentences below the header that are executed a predetermined number of times make up the for loop block or body in Python.

To learn more about loop header, visit:

https://brainly.com/question/22410405

#SPJ4

The complete question is attached below:

You have an Azure subscription that contains a virtual machine named VM1 and a storage account named storage1.

You need to ensure that VM1 can access storage1 by using the Azure backbone.

What should you configure?

Select only one answer.

a VPN gateway

Peering

a service endpoint

a routing table

Answers

a service endpoint

Explanation:

A service endpoint is a way to secure access to specific Azure resources by allowing only traffic from specific subnets or virtual networks to reach those resources. To ensure that VM1 can access storage1 by using the Azure backbone, you should configure a service endpoint on the storage1 storage account, and then associate it with the virtual network or subnet that contains VM1. This will allow only traffic from that virtual network or subnet to reach storage1, and will ensure that VM1 can access storage1 securely and directly over the Azure backbone.

It is worth noting that, Peering is a way to connect two virtual networks in the same or different Azure regions. A VPN gateway is a way to connect an on-premises network to an Azure virtual network. And a routing table is a way to control how traffic is forwarded between subnets and virtual networks. In this case, none of these are the correct answer.

Lane Games

ChatGPT Jan 9 Version. Free Research Preview. Our goal is to make AI systems more natural and safe to interact with. Your feedback will help us im

After entering the sympathetic chain, preganglionic nerve fibers may do which of the following? Select all that apply.

Answers

Preganglionic nerve fibres may synapse with postganglionic neurons after entering the sympathetic chain, which will then deliver the impulse to a target organ or tissue.

The spinal cord's sympathetic chain, a network of nerves, is in charge of triggering the body's "fight or flight" reaction. Preganglionic nerve fibres are bundles of nerve cells in the sympathetic chain that emerge from the spinal cord and go to the sympathetic ganglia. The postganglionic nerve fibres that these fibres synaptically connect with subsequently move to the target organs to initiate the sympathetic response. Preganglionic nerve fibres have a variety of effects, such as speeding up heartbeat, widening pupils, and boosting blood flow to muscles. The sympathetic chain, in its entirety, is essential for triggering the body's reaction to stress or danger, preparing the body for physical activity or to defend against a potential threat.

To know more about Never fiber Please click on the given link:

https://brainly.com/question/29929000

#SPJ4

Automatic Updates Of Applications
There's a constant race between hackers, who try to find vulnerabilities in software, and developers, who
work to fix vulnerabilities and improve overall security. This race leads to a steady stream of updates
offered for various operating systems and applications. One way to protect your computer from attack is
to make sure your own applications are as up to date as possible, and modern operating systems offer a
way to automate your updates.
Search online using a phrase like "activate automatic updates for applications to find out how to activate
automatic updates for applications for your preferred OS: Windows OS, Mac OS X, or Linux.
1. Explain how to activate automatic updates for that system's applications (or how to verify that
automatic updates are turned on). Be sure to name the OS you are using for your answer, and
provide a link to the web page where you found your answer.

Answers

Activate the automatic app updates. To access the Store, choose Store from the Start screen. Tap Settings after sliding in from the right edge of the screen.

How do I make System programs update automatically?

The Start screen's Store option should be chosen. In the upper right corner of the Microsoft Store, choose the account menu (the three dots), and then choose Settings. Under App updates, turn on Update apps automatically.

Why is it crucial to have software update automatically?

To fix vulnerabilities detected in an application, piece of software, or operating system, developers publish updates. Automatic updates can assist in plugging security gaps that nefarious actors attempt to exploit.

To know more about automatic visit:-

https://brainly.com/question/29556906

#SPJ1

True or False, managing information on operations, customers, internal procedures and employee interactions is the domain of cognitive science.

Answers

managing information on operations, customers, internal procedures and employee interactions is the domain of cognitive science is false

what is cognitive science?

Cognitive science is study of how the mind works, functions, and behaves. As a scientific field of study, cognitive science requires applying multiple existing disciplines such as philosophy, neuroscience, or artificial intelligence in order to understand how the brain makes a decision or performs task.

Some of most common instances of cognitive study include:

Attention Span and Capacity. ...

Studying the Memory. ...

Problem-Solving, Decision-Making, and Achieving Goals. ...

Learning and Language Processing.

learn more about cognitive science at

https://brainly.com/question/7274615

#SPJ4

Prepare Mounthly Payroll to xy Company which Calculate Tax, Pension Allowance, over time and Vet for each employce​

Answers

Make a payroll calculation using ADP® Payroll. Get 3 Months of Payroll Free! ADP® Payroll makes the payroll process quicker and simpler. Get ADP® Payroll Started Today! Time and presence. IRS tax deductions.

How do you calculate Monthly Payroll ?

You're ready to determine the employee's pay and the amount of taxes that must be deducted once you've set up your employees (and your firm, too). Making appropriate deductions for things like health insurance, retirement benefits, or garnishments, and, if necessary, adding back reimbursements for expenses. Going from gross compensation to net pay is the technical word for this.

Feel free to jump to the step you're searching for if you're having trouble understanding a particular one: First, determine your gross pay. Step 2: Determine the employee tax with holdings for 2019 or earlier and 2020 or later. Add any expense reimbursements in step four. Step 5: Compile everything.

To learn more about Payroll refer to :

https://brainly.com/question/30086703

#SPJ1

SQL Rank films based on number of films released by year

Answers

A relational database's structured query language (SQL) is a programming language used to store and process data.

What is SQL?

In a relational database, data is stored in tabular form, with rows and columns denoting various data qualities and the relationships between the values of those attributes.

To store, update, remove, search for, and retrieve data from the database, utilize SQL statements. SQL can also be used to optimize and maintain database performance.

A well-liked query language that is commonly used in many kinds of applications is structured query language (SQL). SQL is a popular programming language among data analysts and developers because it interfaces well with other programming languages.

Therefore, A relational database's structured query language (SQL) is a programming language used to store and process data.

To learn more about SQL, refer to the link:

https://brainly.com/question/20264930

#SPJ1

homework: monte carlo estimation in preparation for the lab, carefully review the code below and answer these questions. what does this program do? what is the program output if the user enters 10000 when prompted for the number of points? how would your answer to the above question change if the test in line 15 used

Answers

A set of signs or symbols used in communication: a set of signs, such as letters or numerals, that stand for preset, frequently unspoken meanings.

A mumbo jumbo number generator is available in the Random component; it generates numbers that are 0.1 apart and outputs a mumbo jumbo number that is between 0.0 and 1.0. A set of signs or symbols used in communication: a set of signs, such as letters or numerals, that stand for preset, frequently unspoken meanings. Text written in a programming language by a computer programmer is referred to as code, often known as source code. Examples include the programming languages C, C#, Java, Perl, and PHP. Less formally, content written in markup or style languages like HTML and CSS is also referred to as "code."

Learn more about Source code here:

https://brainly.com/question/30298780

#SPJ4

4.2.5 Text Messages Messages.java 1 public class Messages extends ConsoleProgram 2 - { 3 public void run() 4- 5 6 7 8

public void run()
{
// The first text is from bart to Lisa says, "Where are you?" The second text message is from Lisa to Bart and says,"I'm at school"//
}

Answers

Thus, maintaining one public class per source file allows for a more effective lookup of the source and generated files during linking, which speeds up compilation (import statements).

Can there be only one public class in Java?

The number of classes that can be used in a single Java program is not limited. However, there should only be one class specified with a public access specifier in any Java program. In a single Java application, there can never be two public classes. A member's access can be made public by using the Java keyword public.

All other classes can see public members. Any other class can now access a public field or method, according to this. he said so, therefore! so that the class definition may be quickly found by the compiler. Compiling is simpler that way. No, you must ensure that just one class out of any multiple classes defined in a Java file is public.

To learn more about java programming refer to :

https://brainly.com/question/25458754

#SPJ1

Which of the following actions is NON-DESTRUCTIVE? CHOOSE TWO.

Everything in the Layer > Adjustments menu
The Clone Stamp tool
Converting to Grayscale
Changing the Opacity of a layer
Everything in the Adjustments panel

Answers

The following actions are non-destructive:

Everything in the Layer > Adjustments menu.

These adjustments can be made to a single layer without affecting the underlying layers. This means that you can edit the adjustments or remove them entirely without altering the original image data.

Changing the Opacity of a layer

When you change the opacity of a layer, it simply reduces the visibility of that layer but the original image data is still retained.

The Clone Stamp tool, which is used to copy pixels from one area of an image to another, can be destructive because it overwrites the original pixels.

Converting to Grayscale also discards the color information, which is considered a destructive action.

Everything in the Adjustments panel is not a valid option because it includes both destructive and non-destructive adjustments.

Which of the following is the best course of action when a case has the majority of data missing?(spss)
A. Ignore the fact there are missing data.
B. Compute summed scores for the data you have.
C. Delete the variables in which there are missing data.
D. Delete the case.

Answers

The option that is the best course of action when a case has the majority of data missing is option D. Delete the case.

What is the data  about?

Deleting cases with missing data, also known as listwise deletion, is a common method for dealing with missing data in statistical analyses. This method removes any cases that have missing data for any of the variables, which is appropriate when the majority of data is missing.

The other options, such as ignoring the fact that there are missing data, computing summed scores, or deleting variables, would likely lead to biased or inaccurate results.

So, It is important to note that deleting cases with missing data will reduce the sample size and potentially lead to loss of power and inferential errors. .

Learn more about data from

https://brainly.com/question/28132995

#SPJ1

true or false an integer and float can be argument?

Answers

Answer: TRUE

Explanation:

An integer and a float can both be arguments in a function or method. They are both considered numerical data types in programming, and can be used in mathematical operations.

Correct the formula in cell H5 by making cell F12 an absolute reference. Copy the formula to the range H6:H11.

Answers

The  formula in cell H5 that has been corrected is given below

To correct the formula in cell H5 by making cell F12 an absolute reference, the formula would be modified as follows:

Original formula: =SUM(F5:F11)*F12

Modified formula: =SUM(F5:F11)*$F$12

What is the correct formula about?

To copy the modified formula to the range H6:H11, you would need to select the cell H5, and then drag the fill handle (the small square in the bottom-right corner of the cell) to the range H6:H11.

The modified formula will be copied to all the cells in the range H6:H11, and the reference to cell F12 will remain an absolute reference, so it will not change when the formula is copied.

Also, you can also use the "Paste Special" method. In which you can copy the cell H5, right-click on the cell H6, select "Paste Special" and then select "Formulas" and then click OK. This will copy the formula to the range H6:H11.

Learn more about  absolute reference from

https://brainly.com/question/23944876

#SPJ1

Convert A2D to octal​

Answers

Answer:

5055

Explanation:

A2D is hexadecimal for the (decimal) number 2605

This is because 10*16^2 + 2*16^1 + 13*16^0 = 2605

Likewise 5*8^3 + 0*8^2 + 5*8^1 + 5*8^0 = 2605

question 7 you are using tableau public to create a data visualization. in order to keep your visualization hidden from other users, you click the show/hide icon.
a. true
b. false

Answers

To generate a data visualization, you are working using Tableau Public.Click the show/hide icon if you want to keep your visualization private.

The method of graphically presenting information and data is known as data visualization. By utilizing visual elements like charts, graphs, and maps, data visualization tools provide a simple method for identifying trends, outliers, and patterns in data. Big data technologies and tools are essential for processing enormous amounts of data and for making data-driven decisions. With Tableau Public, you can explore, make, and share data visualizations online for no cost. Learning about data is simple because to Tableau Public's accessibility to the world's greatest library of data visualizations for educational purposes. By building an online portfolio of your work and gaining knowledge from an inexhaustible supply of data, you may advance your analytics profession.

Learn more about Data visualization here:

https://brainly.com/question/30328970

#SPJ4

the value 'blackstone' specified cannot be used as it conflicts with the value 'generic' for asin 'b09mr1ph1b' in the amazon catalog. if this is asin 'b09mr1ph1b', update the value to match the asin data. if this is a different product, update identifying information (upc/ean/part number/etc.).

Answers

Change the value to reflect the ASIN data if this is ASIN "asin name". Update the identifying details if this is a new product.

Explain about the invalid ASIN mean on Amazon?

This mistake shows that your Amazon feed lacks the necessary information, according to this error. Example: A product ID doesn't match an existing ASIN or a crucial value is invalid. There is a different inventory file template for each Amazon product category.

The ASIN number is specific to a product rather than a seller. In this case, if someone else is currently selling your product on Amazon, you can utilise their ASIN. Amazon maintains the order of its catalogue by allowing each product a single ASIN.

Despite the fact that SKUs and ASINs are both used to identify Amazon products, they each function differently. SKUs aid in inventory control while ASINs identify each distinct product on Amazon.

To learn more about generic for asin refer to:

https://brainly.com/question/12904434

#SPJ4

which tool has a graphical interface that you can use to diagnose computer issues? you can view how the computer uses the processor, memory and network statistics. [choose all that apply]

Answers

MSinfo32 (System Information) is tool has a graphical interface that you can use to diagnose computer issues.

What is graphical interface?

Instead of text-based UIs, typed command labels, or text navigation, a graphical user interface enables users to engage with electronic devices through graphical icons and auditory indicators like primary notation. In response to the apparent steep learning curve of CLIs (command-line interfaces), which need commands to be typed on a computer keyboard, GUIs were developed.

In a GUI, the activities are typically carried out by directly manipulating the graphical components.

In addition to PCs, GUIs are utilised in a variety of handheld mobile devices, including MP3 players, portable media players, gaming consoles, cellphones, and smaller controls for the home, office, and industry.

Read more about graphical interface:

https://brainly.com/question/14758410

#SPJ4

Why was the development of a coding system important to the development of life?

Answers

Answer:

full answer below

Explanation:

the development of coding allowed humans to program computers to complete tasks that were hard for humans in a much faster way.

which component causes the universal systems model to be a closed-loop system System input, system output, feedback, or process

Answers

The universal systems model is a closed-loop system because it includes feedback. A closed-loop system is a type of control system in which the output is used to regulate the input.

The feedback component of the system is responsible for comparing the actual output with the desired output and making adjustments to the input accordingly. This creates a self-regulating system in which the output is used to control and improve the input, leading to a more efficient and stable system.

The other components of the universal systems model are system input, system output, and process. The system input is the energy, material, or information that enters the system. The process is the set of operations or transformations that take place within the system. The system output is the energy, material, or information that exits the system. Together, these components work together to create a closed-loop system that is able to regulate itself.

To know more about feedback, refer:

https://brainly.com/question/29366602

What is a requirement?

Answers

The correct answer is a desired or required thing: necessity. Production was insufficient to meet military demands. : a prerequisite for the occurrence or presence of another thing: condition.

A prerequisite is a trait or attribute you must possess in order to engage in an activity or qualify for a position. Commonly accepted requirements are divided into three groups: functional requirements, non-functional requirements, and domain requirements. Functional requirements, according to IEEE, are "a task that a system or component must be able to do." A description of the characteristics the bespoke product must offer, the environment in which it must operate, and the functional specification of the system are established through the requirements process.

To learn more about prerequisite click the link below:

brainly.com/question/19504182

#SPJ4

ink-jet printers produce text and graphics in both black-and-white and color on a variety of paper types.

Answers

On a range of paper types, ink-jet printers output text and images in both black and white and colour.

What is a printer?

A printer is a device that receives text and graphic output from a computer and prints the data on paper, typically on sheets of paper that are standard size, 8.5" by 11".

Ink-jet printers produce text and images in both black and white and colour on a variety of paper types.

Pixels are used to measure how bright an LCD monitor or LCD screen is. When a ribbon with ink is struck by small wire pins on a print head mechanism in a laser printer, printed images are created.

Thus, it is true that ink-jet printers produce text and graphics in both black-and-white and color on a variety of paper types.

For more details regarding printer, visit:

https://brainly.com/question/17136779

#SPJ1

the transmission control protocol (tcp) and internet protocol (ip) are used in internet communication. which of the following best describes the purpose of these protocols?

Answers

Two of the most important protocols used in internet communication are the Transmission Control Protocol (TCP) and Internet Protocol (IP). While TCP is in charge of making sure that data packets are delivered correctly and in the right order, IP is in charge of routing data packets across networks.

TCP is a connection-oriented protocol, which means that prior to data transmission, it creates a fictitious link between two devices. To guarantee that all data is properly received, it additionally employs a system of acknowledgements and retransmissions. This makes TCP a dependable protocol for sending data that must be received in the right sequence and without errors, such as files or graphics.

Contrarily, IP is a connectionless protocol in charge of directing data packets to their intended locations. To identify machines on the internet, a special addressing scheme called IP addresses is used. Additionally, IP has the capacity to split and reassemble bigger data packets into smaller ones that can be sent across multiple networks.

Data is consistently and effectively sent across the internet thanks to TCP and IP working in tandem. TCP makes sure the data is received correctly, whereas IP makes sure it gets to its intended location. The internet as we know it would not operate correctly without these protocols.

To know more about TCP and IP Please click on the given link:

https://brainly.com/question/13267268

#SPJ4

Prasana has been hired by a book author to listen to record interviews and type them into documents. what is her job?
A: Transcriptionist
B: Data entry clerk
C: Writer
D: Receptionist

Answers

The solution is option A, or transcriptionist, based on the facts provided in the question.

What does a clerk who enters data do?

Refreshing the database by including up-to-date information about customers and accounts. source data is organized by gathering and sorting data to get it ready for computer entry. establishes the order of entries. By checking the data for errors, customer and accounts source documents are processed.

How can someone without experience begin data entry?

You require a high school graduation or the equivalent, together with the capacity to exhibit attention to detail, to work as a clerk for data entry without prior experience. Without prior expertise, employers recruit data entry clerks and train people on the data tools they use.

To know more about Data entry clerk visit:

https://brainly.com/question/14856993

#SPJ1

Briefly explain the risks we face in augmented reality,iot and AI​

Answers

Augmented Reality (AR), Internet of Things (IoT), and Artificial Intelligence (AI) are all cutting-edge technologies that offer many benefits, but they also come with certain risks. Some of the main risks associated with these technologies include:

Augmented Reality: One of the main risks associated with AR is that it can distract users from their real-world surroundings, potentially leading to accidents or injuries. Additionally, AR can also be used to spread misinformation or to manipulate people's perceptions of the world.

Internet of Things: The IoT is vulnerable to cyber attacks, as the interconnected nature of these devices makes them an attractive target for hackers. A security breach of an IoT device can lead to the loss of sensitive information or to unauthorized control of the device.

Artificial Intelligence: AI systems can be trained on biased data, which can lead to biased decisions, particularly in sensitive areas such as criminal justice or hiring. Additionally, AI can be used to automate certain tasks, which can displace jobs, and its usage can be used for malicious intent like spreading misinformation, hacking and surveillance.

It's important to keep in mind that these are not exhaustive lists, and there are other risks associated with these technologies. It is crucial to be aware of these risks and to take the appropriate measures to mitigate them.

Finish the VPython code to move the ball down seven units.

Answers

The ball's speed needs to be specified. By designating it as ball.velocity, you can make the ball's velocity an attribute.

What is the purpose of VPython?

VPython is a Python extension that enables simple, "pythonic" 3D. It's been utilized by research scientists to view systems or data in 3D. It is used in education for a range of purposes, include teaching physics and programming.

How can VPython be installed on Windows 10?

Make sure the installer can install Python27 in C:. Python 2.7.x from python.org is required for this version of VPython; any other version will not function properly. Make sure the installer can install Python27 in C:.

To know more about VPython visit:

https://brainly.com/question/20749336

#SPJ1

Your company plans to run large scale image analysis and processing in Azure.

You need to recommend which Azure compute service to use for the planned solution. The solution must minimize administrative effort.

Which Azure service should you recommend?

Select only one answer.

Azure Batch

Azure Functions

Azure Logic Apps

Azure virtual machines

Answers

The Azure service that should be recommended is A. Azure Batch.

What is Azure Batch ?

Azure Batch enables large-scale parallel and high-performance computing (HPC) batch jobs to be run in Azure with a minimum of administrative effort.

It can run jobs on virtual machines (VMs) that are provided and managed by Azure, and can scale out to thousands of VMs if needed. This makes it ideal for image analysis and processing, which can require significant computing power and resources.

Azure virtual machines can be used for running applications in the cloud, but may require more administrative effort for managing the VMs and scaling them as needed.

Find out more on Azure Batch at https://brainly.com/question/29907647

#SPJ1

Use the drop-down menus to complete each sentence.
If a student wants to participate in an online experiment, she will need to access a digital
If a student wants to watch videos, listen to lectures, and take quizzes for a class, he will access a digital
If a student who is also entering the workforce needs to get some skills training for a new job, she will likely need
access to a digital

Answers

The correct answers are given below:

If a student wants to participate in an online experiment, she will need to access a digital platform or website.

If a student wants to watch videos, listen to lectures, and take quizzes for a class, he will access a digital learning management system (LMS).

If a student who is also entering the workforce needs to get some skills training for a new job, she will likely need access to a digital learning platform or online course.

What is an Online Experiment?

An online experiment refers to research that is conducted over the internet, typically using a web-based platform or website. In order to participate in such an experiment, a student will need to access the digital platform or website where the experiment is being conducted.

A digital learning management system (LMS) is a software application for the administration, documentation, tracking, reporting, and delivery of educational courses, training programs, or learning and development programs.

Read more about digital platform here:

https://brainly.com/question/14242512

#SPJ1

Answer:

1.laboratory

2.classroom

3.office

Explanation:edge

all of the following are true of input data except? put all data fields together use some kind of formating to show that all data fields go together. they can be on a different sheet than the calculated fields they have to be on the same sheet as the calculated fields

Answers

It is a data type that the user has specified. Integer, float, char, string, and other forms of data are among them.

The assertion is untrue. The right answer is "A structure's fields are of different data kinds." A user-defined data type with one or more named attributes, each with its own data type, is referred to as a structured type. Properties that characterize a type instance are called attributes. For instance, a list of Cartesian coordinates could be one of the attributes of a geometric shape. One or more variables, maybe of various types, are grouped together and given a single name as a structure. It is a data type that the user has specified. Integer, float, char, string, and other forms of data are among them. As a result, the assertion is untrue.

Learn more about Structured type here:

https://brainly.com/question/29980987

#SPJ4

An unordered list can use one of four different bullet options: disc, square, circle, or triangle.
TRUE OR FALSE

Answers

False. An unordered list can use different types of bullet options, but the specific options you mentioned (disc, square, circle, triangle) are not the only possible options. Unordered list bullet styles can vary depending on the specific implementation and the medium in which they are used (e.g. HTML, CSS, Word Processing software), but the common bullet styles are bullet point, circle and square.

Other Questions
What did fans call Josh Gibson? Which of the following statements describes Asia in terms of its people and population? 1) It is the most populous continent. 2) It is patriarchal. 3) Its major area of employment is agriculture. 4) It is characterized by cultural diversity. Which playwright has only seven surviving plays, and many people consider his Oedipus Rex the greatest Greek tragedy?AeschylusSophoclesEuripidesAristophanes Encontrar la media, mediana, moda y rango de los siguiente valores:84,91, 72,68,87, 78,65,87,79. energy in a stretched spring Escoge la respuesta correcta.En qu regin de Ecuador est Guayaquil?en la costaen la sierraen la amazonaen la regin insular Why does life have to be hard? What is the slope of the line shown below? Answer the31 This question has two parts. First, answer Part A. Then, answer Part B.Part AWhich best states the theme of the passage?A. Discoveries can come from unexpected places.B. Government funding is usually unnecessary.C. It's best to quit while you're ahead.D. Science is filled with trial and error. Germs that cause diseases? Which came first, the Chicken or the Egg? I need help, I did 1-2b, but i do not mind someone answering it either way so I can double check, but I am mainly stuck with 2c and if someone can tell me the answer and as to why, it would mean a lot and you can get brainlest if it is the right answer :) what is the distance between 5,4 and -1,1 If I initially have a gas at a pressure of 12 kPa, a volume of 23 liters, and a temperature of 200 K, and then I raise the pressure to 14 kPa and increase the temperature to 300 K, what is the new volume of the gas? In 2004 a California woman named Lisa Torti was in a vehicle with her friend Alexandra Van Horn when they were involved in a car accident that was not their fault. Lisa, upon seeing what she thought was smoke, grabbed Alexandra and quickly pulled her out of the vehicle and away from danger. Alexandra had a severe spinal injury and later sued Lisa for moving her away from the smoking vehicle (and thereby causing more spinal injury).Many states have laws that prevent bringing lawsuits against a "good samaritan" who is attempting to help you. However, in 2008 a California court ruled 4-3 that Alexandras lawsuit against Lisa was justified and could continue.Assuming Lisa was in fact negligent in moving her friend from the vehicle, discuss your opinion on whether cases like this should be allowed to be brought. Under what circumstances should a "good samaritan" be allowed to be sued?Explain your answer in 2 or more paragraphs. Then review a few of your classmates posts and give a substantive response to one of them with a paragraph. Please help Ill give brainiest question Knowing that 6 7 = 42, we know that 42 7 = ___ The first step in solving 3+7(x-5)=2x+16 is to Which of the following best describes the history of Mormonism in the US? Mormonism was spread from Europe to the US Mormonism arose from the Second Great Awakening but was driven by Protestants into present-day Utah O Mormonism arose from the First Great Awakening but was driven by Catholics into present-day Utah O Mormonism arose and played an important role in settling the Massachusetts Bay colony What was the catastrophic event that led to the U.S.joining the war?