Consider the following sequence of items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert these items in the order above, into an initially empty implicit binary max-heap. Show the heap throughout the process but write down the heap as an answer after every 3 INSERT() operations. (Just hand-simulate the behavior of the implicit binary max-heap, and draw the resulting heap, both throughout the entire process and the ones after every 3 INSERT() operations as answers (note that the former is to show all your work so that partial credits can be given in case you make mistakes, while the latter (answers) are the ones to be graded). Draw them in the form of a tree rather than an array.)

Answers

Answer 1

Answer:

See attachment below

Explanation:

Consider The Following Sequence Of Items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert These
Consider The Following Sequence Of Items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert These
Consider The Following Sequence Of Items 10, 36, 25, 54, 37, 12, 75, 68, 42, 86, 72, 90. Insert These

Related Questions

A network administrator needs to protect a router against brute force login attempts. What is the correct login-block-for command syntax to disable login for 3 minutes if more than 3 failed attempts are made within a 2 minute period?

Answers

Answer:

The correct answer is by login the block-for 180 attempts 3 within 120 it protects a router against brute force login attempts.

Explanation:

The brute force login attempt is the type of attack in which the attacker  try to put the many passwords in the login window. It put many passwords by guessing them. In the Brute force login attempt the attacker checking all the possible passwords.  The network administrator protects the router by login the block-for 180 attempts 3 within 120. This login block protects a router against brute force login attempts.

Declare a char array named line of size 50, and write a statement that reads in the next line of console input into this array. (Assume the line may contain whitespace characters and the total number of the characters in the line is less than 50)

Answers

Answer:

Following are the statement in the C++ Programming Language.

//set character data type variable

char line[50];

//get character input from the user

cin.get(line, 50);

Explanation:

Following are the description of the statement.

In the above statement, we set character data type array variable that is 'line' and its index value is '50' that means the following variable not contain more than 50 character elements. In the other line, we get character type input in the following variable 'line' from the user through the get() method.

Final answer:

To read a line of console input into a char array named line of size 50 in C++, use 'char line[50];' to declare the array and 'std::cin.getline(line, 50);' to read the input, including whitespaces.

Explanation:

To declare a char array named line of size 50 in C++ and read a line of console input that may contain whitespace characters into this array, you can use the following code snippet:

char line[50];
std::cin.getline(line, 50);

Here, cin.getline is a function that reads characters from the standard input stream (cin) into the line array until a newline character is encountered or the maximum length of the array is reached, which is specified as 50 characters in this case. Notice that this reads the entire line, including any whitespace, such as spaces or tabs, and stops reading once it hits the limit or encounters a newline character, which is the end-of-line indicator.

SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection. This approach, one of the oldest in the repertoire of crackers, is sometimes used to perform denial-of-service (DoS) attacks. SYN scanning is also known as half-open scanning.In SYN scanning, the hostile client attempts to set up a TCP/IP connection with a server at every possible port. This is done by sending a SYN (synchronization) packet, as if to initiate a three-way handshake, to every port on the server. If the server responds with a SYN/ACK (synchronization acknowledged) packet from a particular port, it means the port is open. Then the hostile client sends an RST (reset) packet. As a result, the server assumes that there has been a communications error, and that the client has decided not to establish a connection. The open port nevertheless remains open and vulnerable to exploitation. If the server responds with an RST (reset) packet from a particular port, it indicates ___________________________________

Answers

Answer:

A closed port that can not receive request from authorized users.

Explanation:

Networks comprises of end devices, routing and switching devices, servers, technical control devices etc. The communication and interconnection of these devices makes up a secure and resourceful network.

Attackers can exploit loopholes in networks to steal information. The attackers uses the SYN scanning or cracking technique to implement the DOS or denial of service attack.

DOS is used to flood ports on a server in a network, preventing authorized user access, as they steal information to avoid detection.

which of these is a way hexadecimal is commonly used in computing?
A. represent IPv6 network address.
B. communicate with the CPU.
C. exchange data with peripherals.
D. to represent sound waves

Answers

Answer:

represent IPv6 network address.

Explanation:

Hexadecimal number is the representation of large data into small chunk. each number in hexadecimal is replaced by 4 bits of data. With the help of this number system we can reduce the size of the total data.

IPv6 address consist of hexadecimal number. If we represent this address in binary it will utilize 16 x 8 = 128 bits. 128 bit address is too long.

So, we convert the 18 bits data into hexadecimal. This conversion make this address smaller. To represent the IPv6 address, we usually use hexadecimal number representation.

Final answer:

Hexadecimal is commonly used in computing to represent IPv6 network addresses. It allows for a compact representation of large numbers. It is not typically used to interface directly with CPUs or peripherals and does not represent sound waves.

Explanation:

The hexadecimal system is commonly used in computing in a few different ways, and one of these ways is to represent IP versions 6, known as IPv6 network addresses. Unlike the binary and decimal systems, hexadecimal can represent large numbers in a more compact form, which is why it's often used for this purpose in computer systems. Hexadecimal is not typically used to communicate with CPUs or exchange data with peripherals, and it does not play a role in representing sound waves.

Learn more about Hexadecimal use in Computing here:

https://brainly.com/question/33626588

#SPJ3

Write pseudocode instructions to carry out each of the following computational operations:1. Determine the area of a triangle given values for the base b and the height h.2. Compute the interest earned in 1 year given the starting account balance B and the annual interest rate I and assuming simple interest, that is, no compounding. Also determine the final balance at the end of the year.3. Determine the flying time between two cities given the mileage M between them and the average speed of the airplane.

Answers

Answer:

Hi there! The question is checking your knowledge on Pseudocode. Pseudocode is a high level solution written in plain English to outline the steps needed for the program to work correctly. An implementation for the different parts of the question is written below.

Explanation:

1. Determine the area of a triangle

  declare formula for area calculation of triangle as ½ * (base * height)

  validate input parameters “base” and “height”

  apply formula and return result

2. Compute the interest earned Prompt user for input 2

   declare formula for interest calculation as annual interest rate * term *     starting account balance

   validate input parameters “interest_rate” and “starting_account_balance ”

   apply formula and return result as final balance at the end of the year as the interest earned + starting balance.

3. Determine the flying time between two cities given the mileage M between them and the average speed of the airplane.

   declare formula for time calculation of triangle as time = distance / speed

   validate input parameters for mileage “M” and speed “S”

   apply formula and return result

" In which software generation did the distinction between systems programmers and other programmers first surface?"

Answers

Answer:

a. first

Explanation:

Important definitions.

System programmers: we are defining the process of creating a program, which allows the user to interact from a single user-friendly interface.

Programmer: uses different programming languages (writes code) to develop these programs.

Software Developers: Software engineers usually possess the same skills as a programmer, and technically they also "program." It focuses on the development of customized solutions, products or creations.

Readers who can easily locate and understand important information in a document will be more likely to agree with its arguments. True False

Answers

Answer and Explanation:

It is right readers can easily understand the situation and information that has given in any document. As the reader has many qualities such as

Good readers summarize what they read.

Readers make a prediction and visualize what they read

Readers revise and make inferences

Readers ask questions

Readers make connection

It is quite natural for a reader to understand the document with arguments.

____ convert a program design developed by a systems analyst or software developer using one of many computer languages.

Answers

Answer:

"Programmer " is the correct answer for the following question.

Explanation:

A programmer is a person who created the software They are basically a coder who develop a code for the program or the software. They are specialists in some in the programming code area. The programmer are writing the program for a different kind of software.

The main objective programmer they convert the program design which is developed  by a systems analyst or system designer using a different kind of computer language  

A user sends an e-mail request asking for read-only access to files that are not considered sensitive. A Discretionary Access Control (DAC) methodology is in place. Which is the MOST suitable approach that the administrator should take?
A. Administrator should request data owner approval to the user access
B. Administrator should request manager approval for the user access
C. Administrator should directly grant the access to the non-sensitive files
D. Administrator should assess the user access need and either grant or deny the access

Answers

Answer:

A

Explanation:

Although the administrator has a level of access above that of a user, he cannot automatically approve due the presence of Discretionary Access Control (DAC). Hence, the administrator should request data owner approval to the user access.

What are two ways Google Ads can fuel your business goals?
A. Reach more users by placing ads on all search engines.
B. Get more of the right people to visit your website.
C. Enable premium membership subscriptions.
D. Increase online, in-app, in-person, and over-the-phone sales.
E. Cap the number of ads you pay for, based on your business.

Answers

Answer:

B. Get more of the right people to visit your website.

D. Increase online, in-app, in-person, and over-the-phone sales.

Explanation:

Google ads or adsense is a google advertising platform for organisations or individuals with the intent to advertise their products and services on the internet on a wide range of websites, with a limited subscription of video content, product listing and installed application for web users advertising services.

It uses data analytics and search engine optimization to determine the right users to advertise the products to and also increase online and in-application advertisement, and in-person and over-the-phone sales and advertisement.

Which microphones are considered to have the best quality?
External
Headset
Internal
USB

Answers

Answer:

External Microphones

Explanation:

External Microphones provide smoother sound they are used in podcasts, studios, and radio stations.

Answer:

External.

Most internal and Headset mics are made of cheap microphones that are terrible quality. USB mics on the other time have a bad time responding.

Have a great day!

The term _____ distinguishes the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product.

Answers

Answer:

"It user" is the correct answer for the above question.

Explanation:

It users are the user who is generally using the computers and the It system for their work. But the It workers works is to install the service and to develop the service for the IT users.Hence anybody can say that there is a many difference between It user and the IT workers.The above question-statement also wants to states the same difference between the IT user and the It workers. So after putting the "it user" in the above question blanks the statement means the same. Hence "IT user" is the correct answer.
Final answer:

The term that distinguishes a person who uses technology from those who develop and support it is 'user'. Users interact with technology for practical purposes, whereas IT workers handle the technical aspects.

Explanation:

The term that distinguishes the person who uses a hardware or software product from the IT workers who develop, install, service, and support the product is user. Users are generally the individuals or organizations that utilize the technology for various purposes such as word processing, gaming, or accessing the internet. In contrast, IT workers include providers, hardware and software developers, and others who play key roles in web security, commerce, and communications. Users interact with the technology at a commonsense level, using devices and applications for specific tasks, whereas IT professionals work with the computer systems at a more technical or design level.

A user called to inform you that the laptop she purchased yesterday is malfunctioning and will not connect to her wireless network. You personally checked to verify that the wireless worked properly before the user left your office. The user states she rebooted the computer several times but the problem still persists. Which of the following is the first step you should take to assist the user in resolving this issue?

Answers

Answer:

You can perform the following two steps

Explanation:

Have the user press the appropriate function key combination to enable the wireless radio and then attempt to connect to the wireless network (since by mistake he could have disabled it).Ask the user to turn on the laptop’s airplane mode and attempt to reconnect to the wireless network (this mode basically what it does is disable adapters and activate it will connect the Wi-Fi network).

During class, your professor mentions an interesting article about Obama's networking in Iowa. From the Library homepage's list of Articles Indexes and Databases (Links to an external site.), find the Sociological Abstracts index and search it using these terms: presidential networking and Iowa to locate an article published in Feb 2010.

Subject terms are useful for finding similar articles on your topic. Which one of the following is a subject term used for this article? (Remember - if you are off-campus you may need to login to the index with your NetID).
internet T/F

Answers

Answer:

True.

Explanation:

At the time of attending the class, the professor discusses an informative article regarding Iowa's networking with Obama. From those in the collection of Publications Indexes and Databases (References to an external site) of it's Libraries webpage, identify and scan the Sociological Analyses index using such terms: Political networking and Iowa to identify an article in Feb 2010.

Thus, topic words are helpful to identify related articles on the topic for students. Internet is the reference used for this article.

Most of the international operations in a computer use hexadecimal numbering. True Or False

Answers

Final answer:

The statement is false; computers primarily use binary numbering for operations, with hexadecimal as a more human-friendly representation for particular applications like memory addressing or color coding.

Explanation:

The statement that most international operations in a computer use hexadecimal numbering is false. While hexadecimal is a number scheme that can be used to represent numbers in a more human-readable format than binary, computers ultimately operate using binary numbering. Hexadecimal is often used in computing for purposes such as memory addressing and color coding in web design because it's more compact and easier for humans to read than binary, but the computer's hardware and low-level software work directly with binary numbers.

Humans are more comfortable with decimal notation, while computers use binary notation due to the electronic states in computer chips being on or off. This binary system is the foundation of all computation, and even though computers can represent information in hexadecimal, they do so only for the convenience of programmers and users; the underlying operations and data processing are still conducted in binary.

Moreover, representations like IPv4 and IPv6 addresses do use numbers and letters to express the addresses in a format that's both compact and useful for humans. In particular, IPv6 addresses use hexadecimal notation to manage the vastly larger address space they offer compared to IPv4.

Therefore, while hexadecimal is a useful notation for certain aspects of computing, it is not accurate to say that most internal operations in computers use it. Instead, binary remains the basic language of computers.

A method or system of government for information management or control; an example is the Information Technology Infrastructure Library (ITIL) that we are using as a way to organize our course.
a) true
b) false

Answers

Answer:

The answer is A. True

Explanation:

Information governance is a framework or methodology of the government for information control and management.

ITIL (Information Technology Infrastructure Library) is an example of information governance, it was developed by the Central Computer and Telecommunications Agency (CCTA) of the British government. It has gone through various revisions and currently possesses five books, at first it contained more than 30 books.

Which statement about dialogues is NOT correct? Select one: A. Users should be able to control the direction of speed of dialogues. B. Dialogues may appear automatically. C. Dialogues need to provide relevant, context-specific information for tasks. D. Dialogues should change with each use by a single use

Answers

Answer:

Option B is not correct

Explanation:

Dialogues become problematic when they appear automatically because of high level incompatibility

The incorrect statement about dialogues is: B. Dialogues may appear automatically.

What is a dialogue system?

A dialogue system is also referred to as a conversational agent (CA) and it can be defined as a computer system that is typically designed and developed to converse with human beings. Also, a dialogue system makes use of textual information, graphics, speech, haptics, etc., on both its input and output channel.

Generally, all end users should be able to control the direction of speed of dialogues. However, dialogues shouldn't appear to end users automatically.

Read more on computer system here: brainly.com/question/959479

A newspaper wants to estimate the proportion of Americans who will vote for Candidate A. A random sample of 1000 voters is selected. Of the 1000 respondents, 526 say that they will vote for Candidate A. Which Excel function would be used to construct a confidence interval estimate?

Answers

Answer:

The correct answer to the following question will be "NORM.S.INV".

Explanation:

The NORM.IN.V function in Excel determines the opposite of the Cumulative Standard Distribution Function for just a value of x which is given, and the standard deviation and mean of the distribution provided. The probability of NORMINV(mean, probability, standard deviation).In Excel 2010, the standard. S. Inv function is new and is therefore not easily accessible in Excel's earlier versions.

Therefore, NORM.S.INV is the right answer.

To get a page from the Web, a user must type in a URL, which stands for: a. Unknown Resource Locator b. Unknown Router Location c. Uniform Router Location d. Uniform Resource Locator e. Uniform Resource Library

Answers

Answer:

Hey! The answer you're looking for is D. Uniform Resource Locator.

17. Consider a scenario in which you develop a C++ program on a computer that has a Pentium processor and compile the program into the corresponding machine language. What step should you take to run the same program on a computer that has a different processor?

Answers

Answer:

"There is need to compile the program again on a different processor." is the correct answer for the above scenerio.

Explanation:

The c++ program is a platform-dependent program because it is covered on a machine language directly and machine language programs are dependent programs. While in the case of java programming there is an object code that is converted from the class code and it is compatible with the other machine.The dependent program states the meaning that if a program is developed by the one machine then it can not be executed on the other machine The above question asked about the compiled c++ program that it can execute on another machine, which answer is no. if a user wants to execute the c++ program for the other processor then, he needs to compile the program again on the other machine.

Several company users are frequently forgetting passwords for their mobile devices and applications. Which of the following should the systems administrator do to reduce the number of help desk tickets submitted?A. Implement single sign-on.B. Enable multifactor authentication.C. Configure biometric authentication.D. Remove complex password requirements.

Answers

Answer:

Option A i.e., Implement single sign-on.

Explanation:

Many corporate users often forget credentials for various mobile phones and apps. Then, Implementing single sign-on is the sys admin which reduces the amount of ticket requested to that of the helpdesk.

SSO is perhaps a method of authorization which enables the user to control various software using single collection of login information. This is a simple procedure in companies, in which a company locates different resources for connected to a network of local region.

What type of system security malware allows for access to a computer, program, or service without authorization?

Answers

Answer:

"backdoor" is the correct answer for the above question

Explanation:

The backdoor is a type of attack which is done by the type of backdoor programs to remotely access the computers without the authorization of the user of the computer.It is inserted on the computer with the help of the internet and accessed the computer without using authorization techniques.The above question asked about the virus which is used to access the computer without the permission of the right use of the system. Hence the answer is backdoor which is defined above.

At the beginning of his​ webpage, Byron used​ a(n) __________ to provide readers with all the key points while skipping over the details. A. reference B. teaser C. narrative D. summary E. orientation

Answers

Answer:

Summary

Explanation:

The summary provides a short description of the particular relating website. A summary is that part of the record that consists of all key details.  it is considered a brief statement and or conclusion that consists if the all-important key point of writing. The main purpose of the summary is to include all that point that can provide an idea about the piece of writing.

Answer:

At the beginning of his​ webpage, Byron used​ a(n) summary to provide readers with all the key points while skipping over the details.

OPTION. D

_____ is a systems development technique that tests system concepts and provides an opportunity to examine input, output, and user interfaces before final decisions are made.
a. Modeling
b. Prototyping
c. Scrum
d. RAD

Answers

Answer:

Option b("Prototyping") is the correct answer for the above question.

Explanation:

Prototyping is a type of Model which follows the phases of SDLC and used to develop the software project.In this model only a copy of the software is developed and seen by the customer that the developer is developing the right thing or there may be any changes.The above question asked about the Model which is used to provide a copy of the software. That model is known as the Prototyping Model which is described above. Hence Oprion b (Prototyping) is the correct answer for the above while the other is not because:-Option 'a' states about Modeling which is not a model of SDLC.Option c states about Scrum, which does not provide the prototype to the customer.Option d states about RAD which is not the correct answer.

As you are talking to your colleague over the phone, the sound of an airplane flying low drowns out part of your conversation. Immediately after, your cell phone rings, again disturbing the flow of conversation. Both of these are instances of:

Answers

Answer:

Interference.

Explanation:

As the user is communicating with their friend through the mobile, most of their interaction is interrupted by the noise of an airplane flying at low hight. Instantly afterward, the user's mobile phone rang, disrupting the communication once more.  

So, according to the following scenario both of those are examples of interference.

Final answer:

The disruption of the conversation by an airplane and a cell phone ring are examples of physical noise, which includes environmental sounds that interfere with the ability to hear.

Explanation:

The scenario described, where the sound of an airplane flying low and the ringing of a cell phone disrupt a conversation, are instances of physical noise. Physical noise includes various environmental sounds that interfere with hearing.

Examples like construction noise, planes, or loud music nearby can make it difficult to catch what the speaker is saying. In crowded places, where the frequency content of sounds overlaps, masking can also occur, making it hard to hear less intense sounds.

Additionally, unexpected loud noises like a cell phone ringing can capture attention, often referred to as bottom-up attentional capture due to their environmental origin.

You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?

Answers

Answer:

The correct answer to the following question will be "CAPTCHA".

Explanation:

This CAPTCHA technology, an abbreviation for the Completely Automated Public Thought experiment to tell Humans and Computers system Apart.A CAPTCHA is typically a blurred image on a similarly warped or multi-colored backdrop, with a sequence of distorted characters.

Therefore, CAPTCHA is the right answer.

What feature in Excel automatically displays a list of field headings when you begin to create a structured reference?

Answers

Answer:

Formula Auto-Complete

Explanation:

To minimize typing and syntax errors, you can create and edit formulas with Formula Auto-Complete.

After you type an = (equal sign) and begin typing to start a formula, Excel displays a dynamic drop-down list of valid functions, arguments, defined names, table names, special item specifiers—including [ (open bracket),, (comma), : (colon)—and text string that match the letters you type. An argument is the cell references or values in a formula that contribute to the result. Each function uses function-specific arguments, which may include numeric values, text values, cell references, ranges of cells, and so on

A junior security analyst is working on a new ticketing system called ITCustomers. Now and is working in a new field within the tickets dealing with human mistakes as security incidents. A business executive, while traveling, was surfing a gambling site on his laptop at the airport and downloaded a virus that infected the company’s e-mail system. In filling out the ticket, the junior analyst selected "carelessness with laptops" as the human error. Was the junior analyst’s description of the human mistake on the ticket accurate? Why or why not?

Answers

Answer:

Junior analyst's description isn't right.

Explanation:

"carelessness with laptops" isn't the correct description for the mistake or error, and looks like some physical event occurred like laptop computer getting damaged, because of the error, rather than software virus infection.

A more accurate description would be "not being careful enough while surfing the internet and visiting websites".

Inputs to a quantitative model
a. are a trivial part of the problem solving process.
b. are uncertain for a stochastic model.
c. are uncontrollable for the decision variables.
d. must all be deterministic if the problem is to have a solution.

Answers

Answer:B. ARE UNCERTAIN FOR A STOCHASTIC MODEL.

Explanation:Stochastic model is a financial business model, often used by Business organisations to determine which financial decisions to make.

A stochastic model can also be described as a tool for evaluating the probability distributions of potential outcomes of certain events by giving room for random variation in one or more inputs per time. The random variation used in Stochastic model is usually relies on changes observed in historical data for a specific period of time using standard time-series techniques.

INPUT TO A QUANTITATIVE MODEL ARE UNCERTAIN FOR A STOCHASTIC MODEL.

Final answer:

In a quantitative model, inputs can be uncertain as in stochastic models, which is more reflective of real-world scenarios. Deterministic models require precise inputs to predict exact outcomes. The nature of inputs significantly influences the approach to interpreting and solving the model.

Explanation:

When considering inputs to a quantitative model, it's crucial to understand that not all inputs are deterministic; many models deal with uncertainties which is characteristic of stochastic models. Quantitative models in fields like business forecasting and statistics often approximate real-world phenomena and must take into account factors such as disturbances which are inputs that cannot be controlled. Therefore, each variable and how it's treated within the model greatly affects the approach and accuracy of the problem-solving process.

Deterministic models are used in cases where exact outcomes can be predicted from given inputs, such as the trajectory of a rocket or heat transfer calculations. These models rely on deterministic inputs for their precision and usefulness. Conversely, when dealing with stochastic models, inputs are uncertain, reflecting real-world unpredictability and the need for flexibility within the model.

Furthermore, input to these models does not have to be deterministic in order to solve a problem. Many models are designed to use 'placeholder' values that can be later specified by the user, allowing a model to be used in various scenarios with different input values.

An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True False

Answers

Answer:

The answer is True.

Explanation:

The enterprise DBMS can also be used with mobile DBMS.

Enterprise DMBS is the latest version of DBMS which is used in organizations and enterprises to handle a huge amount of Data.

Enterprise Database Management System is mainly designed to do large work simultaneously. It can handle multiple queries simultaneously.  

Multiple users (about 100-10,000 users) can access data at the same time and even they can manipulate simultaneously.

The features of Enterprise DBMS is to work efficiently, multi processing, fast, accurately, and handling huge burden of data.

Other Questions
The Foreign Corrupt Practices Act (FCPA) makes it illegal for US citizens to bribe high ranking foreign officials to get new business. A violation can have a criminal penalty that involves up to five years in prison. If Phil were to be found to be in violation of the FCPA, what standard of proof would be needed for a criminal conviction? A) Proof beyond a reasonable doubt. B) Clear and convincing evidence. C) Proof beyond all doubt. D) Pre-ponderance of the evidence. early American citizens the formation of the first police department 1.) You are a digital forensic examiner and have been asked to examine a hard drive for potential evidence. Give examples of how the hard drive (or the data on it) could be used as (or lead to the presentation of) all four types of evidence in court; testimonial, real, documentary, and demonstrative. If you do not believe one or more of the types of evidence would be included, explain why not. The measures of two angles in a triangle are 48 and 71. What is the measure of the third angle? Compounds A and B were detected in a mixture by TLC. Rf values for both compounds were calculated. Which of the following Rf values would show the smallest separation between compounds? 0.3 and 0.1 0.2 and 0.1 0.8 and 0.6 0.5 and 0.8 none of these choices Suppose we have a tank containing 1/2 lb of salt mixed in 1 gal of water. You pour salt into the tank at a rate of 2 lbs/min, and the well-stirred mixture leaves the tank at a rate in gal/min equal to the square of the current volume of water in the tank. How much salt is in the tank after 1 minute? Set up the initial value problem, and indicate what you are solving for. Locating dependable suppliers is part of the process? claire%20deposited%20$2,500%20into%20an%20account%20that%20accrues%20interest%20monthly.%20she%20made%20no%20additional%20deposits%20or%20withdrawals.%20after%202%20years,%20claire%20had%20$2,762.35%20in%20the%20account.%20what%20is%20the%20annual%20interest%20rate%20of%20the%20account?%20compound%20interest%20formula:%20t%20=%20years%20since%20initial%20deposit%20n%20=%20number%20of%20times%20compounded%20per%20year%20r%20=%20annual%20interest%20rate%20(as%20a%20decimal)%20p%20=%20initial%20(principal)%20investment%20v(t)%20=%20value%20of%20investment%20after%20t%20years%205%%2011%%2026%%2031%Check your spelling or try different keywordsRef A: 30CF20CCD29B40FCB21BC206F16E8CD0 Ref B: ATAEDGE1016 Ref C: 2020-02-06T21:47:16Z Who has the comparative advantage in producing wine and who has the comparative advantage in producing schnitzel? A. France has a comparative advantage producing wine and schnitzel. B. France has a comparative advantage producing schnitzel and Germany has a comparative advantage producing wine. C. Neither has a comparative advantage producing wine or schnitzel. D. Germany has a comparative advantage producing wine and schnitzel. E. France has a comparative advantage producing wine and Germany has a comparative advantage producing schnitzel Why had transportation made so few improvements?People and goods did not travel far.The new transportation was too expensive for the common man.The technology was not available.Transportation had improved in Europe but not America. HELP!!!! I think its C but I'm not sure!What does the fundamental theorem of algebra state about the equation 2x24x+16=0 ?A. The fundamental theorem of algebra tells you that the equation will have two complex roots since the degree of the polynomial is 2. The roots are x=1i72 .B. The fundamental theorem of algebra tells you that the equation will have two complex roots since the degree of the polynomial is 2. The roots are x=1i7 .C. The fundamental theorem of algebra tells you that the equation will have two complex roots since the leading coefficient of the equation is 2. The roots are x=1i72 .D. The fundamental theorem of algebra tells you that the equation will have two complex roots since the leading coefficient of the equation is 2. The roots are x=1i7 . In a certain furniture store, each week Nancy earns a salary of $240 plus 5% of the amount of her total sales that exceeds $800 for the week. If Nancy earned a total of $450 one week, what were her total sales that week ?A. $2,200B. $3,450C. $4,200D. $4,250E. $5,000 Sam can brew 5 gallons of root beer in an hour or he can make 4 pizzas in an hour. Ben can brew 7 gallons of root beer in an hour or he can make 5 pizzas in an hour.Who has an absolute advantage in making pizza? What is the slope of the line with the equation 0 = -15x + 6y Drugs that create feelings of calmness, reduce muscle tension, and lower sympathetic activity in the brain are called _____. Explain the concept of freezing point depression. What is happening between the solute and the solvent?\ When someone refuses treatment which of the following statements is NOT true They have given their consent for assistance.You wait for medical professionals to arrive to take over.You can call 911.You have asked their permission to help Marcy has $20 she wants to buy a book that is marked down 30% from its original price of $28. If the sales tax is 2.5 does she have enough money Choose the type of forecasting technique (survey, Delphi, averaging, seasonal, naive, trend, or associative) that would be most appropriate for predicting the following and give short explaination of why: a. Demand for Mothers Day greeting cards. b. Popularity of a new television series. c. Demand for vacations on the moon. d. The impact a price increase of 10 percent would have on sales of orange marmalade. e. Demand for toothpaste in a particular supermarket. William wants to obtain information from the Securities and Exchange Commission regarding the number of active cases related to insider trading. To request this information, he would need to fill which of the following with the SEC: