Write a method called fact that recursively calculates the factorial value of its single int parameter. The value returned by fact is a long ..

Answers

Answer 1

Answer:

The program to this question can be given as follows:

Program:

//class

public class factorial //defining class

{

//method fact

public static long fact(int x1) //defining method fact

{

//conditional statement

if (x1 <= 1) //if block checks parameter value less then equal to 1

{

return 1; //return value

}

else //else part

{

return (fact(x1 - 1) * (long) x1); //return factors using recursive function

}

}

//method main

public static void main(String[] args) //defining main method

{

long data=fact(5);//defining variable that holds function value

System.out.println("Factorial is: "+data); //print value

}

}

Output:

Factorial is: 120

Explanation:

In the above java program, a class is "factorial" is defined, inside the class, a static method "fact" is declared, that accepts an integer parameter that is "x1" and returns a long value, inside this method a conditional statement is used.

If the block it checks parameter value is less then equal to 1, if this condition is true, it will return 1 when this condition is not true. It will go in else part.In else part, it uses a recursive function to calculate factorial of a number and return its value.Then the main method is defined, inside this method a long variable "data" is defined, that call and holds fact function return value, and in the next line, the print function is used to print the data variable value.


Related Questions

Authorization is the process of granting rights to use an organization's IT assets, systems, applications, and data to a specific user. True or false?

Answers

Answer:

True

Explanation:

In computing context, authorization is a process that grant a specific user to use the computer resources that can include both hardware and software. In some cases, authorization is also granted to access private-owned data. Usually, the authorization is implemented by having a user to entry username and password in order to log into a system to use the resources.

There might also be different level of authorization. Each specific user has different privileged level to use the resources. For example, a staff from finance department can access the corporate financial information but the same info is not available to  other department staffs

Answer:

True

Explanation:

Usually preceded by authentication (which means confirming the identity of a user), authorization is the process of granting access level rights to a user to use an organization's resources such as IT assets, systems, applications, and files.

By access level rights, we mean that depending on the level of authority of the user, they can access certain resources. For example, a mere user (or a regular staff) in an organization, might not have some administrative privileges such as editing files which might be given to other users who are admins. In other words, authorization also means controlling what users access what resources.

Jason is using TCPdump to capture traffic on his network. He would like to review a capture log gathered previously. What command can Jason use?

Answers

Answer:

tcpdump -r capture.log

Explanation:

Based on the information provided within the question it can be said that the command that will allow Jason to do this would be the following : tcpdump -r capture.log . This command (like mentioned in the question) will allow provide Jason with previously captured network traffic logs in order for him to be able to thoroughly review those logs.

What is a function parameter?

A. A measure of the distance between a function’s conception and implementation.
B. A way to give input to a function that controls how the function runs.
C. A collection of commands that can be used in a programming language.
D. Another name for the purpose of a program.
E. A named memory location.

Answers

Answer:

option B

Explanation:

In computer science, the function parameters are used to give input to the function that is processed and produced result.

Write the function prototype for a function called showSquare. The function should have a single parameter variable of the int data type and a return type of void.

Answers

Answer:

void showSquare(int param){

}

Explanation:

In C++ programing language, this is how a function prototype is defined.

The function's return type (In this case Void)

The function's name (showSquare in this case)

The function's argument list (A single integer parameter in this case)

In the open and closing braces following we can define the function's before for example we may want the function to display the square of the integer parameter; then a complete program to accomplish this in C++ will go like this:

#include <iostream>

using namespace std;

void showSquare(int param);

int main()

{

   showSquare(5);

   return 0;

}

void showSquare(int param){

int square = param*param;

cout<<"The Square of the number is:"<<endl;

cout<<square;

}

The biggest change affecting computer security that has occurred over the last 30 years has been the transformation of the computing environment from a highly interconnected network of smaller systems to large mainframes.

Answers

Answer:

False

Explanation:

The change that occurred to computing over the last 30 years was the shift from large mainframes to the highly interconnected networks of smaller systems. Users in time past need to be in a fixed location to be able to use the computer, but over the years size of computers were reduced significantly to very portable devices sharing resources over the internet and can have access to a work server fro any location.

As you develop a Java program, you can use an IDE to Select one:
a. enter and edit the source code
b. compile the source code
c. run the application
d. all of the above
e. both B and C

Answers

Answer:

D) All of the above

Explanation:

An IDE refers to an Integrated Development Environment it is a software that allows a programmer to easily write and edit code, compile and run his/her application. One of the features of IDEs that makes a programmers job easier is syntax highlighting and automatic code completion.

popular Java IDEs that run on different operating systems platforms are are

Eclipes, Netbeans, IntellijIDEA, BlueJ, Jbuilder etc.

Answer:

(d) all of the above

Explanation:

An IDE (Integrated Development Environment) is basically a software application that allows programmers write and edit codes with so much ease.

IDEs have in them some special features that make code writing and software development an easy experience. Some of these features are;

i. Intellisense for automatic code completion and suggestion.

ii. build automation tools for building, compiling, running and even packaging application source codes.

iii. unit testing.

Examples of IDEs are Netbeans, Eclipse, IntelliJ and Notepad++

The design strategy that starts with a global view of the entire problem and breaks the problem down into smaller, more manageable subproblems is known as what type of design?

Answers

Answer:

Top down design

Explanation:

Top-down design is an approach that is used to break down the problem into the smaller subpart so that it can be manageable into more clear form.

C programming is the example of a top-down approach while C++ is the example of the bottom-up approach.

The advantages of the top-down design approach are:

1) easy to manage

2) easy to find the error

3) easy to debug

1. Explain the distinction between interpretation and compilation. What are the comparative advantages and disadvantages of the two approaches?

12. Is Java compiled or interpreted (or both)? How do you know?
13. What is the difference between a compiler and a preprocessor?
14. What was the intermediate form employed by the original AT&T C++ compiler?
15. What is P-code? 16. What is bootstrapping? 17. What is a just-in-time compiler?
18. Name two languages in which a program can write new pieces of itself "on the fly."
19. Briefly describe three "unconventional" compilers—compilers whose purpose is not to prepare a high-level program for execution on a microprocessor.
20. List six kinds of tools that commonly support the work of a compiler within a larger programming environment.
21. Explain how an IDE differs from a collection of command-line tools.

Answers

Answer:

11: Compiler translates a high level source program into a target equivalent (machine language).

An interpreter implements a virtual machine, the high-level programming language of which is the "machine language." The interpreter reads statements more or less one at a time in that language, and executes them as they go along.

12: One could also consider Java either. A compiler (complicated translator) can create code, which is then executed by a complicated virtual machine (interpreter)

13: A preprocessor is an initial translator which removes comments and white space, and group characters together into tokens such as keywords, identifiers, numbers, and symbols, as well as simple syntactic structure analyses. A compiler uses in-depth analysis and nontrivial transformation.

14: C++ implementations based on the early AT&T compiler created an intermediate program in C rather than assembly language

15: Stack-based language, similar to modern Java compiler byte code

16: A method in which a simple interpreter implementation evolves into building more complex versions until the compiler is built.

17: A compiler which translates byte code into machine language immediately prior to each program execution.

18: Lisp and Prolog

19: TEX and TROFF are one of such compilers that translate high-level document descriptions into laser printer or phototypesetter commands. Query language processors for database systems are also compilers that translate languages such as SQL into primitive file operations.

21: without havin to call multiple tools with command-line tools, You can write an entire program in an IDE.

An engineer plans to connect three switches (SW1, SW2, and SW3) in a lab. Before connecting the switches, he starts by configuring all three switches as VTP servers, with matching CTP domain name and password. He then configures some VLANs on each switch so that switch SW3 has a revision number of 10, switch SW2 has a revision number of 6, and switch SW1 has a revision number of 8. Only then does he engineer connect the switches with trunks: first SW1 to SW2, then SW2 to SW3, and then SW3 to SW1. Switch SW1 is elected the STP root switch in VLAN 1. Which answer most accurately states which VLAN configuration database is used, and why?

Answers

Answer:

c. All use SW3's database because SW3 has the highest revision number.

Explanation:

In this particular configuration, the three switches will definitely be connected to one another by the presence of some path with the specific trunks. As a result, the database with the most revision number will ultimately win. The process of the STP election does not have any influence on the selection of the VTP.

Assume that inputFile references a Scanner object that was used to open a file. Which of the following while loops is the correct way to read data from the file until the end of the file is reached?

Answers

Answer:

while(inputFile.hasNext()) { //some code here  }

Explanation:

Even though you did not provide the options, here is how it should look like.

It is known in the question that there is an object called inputFile. To be able to read all the data from a file in Java, you need to use hasNext() function with the object. inputFile.hasNext() enables you to read the data in a file.

while(inputFile.hasNext()) {   } enables you to loop through the file while it has something to read in a file.

Which of the following examples that CANNOT demonstrate that technology applications enhance the delivery of the services while reducing the labor burden?

Answers

Answer:

Many of the guest amenities found in hotel rooms today are technology-based such as Internet access (WiFi), entertainment, climate control, cell phone charging, business and guest services, in-room checkout, minibars (e.g., eTrays that monitor snack consumption), and minisafes

Explanation: The guest amenities in hotel rooms are actually not helping to reduce the labor burden, because it does not require a huge or large number of labor to manage it. most persons lodging in the hotels are computer literates and have the capacity to manage or connect to internet facilities like WIFI etc. Turning on the AC,Charging of cell phones other services listed are not labor intensive.

Refer to the exhibit. The switch does the routing for the hosts that connect to VLAN 5. If the PC accesses a web server from the Internet, at what point will a VLAN number be added to the frame?

Answers

Answer:

no VLAN number is added to the frame in this design.

Explanation:

As can be seen in the exhibit shown in the picture below it can be said that the in this scenario no VLAN number is added to the frame in this design. Usually in many scenarios the switch or router is in charge of applying a VLAN number, which is a number between 0 and 4095, to every port that has a connection to the switch or router.

You are a domain administrator for a large, multi-domain network. There are approximately 2500 computers in your domain. Organizational Units (OUs) have been created for each department. Group Policy objects (GPOs) are linked to each OU to configure department-wide user and computer settings.While you were on vacation, another 20 computers were added to the network. The computers appear to be functioning correctly with one exception: the computers do not seem to have the necessary GPO settings applied.What should you do?

Answers

Answer:

move the computer accounts from their current location to the correct Organizational Units (OU's)

Explanation:

Based on the information provided within the question it can be said that in this scenario the best thing to do would be to move the computer accounts from their current location to the correct Organizational Units (OU's). This would keep things organized and have each computer account in the unit that they belong with the correct access and privileges that they need.

When working with arrays, most programming languages perform ________, which means they do not allow programs to use invalid subscripts. Group of answer choices

1. buffer overrun protection
2. None of these
3. bitwise data execution
4. array bounds checking subscript binding

Answers

Final answer:

In array operations, most programming languages use array bounds checking to prevent the use of invalid subscripts, ensuring memory safety.

Explanation:

When working with arrays, most programming languages perform array bounds checking, which means they do not allow programs to use invalid subscripts. The correct answer is option 4. Array bounds checking is a safety feature in many programming languages that prevents programs from accessing memory locations outside of the allocated array space.

This is important to prevent errors and potential vulnerabilities like buffer overruns, where an attacker could manipulate the program to execute arbitrary code by overwriting parts of the memory.

What can be controlled through IoT? Choose four answers.
Desktops
Door locks
Laptops
Light switches
Security cameras
Thermostat

Answers

Answer:

Door locks

Light switches

Security cameras

Thermostat

Explanation:

IoT is internet of things that means network of different things that are interconnected through internet and make the decision with the help of Electronic sensors. The sensor sense the data from environment at different times and send this to the cloud (that may be the server). On the basis of this data different devices such as door looks, light switches, security cameras and thermostat take decisions with the help of controllers and change their current state.

For Example

In case of door look, there may be sensor that is sensing the finger prints of the user and after recognizing the person the door will be unlock. If unauthenticated user will try to open the lock a message has been sent to concerned. The training data of the the authorized persons is saved on the cloud, whenever someone tries to access, the data from sensor and cloud send to controller for making comparison and decision. So we can say that Door lock can be controlled IoT.

In case of light switches, there are few sensor available to sense the intensity of life. Different training values of that sensors are stored on the cloud. Whenever these sensors sense the light intensity, they send the data to the cloud contentiously, whenever the data match with darkness intensity, a signal has been send from controller to the switch to ON the lights.

Same as in cameras and Thermostat both are sending data to the cloud and controller. With the help of different image processing techniques and sensor camera will take the decision related to face recognition. Thermostat devices are also on and off by variation of temperature.

What computer is designed to meet the computing needs of several people simultaneously in a small to medium-size business environment?

Answers

Answer: Mini computer or mid-range computer

Explanation:

Mini-computer are the computers that is used for purpose of serving engineering,business and scientific processing.It provides storage, processing,DBMS(database management system), handling and management of files and data etc.

Mini-computers are also known as mid-range computer.Example-IBM Power System.These computers are usually used for server processing from small to medium sized fields.This range of computer is between mainframe and microcomputer.

Which feature of SQL Server 2012 provides a failover environment consisting of a group of primary user databases with up to four replicas?

Answers

Answer:

(always on) availability group

Explanation:

Availability group of SQL server 2012 provides replicated alternatives for multiple databases.

In case of a disaster situation, this feature recovers the system by using replicated environments.

This feature is an alternative solution to database mirroring

Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values. Sample Run Enter Temperature: 27.6 Enter Temperature: 29.5 Enter Temperature: 35 Enter Temperature: 45.5 Enter Temperature: 54 Enter Temperature: 64.4 Enter Temperature: 69 Enter Temperature: 68 Enter Temperature: 61.3 Enter Temperature: 50 Sum = 504.3

Answers

Answer:

#include <iostream>

#include <conio.h>

using namespace std;

main()

{

float temp[10], sum;

sum=0;

for (int i=1 ; i<= 10; i++)

{

cout<<"Enter the temperature in Decimal for temp"<<i<<"=";

cin>>temp[i];

}

for (int j=1 ; j<=10 ; j++)

{

sum = sum+temp[i];

}

cout<< "/nThe Total Temperature ="<<sum;

getch();

}

Explanation:

In this program we can take values of temperature in decimal values by taking the data type of temp variable as float. Array is used to enter the ten temperature values. Sum variable is used to add all the values.

The code example provided is a Python program that prompts the user to enter ten temperatures, validates the input as decimal values, accumulates the sum, and then prints out the total sum.

To write a program that asks the user to enter ten temperatures and then finds the sum, you would need a loop that runs ten times, prompting the user to input a temperature on each iteration. The program should allow for decimal values to be entered. Below is an example of how this can be implemented in Python:

sum_temperatures = 0
for i in range(10):
   while True:
       try:
           temp = float(input('Enter Temperature: '))
           sum_temperatures += temp
           break
       except ValueError:
           print('Please enter a valid temperature.')

Consider the following code snippet: public class Motorcycle extends Vehicle { private String model; . . . public Motorcycle(int numberAxles, String modelName) { model = modelName; super(numberAxles); } } What does this code do?

Answers

Answer:

The answer is "The code will not be compiled".

Explanation:

Description of the given code as follows:

In the given code, the class "Motorcycle" is defined, which inherits the above class that is "Vehicle". Inside Motorcycle class a private string variable "model" is declared. In the next line, the parameterized constructor "Motorcycle" is defined, that accepts two different parameters, which is "integer and string", inside the constructor string variable model used to hold parameter "modelName" value, and use the super keyword to call above class variable "numberAxies", which is not defined in this code, that's why the code is not compiled.

The __________ supports the primary system components (such as the CPU and RAM) necessary for all digital electronics devices such as 1. desktop PCs2. notebook PCs3. mobile phones4. iPads4. servers

Answers

Answer:

Computer System unit.

Explanation:

The computer system unit holds all the other components together and protect them outside elements. The components include motherboard, CPU, hard drive, RAM, video card and power supply.

With more and more users using mobile to look at websites, it is key that you optimise your site so users can find it when searching online. Which two elements should you look to optimise for improved SEO performance?

Answers

Answer:

Site speed and usability.

Explanation:

Web pages are developed using web development tools like HTML, CSS, JavaScript etc. A collection of these web pages are called a website. The web is a hosted for internet use in a web server.

All requests for a website in a web server is done in a web browser in a client device. For a website to be easy searched for , the search engine optimisation technique is used.

A hosted website on a server must have a unique and usable domain name and the page loading on a browser should be made faster by optimising the size of the scripting language.

The IMA standard that includes disclosing all relevant information that could reasonably be expected to influence an intended user’s understanding of the reports, analyses, or recommendations is ________.

Answers

Answer:

Credibility.

Explanation:

The IMA or institute of management and accounting is one of the largest and most respected group or association of accountants and other financial professionals in the business industry, with the collaborative intent to advance and promote the management and accounting profession.

All members of the association obligatorily adhere to four principles. They are, honesty, fairness, objectivity and responsibility. And they also follow four IMA standards, which are credibility, competence, integrity and confidentiality.

The credibility standard includes disclosing all relevant information that could reasonably be expected to influence an intended user's understanding of the reports, analyses or recommendation.

Final answer:

The IMA standard requiring disclosure of all relevant information for understanding reports, analyses, or recommendations is grounded in the principle of transparency. This encompasses the clear presentation of data and an easily understandable format, adhering to the ISO 9000 Management Categories for quality and continuous improvement.

Explanation:

The IMA standard that includes disclosing all relevant information that could reasonably be expected to influence an intended user’s understanding of the reports, analyses, or recommendations is transparency. Ensuring transparency involves the presentation of monitoring results and data in such a manner that stakeholders can fully comprehend the scope, methodology, biases, and limitations of the research. It is important to consider not only the content but also the format to make sure that the information is accessible and easily understandable.

According to the ISO 9000 Management Categories, part of this transparency involves clear communication and documentation that reveal what the organization planned to do, what it actually did, and the continuous improvement practices that are in place. This principle of transparency is vital to ensure that data, conclusions, and recommendations are fully understood by all stakeholders.

A programming language that captures only the most primitive operations available to a machine. Anything that a computer can do can be represented with combinations of low level commands.
a) true
b) false

Answers

Answer:

A. True.

Explanation:

Programming languages are computer based languages used to pass instructions or task that can be interpreted to machine language, which can be understood by the computer system. Low level programming language and high level programming language are the two categories of program languages.

Low level languages use low level commands. They use processor instruction sets and primitive opcodes for their instruction syntax. Example of a low level language is Assembly language.

High level languages are English based and more complex in its compilation.

Which key or key sequence pressed during the boot process will allow a user to start a Windows PC using the last known good configuration?

Answers

Answer:

F8

Explanation:

In Windows PC (e.g Windows 7), Last Known Good Configuration, is an option that helps users to start up their PC if it doesn't start normally. This option is only accessible at boot process by using the keyboard (mouse will not work at this point). So to access this option, the F8 key is pressed repeatedly or held down. This will display some start up menus where the user can use the arrow keys to access the option.

Disk Defragmenter eliminates unnecessary file fragments and rearranges files and unused disk space to optimize computer operations. This is an example of which type of program?

Answers

Answer:

Windows utility program.

Explanation:

The operating system is a software used to manage the activities of various parts of the computer system. It acts as a link between the hardware, application software and the user. An example of OS is the Windows OS.

It has the kernel program that directly connects the hardware to the operating system. It provides utility programs to analyse, optimise, control and maintain devices running in the system.

Window utility program is an example of utilities in OS, used to analyse, control, optimise and maintain device and software activities for good system performance.

An example of the windows utility program is the disk defragmenter used to eliminate fragments and rearrange files and unused disk space.

Explain one challenge raised by Vint Cerf in? ""The Internet is for Everyone - but it won’t be if…."" and give one example of it that you know about.

Answers

Answer:

Vint Cerf suggests that the internet is for everyone, but if it's limited and government censors entry, it won't be. Examples include countries that lack freedom such as China, because the government limits internet usage for their residents.

___________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to find pages that might not have the exact words they searched for.

Answers

Answer:

RankBrain

Explanation:

RankBrain is a machine learning-based search engine algorithm, the use of which was confirmed by Google on 26 October 2015. It helps Google to process search results and provide more relevant search results for users.

Final answer:

RankBrain is Goog.le's AI system that helps interpret user searches for more effective results, considering factors like paid ads, popularity, and web connectivity. Search engine rankings are not based solely on content accuracy, so users should use approaches like SIFT to evaluate the credibility of information found online.

Explanation:

RankBrain is Goog.le’s machine-learning artificial intelligence system that interprets people’s searches to find pages that might not have the exact words they searched for. When using search engines like Goog.le, it's important to understand that results are not solely ranked based on authority, accuracy, or relevance. Instead, factors such as paid advertisements, popularity, and web interconnectivity can influence the visibility of web pages in search results.

As a result, it is possible for websites disseminating misinformation to manipulate search engine optimization (SEO) tools to boost their ranking in the search results. Therefore, users should exercise critical judgment and employ the SIFT method, which stands for the four moves of student fact-checkers, to assess the credibility of the sources they find online.

An intranet is a network based on Web technologies that allows selected outsiders, such as business partners and customers, to access authorized resources of a company’s extranet.
(A) True
(B) False

Answers

Answer:

(A) True

Explanation:

Intranet is a network accessible only for the authorized users. For example, an organization intranet is accessible only for the organization members and same authorized non-members (business partners)

Intranet has a restricted network via special network protocols.

Final answer:

The statement is (B) False. An intranet is a private network that is not accessible by outsiders, while an extranet allows limited access to selected outsiders.

Explanation:

The statement is (B) False.

An intranet is a private network that uses Internet technologies to provide access to authorized users within a specific organization. It is not accessible by outsiders such as business partners and customers.

Extranet is a separate network that allows selected outsiders to access certain resources of a company. It can be considered an extension of the company's intranet, but with limited access given to external parties.

Brenda's meeting with the web developer of her retail website concerning the integration of conversion tracking using Google Ads. The web developer needs to set up conversion tracking tags. What's required to accomplish this?
A) A sitewide tag must be added for each conversion action.
B) The required code snippets must be inserted within an inline frame.
C) Conversion tracking tags must use HTML5 for all site pages.
D) Auto-tagging must be turned on in all of her Google Ads.

Answers

The web developer needs to have Brenda's Auto-tagging turned on in all of her Google Ads.

Explanation:

Auto-tagging features when turned on are able to track conversions on your website. Auto–tagging when combined with conversion tracking using Google Ads helps you see how effective your ad clicks are from potential customers. If Brenda’s auto-tagging is enabled, a Google Click Identifier will be registered and stored in what developers call Google Analytics. Brenda will then be able to go to Google Analytics and see customer clicks for website’s purchases, downloads, and more. By default, auto-tagging is turned. To turn it on, the web developer needs to

Sign into Brenda's Google ad account

Click settings in the left pane and select account settings

The web developer would then be able to enable auto-tagging and save the settings.

Learn more about Google Analytics and its connection to conversion tracking

https://brainly.com/question/13234037

https://brainly.com/question/14280673

#LearnWithBrainly

Clicking a _____ name opens a drop-down list of commands and options. Select one: a. menu b. status bar c. ribbon d. toolbar

Answers

Answer:

menu

Explanation:

https://quizlet.com/231958668/windows-chapter-1-concepts-exam-flash-cards/

Final answer:

Clicking a menu name opens a drop-down list of commands and options in many software applications, where users can choose from various actions.

Explanation:

Clicking a menu name opens a drop-down list of commands and options. This characteristic is common in many software applications where a menu is a graphical control element that bears a list of options that a user can choose from to perform certain actions.

Menus are typically found across the top of the screen or window and contain items such as File, Edit, View, and Help. Different types of menus, such as context menus, appear upon interacting with elements within the software, displaying relevant options for that context.

The examples provided such as 'Menu: Actions... Colors... green' indicates a hierarchical menu structure where 'Actions' is a menu, and 'Colors' is a sub-menu with 'green' as one of the selectable options.

Other Questions
A food label must include five primary components: Statement of identity, the quantity of the food product, list of the ingredients, taste and flavor of the food product, and the nutrition facts 1)A statement of identity2)Net contents of the package3)Ingredient list4)Manufacturer's name and address5)Nutrition information (Nutrition Facts Panel) Which of the following will NOT cause the supply curve for kayaks to shift to the left? 8. Water flows out of a hose at a constant rate. After 2 minutes, 97 gallons of water have comese. At what rate, in gallons per minute, is water flowing out of the hose? Hardy is packing his book collection into a box. Each book measures 4inches by 6 inches by 1 inch. The box he uses measures 24 in by 24in by 8in. If Hardy fills the box completely, what is the greatest number of books that fit into the box?If Hardy fills the box completely with the least number of layers, there will be (blank) books on the bottom layer.To fill the box completely, Hardy places 8 layers of books in the box. There are (blank) books in each layer. Thank you in advance for the help! Just a mom who hates math trying to help her kid with volume. 2-41 The time to complete a construction project is normally distributed with a mean of 60 weeks and a standard deviation of 4 weeks. What is the probability the project will be finished in 62 weeks or less? 62-60/4=2/4=0.5=69146 What is the probability the project will be finished in 66 weeks or less? 66-60/4=6/4=1.5 What is the probability the project will take longer than 65 weeks? Assessing opportunity cost involves...making choices and dealing with consequences.choosing consequences over rewards.reviewing past decisions and changing them.minimizing profit and loss. When we study the effects of chronic stress on human health, most of our chronic stress is imaginary, meaning, it's made up by our imagination and conscious thought, created by the Frontal lobe. Discuss, why frogs and lizards cannot experience chronic stress like that? Troy works for a construction company. He takes a test that contains such questions as following:1. I enjoy working with the new project manager.Strongly disagree 1 2 3 4 5 6 Strongly agree2. I am able to communicate well with the new project manager.Strongly disagree 1 2 3 4 5 6 Strongly agreeThis test is an example of a(n) ______ measure. What is the answer to 2(4x-3)-8= 4+2x Henry fords philosophy was to perfect the model-t so that its cost could be reduced further for increased consumer affordability. this most likely reflects the ________. A researcher is interested in examining how the relationship between introversion and work-related outcomes differs across Asian countries, as well as across European countries. What two subfields of psychology is the researcher incorporating in her study? Shulte chose several areas in the lower Chesapeake Bay as his experimental sites. At each site, he constructed artificial reefs of two different heights. He also left portions of each site unrestored to serve as points of comparison. Oysters were allowed to colonize the reefs and the unrestored bay bottom safe from harvesting. His hypothesis was that oysters would survive better in the plankton-rich upper waters away from the smothering sediments and hypoxic waters of the bay bottom.A) Reef type is the independent variable.B) Adult oyster density is a dependent variable.C) Spat density is a dependent variable.D) High-relief and low-relief reefs are treatments. What is the area of a square with a perimeter of 12 feet? Beach ball with diameter of 24 inches what is the volume of air in the beach ball to the nearest of a cubic foot? Refer to the section in the Background titled, "Standard Tests Gaseous Products." Use a flaming splint and a glowing splint to identify the gas above the liquid in the cup. Write the name and formula of the gas in the space provided Manuel, a supervisor, is known by his managers to be sharp in his decisions and has a good track record of meeting his goals. Manuel is a(n) ____ manager. What is (6 x 10^2) divide (3x10^-5) in standard form?Thank you. General Revelation, also known as Natural Revelation, is available to all and does not require a special event or special individual to receive that revelation. divide the difference between one thousand three hundred and nine hundred fifty by 4 Which word from list 3 Best completes the following analogyobserve : fireworks :: consume : _______A. banquetB. holidayC. applaudD. graduation Steam Workshop Downloader