1. Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the two approaches?

12. Is Java compiled or interpreted (or both)? How do you know?
13. What is the difference between a compiler and a preprocessor?
14. What was the intermediate form employed by the original AT&T C++ compiler?
15. What is P-code? 16. What is bootstrapping? 17. What is a just-in-time compiler?
18. Name two languages in which a program can write new pieces of itself "on the fly."
19. Briefly describe three "unconventional" compilers—compilers whose purpose is not to prepare a high-level program for execution on a microprocessor.
20. List six kinds of tools that commonly support the work of a compiler within a larger programming environment.
21. Explain how an IDE differs from a collection of command-line tools.

Answers

Answer 1

Answer:

11: Compiler translates a high level source program into a target equivalent (machine language).

An interpreter implements a virtual machine, the high-level programming language of which is the "machine language." The interpreter reads statements more or less one at a time in that language, and executes them as they go along.

12: One could also consider Java either. A compiler (complicated translator) can create code, which is then executed by a complicated virtual machine (interpreter)

13: A preprocessor is an initial translator which removes comments and white space, and group characters together into tokens such as keywords, identifiers, numbers, and symbols, as well as simple syntactic structure analyses. A compiler uses in-depth analysis and nontrivial transformation.

14: C++ implementations based on the early AT&T compiler created an intermediate program in C rather than assembly language

15: Stack-based language, similar to modern Java compiler byte code

16: A method in which a simple interpreter implementation evolves into building more complex versions until the compiler is built.

17: A compiler which translates byte code into machine language immediately prior to each program execution.

18: Lisp and Prolog

19: TEX and TROFF are one of such compilers that translate high-level document descriptions into laser printer or phototypesetter commands. Query language processors for database systems are also compilers that translate languages such as SQL into primitive file operations.

21: without havin to call multiple tools with command-line tools, You can write an entire program in an IDE.

1. Explain The Distinction Between Interpretation And Compilation. What Are The Comparative Advantages

Related Questions

If an additional term relates to payment, quality, quantity, price, time, and place of delivery, the CISG considers the added terms as material alterations. a. True b. False

Answers

Answer:

The statement is TRUE

Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and features? A- Static IP addresses have been configuredB- Administrator has a strong passwordC- Security updates are current

Answers

Answer:

A. Static IP address have been configured.

Explanation:

A network is an interconnection of network devices for communication to occur. A network comprises of end devices and intermediate network devices.

End devices are the sources and destinations of data transmission, while intermediate devices are the devices that makes communication of data possible like routers and switches. Examples of end devices are servers and workstations (computers, smartphones etc.).

A server in a network is a device that provides special services to workstations or clients. The IP addresses of servers must be known, that is, a static IP address must be configured on a server. Examples of server protocols are DNS, TFTP, FTP, DHCP etc.

a particular variety of database that works by connecting tables to each other. It is the most popular form of database and the type we will discuss most in this class.

Answers

Answer:

Relational Database      

Explanation:

Relational Database is the type of database in which data is stored and presented in the form of tables and it is used to access, manipulate and manage data.Table is also called a relation. It consists of rows and columns where rows represent a record of data and columns represent the attributes of the data.Every table has a primary key which uniquely identifies a row in a table and a foreign key is used to establish relationships among tables.In relational database domain is used to define specify the possible values that an attribute can have.Constraints can also be applied to the values of the attributes in the table.There are many advantages of a relational database. It can organize and manage bulk of information. It is easy to add or delete data in the relational database according to the change in requirements.Relational database ensures the consistency and integrity of data when many users obtain the same database at same time by using concurrency control methods.It ensures security by limiting access rights to the data.It also eliminates data redundancy and dependency using normalization technique which ensures data integrity and accuracy.

What is the output of the code snippet given below?string s = "abcde";int i = 1;while (i < 5){ cout << s.substr (i, 1); i++;}a. no outputb. abcdc. abcde d. bcde

Answers

Answer:

The answer is "Option d".

Explanation:

In the given C++ program code, two-variable is defined, that is "s and i", in which variable s is a string type that holds a value, that is "abcde", and variable i is an integer type, that holds a value '1'.

In the next line, a while loop is declared, that uses integer variable which value is less than 5, inside a loop a substring function is used, that specifies the number of character and return its value.  In array and string indexing starts from 0, and that variable i starts from 1, that is used in substring function, that's why it will print only "bcde".

One of the managers in your organization has seen older servers crash because of one malfunctioning program. What feature in Windows Server 2016 can help prevent this from happening?

Answers

Answer:

Privileged mode for the kernel is the correct answer.

Explanation:

In the following statement, It is the feature of the Ms Windows Server 2016 that helps the manager of the company to see the following earlier servers that crash when program is malfunctioning. The following privileged mode feature helps the manager to prevent this from occurrence. That's why the following answer is correct.

A certain computer game is played between a human player and a computer-controlled player. Every time the computer-controlled player has a turn, the game runs slowly because the computer evaluates all potential moves and selects the best one. Which of the following best describes the possibility of improving the running speed of the game?A The game's running speed can only be improved if the game is played between two human players instead of with the computer-controlled player.B The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.C The game's running speed cannot be improved because computers can only be programmed to find the best possible solution.D The game's running speed cannot be improved because the game is an example of an algorithm that does not run in a reasonable time.

Answers

Answer:

B The game's running speed might be improved by using a process that finds approximate solutions every time the computer-controlled player has a turn.

Explanation:

Even though the moves are not the perfect ones, the algorithm of the game can be written in a way that it can solve the problems and play faster.

Let's see the problems in other options.

A -> The only way is not replacing the computer with a human because, we know that computers can play faster than a human when the algorithm is written well.

C -> Computers cannot only be programmed to find the best possible solution. They can be programmed how the programmer wants them to behave.

D -> Since we do not know anything about the game, we cannot say anything about the algorithm runtime.

Why are models based on​ assumptions? A. Because models are not intended to analyze​ real-world events. B. Because models are only concerned about questions of​ equity, not question of efficiency. C. Because models have to be simplified to be useful. D. Because models are very different from theories.

Answers

Models are based on​ assumptions because models have to be simplified to be useful.

Answer: Option C.

Explanation:

Model is a computer program which helps to predict the situation as to what might have happened. Models are used almost in every aspect, be it economics or science or biology.

Assumptions are necessary because there are many complexity in every system and it is thus essential to have an understanding of the working of those system. It is necessary to remove the complexities for models to be useful. Models which aren’t based on assumptions are massive which is turn creates a problem. Thus it is necessary that models are simplified to be useful.

The scheme where you can find the greatest common divisor of two integers by repetitive application of the division algorithm is known as the Brady algorithm.

Answers

Answer:

False

Explanation:

The scheme where you can find the greatest common divisor (GCD) of two integers by repetitive application of the division algorithm is known as Euclidean Algorithm.

The Euclidean Algorithm for calculating GCD of two numbers X and Y can be given as follows:

If X=0 then GCD(X, Y)=Y since the Greatest Common Divisor of 0 and Y is Y.If Y=0 then GCD(X, Y)=X since the Greates Common Divisor of 0 and X is X.Let R be the remainder of dividing X by Y assuming X > Y. (R = X % Y)Find GCD( Y, R ) because GCD( X, Y ) = GCD(Y, R ). Repeat the above steps again till R = 0.

"Which layer of the OSI seven-layer model keeps track of a system's connections to send the right response to the right computer?"

Answers

Answer:

The Session layer (Layer 5)

Explanation:

The OSI (Open Systems Interconnection) seven-layer model is a reference model that explains how devices (or applications) communicate over the network. The model consists basically of seven different layers which are;

i. Layer 1 or the physical layer

ii. Layer 2 or the data-link layer

iii. Layer 3 or the network layer

iv. Layer 4 or the transport layer

v. Layer 5 or the Session layer

vi. Layer 6 or the presentation layer

vii. Layer 7 or the application layer.

Out of the seven layers, the session layer (layer 5) keeps track of a system's connections to send the right response to the right computer by setting up, coordinating and managing these connections. It controls, establishes and maintains the connection between multiple computers or applications on a computer.

Procter & Gamble uses an intranet called InnovationNet to help people working on similar problems share ideas and expertise. InnovationNet connects those working in many different departments around the world. It uses a browser-based portal to access data and includes a directory of subject matter experts who can be tapped to give advice or collaborate on problem solving or product development.

Answers

The answer is Core Competencies.

Core competency is a management theory which focuses on team works by different divisions or department in an organization. It focuses on activities, programs, software and anything that would make people in the company working together to achieve company's missions more effectively.

You've decided to use a subnet mask of 255.255.192.0 with your 172.17.0.0 network to create four separate subnets. The network ID for one of the subnets is 172.17.0.0. You are installing the first host (a server) on this subnet and want to assign the lowest numbered IP address possible to this system. What should you do?

Answers

Answer:

Assign the system an IP address of 172.17.0.1

Explanation:

Based on the information provided within the question it can be said that in this scenario you need to assign the system an IP address of 172.17.0.1 . This is because since you want the lowest possible IP address and since there is a subnet with an IP of 172.17.0.0 then the next lowest address would be by adding 1 to the last digit making it 172.17.0.1

Final answer:

The first usable IP address for the server on the subnet 172.17.0.0 with a subnet mask of 255.255.192.0 is 172.17.0.1.

Explanation:

To assign the lowest numbered IP address possible to the first host on the subnet with a network ID of 172.17.0.0 and a subnet mask of 255.255.192.0, you should use the first usable IP address in that range. The subnet mask of 255.255.192.0 indicates that the first two octets (172.17) are fixed for network identification, and the third octet will bring additional subnets.

The subnet mask divides the address space into four subnets, each incrementing by 64 in the third octet (since 192 in binary is 11000000). Thus, the possible subnets are 0, 64, 128, and 192. For subnet 172.17.0.0, the first usable address is the one immediately following the subnet address. You would therefore assign the IP address of 172.17.0.1 to the server, with the last octet as '1' since this is the first usable host address.

What is activated as necessary to support local eocs and to ensure that responders have the resources they need to conduct response activities?

Answers

Answer: Emergency Operation Center (EOC)

Explanation:

An Emergency Operation Center is the coordination base for emergency service in case there is any within a state or a state Connecticut. The major purpose of the emergency center is to be in charge of controlling deploying and utilizing facilities needed to prepare for any form of emergency, disaster management, etc.

To run an effective Emergency Operation Center, focus must be on the facilities, equipments and personnel involved.

Having demonstrated its versatility as a high-tech newswire, Twitter drew the attention of those who would prefer to see certain information suppressed.A. TrueB. False

Answers

Answer:

A. True.

Explanation:

Twitter social media platform is an online messaging application, that provides a medium for users to communicate with friends, advertise events or products and broadcast news at a large scale.

Its contents are summarized and detailed with pictures, videos, audios and text information. Developers of this web application utilized the concept of user interface and user experience design for easy access to information on the platform.

One of the Visual Studio 2015 languages that can be used for rapid application development is C#. Another language that supports rapid applicaton development is ____________

Answers

Answer:

Visual Basic is the appropriate answer for the following blank.

Explanation:

Visual Basic is a language based on real events of a third generation for the Module Object model coding model that was originally published and declared legacy in 2008.

In an easy to use graphical environment programmers can create a visual basic programming language for software interfaces and codes. VB is the collection of different components used with the help of the forms with specific characteristics and actions.

n a​ poll, 6767​% of Internet users are more careful about personal information when using a public​ Wi-Fi hotspot. What is the probability that among threethree randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot? How is the result affected by the additional information that the survey subjects volunteered to​ respond?

Answers

Answer:

The probability that among three randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot is 0.964

If the survey subjects volunteered to​ respond , then those with the strongest opinions are most likely respond. The survey sample is then not randomly selected, the survey may have a response bias.

Explanation:

Let P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot) denote the probability that among three randomly selected Internet​ users, at least one is more careful about personal information when using a public​ Wi-Fi hotspot, then we have the equation

P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot) = 1 - P(none of the selected users is more careful about personal information when using a public​ Wi-Fi hotspot)

If 67​% of Internet users are more careful about personal information when using a public​ Wi-Fi, then 33% of them are not.

P(none of the selected users is more careful about personal information when using a public​ Wi-Fi hotspot) = [tex]0.33^{3}[/tex] ≈ 0.036

P(at least one is more careful about personal information when using a public​ Wi-Fi hotspot)  = 1 - 0.036 = 0.964

The term firmware refers to programs embedded into hardware devices. This software only changes when a firmware upgrade is performed.A. TrueB. False

Answers

Answer:

True

Explanation:

Firmware are software programs embedded in hardware devices such as hard drives and BIOS, that allow these hardware devices to run properly. With the help of firmware, user programs can run on devices. Firmware programs hardly change throughout their lifetime except and upgrade is performed on them. Firmware are usually upgraded to fix bugs and maybe to add new features to them.

Examples of firmware are;

(i) programs written for a printer

(ii) software controlling the time in a washing machine.

What is the purpose of the .NET Framework Class Library? a. it provides pre-written code that can be used by .NET applications b. it manages the execution of .NET applications c. it specifies the format of compiled .NET applications d. it specifies the data types that can be used by .NET applications

Answers

Answer:

d. it specifies the data types that can be used by .NET applications.

Explanation:

The .NET Framework Class Library (FCL) makes the system functionality of the .NET Framework available because it contains interfaces, data types, various classes and so on.

It is also important to note that the FCL is integrated to the CLR or Common Language Runtime of .NET Framework which is responsible for code execution.

The Framework Class Library or FCL can be categorized broadly into three:

1.  Frameworks

2. Utility features in .NET, and

3. Wrappers around the Operating System (OS) functionality.

1. Frameworks: The FCL contains many frameworks aimed at the development of some applications. For instance, WPF or Windows Presentation Foundation is used to carry out a number of functions but majorly to render user interfaces.

2. Utility features in .NET: This contains a number of classes for use in the .NET framework, examples of these classes include: dictionary, queue, stack, list and so on. Additionally, it contains classes for different manipulations, for example, for handling regular expressions the Regex class is available for use.

3. Wrappers around the Operating System (OS) functionality: Contained in the Framework Class Library are wrappers that are present at the root functionality of the Windows OS. For instance, classes to handle I/O, network features, file system as so on.

Which term is used to describe a network security device or host software that filters communications, usually network traffic, based on a set of predefined rules?a. Snifferb. Auditorc. Hackerd. Firewall

Answers

Answer:

The correct answer is option (D).

Explanation:

According to the scenario, the most appropriate answer is option (D) because the firewall can be defined as the software program which checks through the network for incoming and outgoing communication on predefined rules.

while the other options are wrong because of the following reasons :

A sniffer can be defined as the program which is used to check the network traffic but it didn't work on predefined rules. An auditor can be defined as a program that is used to analyze the network. The hacker can be a person who hacks the system to gain access or gather information.

The function of the file server is to : 1. store data and software programs that can be used by client computers on the network. 2. manage all printing requests from clients on the network. 3. transfer e-mail messages to other servers on the network. 4. store HTML documents for an Internet or intranet web site. 5. coordinate the communication of client and servers on the network.

Answers

Answer:

1. store data and software programs that can be used by client computers on the network.

Explanation:

Answer:

its D

((((((routers, which direct the data to the correct destination.))))))

A network using multiple cell towers falls under which type of network?
CAN
MAN
WAN
WMN

Answers

Answer:

man

Explanation:

multiple area network

________________program specification, design, and implementation inter-leavedsystem developed as series of versions or increments w/ stakeholders involved w/ version specification and evaluationfrequent delivery of new versions for evaluationextensive tool support used to support developmentminimal documentation

Answers

Answer:

primary attributes of agile development

Explanation:

Based on the information provided within the question it can be said that this information are all main and primary attributes of agile development. Such as is mentioned in the question they are that the

- Program specification, design and implementation are inter-leaved.

- The system is developed as a series of versions or increments with stakeholders involved in version specification and evaluation.

- Frequent delivery of new versions for evaluation.

- Extensive tool support (e.g. automated testing tools) used to support development.

- and even needs Minimal documentation (focus on working code)

This are all parts of what describe an agile and efficient development culture.

A(n) ____ is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.

Answers

Answer:

incident

Explanation:

An incident is an attack against an information asset that poses a clear threat to the confidentiality, integrity, or availability of information resources.

What is the asset?

A business asset is something that has present or future economic worth to the company. In essence, assets for companies encompass anything managed and held by the firm that is today valuable or has the potential to give monetary advantage in the future.

Patents, machines, and investments are some examples of the assets. Assets are crucial because they may help you create money, raise the value of your firm, and help it function smoothly.

Therefore, an incident is an attack on an information asset that puts the confidentiality, integrity, or availability of information resources at risk.

Learn more about the asset, refer to:

https://brainly.com/question/13848560

#SPJ2

What type of cloud computing service provides hardware infrastructure along with necessary operating system software for running client applications?

Answers

Answer:

Platform as a service is the correct answer.

Explanation:

In the following statement, Cloud computing is the platform that allow users the services such as the safety of their important documents and data. It is also the type platform that provides users the infrastructure of the hardware with the important software of the operating system for client applications. That's why the following answer is correct.

A city-wide wireless network is an example of which type of network?
CAN
MAN
WAN
WMN

Answers

Answer:WAN

Explanation:

This means Wide Area Network. It is a combination of about two local area networks designed to serve a large geographical area such as a city.

Consider the following code segment. int count = 1; int value = 31; while (value >= 10) { value = value - count; count = count + 3; } System.out.println(value); What is printed as a result of executing the code segment?

Answers

Answer:

30

26

19

9

Explanation:

Initially, the value of count is 1 and the value of the variable “value” is 31. Since value is greater than 10, the while loop condition holds true and the program enters the while loop and will continue to execute the code inside the loop until the value changes to less than 10. “value” is reduced in the statement “value = value – count;”. Since we know value is initially 31, and count is 1, the value after this statement is executed will become value=31-1 = 30. “count” variable is now incremented by 3, so it now becomes 1+3 = 4. The next line will print this value onto the screen. The loop run again since value is >= 10. In the second run, the value will decrement by 4 as count was incremented by 3 in the previous run. Therefore, the value would become 26, while the count is again incremented by 3 to its new value 7. In the next run, the value of the value variable is therefore decremented by 7 to its new value 19 (26-7=9), and count is again incremented by 3 to make it 10 (7+3=10). The value is decremented by 10 to its new value 9 in the next run. Since 9 is less than 10 the while condition is no longer true and the program exits the while loop.

Companies that have a well-established brand name or reputation in a particular line of business usually want the URLs for their Web sites to reflect that name or reputation.Ture/false

Answers

Answer:

The answer is "True"

Explanation:

In the web browser, when you type and search any name of the company or any brand name so, it will be given the full detail of the company or the specific brand, and it also provides the new collection of the brand. which allows you to buy the product online, that's why we use the URL, that reflects the reputation of a company or the brand.

Describe the form in which a program is passed from the scanner to the parser; from the parser to the semantic analyzer; from the semantic analyzer to the intermediate code generator.

Answers

Answer:

Token stream, Parse tree, Abstract syntax tree or other intermediate form.

A device on a power drill that enables a user to back out a drill bit that is stuck in the work material is called a(n) __________.

Answers

Answer:Reversing switchExplanation:A device on a power drill that enables a user to back out a drill bit that is stuck in the work material is called a(n) Reversing switch.

A power drill is a electrical component that is used to drill or fast screw tightening and it maybe cordless or with cord. So, when the power drill is used to make hole then by using reverse switch it can be back out by rotating in opposite direction.

It is a simple switch operated electrically.It used to reverse the direction in which current is flowing.Reversing switch has four terminals.These terminals can be connected in such a way that when the switch is triggered then the direction or current is reversed and so the rotation of the motor of the power drill is also reversed.

I hope it will help you!

Define a character variable letterStart. Read the character from the user, print that letter and the next letter in the alphabet. Sample output assuming the user enters 'a':

ab

Sample program:

#include

int main(void) {


return 0;
}

Answers

Answer:

declare variable get input display variable and also increment ASCII of variable and th en display it

Explanation:

In above code first we declare a character variable by (var). Then we get a character input from user in (var). Then display character input and at the same time we also display next character by incrementing the ASCII of character input by 1.

Although the traditional model of software acquisition still accounts for more software acquisition, a new model, called ________, is changing the picture dramatically.A. Hardware as a HelpB. Software as a ServiceC. Processing as a ProductD. Storage as a Solution

Answers

Answer:

Option B Software as a Service

Explanation:

Software as a Service (SaaS) is a new software acquisition model. SaaS is based on a subscription license instead of perpetual license. The software is hosted by software provider and the user is required to use a client software or web browser to access and use the software. User pays for the service (software itself) they use on regular basis which can be monthly or yearly.

SaaS offers always up-to-date software solution to the user and the software can be accessed from any machine at any place.  Apart from the subscription fee, user is not required to pay  additional cost for license renewal or updating software. SaaS provides a cheaper and economic cost of software acquisition.

Other Questions
Bill Holdfast owns a small retail property that he inherited from his father. There are no mortgages or interest expenses connected with the property. Bill takes an annual cost recovery expense of $5,000. The property has a monthly gross income of $1,500 and monthly operating expenses of $500. Bill's taxable income from this property will be taxed at a rate of 30%. What is the tax liability for the year? USGS researches all of the spheres of the Earth system. Sort the following USGS mission areas into groups according to the Earth system sphere with which they are most closely associated? State two methods used by the United states government to acquire new territory Something is wrong with the logic in the program above. For which values of time will the greeting "Good Morning!" be displayed? var time = promptNum("What hour is it (on a 24 hour clock)?"); var greeting = ""; if (time < 6) { greeting = "It is too early!"; } else if (time < 20) { greeting = "Good Day!"; } else if (time < 10) { greeting = "Good Morning!"; } else { greeting = "Good Evening!"; } console.log(greeting); WILL BRAINLEST 100 POINTS ASAP WILL GIVE PRIZERead Shakespeare's "Sonnet 19.Devouring Time, blunt thou the lion's paws,And make the earth devour her own sweet brood;Pluck the keen teeth from the fierce tiger's jaws,And burn the long-liv'd phoenix, in her blood;Make glad and sorry seasons as thou fleets,And do whate'er thou wilt, swift-footed Time,To the wide world and all her fading sweets;But I forbid thee one most heinous crime:O! carve not with thy hours my love's fair brow,Nor draw no lines there with thine antique pen;Him in thy course untainted do allowFor beauty's pattern to succeeding men.Yet, do thy worst old Time: despite thy wrong,My love shall in my verse ever live young.Which features make this an example of a Shakespearean sonnet? Select three options.the abab, cdcd, efef, gg rhyme schemethe groupings of two stressed syllablesthe widespread use of iambic pentameterthe use of three quatrains followed by a coupletthe fact that the final lines summarize the preceding lines Work is done on an object as you drop it from the second floor of a building to the ground floor. True False. Calculate the molarity of a 10.0% (by mass) aqueous solution of hydrochloric acid. The density of this solution is 1.01 g/mL. a. 0.277 M b. 2.77 M c. 3.04 M d. 4.33 M e. The density of the solution is needed to solve the problem A wave with a high pitch and a quiet sound will haveGroup of answer choicesa short wavelength and a low amplitudea short wavelength and a high amplitudea big wavelength and a high amplitudea big wavelength and a low amplitude A ferry boat shaped just like a brick is 4.3 m wide and 8.5 m long. When a truck pulls onto it, the boat sinks 6.15 cm in the water. What is the weight of the truck? The acceleration of gravity is 9.81 m/s 2 . Answer in units of N. In industries where there is a high degree of competition among suppliers, reverse auctions can be an efficient way to conduct and manage the price bidding that would naturally occur in that market.True / False. What is the equation of the line of the best fit for the following data? Round to the slope and y-intercept of the line to three decimal places 15 multiplied by 1/5 Suppose you start an antique car by exerting a force of 300 N on its crank for 0.250 s. What angular momentum is given to the engine if the handle of the crank is 0.300 m from the pivot and the force is exerted to create maximum torque the entire time? What did kublai khan plant in his courtyard to remind him of home A 32-year-old female client has been diagnosed with a superinfection and has been prescribed tigecycline. What is a priority nursing action?a-Educate the client about the need to supplement oral contraceptives with another form of birth controlb-Assess the client's blood pressure prior to administering the first dose and monitor closely for the first 12 hoursc-Assess the client carefully for recreational drug used-Educate the client about the need to avoid OTC antihistamines during treatment, due to the risk for anticholinergic effects A. 37B. 38C. 39D. 40 PLS HELP!Most grocery stores place the ________ along the inner aisles of the store. freshest, healthiest foods frozen and processed foods dry, packaged goods produce and dairy products in a class there are 8 students who play football and cricket 4 students who do not play football or cricket 14 students who play football 20 students who play cricketfind the probability that a student chosen at random plays football or cricket or bothdont necessarily need an explanation but if you have a simple one i can understand then please do tell me x The ratio of pages read to minutes for Hang is 5 : 8. Who has a greater ratio of pages read to minutes than Hang? Select all that apply. A. Kira:2 pages read every 4 minutes B. Joe:6 pages read every 9 minutes C. Quon:5 pages read every 7 minutes D. Lulu:10 pages read every 13 minutes E. Find x- the length of the hypotenuse of the triangle Steam Workshop Downloader