This is related to coding. I just have no idea how to do this coding project.

This Is Related To Coding. I Just Have No Idea How To Do This Coding Project.

Answers

Answer 1

class brainly

{

public String repeatString(String str, int n)

{

for(n=1;n<=3;n++)

{

System.out.print(str);

}

}

}

Answer 2

Using the knowledge of the computational language in JAVA it is possible to write a code that write a method that takes a string and a int and return to the string.

Writting the code:

public String repeatString(String str, int n)

{

 String text = "";

 

 for (int i = 0; i < n; i++)

     {

       text = text + str;

     }

     

   return text;

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

This Is Related To Coding. I Just Have No Idea How To Do This Coding Project.

Related Questions

Probability Practice: Cass is interested in figuring out how many customers have applied for a home mortgage recently.

Review the data and calicut are the probability that if Cass runs into one of the financial institutions customers at random, that person has applied for a home mortgage this year.


What is the total number of customers?


How many customers applied for a home mortgage?

Answers

Answer:

Doesn't make a lot of sense. Can you be more specific.

Explanation:

Answers

What is this? Can you correct this question

How many subnets and host per subnet are available from network 192.168.43.0 255.255.255.224?

Answers

It should be noted that the number of subnets and hosts available from network 192.168.43.0 255.255.255.224 is 8 and 32, respectively. Only 30 of the 32 hosts are generally functional.

What is a host in computer networking?

A network host is a computer or other device that is connected to a computer network. A host can serve as a server, supplying network users and other hosts with information resources, services, and applications. Each host is given at least one network address.

A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, computers use common communication protocols over digital links.

So, in respect to the above response, bear in mind that we may compute the total number of: by putting the information into an online IPv4 subnet calculator.

8 subnets; and30 hosts available for 192.168.43.0 (IP Address) and 255.255.255.224 (Subnet)

Learn more about hosts:

https://brainly.com/question/14258036

#SPJ1

Write an SQL statement to display for every restaurant the name of the restaurant (where the name of the restaurant consists of more than 10 characters) and for every category of menu item its description (catdesc). Furthermore, display the average; cheapest or lowest; and highest or most expensive price of all menu items in that category at that restaurant. Use single row functions to format all the prices. The average price must be padded; the cheapest price must be rounded; but the highest price must not be rounded. Display only those menu items of which the average item price is more than R40. Sort your results according to the restaurant names and for every restaurant from the most expensive average menu item to the cheapest average menu item. Display your results exactly as listed below.

Answers

Using the knowledge in computational language in SQL it is possible to write the code that display for every restaurant the name of the restaurant  and for every category of menu item its description.

Writting the code:

INSERT INTO Dish Values(13, 'Spring Rolls', 'ap');

INSERT INTO Dish Values(15, 'Pad Thai', 'en');

INSERT INTO Dish Values(16, 'Pot Stickers', 'ap');    

INSERT INTO Dish Values(22, 'Masaman Curry', 'en');  

INSERT INTO Dish Values(10, 'Custard', 'ds');  

INSERT INTO Dish Values(12, 'Garlic Bread', 'ap');    

INSERT INTO Dish Values(44, 'Salad', 'ap');    

INSERT INTO Dish Values(07, 'Cheese Pizza', 'en');  

INSERT INTO Dish Values(19, 'Pepperoni Pizza', 'en');    

INSERT INTO Dish Values(77, 'Veggie Supreme Pizza', 'en');

INSERT INTO MenuItem Values(0, 0, 13, 8.00);

INSERT INTO MenuItem Values(1, 0, 16, 9.00);

INSERT INTO MenuItem Values(2, 0, 44, 10.00);

INSERT INTO MenuItem Values(3, 0, 15, 19.00);

INSERT INTO MenuItem Values(4, 0, 22, 19.00);

INSERT INTO MenuItem Values(5, 3, 44, 6.25);

INSERT INTO MenuItem Values(6, 3, 12, 5.50);

INSERT INTO MenuItem Values(7, 3, 07, 12.50);

INSERT INTO MenuItem Values(8, 3, 19, 13.50);

INSERT INTO MenuItem Values(9, 5, 13, 6.00);

INSERT INTO MenuItem Values(10, 5, 15, 15.00);

INSERT INTO MenuItem Values(11, 5, 22, 14.00);

See more about SQL atbrainly.com/question/13068613

#SPJ1

Which of the following is the outline of all the stages games go through when
being developed?
(1 point)
production cycle
design cycle
scientific method
alpha stages

Answers

Product Cycle is all the stages games go through when being developed.

What's product cycle?

The product cycle is the period of time from the morning of processing to the finished product during which stocks( raw accoutrements , accoutrements ,semi-finished corridor, and finished factors) live in the manufacturing process. It takes up some of the manufacturing time and comprises of processing and halting phases.

Product cycle for developing a game :

Stage 1 of the game development process :

Although each step in the game development process is important, the original planning cycle has a direct impact on all posterior cycles. It's critical to begin the process of creating a computer game by gathering details about the willed end product, similar as technological specifications.

Stage 2 The product :

The product stage, which is broken down into multiple internal stages, is the stage that takes the longest and requires the topmost labor.

Stage 3 Quality control :

A game of any complexity needs to be tested to insure that it's error-free and bug-free. This is due to the fact that a single issue can have a negative impact on both the stoner experience and the overall enjoyment of a game. As a result, functional,non-functional, and beta testing are constantly carried out.

 

Stage 4 Launch :

The final stage of game product is the product debut, which is largely anticipated by all. But the story does not end with launch. Indeed after a game is finished, there are generally still enough bugs and faults, thus the game development platoon keeps adding new features and perfecting the game coincidently with its release. At the same time, testers gather the first stoner feedback to help inventors make significant adaptations.

Stage 5 Post-production :

Fixes and upgrades need to be continually covered after a game is released on the request to insure that it's stable and performing as intended. Studios should immaculately release updates constantly to cleave to the evolving specialized specifications of platforms.

Learn more about production cycle of game developement click here:

https://brainly.com/question/26006886

#SPJ1

Consider a 3x4 rectangular shape room. Four computers are located at the four
corners of the room. The HUB is placed on the center of the room. Calculate the
minimum length of cables required to connect the computers in a network in each of the
following topologies:
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology

Answers

The minimum length of cables required to connect the computers in a network in each of the bus topology. Thus, option (a) is correct.

What is computers?

Computer is the name for the electrical device. In 1822, Charles Babbage created the first computer. The work of input, processing, and output was completed by the computer. Hardware and software both run on a computer. The information is input into the computer, which subsequently generates results.

According to givens the scenario was the justify are the 3×4 rectangular shape room there are the four computers are the set-up to the HUB is placed in the center of the room. The bus topology is the based on the networks are the subsequently.

As a result, the minimum length of cables required to connect the computers in a network in each of the bus topology. Therefore, option (a) is correct.

Learn more about on computers, here:

https://brainly.com/question/21080395

#SPJ2

You are trying to automate the sales of a car sales and distribution company in the
Western Cape. The work was supposed to be completed by your predecessor, but he
was unable to perform this task as he had a short stint in this job. However, he had
divided this complex task into manageable tasks for you using arrays. Analyse the
input/output of the desktop application below and answer the questions that follow.
a) Write Java statements to declare an array that will store the total car sales
values (int) for each month of the year

Answers

Using the knowledge of the computational language in python it is possible to write a code that Write Java statements to declare an array that will store the total car sales values (int) for each month of the year

Writting the code:

import javax.swing.*;

import java.util.*;

public class Sales{

       public static void main (String[] args) {

           int max=1000000,min=100000;

           int carSales[]= new int[12];

           for(int i=0;i< carSales.length;i++)

              carSales[i]=(int)(Math.random()*(max-min+1)+min);

           String month[]={"January","February","March","April","May","June","July","August","September","October","November","December"};

           int maxSale=carSales[0],index=0;

           for(int i=1;i< carSales.length;i++)

           {

               if(carSales[i]>maxSale)

               {

                   maxSale=carSales[i];

                   index=i;

               }

           }

           System.out.println(Arrays.toString(carSales));

           JFrame f=new JFrame();

           JOptionPane.showMessageDialog(f,"Highest Sale Value is "+maxSale+" which occur in month of "+month[index]);

           String Jmonth[]=new String[3];

           int count=0;

           for(int i=0;i< month.length;i++)

           {

               if(month[i].charAt(0)=='J')

               {

                   Jmonth[count]=month[i];

                   count++;

               }

           }

           JList list = new JList(Jmonth);

           JPanel panel = new JPanel();

           panel.add(new JScrollPane(list));

           JOptionPane.showMessageDialog(null, panel);

       }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.


Sample Run


What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop

Sample Output

What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

/*

What pet do you have? lemur

parrot

What pet do you have? cat

What pet do you have? stop

*/

string pet;

int num=1;

while (pet!="stop"){

cin>>pet;

cout<<"What pet do you have?";

if (pet!="stop"){

cout<<"you have one "<< pet<<" total numof # is "<<num++<<endl;

}

else{

cout<<"stop";

}

}

}

Explanation:

you did not specify the language so i went with c++

i used while loop which will keep asking the user for an input until he/she write stop in order to break the loop

first i declared the data type of the input

used it as a conditionin the while loop

then printed the input everytime the loop runs

Write Java statements to declare an array that will store the total car sales values (int) for each month of the year

Answers

The Java statements to declare an array that will store the total car sales values (int) for each month of the year is given below:

The Statement

int[] months = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12};

This given program gives each value for each month of the year and gives them a number from 1 to 12 which signifies the 12 months of the year:

January, February, March, April, May, June, July, August, September, August, October, November, and December.

Hence, for each sale made, it is computed and the total for each month is printed, along with each individual month and listed out as output.

Read more about java programming here:

https://brainly.com/question/18554491
#SPJ1

Which of the following is not used as an Internet security indicator?
A) shield icon
B) handshake icon
C) lock symbol
D) heart symbol

Answers

Internet security is not indicated by the shield icon.

What does "Internet security" mean?

A key element of cybersecurity is online security, which includes controlling risks and dangers posed by the Internet, online browsers, web apps, websites, and networks. Protecting consumers & corporate IT assets against online threats is the main objective of Online security systems.

What are the many methods of Internet security?

Access control, antivirus, security testing, network analytics, various forms of network-related safety (endpoint, online, wireless), firewalls, VPN encryption, and more are all included in network security.

To know more about Internet security visit:

https://brainly.com/question/27730901

#SPJ4

Answer:

it is A.

Explanation:

Explain the following :Union within structure union

Answers

Answer:

union with union structure

Explanation:

A ____ risk assessment evaluates threats to and vulnerabilities of the network.

Answers

Answer:

Vulnerability

Explanation:

Vulnerability refers to a weakness in your hardware, software, or procedures

Identification where Information Technology causes a hindrance to business processes

Answers

Identification where Information Technology causes a hindrance to business processes is one that is  Lacking an IT Plan.

Why is planning for information technology so crucial?

The organization's strategic goals and objectives may be achieved with the aid of this planning. The strategic IT plan should take into account how each of the organization's strategic business goals relates to technology as well as any modifications that will need to be made to the organization's information and communications infrastructure.

Note that So much so that a business will find it difficult to run efficiently without fully functional computers and access to emails and data. The consequences of data loss or corruption due to hardware failure, human mistake, hacking, or malware could be disastrous for any organization, it is a basic reality.

Learn more about Technology  from

https://brainly.com/question/25110079
#SPJ1

For this task you have the chance to show what you’ve learned about implementing repetition in code. You are required to create a program that uses the while loop structure.

Write a program that always asks the user to enter a number. When the user enters the negative number -1, the program should stop requesting the user to enter a number. The program must then calculate the average of the numbers entered excluding the -1.

Make use of the while loop repetition structure to implement the program.

Answers

Explanation:

#include <stdio.h>

main(){

int x,c=0,sum=0;

float a;

printf("enter a number (don't enter -1)\n");

scanf("%d",&x);

while(x!=-1){

c++;

sum+=x;

printf("enter a number(enter -1 to calculate the average)\n");

scanf("%d",&x);

}

a=float(sum)/c;

printf("the average is %.2f ",a);

}

Write a java program to find the average of any three numbers.​

Answers

import java.util.Scanner;

public class JavaExample {

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.print("Enter the first number: ");

double num1 = scan.nextDouble();

System.out.print("Enter the second number: ");

double num2 = scan.nextDouble();

System.out.print("Enter the third number: ");

double num3 = scan.nextDouble();

scan.close();

System.out.print("The average of entered numbers is:" + avr(num1, num2, num3) );

}

public static double avr(double a, double b, double c)

{

return (a + b + c) / 3;

}

}

The output is attached to the answer. You can also check it..

Explain why you would select the waterfall model to implement the baby monitoring system by describing the advantages of using the waterfall model in projects like this which consists of a large scope.

Answers

The waterfall model's benefits includes Teams must follow a set of stages in a waterfall process, never going on until each phase is finished. Smaller projects with clear-cut deliverables from the beginning are best suited for this framework.

Why did you choose waterfall model?

When a project must adhere to stringent guidelines, the waterfall technique is preferable because it calls for deliverables for each step before moving on to the next.

Note that As an alternative, Agile is better suited for teams who want to move quickly, experiment with direction, and start without knowing exactly how the project will turn out.

Therefore, The sequential Waterfall Model separates software development into pre-established segments. Before the following phase can start, each phase must be finished.

Learn more about Waterfall Model from

https://brainly.com/question/14079212
#SPJ1

What are the architectural features of the data storage system in each proposal

Answers

Answer:

Network storage architecture refers to the physical and conceptual organization of a network that enables data transfer between storage devices and servers. It provides the backend for most enterprise-level operations and allows users to get what they need

Explanation:

[SPECIAL]>>>WRITE THIS TEXT IN BINARY CODE

Answers

Answer: GET YOUR BONUS

in binary code

01000111 01000101 01010100 00100000 01011001 01001111 01010101 01010010 00100000 01000010 01001111 01001110 01010101 01010011

THX:

01010100 01001000 01000001 01001110 01001011 00100000 01011001 01001111 01010101

Answer:

01000111 01000101 01010100 00100000 01011001 01001111 01010101 01010010 00100000 01000010 01001111 01001110 01010101 0101001

What can help refine and narrow search results?
A) search strings
B) Boolean operators
C) algorithms
D) parentheses

Answers

The elements or features that can help refine and narrow search results are: B) Boolean operators.

What are Boolean operators?

Boolean operators can be defined as the specific words and symbols that are typically designed and developed to enable an end user in expanding or narrowing search parameters, especially when querying a database or search engine in order to generate focused and productive search results.

The types of Boolean operators.

In Computer technology, there are three (3) main types of Boolean operators and these include the following:

AND (multiplication)NOT (complementation)OR (addition)

In conclusion, a Boolean operator can help an end user in refining and narrowing his or her search results.

Read more on Boolean operator here: https://brainly.com/question/8897321

#SPJ1

Answer:

it is B.

Explanation:

What is a privacy data breach

Answers

Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.

Explanation:

Examples of a  data breach might include:

Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.

with aid of two examples, describe the use of merging of docments

Answers

Answer:

Answer down below

Explanation:

Q's Asked: With the aid of two examples, describe the use of merging of documents.

------------------------------------------------------------------------------------------------------------

Explanation of "merging documents":

What is the use of merging of documents?

Well merging documents is really only used for organization or systems where documents/ data are changed by different users or systems.

Anyway The requirements for "mail merging" is :

(a) Main Document,

(b) Data Source,

(c) Merge Document.

: Meaning of A horizontal merger: A horizontal merger is when competing companies merge—companies that sell the same products or services.

: Meaning of A vertical merger: A vertical merger is a merger of companies with different products. :3

Welp anyway back to the Q's: With the aid of two examples, describe the use of merging of documents.Umm some people that use "merging of documents", are horizontal mergers which increase market share, such as Umm... T-moblie and sprit bc they are both a phone company. vertical mergers which exploit existing synergies.  So like ummm.... a sports drink company and a car company combining together. hope this helps ~~Wdfads~~~

17 Can you determine Lack of Encryption and Security Misconfiguration in an organisation?

Answers

It is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

What do you mean by Security misconfiguration?

Security misconfiguration may be defined as a type of security control that is significantly configured or left insecure inaccurately by putting your systems and data at risk. It may arise when essential security settings are either not implemented or implemented with errors.  

A lack of encryption and security misconfiguration is easily determined by the employees of an organization. It may cause a potential threat to the organization by stealing all its personal and confidential information that harms the whole institution or organization.

Therefore, it is possible for the person to determine the lack of Encryption and Security Misconfiguration in an organization.

To learn more about Security misconfiguration, refer to the link:

https://brainly.com/question/29095078

#SPJ1

Which two features are most important for Virtual Reality to provide a smooth and enjoyable experience for the user?

Answers

Immersion and Interaction are the two most important features of virtual reality.

What is Immersion?

Immersion, also known as presence, refers to the degree of reality in which the viewer exists as the protagonist in the virtual environment. By wearing interactive devices such as helmet-mounted displays and data gloves, viewers can immerse themselves in a virtual environment and become a part of it.

What is Interaction?

Interaction refers to the user's ability to manipulate objects in the simulated environment as well as the natural degree of feedback from the real world. Human-computer interaction in VR technology is similar to natural interaction. There are two kinds of interactions: three-degree-of-freedom (3DoF) interactions and six-degree-of-freedom (6DoF) interactions.

What is Virtual reality (VR)?

Virtual reality (VR) is a simulated experience that uses pose tracking and 3D near-eye displays to immerse the user in a virtual world. A computer-generated simulation of a three-dimensional image or environment that can be interacted with in a seemingly real or physical way by a person wearing special electronic equipment, such as a helmet with a screen inside or gloves with sensors

To know more about Virtual Reality (VR), Kindly visit: https://brainly.com/question/13269501

#SPJ1

In reference to computers, what is a firewall?

A) letters, numbers, and special characters assigned to unlock accounts and websites
B) email attachments
C) an installed software element that protects and monitors incoming and outgoing data
D) a second copy of files saved to a cloud

Answers

Answer:

C) an installed software element that protects and monitors incoming and outgoing data

Explanation:

How computer networks help in storage capacity and volume

Answers

Answer:

Having a network of computers (especially a server) allows you to store things on the network instead of your own computer's drive.

Explanation:

A network is a grouping of computers. Some of these computers are usually servers, especially in medium-sized companies. An example is having a server unit (usually with something like an Intel Xeon processor, and with at least 64GB of RAM) with the main feature being mass storage. It's like your own personal cloud! You'll often see a couple of 10TB drives stashed into one. Everything anyone could need to access is on there, as well as everything they need to save. This really helps if you give your employees basic laptops for WFH.

As a cool anecdote, I have 5.5TB of storage and am using 90% of it. You can never have enough! The cost adds up too, with 2TB of typical Hard Drive storage being a $50 expense. With laptops, you usually need an external HDD, which is slightly more expensive. Hence, cloud/network.

What does Power Query use to change to what it determines is the appropriate data type?

Answers

Answer:

Power Query reads the table schema from the data source and automatically displays the data by using the correct data type for each column. Unstructured sources Examples include Excel, CSV, and text files. Power Query automatically detects data types by inspecting the values in the table.

The Power Query is used in Excel. It is used to transfer data from other data sources like text, web or other workbooks.

What is a power query?

Power Query extracts the table schema from the data source and uses the appropriate data type for each column to automatically display the data. unorganized sources Excel, CSV, and text files are a few examples. By looking at the values in the table, Power Query automatically determines the data types.

Power Query automatically adds two phases to your query when this setting is enabled: Encourage column headings: increases the prominence of the table's first row as the column header. Changed type: Examines the values from each column before changing the data types of the Any data type values.

Therefore, Excel makes advantage of the Power Query. Data from other data sources, including text, the web, and other workbooks, are transferred using it.

To learn more about power query, refer to the link:

https://brainly.com/question/29756007

#SPJ2

Format a paragraph border

Answers

The way that you can format a paragraph border  is by:

Pick a phrase, sentence, or paragraph. Click the arrow next to the Borders button on the Home tab. Select the border style you want to use by clicking it in the Borders gallery.

What is a paragraph border?

To format, this can also be done by:

Select the border style you want to use by clicking it in the Borders gallery. The page margins are not the same as these margins. To distinguish a document title or header, paragraph borders are frequently used.When several paragraphs are chosen, the border is applied to them all at once.

Therefore, Press Format. Select the line style you want to use for the border by clicking it in the Style box under Line on the Border tab. Choose the color you want to use from the Color box. To construct the border you want to use, click the border buttons under Border.

Learn more about paragraph from

https://brainly.com/question/1424157
#SPJ1

See full question below

How do you format a paragraph border

Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.

Answers

The way to increase this title for the thesis the negative influence of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in an economy.

What does a research thesis entail?

It is a position or assertion that you will support with research. A compelling thesis statement outlines the subject to be covered, condenses the key points, and persuades the reader to keep reading.

Therefore, The major topics that will be discussed in the essay should be summarized in the thesis. Many thesis statements hint at what will be discussed in the essay in addition to stating the argument to be made.

Learn more about thesis forming from

https://brainly.com/question/876674
#SPJ1

Implication if the intellectual property rights do not exist

Answers

Intellectual Property Rights (IPR) are  the creative rights over an original piece of work, invention or even an idea behind a business can come under the purview of Intellectual Property Rights Act.

Implication if the intellectual property rights do not exist

1.  Less research and development as nobody would reap benefits generated by their innovations.

2. Cultural and art vitality as they would not be made more according to their original work.

3. Job losses and economic issues as IPR helps in boosting both of these factors.

4. Healthcare and treatment would be at lost because of less innovation of useful vaccines.

5. Less emergence of startups with unique ideas, decline in innovative trade and a race backwards.

6. Counterfeiting of journals, research papers leading to a still situation.

Hence, these factors explain what would happen without IPR.

To know more about Intellectual property rights from the given link

https://brainly.com/question/24015145

#SPJ13

You wrote a pseudocode outline of your program using comments. Which character do you use to indicate a line is a comment? O # O/ O& O"​

Answers

It depends on the coding language but assuming you’re studying Python the correct way to comment is with # symbol
Other Questions
Write a 7 sentence paragraph with evidence from the text to show what happened to the African tribes and residents when the scramble for Africa took place Find the measure of the exterior angle. as a country develops economically from being very low income to higher income, what are the most important changes that occur in the country's burden of disease How can we statistically study the evolution of galaxies many billions of years ago?. part c - spherical pressure vessel a spherical pressure vessel is required to contain 1.8 m3 of compressed natural gas at 22 mpa . if the tank is made of a516 grade 60 steel with a maximum normal stress 150 mpa , what is the required thickness of the tank wall? In The Number Devil, the number devil's character helps to build on the point of the story by challenging Robert's negative view of numbers. getting himself into a difficult situation. asking Robert the origin of his pretzel tale. finding a unique way to solve a problem. Which of the following is not an example of how bacteria aid in the nitrogen cyclechanging nitrogen compounds into atmospheric nitrogennitrogen fixationbreaking down the tissue of dead organismsinfecting tissueanging nitrogen compounds into atmospheric nitrogen Mendel found that yellow pea pod color (G) was dominant to green pea pod color (g), and that round seeds (W) were dominant to wrinkled seeds (w) what percentage or each orthe phenotypes below are expected from the following cross? Ggww x ggwwYellow and roundYellow and wrinkledGreen and roundGreen and wrinkledA. 0%B. 25%C. 33%50%D.E.66%F. 75%G. 100% What happens should no presidential candidate receive the majority of electoral college votes?. larren buffett is concerned after receiving her weekly paycheck. she believes that her deductions for social security, medicare, and federal income tax withholding (fit) may be incorrect. larren is paid a salary of $4,100 weekly. she is married, claims 3 deductions, and prior to this payroll check, has total earnings of $128,245. what are the correct deductions for social security, medicare, and fit? assume a rate of 6.2% on $128,400 for social security and 1.45% for medicare. light of wavelength 585.0 nm illuminates a slit of width 0.80 mm. (a) at what distance from the slit should a screen be placed if the first minimum in the diffraction pattern is to be 0.95 mm from the central maximum? m (b) calculate the width of the central maximum. mm Help me with this question explain the difference between temperatures and physical characterisitics of mafic and felsic lava flows what is the driest place on earth? group of answer choices death valley, california sahara desert, north africa atacama desert, chile great sandy desert, australia Rich vs poor great gatsby According to "new isu study finds eyewitness memory susceptible to misinformation after testing," eyewitness testimonies can be inaccurate due to intentioned or unintentional __________. a. repression b. pseudoforgetting c. judgment d. misinformation although restrictive covenants can potentially reduce moral hazard, a problem with restrictive covenants is that Please answer all (french) which of the following is not a reason why the aggregate-demand curve slopes downward? a. the wealth effect b. the interest-rate effect c. the classical dichotomy/monetary neutrality effects d. the exchange-rate effect e. all of the above are reasons why the aggregate-demand curve slopes downward. The imperialist nation controlstrade and other business.