Use NAND operator to write; P or Q, and P -Q make an everyday implication sentence using only NAND

Answers

Answer 1

Answer:

Hence the answer is given as follows,

Explanation:

By using the NAND operator:-

P or Q and P -Q make an everyday implication sentence using the only NAND is given as,

Use NAND Operator To Write; P Or Q, And P -Q Make An Everyday Implication Sentence Using Only NAND

Related Questions

What is machine learning

Answers

Answer:

machine learning is the ability for computers to develop new skills and algorithms without specific instructions to do so.

Machine learning is a branch of artificial intelligence (AI) and computer science which focuses on the use of data and algorithms to imitate the way that humans learn, gradually improving its accuracy.

Java !!!
A common problem in parsing computer languages and compiler implementations is determining if an input string is balanced. That is, a string can be considered balanced if for every opening element ( (, [, <, etc) there is a corresponding closing element ( ), ], >, etc).
Today, we’re interested in writing a method that will determine if a String is balanced. Write a method, isBalanced(String s) that returns true if every opening element is matched by a closing element of exactly the same type. Extra opening elements, or extra closing elements, result in an unbalanced string. For this problem, we are only interested in three sets of characters -- {, (, and [ (and their closing equivalents, }, ), and ]). Other characters, such as <, can be skipped. Extra characters (letters, numbers, other symbols) should all be skipped. Additionally, the ordering of each closing element must match the ordering of each opening element. This is illustrated by examples below.
The following examples illustrate the expected behaviour:
is Balanced ("{{mustache templates use double curly braces}}") should return true
is Balanced("{{but here we have our template wrong!}") should return false
is Balanced("{ ( ( some text ) ) }") should return true
is Balanced("{ ( ( some text ) } )") should return false (note that the ordering of the last two elements is wrong)
Write an implementation that uses one or more Stacks to solve this problem. As a client of the Stack class, you are not concerned with how it works directly, just that it does work.

Answers

Answer:

Explanation:

import java.util.*;

public class BalancedBrackets {

// function to check if brackets are balanced

static boolean isBalanced(String expr)

{

Stack<Character> stack = new Stack<Character>();

for (int i = 0; i < expr.length(); i++)

{

char x = expr.charAt(i);

if (x == '(' || x == '[' || x == '{')

{

// Push the element in the stack

stack.push(x);

continue;

}

if (stack.isEmpty())

return false;

char check;

switch (x) {

case ')':

check = stack.pop();

if (check == '{' || check == '[')

return false;

break;

case '}':

check = stack.pop();

if (check == '(' || check == '[')

return false;

break;

case ']':

check = stack.pop();

if (check == '(' || check == '{')

return false;

break;

}

}

// Check Empty Stack

return (stack.isEmpty());

}

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.println("\nEnter the expression to check is balanced or not !");

String expr = scan.nextLine();

boolean output;

output = isBalanced(expr);

System.out.println(output);

if (output)

System.out.println("Balanced ");

else

System.out.println("Not Balanced ");

scan.close();

}

}

Write a function int checkBalance(char exp[]); that can take an expression as input and check whether the parenthesis used in that expression are valid or invalid. It returns 1 if it is valid, and returns 0 if it is not valid.For example, the following expressions are valid: [ A * {B (C D)}] and [{()()}]The following expressions are invalid: [ A * {B (C D})], [ { ( ] ) ( ) }

Answers

Answer:

Explanation:

The following code is written in Java. It uses for loops to loop through the array of characters, and uses IF statements to check if the symbols in the expression are balanced. If so it returns true, otherwise it breaks the function and returns false. Two test cases have been provided in the main method and the output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       char[] exp = { '[', 'A', '*', '{', 'B', '(', 'C', 'D', ')', '}', ']'};

       char[] exp2 = {'[', 'A', '*', '(', 'C', '}', ']'};

       System.out.println(checkBalance(exp));

       System.out.println(checkBalance(exp2));

   }

   public static boolean checkBalance(char exp[]) {

       ArrayList<Character> symbols = new ArrayList<>();

       for (char x: exp) {

           if ((x =='[') || (x == '{') || (x == '(')) {

               symbols.add(x);

           }

           if (x ==']') {

               if (symbols.get(symbols.size()-1) == '[') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

           if (x =='}') {

               if (symbols.get(symbols.size()-1) == '{') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

           if (x ==')') {

               if (symbols.get(symbols.size()-1) == '(') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

       }

       return true;

   }

}

Can anyone decipher these? There a bit random. Maybe binary but if there are other ways please include them.​

Answers

Answer:

Explanation:

so this is what "format" is about,   it's saying what do the ones and zeros represent.   b/c the bits can represent lots of different things ,  like letters with ascii code ,   and that's got several types.  some are 8 bits,  some are 16 bits,  the questions  you've shown are in groups of 5 which is really not a "thing" in binary,  it's always by twos,   without some type of  "frame work"  around the bits, we won't know what they represent,  if that is helping?   the important part is what is the "frame work"   that these bits are in.

all of your questions seem to have some  "art"  thing going on,  they make some kinda of binary artwork,  for what they are saying, that's not what's important.  Other than if they form  palindromes,   maybe that's what the questions are really about, how these do from palindromes, that is, they read the same backwards as forwards... I know.. why would anyone read backwards.. but a computer can do that pretty quickly,  sooo sometimes to check,  it will read  forwards and backwards.. but when there is a palindrome,  the computer is "confused"  

this is also a big big part of  "typing"  not like on a keyboard but when you program, and you say that  your variables are of a certain type,  like a char, or a string, or a double, you are specifying how many bits will be used to represent your data.  so then when you put the ones and zeros into the memory ,  ( think RAM)  then it's stored in groups of what ever size you've determined.    hmmmm   does this help?


The part of the computer that provides access to the Internet is the

Answers

Answer:

MODEM

Explanation:

Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Answers

Answer:

Denial of service attack.

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, DOS attack, etc.

A denial of service (DOS) attack is a form of cyber attack that involves either the exploitation of a software flaw or overwhelmingly floods a computer system in a network with traffic in order to prevent authorized users from performing legitimate activities or transactions.

Some of the ways to prevent vulnerability or cyber attacks in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

Create and configure databases in oracle database management system operation administration

Answers

Answer:

You typically create a database during Oracle Database software installation. However, you can also create a database after installation.

Reasons to create a database after installation are as follows:

You used Oracle Universal Installer (OUI) to install software only, and did not create a database. You want to create another database (and database instance) on the same host computer as an existing Oracle database. In this case, this chapter assumes that the new database uses the same Oracle home as the existing database. You can also create the database in a new Oracle home by running OUI again. You want to make a copy of (clone) a database.

Complete the AscendingAndDescending application so that it asks a user to enter three integers. Display them in ascending and descending order.An example of the program is shown below:Enter an integer... 1 And another... 2 And just one more... 3 Ascending: 1 2 3 Descending: 3 2 1GradingWrite your Java code in the area on the right. Use the Run button to compile and run the code. Clicking the Run Checks button will run pre-configured tests against your code to calculate a grade.Once you are happy with your results, click the Submit button to record your score.

Answers

Answer:

Following are the solution to the given question:

import java.util.Scanner;//import package

public class AscendingAndDescending//defining a class AscendingAndDescending  

{

   public static void main(String[] args) //main method

   {

       int n1,n2,n3,min,max,m;

       Scanner in = new Scanner(System.in);//creating Scanner class object

       System.out.print("Enter an integer: ");//print message

       n1 = in.nextInt();//input value

       System.out.print("And another: ");//print message

       n2 = in.nextInt();//input value

       System.out.print("And just one more: ");//print message

       n3 = in.nextInt();//input value

       min = n1; //use min variable that holds value

       max = n1; //use mix variable that holds value

       if (n2 > max) max = n2;//use if to compare value and hols value in max variable

       if (n3 > max) max = n3;//use if to compare value and hols value in max variable

       if (n2 < min) min = n2;//use if to compare value and hols value in min variable

       if (n3 < min) min = n3;//use if to compare value and hols value in min variable

       m = (n1 + n2 + n3) - (min + max);//defining m variable that arrange value

       System.out.println("Ascending: " + min + " " + m + " " + max);//print Ascending order value

       System.out.println("Descending: " + max + " " + m + " " + min);//print Descending order value

   }

}

Output:

Enter an integer: 8

And another: 9

And just one more: 7

Ascending: 7 8 9

Descending: 9 8 7

Explanation:

In this program inside the main method three integer variable "n1,n2, and n3" is declared that inputs value from the user end and also defines three variable "min, max, and m" that uses the conditional statement that checks inputs value and assigns value according to the ascending and descending order and prints its values.

Which key should you press to leave the cell as it originally was?

Answers

Answer:

Backspace.

Explanation:

Cancel Button you should press to leave the cell as it originally was. Cancel Button you should press to leave the cell as it originally was. This answer has been confirmed as correct and helpful.

Backspace is press to leave the cell as it originally was.

What is Backspace key?

The Backspace key is situated in the top-right corner of the character keys part of the keyboard.

Backspace is replaced by a "delete" key on Apple computers, although it serves the same purpose.

There are no "backspace" keys on an Android or Apple iPhone smartphone or iPad tablet, but there is a key that serves the same purpose. Look for a key that resembles an arrow with a "X" or an arrow pointing left, as illustrated in the image.

Therefore, Backspace is press to leave the cell as it originally was.

To learn more about backspace, refer to the link:

https://brainly.com/question/29790869

#SPJ2

Discuss why databases are important in accounting information systems. Describe primary and foreign keys, normalization and database cardinalities. Why are each important to the database design

Answers

Answer:

ensure integrity. primary key is unique key..foreign key is to connect 2 table.normalization to ensure you keep track on what you should do to create db..

A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email, browsing and Office software. In addition, 25 of them also do a large number of client/server requests into a database system. Which local area network operating system would you recommend?

Answers

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

Using Python suppose an array sorted in ascending order is rotated at some pivot unknown to you beforehand. (i.e., [0,1,2,4,5,6,7] might become [4,5,6,7,0,1,2]).
You are given a target value to search. If found in the array return its index, otherwise return “The input is not on this list”
You may assume no duplicate exists in the array.
Hint: Use a function. Use the built in method .index( ) and/or for loops.

Answers

Answer:

Explanation:

class Solution {

   public int search(int[] nums, int target) {

       int n = nums.length;

       int low = 0 , high = n - 1;

       While(low < high){//Set virtual node

           int mid = (low + high) / 2;

           if(nums[mid] > nums[high]){

               low = mid + 1;

           }else{

               high = mid;

           }

       }

       int rot = low;

       low = 0;

       high = n - 1;

       while(low <= high){

           int mid = (low + high) / 2;

                        Int real = (mid + rot) % n;//The virtual node is mapped to the real node.

           if(nums[real] == target){

               return real;

           }else if(nums[real] < target){

               low = mid + 1;

           }else{

               high = mid - 1;

           }

       }

       return -1;

   }

}

The purpose of the five-entity minimum, six-entity maximum is to establish a relatively small baseline for you to keep the scope of your database project constrained.

a. True
b. False

Answers

It would have to be false ^

Explain the following terms.
a) Explain Final keyword with example. b) Define Static and Instance variables

Answers

Answer:

A.

the final keyword is used to denote constants. It can be used with variables, methods, and classes. Once any entity (variable, method or class) is declared final , it can be assigned only once.

B.

Static variables are declared in the same place as instance variables, but with the keyword 'static' before the data type. While instance variables hold values that are associated with an individual object, static variables' values are associated with the class as a whole.

how to Write a simple Java socket programming that a client sends a text and server receives and print.

Answers

Answer:

Java Socket programming is used for communication between the applications running on different JRE.

Java Socket programming can be connection-oriented or connection-less.

Socket and ServerSocket classes are used for connection-oriented socket programming and DatagramSocket and DatagramPacket classes are used for connection-less socket programming.

The client in socket programming must know two information:

IP Address of Server, and

Port number.

Here, we are going to make one-way client and server communication. In this application, client sends a message to the server, server reads the message and prints it. Here, two classes are being used: Socket and ServerSocket. The Socket class is used to communicate client and server. Through this class, we can read and write message. The ServerSocket class is used at server-side. The accept() method of ServerSocket class blocks the console until the client is connected. After the successful connection of client, it returns the instance of Socket at server-side.

Explanation:

Creating Client:

import java.io.*;

import java.net.*;

public class MyServer {

public static void main(String[] args){

try{

ServerSocket ss=new ServerSocket(6666);

Socket s=ss.accept();//establishes connection.

DataInputStream dis=new DataInputStream(s.getInputStream());

Write a recursive function that calculates the sum 11 22 33 ... nn, given an integer value of nin between 1 and 9. You can write a separate power function in this process and call that power function as needed:

Answers

Answer:

The function in Python is as follows:

def sumDig(n):

if n == 1:

 return 11

else:

 return n*11 + sumDig(n - 1)

Explanation:

This defines the function

def sumDig(n):

This represents the base case (where n = 1)

if n == 1:

The function returns 11, when it gets to the base case

 return 11

For every other value of n (n > 1)

else:

This calculates the required sum recursively

 return n*11 + sumDig(n - 1)

Base conversion. Perform the following conversion (you must have to show the steps to get any credit.
3DF16 = ?

Answers

Base to be converted to was not included but we would assume conversion to base 10(decimal)

Answer and Explanation:

The 3DF in base 16 is a hex number so we need to convert to its equivalent binary/base 2 form:

We therefore each digit of given hex number 3DF in base 16 to equivalent binary, 4 digits each.

3 = 0011

D = 1101

F = 1111

We then arrange the binary numbers in order

3DF base 16 = 1111011111 in base 2

We then convert to base 10 =

= 1x2^9+1x2^8+1x2^7+1x2^6+0x2^5+1x2^4+1x2^3+1x2^2+1×2^1+1×2^0

= 991 in base 10

Register the countChars event handler to handle the keydown event for the textarea tag. Note: The function counts the number of characters in the textarea.
Do not enter anything in the HTML file, put your code in the JavaScript section where it says "Your solution goes here"
1 klabel for-"userName">user name: 2
3

Answers

Answer:

Explanation:

The following Javascript code is added in the Javascript section where it says "Your solution goes here" and counts the current number of characters in the text within the textArea tag. A preview can be seen in the attached image below. The code grabs the pre-created variable textareaElement and attached the onkeypress event to it. Once a key is pressed it saves the number of characters in a variable and then returns it to the user.

var textareaElement = document.getElementById("userName");

function textChanged(event) {

   document.getElementById("stringLength").innerHTML = event.target.value.length;

}

// Your solution goes here

textareaElement.onkeypress = function() {

   let numOfCharacters = textareaElement.value.length;

   return numOfCharacters;

};

Describe how keyboard software works and which problems does keyboard software
need to handle?

Answers

Answer:

The target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location.

No physical sensation of pressing a button results in misfires. Lack of physical divisions between keys makes touch typing impossible. Smaller key spacing results in typos.

Write a partial class that shows a class constant and an instance method. Write an instance method that converts feet to inches using a class constant representing the number of inches in one foot. The value passed to the method represents the distance in feet.

Answers

Answer:

Please the code snippet below, the code was writen in Kotlin Language

Explanation:

const val inches:Int= 12 .   //This is the const value

fun main(args: Array<String>) {

 //this will ask the user for input

   print("Enter a number")            

  //this will do the conversion

var valueInFeet= Integer.valueOf(readLine())*inches

   print("The value in feet is $valueInFeet feet(s)")  

   }

Briefly explain what an array is. As part of your answer make use of a labelled example to show the declaration and components of an array

Answers

Answer:

Explanation:

In programming an array is simply a grouping of various pieces of data. Various data elements are grouped together into a single set and saved into a variable. This variable can be called which would return the entire set which includes all of the elements. The variable can also be used to access individual elements within the set. In Java an example would be the following...

int[] myArray = {33, 64, 73, 11, 13};

In Java, int[] indicates that the variable will hold an array of integers. myArray is the name of the variable which can be called to access the array elements. The elements themselves (various pieces of data) are located within the brackets {}

Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices A compilation error will occur. A run time error will occur. An inheritance error will occur. No problem will occur at all.

Answers

Answer:

A compilation error will occur.

Explanation:

The % operator does not accept a float as its right-hand operand.

command create database in oracle database ::((

Answers

Answer:

kdkskskiisidiodoosooddodod

Tips for Interactions with Personalized LinkedIn Outreach?

Answers

Answer:

Follow the best strategies for personalized LinkedIn outreach through 2021.

 

Run an Outreach Campaign for niche-specific People Collect Data about your Audience Keep your message short Save your Sale Pitches for later Give them a reason to reply to you

A technician needs to manage a Linux-based system from the GUI remotely. Which of the technician should the technician deploy

Answers

Complete Question:

A technician needs to manage a Linux-based system from the GUI remotely.  Which of the following technologies should the technician deploy?

A. RDP  

B. SSH  

C. VNC  

D. Telnet

Answer:

Managing a Linux-based System from the GUI Remotely

The technology that the technician should deploy to manage the Graphic User Interface (GUI) remotely is:

C. VNC

Explanation:

VNC stands for Virtual Network Computing. This computing technology enables a remote user to access and control another computer to execute commands. It acts as a cross-platform screen-sharing system and is used to remotely access and control another computer. VNC makes a computer screen, keyboard, and mouse available to be seen and used from a remote distance.  The remote user does everything from a secondary device without being in front of the primary computer or device.  An example of a good VNC is TeamViewer.

List safety conditions when downloading shareware, free free where, or public domain software

Answers

Answer:

Explanation:

Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.

Some of the necessary safety conditions that should be taken include;

1) Appropriate research about the software including taking more about the vendors and reviews.

2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.

3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.

4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.

You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface element that accepts user input. This user interface will be reused across several other applications in the organization. None of the controls in the Visual Studio toolbox meets your requirements; you need to develop all your code in house.

Required:
What actions should you take?

Answers

Answer:

The answer is "Developing the custom control for the user interface"

Explanation:

The major difference between customized control & user control would be that it inherit throughout the inheritance tree at different levels. Usually, a custom power comes from the system. Windows. UserControl is a system inheritance.

Using accuracy up is the major reason for designing a custom UI control. Developers must know how to use the API alone without reading the code for your component. All public methods and features of a custom control will be included in your API.

You are given a sequence of n songs where the ith song is l minutes long. You want to place all of the songs on an ordered series of CDs (e.g. CD 1, CD 2, CD 3,... ,CD k) where each CD can hold m minutes. Furthermore, (1) The songs must be recorded in the given order, song 1, song 2,..., song n. (2) All songs must be included. (3) No song may be split across CDs. Your goal is to determine how to place them on the CDs as to minimize the number of CDs needed. Give the most efficient algorithm you can to find an optimal solution for this problem, prove the algorithm is correct and analyze the time complexity

Answers

Answer:

This can be done by a greedy solution. The algorithm does the following:  

Put song 1 on CD1.

For song 1, if there's space left on the present CD, then put the song on the present CD. If not, use a replacement CD.

If there are not any CDs left, output "no solution".

Explanation:  

The main thing is prove the correctness, do that by the "greedy stays ahead argument". For the primary song, the greedy solution is perfect trivially.  

Now, let the optimal solution match the greedy solution upto song i. Then, if the present CD has space and optimal solution puts song (i+1) on an equivalent CD, then the greedy and optimal match, hence greedy is not any worse than the optimal.Else, optimal puts song (i + 1) on subsequent CD. Consider an answer during which only song (i + 1) is moved to the present CD and zip else is modified. Clearly this is often another valid solution and no worse than the optimal, hence greedy is not any worse than the optimal solution during this case either. This proves the correctness of the algorithm. As for every song, there are constantly many operations to try to do, the complexity is O(n).

Explain why you want a USB hub if there are already USB ports in the computer.

Answers

Answer:

Powered USB hubs provide their own power supply for devices. Typically, when you connect a device to your computer via USB, the device draws upon your computer's power to function. Powered USB hubs come with their own power source and provide power for your connected devices so your computer doesn't have to.

Explanation:

Please Mark me brainliest

how an operating system allocates system resources in a computer​

Answers

Answer:

The Operating System allocates resources when a program need them. When the program terminates, the resources are de-allocated, and allocated to other programs that need them

Other Questions
Select the correct statement(s) regarding network physical and logical topologies.a. While logical topologies can be configured in star, ring, bus, and tree configurations, the physical topology must always be in a full-mesh topologyb. logical topologies always incorporate centralized access, whereas physical topologies are always configured as a distributed access networkc. the physical topology addresses how devices are connected, while a logical topology addresses how devices actually communicate to one anotherd. all statements are correct What is the most widely accepted theory on how early humans migrated to North America? Which cause and effect relationship in broken chain relates to the theme even when you have problems with your family, in the end you can count on them What two events led to the beginning of European exploration? What were two effects of the invention of the compass on China during the Middle Ages? Paauto A: Isulat sa papel ang alpabetong Ingles at bilang I hanggang 10 sa istilongRoman ng pagleletra. How do you feel when you buy a product that is overpriced? Laura: Eva es muy simptica, __________?Marc: S, ella es muy simptica.A. por lo tantoB. nadaC. ningunoD. no es cierto Thanks for helping me two more problems Requirements:Tienes suerte!Your parents have decided to let you plan your next family vacation. You get to pick between Chile, Ecuador, or Peru and what you need to do to prepare.*Note: The sample sentences in parentheses are just a guide to help you form your sentences. You must come up with your own original answers keeping academic integrity intact.Give one sentence to state which country (Chile, Ecuador, or Peru) you and your family are going to travel and when (season, month, etc.), using the correct form of the verb ir + a + infinitive. (e.g., My family and I are going to visit Spain this summer.)Give one sentence to state one thing you have to do before going on the trip, using the correct form of the verb tener + que + infinitive. (e.g., I have to check a map of Spain.)Give one sentence to state at least two things your parents have to put in the suitcase, using the correct form of the verb tener + que + infinitive. (e.g., My parents have to put the camera and our clothes in the suitcase.)Give one sentence stating at least two things you and your family are going to do and where, using the correct form of the verb ir + a + infinitive. (e.g., We are going to take a bus excursion around the city of Barcelona, and we are going to explore the river Onyar.)Give one sentence stating how you feel about the trip using the correct form of the verb estar. (e.g., I am very excited for the trip!) Yo ____ en el parque. A. patino B. patinar C. patinamos D. patina Tom goes to the book fair where paperback books are $3 and hardback books are $5.50. Travisbuys three paperback and four hardback books. How much change will Travis receive from a $50bill1.Equation/Expression:2. Solve: According to psychologists who support the feedback hypothesis of emotion, if you want to be happy, you should Express the following the number indecimalform - 2536 Determine whether the phrase below is a sentence or a fragment.While we were in Greece, we ate a lot of feta cheese.a.Sentenceb.Fragment What is 6.273 rounded to the nearest thousandths? What is y=-2(x+3)^2+2 The elemental mass percent composition of succinic acid is 40.68% CC, 5.12% HH, and 54.19% OO. Determine the empirical formula of succinic acid. If the demand for a product was 16, 28, 20 and 24 units in four consecutive months, and the corresponding forecasts in those four months were 20, 16, 20 and 30 units respectively, what is the MAD at the end of four months Find (f9)(x). A.B.C.D.