RecursionexerciseCOP 3502; Summer2021We have gone through many examples in the class and those examples are available in the slides and uploaded codes. Try to test those codes and modify as you wish for getting more clarification.In additiontry the following:---------------------------------------------------------------------------------------------------------------------------------------1.What would be the output of the following recursive function if we call rec2(5)

Answers

Answer 1

Answer:

The output is:

1 2 3 4 5

Explanation:

Given

See attachment for code segment

Required

The output of rec2(5)

From the attached code segment, we have the following:

The base case: if (x==0){ return;}

The above implies that, the recursion ends when the value of x gets reduced to 0

The recursion:

rec2(x-1); ---- This continually reduces x by 1 and passes the value to the function

printf("%d ", x); This prints the passed value of x

Hence, the output of rec2(5) is: 1 2 3 4 5

RecursionexerciseCOP 3502; Summer2021We Have Gone Through Many Examples In The Class And Those Examples

Related Questions


How did the military in the early 1900s move resources?
engines.
In the early 1900s, military moved their resources to distant locations with the help of

Answers

Answer:

In the early 1900s, military moved their resources to distant locations with the help of trains, ships, and, to a lesser extent, horse-drawn wagons. This was so because at that time airplanes did not yet exist, capable of transporting inputs to any part of the world in a very short period of time. Therefore, inputs and resources were brought by sea and, if impossible, through land, using railways or highways.

Register the countChars event handler to handle the keydown event for the textarea tag. Note: The function counts the number of characters in the textarea.
Do not enter anything in the HTML file, put your code in the JavaScript section where it says "Your solution goes here"
1 klabel for-"userName">user name: 2
3

Answers

Answer:

Explanation:

The following Javascript code is added in the Javascript section where it says "Your solution goes here" and counts the current number of characters in the text within the textArea tag. A preview can be seen in the attached image below. The code grabs the pre-created variable textareaElement and attached the onkeypress event to it. Once a key is pressed it saves the number of characters in a variable and then returns it to the user.

var textareaElement = document.getElementById("userName");

function textChanged(event) {

   document.getElementById("stringLength").innerHTML = event.target.value.length;

}

// Your solution goes here

textareaElement.onkeypress = function() {

   let numOfCharacters = textareaElement.value.length;

   return numOfCharacters;

};

solve(-8/3)+7/5 please answer​

Answers

Answer:

hope this will help you more

Hey ! there

Answer:

-19/15 is the answer

Explanation:

In this question we are given two fraction that are -8/3 and 7/5. And we have asked to add them .

Solution : -

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 8}{3} + \dfrac{7}{5} [/tex]

Step 1 : Taking L.C.M of 3 and 5 , We get denominator 15 :

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 8(5) + 7(3)}{15} [/tex]

Step 2 : Multiplying -8 with 5 and 7 with 3 :

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 40 + 21}{15} [/tex]

Step 3 : Solving -40 and 21 :

[tex]\quad \: \dashrightarrow \qquad \: \red{\underline{ \boxed{ \frak{\dfrac{ - 19}{15} }}}} \quad \bigstar[/tex]

Henceforth , -19/15 is the answer .

#Keep Learning

Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Answers

Answer:

Denial of service attack.

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, DOS attack, etc.

A denial of service (DOS) attack is a form of cyber attack that involves either the exploitation of a software flaw or overwhelmingly floods a computer system in a network with traffic in order to prevent authorized users from performing legitimate activities or transactions.

Some of the ways to prevent vulnerability or cyber attacks in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.


The part of the computer that provides access to the Internet is the

Answers

Answer:

MODEM

Explanation:

What is machine learning

Answers

Answer:

machine learning is the ability for computers to develop new skills and algorithms without specific instructions to do so.

Machine learning is a branch of artificial intelligence (AI) and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy.

List safety conditions when downloading shareware, free free where, or public domain software

Answers

Answer:

Explanation:

Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.

Some of the necessary safety conditions that should be taken include;

1) Appropriate research about the software including taking more about the vendors and reviews.

2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.

3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.

4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.

For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.

Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD

Answers

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

Can anyone decipher these? There a bit random. Maybe binary but if there are other ways please include them.​

Answers

Answer:

Explanation:

so this is what "format" is about,   it's saying what do the ones and zeros represent.   b/c the bits can represent lots of different things ,  like letters with ascii code ,   and that's got several types.  some are 8 bits,  some are 16 bits,  the questions  you've shown are in groups of 5 which is really not a "thing" in binary,  it's always by twos,   without some type of  "frame work"  around the bits, we won't know what they represent,  if that is helping?   the important part is what is the "frame work"   that these bits are in.

all of your questions seem to have some  "art"  thing going on,  they make some kinda of binary artwork,  for what they are saying, that's not what's important.  Other than if they form  palindromes,   maybe that's what the questions are really about, how these do from palindromes, that is, they read the same backwards as forwards... I know.. why would anyone read backwards.. but a computer can do that pretty quickly,  sooo sometimes to check,  it will read  forwards and backwards.. but when there is a palindrome,  the computer is "confused"  

this is also a big big part of  "typing"  not like on a keyboard but when you program, and you say that  your variables are of a certain type,  like a char, or a string, or a double, you are specifying how many bits will be used to represent your data.  so then when you put the ones and zeros into the memory ,  ( think RAM)  then it's stored in groups of what ever size you've determined.    hmmmm   does this help?

Assume myString and yourString are variables of type String already declared and initialized. Write ONE line of code that sets yourString to the first character and the last character of myString added to myString variable.

Answers

Answer:

line of code :

newString=myString+myString.charAt(0)+myString.charAt(myString.length()-1);

Explanation:

In Java, the + is used for concatenation

method

charAt() will return the character from the given index from string

myString.charAt(0) will return E

myString.charAt(myString.length()-1)

Complete the AscendingAndDescending application so that it asks a user to enter three integers. Display them in ascending and descending order.An example of the program is shown below:Enter an integer... 1 And another... 2 And just one more... 3 Ascending: 1 2 3 Descending: 3 2 1GradingWrite your Java code in the area on the right. Use the Run button to compile and run the code. Clicking the Run Checks button will run pre-configured tests against your code to calculate a grade.Once you are happy with your results, click the Submit button to record your score.

Answers

Answer:

Following are the solution to the given question:

import java.util.Scanner;//import package

public class AscendingAndDescending//defining a class AscendingAndDescending  

{

   public static void main(String[] args) //main method

   {

       int n1,n2,n3,min,max,m;

       Scanner in = new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter an integer: ");//print message

       n1 = in.nextInt();//input value

       System.out.print("And another: ");//print message

       n2 = in.nextInt();//input value

       System.out.print("And just one more: ");//print message

       n3 = in.nextInt();//input value

       min = n1; //use min variable that holds value

       max = n1; //use mix variable that holds value

       if (n2 > max) max = n2;//use if to compare value and hols value in max variable

       if (n3 > max) max = n3;//use if to compare value and hols value in max variable

       if (n2 < min) min = n2;//use if to compare value and hols value in min variable

       if (n3 < min) min = n3;//use if to compare value and hols value in min variable

       m = (n1 + n2 + n3) - (min + max);//defining m variable that arrange value

       System.out.println("Ascending: " + min + " " + m + " " + max);//print Ascending order value

       System.out.println("Descending: " + max + " " + m + " " + min);//print Descending order value

   }

}

Output:

Enter an integer: 8

And another: 9

And just one more: 7

Ascending: 7 8 9

Descending: 9 8 7

Explanation:

In this program inside the main method three integer variable "n1,n2, and n3" is declared that inputs value from the user end and also defines three variable "min, max, and m" that uses the conditional statement that checks inputs value and assigns value according to the ascending and descending order and prints its values.

Data representation and interactivity are important aspects of data visualization.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Data visualization are defined as the representation of the data and information in graphical way. The data visualization tool uses charts, diagrams, graphs, maps, etc. to represent and visualized the information and understand the patter or trend in the data.

It is an effective way to interact with the user and works likes a form of a visual art.

Thus interactivity and data representations are the two important aspect of the data visualization.

Hence, the answer is true.

Java !!!
A common problem in parsing computer languages and compiler implementations is determining if an input string is balanced. That is, a string can be considered balanced if for every opening element ( (, [, <, etc) there is a corresponding closing element ( ), ], >, etc).
Today, we’re interested in writing a method that will determine if a String is balanced. Write a method, isBalanced(String s) that returns true if every opening element is matched by a closing element of exactly the same type. Extra opening elements, or extra closing elements, result in an unbalanced string. For this problem, we are only interested in three sets of characters -- {, (, and [ (and their closing equivalents, }, ), and ]). Other characters, such as <, can be skipped. Extra characters (letters, numbers, other symbols) should all be skipped. Additionally, the ordering of each closing element must match the ordering of each opening element. This is illustrated by examples below.
The following examples illustrate the expected behaviour:
is Balanced ("{{mustache templates use double curly braces}}") should return true
is Balanced("{{but here we have our template wrong!}") should return false
is Balanced("{ ( ( some text ) ) }") should return true
is Balanced("{ ( ( some text ) } )") should return false (note that the ordering of the last two elements is wrong)
Write an implementation that uses one or more Stacks to solve this problem. As a client of the Stack class, you are not concerned with how it works directly, just that it does work.

Answers

Answer:

Explanation:

import java.util.*;

public class BalancedBrackets {

// function to check if brackets are balanced

static boolean isBalanced(String expr)

{

Stack<Character> stack = new Stack<Character>();

for (int i = 0; i < expr.length(); i++)

{

char x = expr.charAt(i);

if (x == '(' || x == '[' || x == '{')

{

// Push the element in the stack

stack.push(x);

continue;

}

if (stack.isEmpty())

return false;

char check;

switch (x) {

case ')':

check = stack.pop();

if (check == '{' || check == '[')

return false;

break;

case '}':

check = stack.pop();

if (check == '(' || check == '[')

return false;

break;

case ']':

check = stack.pop();

if (check == '(' || check == '{')

return false;

break;

}

}

// Check Empty Stack

return (stack.isEmpty());

}

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.println("\nEnter the expression to check is balanced or not !");

String expr = scan.nextLine();

boolean output;

output = isBalanced(expr);

System.out.println(output);

if (output)

System.out.println("Balanced ");

else

System.out.println("Not Balanced ");

scan.close();

}

}

Write a recursive function that calculates the sum 11 22 33 ... nn, given an integer value of nin between 1 and 9. You can write a separate power function in this process and call that power function as needed:

Answers

Answer:

The function in Python is as follows:

def sumDig(n):

if n == 1:

 return 11

else:

 return n*11 + sumDig(n - 1)

Explanation:

This defines the function

def sumDig(n):

This represents the base case (where n = 1)

if n == 1:

The function returns 11, when it gets to the base case

 return 11

For every other value of n (n > 1)

else:

This calculates the required sum recursively

 return n*11 + sumDig(n - 1)

The purpose of the five-entity minimum, six-entity maximum is to establish a relatively small baseline for you to keep the scope of your database project constrained.

a. True
b. False

Answers

It would have to be false ^

A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email, browsing and Office software. In addition, 25 of them also do a large number of client/server requests into a database system. Which local area network operating system would you recommend?

Answers

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

Explain the following terms.
a) Explain Final keyword with example. b) Define Static and Instance variables

Answers

Answer:

A.

the final keyword is used to denote constants. It can be used with variables, methods, and classes. Once any entity (variable, method or class) is declared final , it can be assigned only once.

B.

Static variables are declared in the same place as instance variables, but with the keyword 'static' before the data type. While instance variables hold values that are associated with an individual object, static variables' values are associated with the class as a whole.

Create and configure databases in oracle database management system operation administration

Answers

Answer:

You typically create a database during Oracle Database software installation. However, you can also create a database after installation.

Reasons to create a database after installation are as follows:

You used Oracle Universal Installer (OUI) to install software only, and did not create a database. You want to create another database (and database instance) on the same host computer as an existing Oracle database. In this case, this chapter assumes that the new database uses the same Oracle home as the existing database. You can also create the database in a new Oracle home by running OUI again. You want to make a copy of (clone) a database.

Write a partial class that shows a class constant and an instance method. Write an instance method that converts feet to inches using a class constant representing the number of inches in one foot. The value passed to the method represents the distance in feet.

Answers

Answer:

Please the code snippet below, the code was writen in Kotlin Language

Explanation:

const val inches:Int= 12 .   //This is the const value

fun main(args: Array<String>) {

 //this will ask the user for input

   print("Enter a number")            

  //this will do the conversion

var valueInFeet= Integer.valueOf(readLine())*inches

   print("The value in feet is $valueInFeet feet(s)")  

   }

Which of the following was one reason why electronic (computer-based) information sharing was challenging in the not too distant past?
a. Individuals and/or members of organizations did not speak the same language.
b. Hardware and software applications on either end could not talk to one another.
c. The most powerful computers were owned by large companies.
d. Organizations needed to protect information for competitive advantage.

Answers

Answer:

B. Hardware and software applications on either end could not talk to one another.

Explanation:

The answer to this question is that making connection to the internet used to be very slow, it's operation was difficult and so was its maintenance. Therefore they could be said to be unreliable at the time making electronic information sharing difficult as well as challenging. From this explanation the right answer to this question is answer option b.

Thank you.

command create database in oracle database ::((

Answers

Answer:

kdkskskiisidiodoosooddodod

Base conversion. Perform the following conversion (you must have to show the steps to get any credit.
3DF16 = ?

Answers

Base to be converted to was not included but we would assume conversion to base 10(decimal)

Answer and Explanation:

The 3DF in base 16 is a hex number so we need to convert to its equivalent binary/base 2 form:

We therefore each digit of given hex number 3DF in base 16 to equivalent binary, 4 digits each.

3 = 0011

D = 1101

F = 1111

We then arrange the binary numbers in order

3DF base 16 = 1111011111 in base 2

We then convert to base 10 =

= 1x2^9+1x2^8+1x2^7+1x2^6+0x2^5+1x2^4+1x2^3+1x2^2+1×2^1+1×2^0

= 991 in base 10

Write a method swapArrayEnds() that swaps the first and last elements of its array parameter. Ex: sortArray

Answers

I understand you want a function that swaps the first and last element of an array so that the first element takes the last one's value and vice versa.

Answer and Explanation:

Using Javascript programming language:

function swapArrayEnds(sortArray){

var newArray= sortArray.values();

var firstElement=newArray[0];

newArray[0]=newArray[newArray.length-1];

newArray[newArray.length-1]=firstElement;

return newArray;

}

var exampleArray=[2, 5, 6, 8];

swapArrayEnds(exampleArray);

In the function above we defined the swapArray function by passing an array parameter that is sorted by swapping its first and last element. We first get the elements of the arrayvusing the array values method. We then store the value of the first element in the variable firstElement so that we are able to retain the value and then switch the values of the first element before using the firstElement to switch value of the last element. We then return newArray and call the function.

Which key should you press to leave the cell as it originally was?

Answers

Answer:

Backspace.

Explanation:

Cancel Button you should press to leave the cell as it originally was. Cancel Button you should press to leave the cell as it originally was. This answer has been confirmed as correct and helpful.

Backspace is press to leave the cell as it originally was.

What is Backspace key?

The Backspace key is situated in the top-right corner of the character keys part of the keyboard.

Backspace is replaced by a "delete" key on Apple computers, although it serves the same purpose.

There are no "backspace" keys on an Android or Apple iPhone smartphone or iPad tablet, but there is a key that serves the same purpose. Look for a key that resembles an arrow with a "X" or an arrow pointing left, as illustrated in the image.

Therefore, Backspace is press to leave the cell as it originally was.

To learn more about backspace, refer to the link:

https://brainly.com/question/29790869

#SPJ2

Tips for Interactions with Personalized LinkedIn Outreach?

Answers

Answer:

Follow the best strategies for personalized LinkedIn outreach through 2021.

 

Run an Outreach Campaign for niche-specific People Collect Data about your Audience Keep your message short Save your Sale Pitches for later Give them a reason to reply to you

Discuss why databases are important in accounting information systems. Describe primary and foreign keys, normalization and database cardinalities. Why are each important to the database design

Answers

Answer:

ensure integrity. primary key is unique key..foreign key is to connect 2 table.normalization to ensure you keep track on what you should do to create db..

You are given a sequence of n songs where the ith song is l minutes long. You want to place all of the songs on an ordered series of CDs (e.g. CD 1, CD 2, CD 3,... ,CD k) where each CD can hold m minutes. Furthermore, (1) The songs must be recorded in the given order, song 1, song 2,..., song n. (2) All songs must be included. (3) No song may be split across CDs. Your goal is to determine how to place them on the CDs as to minimize the number of CDs needed. Give the most efficient algorithm you can to find an optimal solution for this problem, prove the algorithm is correct and analyze the time complexity

Answers

Answer:

This can be done by a greedy solution. The algorithm does the following:  

Put song 1 on CD1.

For song 1, if there's space left on the present CD, then put the song on the present CD. If not, use a replacement CD.

If there are not any CDs left, output "no solution".

Explanation:  

The main thing is prove the correctness, do that by the "greedy stays ahead argument". For the primary song, the greedy solution is perfect trivially.  

Now, let the optimal solution match the greedy solution upto song i. Then, if the present CD has space and optimal solution puts song (i+1) on an equivalent CD, then the greedy and optimal match, hence greedy is not any worse than the optimal.Else, optimal puts song (i + 1) on subsequent CD. Consider an answer during which only song (i + 1) is moved to the present CD and zip else is modified. Clearly this is often another valid solution and no worse than the optimal, hence greedy is not any worse than the optimal solution during this case either. This proves the correctness of the algorithm. As for every song, there are constantly many operations to try to do, the complexity is O(n).

When implementing a 1:1 relationship, where should you place the foreign key if one side is mandatory and one side is optional? Should the foreign key be mandatory or optional?

Answers

Answer:

When implementing a 1:1 relationship, the foreign key should be placed on the optional side if one side is mandatory and one side is optional.  

When this is implemented, the foreign key should be made mandatory.

Explanation:

A foreign key (FK) is a primary key (PK) in relational databases.  It is used to establish a relationship with a table that has the same attribute with another table in the database.  A mandatory relationship exists when the foreign key depends on the parent (primary key) and cannot exist without the parent.  A one-to-one relationship exists when one row in a data table may be linked with only one row in another data table.

Using Python suppose an array sorted in ascending order is rotated at some pivot unknown to you beforehand. (i.e., [0,1,2,4,5,6,7] might become [4,5,6,7,0,1,2]).
You are given a target value to search. If found in the array return its index, otherwise return “The input is not on this list”
You may assume no duplicate exists in the array.
Hint: Use a function. Use the built in method .index( ) and/or for loops.

Answers

Answer:

Explanation:

class Solution {

   public int search(int[] nums, int target) {

       int n = nums.length;

       int low = 0 , high = n - 1;

       While(low < high){//Set virtual node

           int mid = (low + high) / 2;

           if(nums[mid] > nums[high]){

               low = mid + 1;

           }else{

               high = mid;

           }

       }

       int rot = low;

       low = 0;

       high = n - 1;

       while(low <= high){

           int mid = (low + high) / 2;

                        Int real = (mid + rot) % n;//The virtual node is mapped to the real node.

           if(nums[real] == target){

               return real;

           }else if(nums[real] < target){

               low = mid + 1;

           }else{

               high = mid - 1;

           }

       }

       return -1;

   }

}

You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface element that accepts user input. This user interface will be reused across several other applications in the organization. None of the controls in the Visual Studio toolbox meets your requirements; you need to develop all your code in house.

Required:
What actions should you take?

Answers

Answer:

The answer is "Developing the custom control for the user interface"

Explanation:

The major difference between customized control & user control would be that it inherit throughout the inheritance tree at different levels. Usually, a custom power comes from the system. Windows. UserControl is a system inheritance.

Using accuracy up is the major reason for designing a custom UI control. Developers must know how to use the API alone without reading the code for your component. All public methods and features of a custom control will be included in your API.

Other Questions
if 1 candian dollar is equivalent to 1.04 austrialian dollars what is the value if 4269 australian dollars in canadian currency? The threshold of external interruption whereby listeners can effectivelybecome immersed in a story or not is known as thethreshold. Those who trace the origins of social bonding to its survival value are most likely to agree that the need to belong is: there are....... section incpu Can you please help me solve this step by step? From dance hall of the dead Read the sentence.Yesterday, when they arrived at the beach, the students who had never seen the ocean before were surprised by the size of the foaming waves that rolled gracefully toward the shore.Which part of the sentence is an adverbial dependent clause?when they arrived at the beachwho had never seen the ocean beforeby the size of the foaming wavesthat rolled gracefully toward the shore what's the name of contesting stage The Rivera family bought a new tent for camping. The front of the old tent is a triangle with equal sides of 3.2 m and a floor width of 4.8 m. If the new tent is similar in shape to the old tent and has equal sides of 4 m, how wide is the floor of the new tent? Which capital budgeting technique is used on an exclusionary basis to prevent investing time and resources investigating using more complex techniques A solid reactant is placed into a beaker of a warm water. The liquid vigorously bubbles as the solid dissolves into the solution. What will most likely happen if the temperature of the liquid is slightly reduced? More bubbles will be produced because the solution is becoming more concentrated.Fewer bubbles will be produced because of fewer collisions of reactant molecules.The solid will get smaller at a faster rate because of more collisions of reactant molecules.The solid will get larger at a slower rate because precipitate is coming out of the solution. what was a result of the arms race between the united states and soviet union duringpresident einsenhower's term? a. the united states and soviet union began building up theirmilitary forces very quickly b. the united states and the soviet union agreed to join theunited nations c. the united states and the Soviet union agreed to end the cold war d. theunited states and the soviet union decided to reduce the size of their military forces NO LINKS OR ANSWERING WHAT YOU DON'T KNOW?1. Suppose y varies inversely with x, and y = 25 when x = 1/5. What is the value of y when x = 5?a. 15b. 5c. 25d. 12. Suppose y varies inversely with x, and y = a when x = a^2. What inverse variation equation related x and y?a. y = a^2/xb. y = a^3/xc. y= a^3xd. y = ax3. Suppose y varies inversely with x, and y = 3 when x = 1/3. What is the inverse variation equation that relates x and y?a. y = 1/xb. y =xc. y = 3xd. y = 3/x Examine the two normal probability curves and complete the statements.The mean of the shorter normal curve is ["equal to", "greater than", "less than"] the mean of the taller normal curve.The standard deviation of the shorter normal curve is ["less than", "greater than", "equal to"] the standard deviation of the taller normal curve.The area under the shorter normal curve is ["equal to", "greater than", "less than"] the area under the taller normal curve. 2x+6=x-4 Solve this equation A certain lottery has 37 numbers. in how many different ways can 4 of the numbers be selected? Rewrite 24.5 as a mixed number in lowest terms.Rewrite 0.85 as a fraction in lowest terms. BRAINLIEST FOR EXPLANATION AND STEP BY STEP. (One question) 1) In a right triangle, the side adjacent to the 25 degree angle is 15cm long. What is the length of the side opposite the 25 degree angle to the nearest centimeter? MY QUESTIONS:what is the question asking for? And where is the 25 degree in a right triangle??PLS HELP! :)) PLEASE HELP ME Write a 150-word paragraph about five of the zaniest and/or most novel ways youve found online that people earn incomes. Keep in mind that the sites should not be corporate sites. We are looking for unique niches. Have fun. We think you will be surprised when you see what people are willing to pay for online. How would the fraction [tex]\frac{7}{1-\sqrt{5} }[/tex] be rewritten if its denominator is rationalized using difference of squares?