Can you help me solve this with the proper code?

Can You Help Me Solve This With The Proper Code?

Answers

Answer 1

def __init__(self,num_mins,num_messages):

   self.num_mins=0

   self.num_messages=0


Related Questions

how often does windows automatically defragment a hard drive or trim a solid-state drive

Answers

If there is extraordinary fragmentation that is getting close to the "maximum fragmentation threshold," Windows will automatically consider partially defragmenting an SSD once a month.

In this post, we define defrag and discuss why doing it on an SSD is often a terrible idea.

However, that is a pretty straightforward response to a much more complex reality that most websites and forums get incorrect. If you want to know that, when left to Microsoft, defragging and optimizing an SSD are both excellent things, keep reading this article.

It saves time, energy, and wear and tear for disk read heads to not have to skip around your spinning disk in search of all the pieces by moving the thousands of file parts into sequential order during defragmentation of a spinning hard drive.

However, if there is extraordinary fragmentation that is getting close to the "maximum fragmentation threshold," Windows will automatically consider partially defragmenting an SSD once per month. After that point, the SSD will stop reading and writing because the "meta data" for the file fragments is too much for the SSD to manage. Microsoft will cautiously defrag the seldom potentially dangerous files because this is a negative thing.

To know more about fragmentation click on the link:

https://brainly.com/question/14127090

#SPJ4

An attacker discovered an input validation vulnerability on a website, crafted a URL with additional HTML code, and emailed the link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking on the malicious URL. No other malicious operations occurred outside of the web application’s root directory. This scenario is describing which type of attack?

Answers

This scenario is describing attack of:

Computer BotsCommand & Control

What are computer bots?

A computer programme known as a "bot," short for robot, executes automatic, repeated operations. Usually, bots mimic or take the place of human users. As automated systems, they perform tasks considerably more quickly than do consumers who are humans.

Which types of bots are there?

Bots come in two flavours: good bots and bad bots, both of which are relevant to web security. Both make attempts to use web resources (such as websites, web applications, APIs, etc.) or carry out other normal human user actions on the web, but for quite different reasons.

How do computer bots work?

A bot (short for robot) is a software application programmed to perform tasks through Robotic Process Automation, or RPA. Bots work by automatically going through a set of instructions, and they carry out tasks and processes much faster, more accurately, and at a higher volume than it would otherwise take humans.

What is computer bots malware?

Here's a quick malicious bot definition: A malicious bot is an automated malware program that can infect a system, steal data, or commit other fraudulent activities.

To learn more about computer bots visit:

https://brainly.com/question/28540266

#SPJ10

Answer:  (D) Cross-site scripting (XSS)

Explanation: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

What is SDLC & Agile Development

Answers

In software engineering, a software development process is a process of dividing software development work into smaller, parallel, or sequential steps or sub-processes to improve design, product management. It is also known as a software development life cycle.

You are the new IT admin of Sherpa Logistics. The company's in-house application is showing some aberrant behaviors and your team lead has asked you to handle the situation in his absence. What would be your first point of action in such a scenario?

Answers

The first action in such a scenario would be to Troubleshoot the software. This will yield insight into what the issue is and give more understanding of the problem.

What are the steps to solving a software problem?

In general, fixing a software challenge may be separated into four steps:

Determine the issueObtain informationIterate on possible solutions.Try out your solution.

A problem does not always manifest itself with flashing red lights—the software simply does not perform as expected.

Even if this is the case, you should do your best to describe the issue. Ask yourself (and perhaps write down your replies) the following questions:

What am I attempting to accomplish?What have I already done?What do I believe the program should accomplish?What exactly is it doing?

Learn more about software problems:
https://brainly.com/question/13533992
#SPJ1

Which of the following are notes which can be electronically entered into documents without changing the content of the document?


: Comparisons

Comments

Changes

Reviews

Answers

The option that are notes which can be electronically entered into documents without changing the content of the document is option B: Comments.

What type of word is comments?

As a noun and a verb, "comment" has numerous more meanings. When people comment on something, they are expressing their viewpoint or opinion about it in the form of an observation or a criticism. Short statements typically make up comments. Longer critique or a collection of remarks are referred to as a commentary.

Therefore, An explanation or annotation in a computer program's source code that can be viewed by programmers is known as a remark. Compilers and interpreters typically ignore them because they were introduced to make the source code simpler for humans to understand.

Learn more about Comments from

https://brainly.com/question/27798319

#SPJ1

Answer: comments

Explanation:

converting 13975 from decimal number to binary format​

Answers

13975 from decimal to binary is 11011010010111.

There are.
A. 40
B. 20
C. 65
D. 15
questions on the Aspire science test.

Answers

A - The Science Aspire test is composed of 35 multiple choice and 5 constructed response questions.

A.40 questions on the Aspire science test.

Some one please help me​

Answers

Answer:

Makes no sense

Explanation:

Ashan Bhetwal wants to create a personal website to display and sell his artwork. He also wants to show the location of his studio, and a video of him painting. What features might he want to add to his website? What tools might he use to build the website?

Answers

The  features and  tools that might he use to build the website is the  use of video embed and go ogle maps features.

What is the easiest method of website design?

Using a website builder is the simplest approach to make a website. Utilizing one of their pre-made templates, you may build a website using these interactive, browser-based tools. However, just because the templates are "ready-made" doesn't imply you'll end up with a generic website.

A website, often known as a web site, is a collection of web pages and related material that is published on at least one web server and given a shared domain name.

Therefore, In social media posts or other web media, embedding describes the incorporation of links, photographs, videos, gifs, and other content. The inclusion of embedded content gives posts a visual component that promotes more clicks and engagement.

Learn more about website from

https://brainly.com/question/28114357
#SPJ1

Which of the following people will benefit the most from using a B2B website?

Answers

A person who would benefit the most from using a B2B website is: A. Akiko, who provides services to other smaller businesses which helps them establish themselves in the market.

The types of business models.

Generally speaking, e-commerce comprises of four (4) main business models and these include the following;

Business to Consumer (B2C).Business to Government (B2G).Consumer to Consumer (C2C).Business to Business (B2B).

What is B2B?

B2B is an abbreviation for business-to-business and it can be defined as a type of market in which a business (manufacturer or producer) sells its products directly to other business agents such as:

RetailersWholesalers

In this context, we can reasonably infer and logically deduce that Akiko would benefit the most from using a business-to-business (B2B) website because she is a service provider to other smaller businesses.

Read more on B2B here: https://brainly.com/question/26506080

#SPJ1

Complete Question:

Which of the following people will benefit the most from using a B2B website?

A. Akiko, who provides services to other smaller businesses which helps them establish themselves in the market

B. Rahim, who wants to sell his old furniture before he moves to a different city

C. Rohan, who runs a company that sells organic cosmetics directly to consumers

D. Mika, who sells hand-made and inexpensive jewelry to college students

Please help

When communicating online, it is important to understand there is no vocal tone or body language, as there is in face-to-face conversation. What are some things you can do when communicating online to maintain appropriate netiquette? Use details to support your answer.

Answers

You can use proper grammar and punctuation to maintain a neutral tone. Also, justify your opinions instead of arguing pointlessly.

In addition, you should address others by their appropriate title and name. Sarcasm should be avoided at all costs - it can be easily misinterpreted.

A while loop reads characters from input. Write an expression that executes the while loop until character 's' is read.

Answers

An expression that executes the while loop until character 's' is read is given below:



The Expression

// Takes character input, tallies periods, stops on dollar sign

#include <iostream>

using namespace std;

int main() {

   char i; // input received

   int j = 0; // counter for # of periods

   cout << "This program will accept single-character entries and report the number of periods you've entered.\n";

   for (;;) {

       do {

           cout << "Please enter a single character, using $ to stop: ";

           cin >> i;

           if(i == '.')

               j++;

       } while(i != '$');

   if(i == '$')

       cout << "Total number of periods entered is " < < j < < " .";

       break;

   }

   return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Which of the following is NOT true of summary notes?
a. They can be created with a computer.
b. They tie together content from all readings, lectures, and lab sessions.
c. They are the same as the notes you take throughout the term in class.
d. They are created specifically for test reviews.

Answers

The incorrect statement about the summary notes is they are the same as the notes you take throughout the term in class. The correct option is c.

What are summary notes?

Summary notes are compact notes that are made for revision of purposes. These notes are the extract of all your studies. They contain main things and important subjects and topics.

They can be created on computers and phones, and they are smaller than the notes that are prepared in class.

Therefore, the correct option is c. They are the same as the notes you take throughout the term in class.

To learn more about summary notes, refer to the below link:

https://brainly.com/question/28176775

#SPJ1

in java, when a character is stored in memory, it is actually the ________ that is stored.

Answers

In java, when a character is stored in memory, it is actually the Unicode number that is stored.

Every character in Unicode has a unique number, regardless of the platform, language, or software it is used with. There were hundreds of distinct encoding techniques for allocating this number prior to the creation of Unicode. Not enough characters could fit in a single encoding: To cover all of its languages, for instance, the European Union alone needs a number of distinct encodings.

No one encoding was sufficient for all the letters, punctuation, and technical symbols in regular usage, not even for a single language like English. Additionally, several encoding techniques clash with one another. The same number may be used by two distinct encodings for two different characters or by a single character in both.

Data always runs the danger of damage when it is transferred between multiple encodings or platforms, even if any particular computer (especially servers) needs to support a wide variety of encodings.

Both students and working professionals can benefit from our fundamental Java programming tutorial. Java is a general-purpose, concurrent, secured, object-oriented, class-based, and computer programming language. It is an established, reliable technique.

A platform is any hardware or software environment in which a program is run. Java is referred to as a platform since it has a runtime environment (JRE) and an API.

To know more about unicode click on the link:

https://brainly.com/question/17147612

#SPJ4

Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he or she is finished providing inputs. After the user presses the enter key, the program should print the sum of the numbers and their average.

Answers

The program that receives a series of numbers from the user is:

theSum = 0.0

# stores the number of terms entered by the user

n = 0

# loop until user presses the enter key

# infinite loop

while True:

# get user input from user

data = input("Enter a number or press Enter to quit: ")

# if user presses enter

if data == '':

# break out of the loop

break

# convert data into float using float()

number = float(data)

# add the entered number to theSum

theSum += number

# increase the number of terms

n += 1

print()

print("The sum is", theSum)

# if numbers of terms entered are greater than 0

if n > 0:

# calculate average

average = theSum / n

print('The average is', average)

# if no terms are entered

else:

print('Average : undefined (as the number of terms entered are 0)')

What is a program?

A computer program is a set of instructions written in a programming language that a computer is supposed to obey.

Computer programs are one of the intangible components of the software, which also includes documentation and other components. The version of a computer program that humans can read is called the source code.

Learn more about program on;

https://brainly.com/question/23275071

#SPJ1

You're installing a new network for CSM Tech Publishing, a new publisher of technical books and training materials. There will be 10 client computers running Windows 10, and CSM Tech Publishing plans to run a web-based order processing/inventory program that for now is used only by in-house employees while they're on site. CSM Tech Publishing wants to be able to manage client computer and user policies and allow employees to share documents. Sign in and security should be centrally managed. What network model, workgroup, or domain, should be used? Explain your answer, including any server roles you may need to install.

Answers

The network model, workgroup, or domain, that should be used include TCP, Microsoft, and Windows domain respectively.

How to illustrate the information?

The TCP/IP paradigm is employed in this scenario because it requires established protocols for packet and data transmission over a network of 10 clients and in-house personnel. TCP/IP is a connection-oriented protocol that aids in packet transport.

The workgroup that adheres to Microsoft Windows guidelines can be used. These workgroups play a significant role in the management of LAN PCs by offering peer-to-peer connectivity. Peer-to-peer networking facilitates file sharing and local resource sharing.

The PCs can be managed via the Windows Domain. The Windows Domain also aids in resource sharing. The network administrator plays a vital role in network monitoring by using a monitoring tool. The administrator scans the network for various vulnerabilities.

Learn more about network on:

https://brainly.com/question/1027666

#SPJ1

3. What is a process in software engineering

Answers

a process of dividing software development work into smaller,parallel, or sequential steps or sub-processes to improve design, product management

a program to search words in c++

Answers

Answer:

a starting point might be after you get this working, you can allow them to enter more words and iterate your search,

for each argument (not counting the first one that is the file name)

search for the word, show the lines...

and more files too, for that matter, for each file, for all the words... (at this point you MUST put flags on what each thing is, up to now, you can use the order of args)

just note that arg[] are c-strings. you can assign a string a c-string, so promotion lets you do things more normally, or you can process it as-is depending on what you use it for (see how I just used it in the file name but moved it to a string in the target?). I plan to use target a lot, but the file name only in one statement ever, no need to upcast it.

Explanation:

int main(int argc, char* argv[])

{

   if(argc < 3) //if the user did not provide enough command line inputs.  

    //you can, and should probably, do more exhaustive input validation and maybe have them

    //do flags as well rather than rely on the order of the arguments to be correct.

     {

        cout << "usage:  mygrep filename word"

        return 1;

     }

   ifstream infile(argv[1]);  //attempt to open the first target as the file

   string target = argv[2];   //assign target from the second argument

   

   ...

susan wants to bring out as much tone and shading in her prints as possible what type of paper should she use

Answers

Since Susan wants to bring out as much tone and shading in her prints as possible, the type of paper that she need to use is Strathmore Toned papers.

What effect does value shading have on a piece of art?

Value is employed to simulate the appearance of highlights and shadows. The illusion of a light source is produced by the interaction of highlights and shadows.

Tone can be a key instrument for generating contrast in an artwork by establishing a sense of antagonism and tension between various elements or by drawing attention to certain areas of the composition.

Your speed increases on a toned surface. more approachable than a white paper. minimize glare when it is sunny. stronger compared to several other art paper varieties. come in a huge range of hues.

Therefore, In a sketchbook, artists would record the images that served as their sources for larger, more complex paintings.

Learn more about shading from

https://brainly.com/question/25729154

#SPJ1

This code is giving no error but is not printing my "goal." Which is to print a year of highschool when a number is input. Instead the code is only printing "Not in High School" every time, every number. Can someone please explain to me what I did wrong?


grade_number = input("What year of high school are you in? ")


if grade_number == 9:

print("Freshman")


elif grade_number == 10:

print("Sophomore")


elif grade_number == 11:

print("Junior")


elif grade_number == 12:

print("Senior")


else:

print("Not in High School")

Answers

Answer:

You must convert your input to an integer before the if statements.

Explanation:

input() returns a string, which should be converted to your desired type, OR you should compare against string literals.

See below for working code.

Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a single line separated by a space

Answers

The coding for completing the program is by using two words and a number, storing each into separate variables.

What are variables?

In coding or any computer language like python, the variables are the things that are taken in the subject.

def userdetails():

words = input("Enter a word: ")

word2 = input("Enter a word: ")

numm = input("Enter a number: ")

pw1 = words+"_"+word2

pw2 = numm+words+numm

print("You entered: {} {} {}" .format(words,word2,numm))

print("First password:",pw1)

print("Second password:",pw2)

print("Number of characters in",pw1,":",len(pw1))

print("Number of characters in",pw2,":",len(pw2))

Thus, the code for given words and numbers is given above.

To learn more about variables, refer to the below link:

https://brainly.com/question/14679709

#SPJ1

i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to fix and it dosent work i even resatrt my computer and scan for malware what shoul i do? and every day i fix it but then the next day it happens again pls help. and dont tell me to get a computer.

Answers

Answer:

1 Broken or malfunctioning keyboard: A broken key in your keyboard or a malfunctioning keyboard can cause such issues.

2 Problematic Keyboard Drivers: Outdated or corrupted keyboard drivers may trigger actions that make your computer alt tab on its own.

3Problematic Graphics Drivers: Corrupted graphics drivers may bug the overlay, which is likely why your games keep alt tabbing.

4Virus Or Malware: Virus and malware are known to take over applications and make them behave wierdly. This can be one of those situations.

5 A Task is running in the background: A task may be running in the background while you are playing a game on fullscreen. This may bug the task window and make it alt tab every few seconds.

6Background applications and services: Similar to a task running in the background, other applications, and services running in the background can also get bugged and alt tab on their own.

7Corrupted system files and outdated Windows: Outdated Windows and corrupted system files are also known instigators for such issue.

have great day

What building on the Castle Crasher Playground will be the THIRD knocked over according to this project?

Answers

5 buildings on the Castle Crasher Playground will be the THIRD knocked over according to this project.

Project

A project is any individual or collaborative undertaking, possibly involving research as well as design, that is carefully planned to achieve a specific goal. An alternative viewpoint regards a project as a series of events: a "set of interrelated tasks to be completed over a fixed period of time and within certain cost and other constraints." A project is a temporary (rather than permanent) social system (work system) that may be staffed by teams (within or across organisations) to complete specific tasks under time constraints.

The algorithm should be written in such a way that the VR Robot can knock down all five buildings regardless of the layout of the Playground. Without modifying the project, knock down all buildings in five Castle Layouts.

To learn more about project

https://brainly.com/question/25009327

#SPJ9

The Web Engineering methods landscape encompasses a set of technical tasks that enable a Web engineer to understand, characterize, and then build a high-quality Web Applications. Discuss the following Web Engineering methods:
a) Communication methods.
b)Requirements analysis methods.
c) Design methods.
d) Construction methods.
e) Testing methods.

Answers

Answer:

A

Explanation:

I did the test,

What malware is similar to a virus but is transmitted over a network?
A) anti-malware
B) adware
C) worms
D) spyware

Answers

the Answer is C worms

Answer:Worms

Explanation: Worms are self replicating. Worms also don’t need a host computer to run like viruses do.

Assume that c is a char variable that has been declared and already given a value. Write an expression whose value is true if and only if c is what is called a whitespace character (that is a space or a tab or a newline-- none of which result in ink being printed on paper).

Answers

The expression whose value is true if and only if c is what is called a whitespace character is ( c == " II c== '\n' || c == '\t').

The "white-space character" space, tab, line feed (newline), carriage return, form feed, and vertical tab serve the same function as the spaces between words and lines on a printed page: they facilitate reading. White-space characters and other tokens, including operators and punctuation, serve as token delimiters (bounded spaces).

The C compiler ignores white-space characters while parsing code unless you use them as separators, as parts of character constants, or as literal strings. To make a program easier to read, use white space characters. Take note that comments are also treated as white space by the compiler.

Any character or string of characters used to represent horizontal or vertical space in typography is known as whitespace in computer programming. A whitespace character usually takes up space on a page even though it does not correlate to a mark when it is rendered.

For instance, the standard whitespace symbol U+0020 SPACE (also known as ASCII 32) is a punctuation mark for a blank space that is used to separate words in Western scripts.

To know more about whitespace character click on the link:

https://brainly.com/question/14936585

#SPJ4

Design a flowchart and code for a program that tabulates contributions collected by an organization. The organization wishes to accept contributions until a total of $10,000,000 is met. Once this total is hit, no further contributions should be accepted.


The organization wants the program to read data from an input file (input.in). The following data should be written to a file called results.out

a.The total number of contributions needed to meet the goal of 10 million dollars

b.The amount of the largest and smallest contribution accepted

c.The average contribution size

d.The final total of the contributions accepted

Answers

In this exercise we have to use the knowledge of computational language in JAVA to write a code that Design a flowchart and code for a program that tabulates contributions collected by an organization.

Writting the code:

import java.io.*;

import java.util.Random;

import java.util.Scanner;

class Contribution {

   public static void main(String[] args) {

       String fileInput = "contributions.txt"; // input file

       String fileOutput = "results.out"; // the output file to write the result

       final double UPPER_LIMIT = 10000000; // declare constant for 10,000,00

       double min = 0, max = 0;

       double contribution, total = 0;

       int counter = 0;

       try {

           // read the input file using scanner class

           Scanner fileReader = new Scanner(new File(fileInput));

           // loop as long total contribution is less than max there are contributions in the file

           // read line by line

           while (fileReader.hasNextDouble() && total < UPPER_LIMIT) {

               // read the contribution amount from the file

               contribution = fileReader.nextDouble();

               // increment counter

               counter += 1;

               // update the min value

               if (counter == 1 || min > contribution) min = contribution;

               // update the max value

               if (counter == 1 || max < contribution) max = contribution;

               // running total of all contribution so far

               total += contribution;

           }

           // close the input file

           fileReader.close();

           // write the data to the output file now

           double average = total / counter;

           FileWriter writer = new FileWriter(new File(fileOutput));

           writer.write(String.format("It took %d contributions to reach the goal.\r\n", counter));

           writer.write(String.format("The maximum contribution received was $%,.2f\r\n", max));

           writer.write(String.format("The minimum contribution received was $%,.2f\r\n", min));

           writer.write(String.format("The average contribution received was $%,.2f\r\n", average));

           writer.write(String.format("A total of $%,.2f was collected.\r\n", total));

           writer.flush();

           writer.close(); // close the output file

       } catch (IOException e) {

           System.out.println("Error: could not read/open file: " + fileInput);

       }

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Effective PivotCharts should include as many metrics as possible.
O True
O False

Answers

It is true that effective pivot charts should include as many metrics as possible. Hence, the statement is true.

What is a Pivot Chart?

A PivotTable to compile, examine, research, and display summary data In order to help you quickly see comparisons, patterns, and trends, PivotCharts add visualizations to the summary data in a PivotTable. You can use both pivot tables and pivot charts to make well-informed judgments regarding important business data.

You can connect to PivotTables in order to access other data sources such SQL Server tables, SQL Server Analysis Services cubes, Azure Marketplace, Office Data Connection (.odc) files, XML files, Access databases, and text files. Additionally, you can create new tables by utilizing already-existing pivot tables.

To get more information about Pivot Chart :

https://brainly.com/question/13198104

#SPJ1

Consider photographing a football stadium fully lit with stadium lights compared to
a football stadium lit by nothing but candlelight. What is the main difference
between these two lighting situations?
(1 point)
O the light intensity
O the light quality
O the shadow of the light
O the position of the light

Answers

The main difference between these two lighting situations is: A. the light intensity.

What is a photoshoot?

A photoshoot simply refers to a photography session which typically involves the use of digital media equipment and lighting equipment, to take series of pictures (photographs) of models, group, things or places, etc., especially by a professional photographer.

What is light intensity?

Light intensity can be defined as a measure of the rate at which light radiates over the surface of an area such as a football stadium, with respect to the distance from a source. This ultimately implies that, the unit of measurement of light intensity is Watts per steradian (W/sr).

In conclusion, light intensity is simply a difference between a fully lit area and a partially lit area.

Read more on light intensity here: https://brainly.com/question/28145811

#SPJ1

Answer: A.) light intensity

Explanation: edge 2023

Q1:most common cybercrimes?
Q2: Difference between Hacker and crackers ​

Answers

Q1: phishing and similar fraud

Q2: Hackers are good people who hack devices and systems with good intentions. They might hack a system for a specified purpose or for obtaining more knowledge out of it. Crackers are people who hack a system by breaking into it and violating it with some bad intentions.

Other Questions
Graph each equation rewrite in slope-intercept form first if necessary.Y=-1/3x+4 After declaring independence from great britain, the delegates of the continental congress drafted which document?. Use the information to answer the question.Cities on a ContinentBerlin ParisRomeWhere are these cities located?AsiaEuropeNorth AmericaSouth America Evidence comes from... In the 2017 equifax breach, what was the password used to access the portal used to manage credit disputes?. which equations represent exponential growth? which equations represent exponential decay? drag the choices into the boxes to complete the table. put responses in the correct input to answer the question. select a response, navigate to the desired input and insert the response. responses can be selected and inserted using the space bar, enter key, left mouse button or touchpad. responses can also be moved by dragging with a mouse. exponential growth exponential decay 4. What is the difference between a complex character and a flat character? Given that the measure of x is 120, and the measure of y is 60, find the measure of z. the event containing the outcomes belonging to a or b or both is the __________ of a and b. A group of people were asked if they had run a red light in the last year. 478 responded "yes", and 200 responded "no".Find the probability that if a person is chosen at random, they have run a red light in the last year. What is the correct way to solve this problem? I cannot for the life of me figure this out. 180-x=x ???? Why did Yongle move the capital to Beijing? A. to control trade across the Mongol empire B. to strengthen ties with lands outside China C. to strengthen Ming rule over southern China D. to protect against future Mongol invasions After working a summer job, you have $1,000 to put into a bank account. You need to decide which bank is a better investment: Elite Bank or Bankify.Elite Bank is offering a monthly interest rate of 1%. Which equation models how much money you'd have in an Elite Bank account after (x) months?A. g(x) = 1000/x + 1.01B. g(x) = 1000(1.01)^xC. g(x) = 1000 + 1.01xD. g(x) = 1000 (1.1)^x (a) Explain the process by which these dark lines are generated by the elements in the sun's atmosphere.Specifically, why are they black and not colored, and why do they match the colored line spectra ofthose elements? 3. The 9 boys in Mr. Ackerman's class wentoutside for recess. They wore their gloves.Isaiah and Michael each lost a glove whileoutside. How many gloves did the boys bringback into the classroom? the unit of measure that represents resting metabolic rate, or the energy requirement of the body at rest, is called What was the significance of the Battle of the Argonne Forest? A. It was one of the last battles before Germany surrendered. B. It was a battle in which the U.S. army was ambushed and defeated. C. It was the bloodiest battle that was fought during World War I. D. It was an Allied victory that convinced the U.S. to enter the war. X is a normally distributed random variable with mean 71 and standard deviation 9.What is the probability that X is between 60 and 82?Write your answer as a decimal rounded to the nearest thousandth. Less congested lanes on an expressway mean there is more room and correct will be followed. a) Space cushions b) Speed limits Passing rules d) None of the above n most people, hypertension results from: no obvious external cause. diabetes. kidney disease. atherosclerosis.