1. If you were making a sports game, should you include a mode where the computer can play against itself? If so, why? If not, why not?

Answers

Answer 1

Answer:

I say not

Explanation:

because it's pretty not smart to have the computer going against itself


Related Questions

Are the copper tape and aluminum foil switches analog or digital devices? How do you know?

Answers

In a digital sensor, you may use a microbit or a switch analog of copper tape or aluminum foil.

What are digital sensor?

Digital sensor are defined as a sensor that is electronic or electrochemical that uses digital data processing and data transmission. The contemporary replacements for analog sensors are digital sensors.

Switch analog are defined as a piece of technology that selectively allows or disallows signal levels to pass from the input to the output. A sine-wave signal, for example, can be conducted by an analog switch in either direction.

Thus, in a digital sensor, you may use a microbit or a switch analog of copper tape or aluminum foil.

To learn more about digital sensor, refer to the link below:

https://brainly.com/question/3979742

#SPJ1

application programming interfaces, or apis, are sets of that query databases for specific information a.) methods b.) programs c.) sources d.) sql

Answers

API (Application Programming Interfaces) is a program that are sets of that query databases for specific information.

What is an API (Application programming interface)?

An application programming interface, or API, allows businesses to expose the data and functionality of their applications to third-party developers and business partners, as well as departments within their own organizations.

Through a documented interface, this allows services and products to communicate with one another and leverage one another's data and functionality.

Programmers aren't required to understand how an API works; they simply use the interface to communicate with other products and services. API usage has skyrocketed in the last decade, to the point where many of today's most popular web applications would be impossible to create without them.

Why we need APIs -

Improved collaborationEasier innovationData monetizationAdded security

To learn more about API, visit: https://brainly.com/question/12987441

#SPJ1

is a technique that engineers use to designate common elements across web pages to dynamically load only specific sections of pages, saving time and bandwidth. a.) ajax b.) mosaic c.) netscape d.) java

Answers

Dividing up visual content into sections like paragraphs and headings. APIs that are not included by default with your web browser and must be consciously integrated.

JavaScript and SQL are the most often used languages among web developers, according to their research, stated the developers. Other well-known programming languages include Java. C# A dynamic computer programming language is called Javascript. Its implementations enable client-side script to interact with users and create dynamic pages, and it is most frequently used as a component of web pages. It is an object-oriented programming language that may be interpreted. Data can be "displayed" via JavaScript in a variety of ways: using innerHTML to write into an HTML element. Using document, writing into the HTML output. ). Using window.alert() to write to an alert box.

Learn more about programming here-

https://brainly.com/question/11023419

#SPJ4

describe how to perform a removal from a hash table that uses linear probing to resolve collisions where we do not use a special marker to represent deleted elements. that is, we must rearrange the contents so it appears that the removed entry was never inserted in the first place.

Answers

We follow the following steps, to perform a removal from a hash table that uses linear probing to resolve collisions where we do not use a special marker to represent deleted elements. that is, we must rearrange the contents so it appears that the removed entry was never inserted in the first place:

Find and remove the desired elementGo to the next bucketIf the bucket is empty, quitIf the bucket is full, delete the element in that bucket and re-add it to the hash table using the normal means. The item must be removed before re-adding because it is likely that the item could be added back into its original spot.Repeat step 2.

This technique keeps your table tidy at the expense of slightly slower deletions.

What is linear probing?

In computer programming, linear probing is a technique for dealing with collisions in hash tables, which are data structures for storing a variety of key-value combinations and locating the value corresponding to a particular key. When a collision happens in linear probing, we continue probing until an empty. Although linear probing is simple to compute, clustering is its biggest drawback. It takes time to look for an element or to find an empty bucket since it creates numerous consecutive items that clump together.

To learn more about linear probing, use the given link
https://brainly.com/question/17238698
#SPJ4

consider a disk with a sector size of 512 bytes, 2,000 tracks per surface, 50 sectors per track, and five double-sided platters. what is the capacity of a track in bytes?

Answers

The capacity of a track in bytes is (25 k , 50000 k).

What is capacity of a track?The permitted load at which a bearing's outer ring and its mating surface can tolerate continuous use over an extended length of time is known as the track load capacity.The hard drive's overall megabyte capacity is determined as follows: Megabytes are equal to (512 * cylinders * heads * sectors-per-track) / (1024 * 1024). The reason behind the number 512 is that most hard disks have 512 bytes per sector.Because a block size cannot be greater than a track's size, which is 25600 bytes, 51200 is not a legal block size in this situation.

To learn more about capacity of a track refer to:

https://brainly.com/question/4541859

#SPJ4

which statement best describes how vpc routers and firewalls work? they are managed by in virtual machines and customers cannot modify them. they are managed by as a built-in feature

Answers

The phrase "they are managed by as a built-in feature" best captures how virtual private network routers and firewalls operate.

What is vpn and firewall?For packets going to and from VM instances, both VPC firewall rules and hierarchical firewall policies are in effect. Even when traffic is only moving between VMs within the same VPC network, these types of firewalls nonetheless regulate it.Based on a configuration you define, VPC firewall rules enable you accept or restrict connections from or to the virtual machine (VM) instances. Regardless of its configuration or operating system, instances are always protected by enabled VPC firewall rules, even if they have not yet started up.In your VPC, you employ a firewall for each Availability Zone. You select a subnet to house a firewall endpoint which filters your traffic for each Availability Zone.

To learn more about vpn firewall refer to :

https://brainly.com/question/28002218

#SPJ4

you have a dvd-rom disc with no label, and you want to know if it has any important files on it. you insert the dvd-rom into your optical media drive, then you double-click the drive letter for the optical drive to see the contents of the disc. if the dvd-rom is not a valid disc, which error message will you see?

Answers

When you have a DVD-ROM disc with no label, and you want to know if it has any important files on it and after you insert the DVD-ROM into your optical media drive, then you double-click the drive letter for the optical drive to see the contents of the disc and if he DVD-ROM is not a valid disc, it will display the error message "no media".

What is an error message?

When an unexpected issue arises, information is shown in the form of an error message, typically on a computer or other device. Error message is frequently shown using dialog boxes on contemporary operating systems with graphical user interfaces. An error message is, to put it simply, a message that is delivered to the user by an operating system or program whenever an unexpected circumstance occurs. Error message is necessary to pass crucial cautions or when user intervention is required.

To learn more about error messages, use the link given
https://brainly.com/question/28501392
#SPJ4

what are the common disadvantages/issues with locks created through interrupt disabling/enabling mechanism? mark all correct answers.

Answers

According to the system. Disabling interrupts is preferable in some real-time processes, but the interval during which they are deactivated MUST be brief enough to prevent problems.

It would respond in 50 microseconds, whereas using an interrupt would take more over 100. I used it once to handle a somewhat messy device (saving and restoring registers and such). Consequently, a loop without interruptions and with a countdown timer. The device was tagged as "offline" and interruptions were enabled again if the countdown limit was reached. Interrupts were re-enabled if the device responded. Thus, interrupt blocking was quicker and took a manageable amount of time so that other devices weren't starved.

Learn more about devices here-

https://brainly.com/question/11599959

#SPJ4

which of the following environments utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build? a. production b. test c. staging

Answers

The environments that utilizes dummy data and is most likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build is option b. test.

Why is a test environment necessary?

Before delivering the program to the user, the testing teams examine its effectiveness and quality in the test environment. It can test a particular section of an application using various data setups and configurations. It is a crucial component of the agile development process.

In a QA environment, intended users can test the finished Waveset application while your upgrade procedure is tested against data, hardware, and software that closely resembles the Production environment.

Therefore, The testing teams evaluate the application's or program's quality in a test environment. This enables computer programmers to find and correct any issues that might affect how well the application functions or the user experience.

Learn more about test environments from

https://brainly.com/question/21902774
#SPJ1

a layer 2 device whose primary purpose is to create a point-to-point connection between one of its input ports and one of its output ports is called a .

Answers

A device that follows the Layer 2 data communications protocol is known as a Layer 2 switch. A multiport bridge is another name for a layer 2 switch.

How does a Layer 2 switch operate?Bridges are comparable to layer 2 switches. They serve as bridges, constructing tables for the transfer of frames between networks at layer 2, where they most frequently connect networks at the MAC sublayer. Layer 2 switches first appeared in order to solve the shared media LANs' contention issue.The Data Link Layer, sometimes referred to as Layer 2, is the second level in the seven-layer OSI reference model for network protocol architecture. The TCP/IP network model compares Layer 2 to the link layer, which is the lowest layer.A device that follows the Layer 2 data communications protocol is known as a Layer 2 switch. A multiport bridge is another name for a layer 2 switch.    

To learn more about Layer 2 switch refer to:

https://brainly.com/question/14747487

#SPJ4

What factors are most important when designing a computer network? SELECT ALL THAT APPLY
1) the ways in which employees share business documents
2) the type of work done at networked computers
3) the rate of pay for networked employees
4) the number of networked computers
5) the number of hours employees work
6) the number of employees using each computer

Answers

The factors are most important when designing a computer network are:

1) the ways in which employees share business documents.

2) the type of work done at networked computers.

4) the number of networked computers.

6) the number of employees using each computer.

What are networks on computers?

Computer networking is the term for a network of connected computers that may communicate and share resources. These networked devices transmit data through wireless or physical technologies using a set of guidelines known as communications protocols.

Local-area networks (LANs) and wide-area networks are two fundamental types of networks (WANs). LANs use links to connect computers and peripheral devices in a constrained physical space, like a lab, office, or college campus.

So, If you want a network that is dependable, secure, and efficient, there are four key factors that you must take into mind while designing it. Embedded security mechanisms, software and hardware standardization, network resilience, and redundancy are a few of them.

Learn more about computer network from

https://brainly.com/question/20535662
#SPJ1

Automation can be of key importance for any organization and administrator. knowing how to set up automated processes can allow for more focus to specialized and important activities which take more of a manual engagement level. choose the best option for an automated process used to backup files. group of answer choices son backup system protection grandfather backup differential backup

Answers

Since Automation can be of key importance for any organization and administrator. Automation process used to backup files is option D: differential backup.

Why is automation crucial for a company?

By automating business processes, bottlenecks that waste time and money are removed. Every aspect of the firm benefited from the increases in productivity and compliance, which also led to enhanced customer service and performance.

Therefore, Higher productivity, dependability, availability, improved performance, and lower operating costs are all advantages of automated processes. Automation in industrial settings improves production reliability while reducing costs.

Learn more about Automation from

https://brainly.com/question/11211656
#SPJ1

Trade secrets _____.

protect owners for 20 years
protect owners for 20 years

are secret company names
are secret company names

give a competitive edge
give a competitive edge

are products that generate profit

Answers

Answer:

gives a competitive edge

Explanation:

briefly explain the evolution of i/o-cpu interfaces due to the introduction of i) interrupts and ii) dma.

Answers

Since the introduction of the interrupts, the processors can now recognize and process interrupts and share resources accordingly. During each instruction cycle, the CPU samples the interrupt input signal. If the signal is asserted when sampling occurs, the CPU will recognize the interrupt request. Through wired-OR connections, level-triggered inputs enable numerous devices to share the same interrupt signal.

Direct memory access (DMA) is a computer system feature that allows some hardware subsystems to access main system memory without relying on the central processor unit (CPU).

What is an I/O interface?

An interface in computing is a common boundary that allows two or more distinct components of a computer system to communicate information. Software, computer hardware, external devices, humans, and blends of these can all be exchanged.

I/O interfaces are the means via which data is delivered from internal logic to external sources and received from external sources. The interface signals can be unilateral or reversible, single-ended or differential, and adhere to one of several I/O standards.

Learn more about Processors:
https://brainly.com/question/28902482?
#SPJ1

an example of a host based intrusion detection tool is the tripwire program. what are the advanatges and disadvantages of using such a tool?

Answers

There are several advantages and disadvantages in using the tripwire program, namely:

StrengthDetects “external hackers” or internal network attacks. It is easy to use in providing protection for the entire network. This program is used centrally in dealing with distributed and shared attacks.WeaknessResponds to attacks more than prevents them. Generates big data to analyze. Vulnerable to “low and slow” attacks.

What is the Tripwire Program?

Tripwire is included in the Host Intrusion Detection System (IDS) category. Which detects file changes on the machine that an attacker might make. The logic of working tripwire is to create a baseline database from files on the system.

If the file changes then tripwire will log or notify the machine administrator. Integrity checker on Tripwire works by calculating the checksum (computing the integrity) of a list of encrypted directories and storing them in a database. Then periodically or when the user is ordered to check, the checksums of these programs will be recalculated and compared with the checksum database.

Learn more about the working concept of the tripwire program: https://brainly.com/question/22786289

#SPJ1

which of the following statement about dbscan algorithm is false? a. can find arbitrarily shaped clusters b. no need to specify number of clusters c. robust to outliers d. not sensitive to parameters

Answers

DBSCAN  algorithm  not sensitive to parameters.

What is the basic principle of DBSCAN clustering?Density-based spatial grouping of applications with noise is referred to as DBSCAN.It can locate clusters with noise and clusters of any shapes (i.e. outliers).DBSCAN's core tenet is that a point belongs to a cluster if it is near numerous other points from that cluster.Density-Based Spatial Clustering of Applications with Noise is known as DBSCAN.It is a well-liked unsupervised learning technique used in machine learning algorithms and model building.It is a clustering technique used to distinguish between high- and low-density clusters.

To learn more about DBSCAN.  refer,

https://brainly.in/question/17459920

#SPJ4

DBSCAN  algorithm  not sensitive to parameters.

What is the basic principle of DBSCAN clustering?Density-based spatial grouping of applications with noise is referred to as DBSCAN.It can locate clusters with noise and clusters of any shapes (i.e. outliers).DBSCAN's core tenet is that a point belongs to a cluster if it is near numerous other points from that cluster.Density-Based Spatial Clustering of Applications with Noise is known as DBSCAN.It is a well-liked unsupervised learning technique used in machine learning algorithms and model building.It is a clustering technique used to distinguish between high- and low-density clusters.

To learn more about algorithm refer,

https://brainly.com/question/24953880

#SPJ4

Marcus wants to create a spreadsheet with names, street addresses, city, and state for a mailing list. all those on the list will have the same city and state. which tool would be the best to use to quickly enter that information? flash fill autocomplete autofill tell me bar

Answers

Autofill

You can learn more through link below:

https://brainly.com/question/8284022#SPJ4

On a pc, what computer command is used to quickly save a file as another copy of that file?.

Answers

Answer:

Ctrl+S

Explanation:

This command is used to quickly save a file.

Hope this helps!

using a web search engine, find an article from a reputable source, published within the past six months, that reports on the risk coming from inside the organization compared to the risk coming from outside the organization. if the article notes that this relative risk is changing, how is it changing and to what is the change attributed?

Answers

A D614G (glycine for aspartic acid) substitution that became the predominate polymorphism globally over time was discovered early in the pandemic by a study that tracked amino acid changes in the spike protein of SARS-CoV-2 that was included in a sizable sequence database.

When compared to viruses with the D614 polymorphism, those with the G614 polymorphism exhibit larger quantities of infectious virus in the respiratory tract, improved binding to ACE-2, and better replication and transmissibility in animal and in vitro tests [12,13]. The G614 mutation does not seem to affect anti-spike antibody binding [14] or to be linked to an increased risk of hospitalization [11]. It is now found in the majority of SARS-CoV-2 lineages that are in circulation, including the variants of concern listed below.

Learn more about polymorphism here-

https://brainly.com/question/29241000

#SPJ4

the customer table contains a foreign key, rep num, that must match the primary key of the rep table. what type of update(s) to the customer table would violate the foreign key constraint?

Answers

A foreign key constraint, on the other hand, creates a connection between two distinct tables in order to specifically identify a row of the same table or another table.

The essential building blocks for creating a relationship between two tables are crucial in MySQL.

A database's foreign key is a collection of one or more columns used to uniquely identify a database record in a different table and preserve referential integrity. It is sometimes referred to as the reference key since it creates a connection between two different database tables.

The primary key column in another table must always match the foreign key column. It denotes that a primary key column of one table is referenced by a foreign key column in another table. When normalizing a relational database, a foreign key is useful, especially when we need to access data from other tables.

To know more about foreign key click here:

https://brainly.com/question/15177769

#SPJ4

compared to other data structures, this dbms structure is more flexible and stores data as well as instructions to manipulate the data.

Answers

Object-oriented databases is more flexible and stores data as well as instructions to manipulate the data.

A system known as an object database uses object-oriented programming to represent data in the form of objects. Different from relational databases, which are table-oriented, are object-oriented databases.

The concept of object-oriented programming languages, which is currently popular, is the foundation of the object-oriented data model. Overloading, polymorphism, and inheritance Object-oriented programming fundamentals that have found use in data modelling include object-identity, encapsulation, and information hiding with methods to provide an interface to objects. The rich type system, which includes collection and structured types, is supported by the object-oriented data model as well.

In contrast to relational databases, which can only handle one type of data, object databases can handle multiple data types. Unlike conventional databases like hierarchical, network, or relational, object-oriented databases can handle a variety of data types, including text, numbers, images, voice, and video.

Also, Reusable code, realistic modelling, and increased dependability and flexibility are all provided by object-oriented databases.

To learn more about Object-oriented databases click here:

brainly.com/question/29441658

#SPJ4

When navigating the design process do you have to follow each stage in order or is it possible to jump across the different stages dynamically?

Answers

Answer:Not all navigation mechanisms on a site are equal.

Your job is to sort them out. You must determine the purpose and importance of the navigation within your site, bringing similar options together and presenting them as a cohesive unit. Of course, there are conventions to get you started—bars and tabs are commonly used for the main navigation, vertical mechanisms on the left for local navigation—but there are no set usage rules, and many variations exist.

Explanation:

True or False. Columns go up and down (vertically).

Answers

Answer:true

Explanation:columns are verticle(up and down) and rows are horizontal(side to side)

you are working on a project to design a new software for your company to use. creating the software involves an extensive amount of high level coding. this yields for a potentially high risk. how long should your sprints be?

Answers

Creating the software involves an extensive amount of high level coding. this yields for a potentially high risk should long sprints be as short as possible.

What does software developmnent means?

Software development is the name given to a group of computer science tasks involved in developing, deploying, and maintaining software. The set of instructions or programs that a computer follows are known as software. It makes computers programmable and is independent of hardware.

What is high level coding.?

Konrad Zuse's Plankalkül was the first high-level programming language intended for computers.

With the exception of Heinz Rutishauser's "Superplan" language and, to a lesser extent, ALGOL, it was not implemented during his lifetime, and World War II effectively cut off his original contributions from other advancements. Fortran was the first widely used high-level language. It was a machine-independent upgrade to IBM's earlier Autocode systems.

The ALGOL family introduced recursion as well as nested functions under lexical scope, with ALGOL 58 defined in 1958 and ALGOL 60 defined in 1960 by committees of European and American computer scientists.

Learn more about high level coding click here:

https://brainly.com/question/28823733

#SPJ4

what is not one of the three risk points for data collected on a wearable device identified by security company symantec?

Answers

while attaching the digital certificate to the data is not one of the three risk points for data collected on a wearable device identified by security company symantec.

What is wearable devices?

Goods that can be incorporated into clothing or worn on the body as accessories are known as wearable devices. They are products that are controlled by electronic components and software. Many wearable gadgets have been developed recently, including smartwatches and smartglasses.

What is digital certificate?

Digital certificates, which are often referred to as identity certificates or public key certificates, are a type of electronic password that use the public key infrastructure (PKI), allowing people and businesses to communicate data over the internet in a safe way.

Many self-tracking devices have security flaws, according to Symantec, and applications. One of the most important results was that every wearable evaluated were activity-tracking gadgets, including ones made by renowned manufacturers, are susceptible to being located.

Using Raspberry Pi tiny computers, our researchers created a variety of scanning apparatuses including, by bringing them to sporting events and crowded public areas, discovered that it was able to tracking people.

Symantec discovered flaws in the management and storage of sensitive data, including Poor session management and clear-text password transmission. As we assemble, storing and disseminating more personal information.

Learn more about wearable device click here:

https://brainly.com/question/20885018

#SPJ4

suppose that you have a mastercard and a visa and you typically use the mastercard because it gives you airmile points for each person. suppose further that mastercard terminates their airmiles program and you switch to visa. the announcement of the termination of the airmiles program would be an example of a(n) for using the mastercard:

Answers

Suppose that you have a Mastercard and a visa and you typically use the MasterCard because it gives you airmile points for each person. suppose further that MasterCard terminates their airmiles program and you switch to visa. the announcement of the termination of the airmiles program would be an example of a "CMAO" for using the MasterCard.

Explain the termination statement.

A lending institution's signature appears on a termination declaration in a legal document. This document serves as proof that a loan that was previously extended by that lender has been paid back by the borrower.

For instance, mortgage lenders are obligated to give termination notifications once the homeowner has paid off the mortgage's remaining balance. Getting this termination statement is crucial because it enables the homeowner to demonstrate that they now have free and clear ownership of their home.

To learn more about termination statement, use the given link
https://brainly.com/question/16969411
#SPJ4

what happened when the fbi asked apple to create a new version of the ios operating system was would allow the fbi to gain access to the locked iphone of syed rizwan farook?

Answers

Apple rejected the demand and decided to take the FBI to court. According to the individual.

The F.B.I. was not requesting that Apple develop a so-called backdoor or other technological workaround to Apple's encryption that would have to be made available to the government. The official claimed that the government is actually interested in the data on the two phones. The FBI replied by successfully requesting a court order from Sheri Pym, a United States magistrate judge, requiring Apple to produce and release the required software. The order was issued under the All Writs Act of 1789 and was not a subpoena. The most recent iPhone models are compatible with these gadgets, and Cellebrite claims to be able to unlock any iPhone for law enforcement.

Learn more about software here-

https://brainly.com/question/985406

#SPJ4

luca's running a app campaign for news publisher world news online. why should luca care about the quality of world news online's listing on play?

Answers

Promote the installation of your software through advertisements.

Which advantages do advertisements offer?increasing awareness of the brand and its offerings.making a difference in the marketplace.luring in both existing and new clients.providing your clients with information.Boosting ROI & Sales Volume.enhancing the "image" of your brandaiding other commercial endeavorsAccording to research, in-app ad-engaging users view 4.2 times more products per session than organic users who might be specifically shopping for something. There are 4.2 more chances to turn a user into a paying customer in this scenario.By educating potential clients about your product or service, you can improve sales. Inform customers of service updates, new product introductions, and enhancements. With a one-time communication, you can boost your short-term sales by informing people of a special deal or a feature of your product.  

To learn more about Brand refer to:

https://brainly.com/question/25922327

#SPJ4

which dynamic routing protocol was developed as an exterior gateway protocol to interconnect different internet providers? group of answer choices ospf bgp eigrp rip

Answers

The dynamic routing protocol that was developed as an exterior gateway protocol to interconnect different internet providers is BGP.

The external gateway protocol is known as BGP. It was created to exchange routing data between various networks, or autonomous systems (ASes).

In contrast to static routing, which requires administrators to configure events for any changes, dynamic routing relies on routers that automatically learn the routing information and add the route to their routing database. When a router employs a dynamic routing protocol, it can identify a backup route in case the primary one fails and saves the best route to its routing database.

An Internet service provider is a business that offers both individuals and businesses Internet access and services (ISP).

To know more about dynamic routing click here:

https://brainly.com/question/14285971

#SPJ4

i need help on 4.9 lesson practice:
{A __________ variable is used to keep track of the number of loops that have been executed.}

Answers

A Consistent variable is used to keep track of the number of loops that have been executed.

What variable maintains track of how frequently a procedure is run?

The term  constant's value does not alter over time. On the other hand, a variable's value is one that tends to varies depending on the equation.

Therefore, note that all of those portions use a counter variable. This variable, which is frequently called I keeps track of the current repetition. The counter variable is one that is often given a beginning value during the course of the initialization phase.

Learn more about variable from

https://brainly.com/question/17367653

#SPJ1

Answer:

"Count" variable

Explanation:

Technically, the correct term IS  consistent variable but for some reason Project Stem's answer is count

Other Questions
What is the equation of the line? the number of homes sold by a realtor during a month has the following probability distribution: number sold probability 0 0.20 1 0.40 2 0.40 what is the probability that the realtor sells no more than one house during a month? belinda wants to sign up for a streaming service to watch movies and other programs. after much thought, she decides to subscribe to netflix. shortly after having done so, belinda hears her friends talking about a great series they are watching on amazon prime. belinda now wonders whether she made the right decision. what part of consumer behavior does this represent? sa11 and pdh223 confer erythromycin resistance on f. johnsoniae, but not on e. coli. how would the outcome of this experiment have been different if psa11 and pdh223 conferred erythromycin resistance on both f. johnsoniae and e. coli? explain what are the formulas of the compounds that correspond to the names given in the following table? compound name formula carbon tetrabromide cobalt(ii) phosphate magnesium chloride nickel(ii) acetate calcium nitrate whats the answer....................... A teacher covered the exterior of a rectangular prism-shaped box that measured 8 inches by 9 inches by 10 inches using one sheet of rectangular-shaped wrapping paper that measured 2 feet by 3 feet. There were no gaps or overlapping paper. How many square inches of wrapping paper were left over? Josiah lives in a town where people believe that missing church is fine. Where does he live? A. Salem B. Portsmouth C. Plymouth D. Providence What is the mass in grams of 5.90 mol C6H12? when a platinum wire is dipped into a strontium nitrate solution and then inserted into a burner flame, the strontium atoms emit a characteristic red color. this is an example of how an element can be identified by its unique Find the equation of the line the (2, 6) and is perpendicular to the equation y = 2x + 8 do other organisms get benifit from a cicadas life cylce Which statement is a pattern in the fossil record? A. Which statement is a pattern in the fossil record? B.The gas ratios in the atmosphere have been stable since the beginning of the fossil record.C.Earths climate has been stable since the beginning of the fossil record.D.Multiple mass extinction events have occurred in Earths history. can you give me an answer i don't know how to do this "Small islands, not capable of protecting themselves, are the proper objects for kingdoms to take under their care; but there is something absurd, in supposing a continent to be perpetually governed by an island."what is the meaning of the quote? a client is prescribed an angiotensin-converting enzyme (ace) inhibitor for hypertension. the nurse questions the prescription of an ace inhibitor for a client with which condition? heart failure renal artery stenosis diabetes coronary artery disease helping individuals shape their environments in ways that lead them to expect real and immediate positive outcomes from exercise is the basic premise of: Rewrite his description to make it more interesting. Add the adjectivesgiven in parentheses in the correct place and use the correct form. The paragraph is broken up into the foursentences for you.C'est un appartement (beau / ancien) avec trois chambres (petit / ensoleill.). Dansle salon, il y a un canap (bleu / beau) et des chaises (vieux) en bois. Je partage, lacuisine avec deux tudiants (tranger/jeune). Dans le quartier, il est facile derencontrer des personnes (nouveau / sympathique).C'estDans le salon,Je partageDans le quartier, Teddy and Henry both bought a used car on the same day. Teddy's used car has4,298 miles on it already, and he drives 426 miles per month. Henry's car has 6,129miles on it already, and he drives 223 miles per month. After how many months willeach car have the same nulaber of miles on it? a) what would if we tried to further accelerate a Supersonic fluid with adiverging diffuser?