Which constructs break or bend the normal functional programming rules of scheme?

Answers

Answer 1

Lambda constructs break or bend the normal functional programming rules of scheme.

Programming languages in the Lisp family include Scheme. The Lambda Papers are a collection of memoranda that were disclosed by Guy L. Steele and Gerald Jay Sussman, who developed Scheme at the MIT AI Lab in the 1970s.

It was the first Lisp dialect to choose for lexical scope and the first to demand tail-call optimization from implementations, providing stronger support for functional programming and related strategies like recursive algorithms. The first programming language to offer first-class continuations was this one. It significantly influenced the work that went into creating Common Lisp.

The official IEEE standard[2] and a de facto standard known as the Revised Report on the Algorithmic Language Scheme both contain standards for the Scheme language (RnRS). R5RS is a commonly used standard (1998). [3] "R7RS-small" is the most recent Scheme standard to be ratified (2013). [4] In 2007, the R6RS, which is more extensive and modular, was approved. [5] Both are descended from R5RS, and the sequence below shows the ratifications in chronological order.

To know more about scheme click on the link:

https://brainly.com/question/17466042

#SPJ4


Related Questions

Mario wants to make his document more accessible to those who do not have access to a Word application. He decides to save his Word document to another format.

Which series of steps does Mario need to do this task?

A. Click the File tab, click Save, click PDF, and click Save.
B. Click the File tab, click Save As, click PDF, and click Save.
C. Click the File tab, click Save As, click Word document, and click Save.
D. Click the File tab, click Save As, click Excel document, and click Save.

Answers

B would be the best answer. When you save as an excel document, you would need Office, but as the question states, those who do not have Office would not be able to access the document. Your best answer is to save it as a PDF a y clicking “Save As”, because clicking “save” just saves the document as a default format.

Answer: answer is b

Explanation:

what is active directory? check all that apply.

Answers

An active directory is Microsoft's implementation of a directory server and An LDAP-compatible directory server.

What is an active directory?

Active Directory (AD) is a database service and set of others services developed by Microsoft for Windows domain networks. It's aim is to connect users with the network resources they need to get their work done. It is included in most Windows Server operating systems as a set of processes and services.

Here's the complete question:

What is an active directory? check all that apply.

a. An open source directory server

b. A windows-only implementation of a directory server

c. Microsoft's implementation of a directory server

d. An LDAP-compatible directory server

Learn more Active directory from:

https://brainly.com/question/27960590?referrer=searchResults

#SPJ4

Which of these are part of the five primary elements that make up a post-mortem report?

a. A summary
b. Backup procedures
c. A timeline
d. Resolution and recovery steps
e. A root cause description
f. Recommended future action items

Answers

Option a, c and d are correct. A summary, a timeline, resolution and recovery steps are part of the five primary elements that make up a post- mortem report.

A disaster recovery plan (DRP) is a written, organized strategy that outlines how a company can quickly restart operations following an unanticipated occurrence. A business continuity plan must include a disaster recovery plan.

It is used in relation to organizational components that are dependent on an effective information technology (IT) infrastructure. A disaster recovery plan seeks to assist an organization in resolving data loss and recovering system functioning so that it can function even if it functions at a low level following an incident.

The disaster preparedness strategy comprises of actions to lessen the consequences of a disaster so that the company can carry on with operations or swiftly restart mission-critical tasks. An study of business processes and continuity requirements is typically part of a DRP.

To know more about recovery click on the link:

https://brainly.com/question/1528638

#SPJ4

If a computer system can be equated to a layer cake, which of the following combinations represents the computer system in the bottom-to-top order?

a. Hardware, operating system, application, user
b. Application, operating system, hardware, user
c. Operating system, hardware, user, application
d. User, application, hardware, operating system
e. User, operating system, hardware, application

Answers

Option A Hardware, operating system, application, user represents the computer system in the bottom-to-top order.

A computer is a digital electrical device that may be configured to do automatic computations using a series of mathematical or logical processes. Programs are generic sets of operations that modern computers are capable of performing. Computers can now carry out a variety of activities thanks to these applications. It is used to run all programing languages. As the primary window for Internet connection, a computer is an essential instrument for gaining access to and processing information and data. It work on machine learning program.  It is a crucial resource for science students, who typically use it to create their academic reports and projects. Computers are utilized in households for a variety of activities including online bill payment, watching movies or television shows at home, home tutoring, access to social media, playing games, and internet access. Through email, they facilitate contact.

Learn more about computer here:

https://brainly.com/question/21474169

#SPJ4

webtel services, inc. and acme co. sign a document which states that webtel services will create a web page for acme and that acme will pay for this work. this is an example of a(n):

Answers

Sign a document which states that Webtel Services will create a web page for Acme and that Acme will pay for this work. This is an example of a: bilateral, express contract.

What is express contract?The terms by which the parties agree to be bound are stated either orally, in writing, or in a combination of both, at the time the exchange of promises is made. The express agreement need not be formal or written. It simply calls for the parties to state their intentions in writing. Example: Someone explicitly offers to sell another individual a widget. By declaring that she will accept the offer, the other person accepts it. Express contracts show commitments established between parties with specific terms and restrictions. Implied agreements are created between parties based on their actions.The sign a contract stating that Webtel Services will develop a website for Acme, and that Acme will be responsible for paying for the service. This is an illustration of an explicit, bilateral contract.

To learn more about express contract refer to:

https://brainly.com/question/2669219

#SPJ4

Which of the following is true about half-duplex mode?

a. It requires switches with dedicated switch ports.
b. The device can send and receive at the same time.
c. Collision detection is turned on.
d. Collision detection is turned off.

Answers

option c is true It is activated to detect collisions. Only one way at a time can be sent or received by the gadget. This communication must be used by all hub-connected devices.

When a collision is detected in a collision-detection system, the transmitting devices will suspend communications for an undetermined period of time before attempting to communicate again. This random pause is intended to prevent both devices from trying to re-transmit at once and colliding once more. When two or more devices attempt to send a frame at the same time over half-duplex Ethernet (full-duplex will be discussed below), collisions take place. Each device delays (backs-off) for a random period of time before retrying when frames clash since the frame must be retried. When two devices connected to the same Ethernet network attempt to send data at precisely the same time on a half-duplex Ethernet network, a collision occurs.

Learn more about collision here:

https://brainly.com/question/13138178

#SPJ4

In the context of networks, the term "topology" refers to the order and arrangement of the elements of a communications network.

a. True
b. False

Answers

The statement is true. Network topology describes the physical and logical relationships between nodes in a network, as well as the schematic arrangement of links and nodes, or some hybrid of the two.

Network topology is used to define the layout, structure, and shape of a network, both physically and logically. A network can have a single physical topology and multiple logical topologies at the same time. The physical connections of devices such as wires, cables, and others are referred to as network layout. The geometric arrangement of links and nodes in a computing network is referred to as network topology. Network topology, on the other hand, may describe how data is transferred between these nodes. Network topologies are classified into two types: physical and logical.

Learn more about topology here-

https://brainly.com/question/13186238

#SPJ4

Which of the following takes place at the presentation layer?
A. Email
B.Encryption
C. File transfer
D. FTP

Answers

Answer:  The correct answer is B. Encryption

Explanation:  The presentation layer is the GUI or end-user interface where information is displayed (such as a web page), so encryption takes place during the process to protect the data being displayed (for example using HTTPS protocols).

What do RFC 349 and RFC 1700 have in common?

Answers

Answer: Both rfc 349 and rfc 1700 have an assignment number and both have wide standard functions.

Explanation:

They also offer applications that offer link, socket, port, and protocol.

RFC 349 and RFC 1700 have in common that they both are Request for Comments documents.

What is the difference between an RFC and a standard?

A Request for Comments (RFC) or collection of RFCs serves as the documentation for an Internet Standard. An Internet Draught of a specification that will eventually become a Standard or a component of a Standard is approved and published as an RFC by the RFC Editor and given the designation of a Proposed Standard after going through multiple revisions.

RFC 1700 and RFC 349 both have an assigned number and a broad range of standard functions. Aside from that, they provide programs that give connections, sockets, ports, and protocols.

The IETF is in charge of updating and maintaining the RFCs, which are technical and organizational papers that outline numerous Internet standards. 5. The fact that RFC 349 and RFC 1700 are both Requests for Comments (RFC) publications unites them.

Learn more about RFC here:

https://brainly.com/question/12950573

#SPJ2

you are managing a network and have used firewalls to create a screened subnet. you have a web server that internet users need to access. it must communicate with a database server to retrieve product, customer, and order information. how should you place devices on the network to best protect the servers? (select two.)

Answers

Since It must communicate with a database server to retrieve product, customer, and order information,  the way that you should place devices on the network to best protect the servers are option B and E:

Put the database server on the private network.Put the web server inside the screened subnet.What is a database server used for?

Database servers are used to host, maintain, and grant authorized users access to databases that are kept on the server. The data is kept on this kind of server in a centralized location where frequent backups can be made. Additionally, it enables users and programs to access network-wide data from a single location.

Note that a piece of hardware that runs database software is called a database server. Users and businesses can store, handle, retrieve, update, as well as been able to modify files, information logs, and other forms of digital data with the use of database software.

Hence, It might be anything, such as a straightforward grocery list, a photo gallery, or the enormous amount of data in a business network. A database is required in order to add, access, and process data stored in a computer database.

Therefore, by using the two process above, one can be able to handle the issues with the communication.

Learn more about database server from

https://brainly.com/question/23752341
#SPJ1

See full question below

You are managing a network and have used firewalls to create a screened subnet. You have a web server that internet users need to access. It must communicate with a database server to retrieve product, customer, and order information.

How should you place devices on the network to best protect the servers? (Select two.)

Put the web server on the private network.

Put the database server inside the screened subnet.

Put the database server on the private network.

Put the database server and the web server inside the screened subnet.

Put the web server inside the screened subnet.

write the python code to calculate the admission rate for each major and store it in the column admission rate.

Answers

The python code to calculate the admission rate for each major and store it in the column admission rate is junior=df["School Year"] == "junior"] standard_deviation = junior["Hours of Sleep"].std()

Python is an interpreted, object-oriented, high-level, dynamically semantic programming language. It is particularly desirable for Rapid Application Development as well as for usage as a scripting or glue language to tie existing components together due to its high-level built-in data structures, dynamic typing, and dynamic binding.

Python's straightforward syntax prioritizes readability and makes it simple to learn, which lowers the cost of program maintenance. Python's support for modules and packages promotes the modularity and reuse of code in programs. For all popular platforms, the Python interpreter and the comprehensive standard library are freely distributable and available in source or binary form.

Python is a powerful, interactive, object-oriented, and interpreted scripting language. Python has been created to be very readable. It has fewer syntactical dynamic structures than other languages and typically employs English keywords rather than punctuation.

To know more about python click on the link:

https://brainly.com/question/13437928

#SPJ4

depth-first search always expands at least as many nodes as a search with an admissible heuristic

a. True
b. False

Answers

Option b is correct. It is false that depth-first search always expands at least as many nodes as a search with an admission heuristic.

By good luck, depth-first search may occasionally extend fewer nodes than A* search with an acceptable heuristic. For instance, it is conceivable that occasionally, via good fortune, depth-first search may march directly to the objective without making any detours.

A node is the fundamental building block of a data structure like a linked list or tree. Nodes can link to other nodes and also store data. Pointers are frequently used to implement links between nodes.

Tree topologies are frequently formed from nodes. A node is a representation of the data that makes up a single data structure. These nodes might include a value or a condition, act as another independent data structure, or both.

A single parent node serves to symbolize a node. A root node is the highest node in a tree structure; it lacks a parent node but acts as the parent or "grandparent" of all nodes below it in the tree.

To know more about nodes click on the link:

https://brainly.com/question/28485562

#SPJ4

what are the components that make up a cryptosystem? check all that apply.

Answers

The components that make up a cryptosystem are plaintext, encryption algorithm, ciphertext, decryption algorithm, decryption key.

A cryptosystem is a system that uses cryptographic methods and supporting tools to offer information security services. A cryptographic key, a string of bits utilized by a cryptographic algorithm to convert plain text into ciphertext or the other way around, lies at the core of all cryptographic activities. To carry out this kind of action, a cryptographic algorithm requires the key as one of the variables in the data it receives as input.

In order to securely encode or decode messages, a cryptosystem is a structure or scheme made up of a collection of algorithm that transform plaintext into ciphertext.

The abbreviation "cryptosystem" stands for "cryptographic system" and designates a computer system that uses cryptography, a technique for encrypting data and communications so that only the intended recipients can read and process them.

To know more about cryptosystem click on the link:

https://brainly.com/question/28270115

#SPJ4

in the osi model, which of the following functions are performed at the application layer? (select two.)

Answers

The first of the alternatives offered, message routing is the function that is NOT carried out at layer 6 of the OSI model.

The Presentation Layer, or Layer 6 in the OSI model, effectively takes a message forwarded by an Application Layer protocol (like HTTP) and formats it such that it may be uniquely decoded at its intended recipient.

Among other things, this can involve compression and encryption.

Therefore, Layer 6 is not in charge of routing the communication (this is a function of Layer 3, the Network Layer).

The seven levels that computer systems employ to interact over a network are described by the Open Systems Interconnection (OSI) model.

Learn more about (OSI) model :

https://brainly.com/question/22709418

#SPJ4

Rafael has to type a report about class trip to the museum. Which of the following types of apps should he use to type the report?

a. Presentation
b. Spreadsheet
c. Word processor
d. Messaging

Answers

Option c is correct. Rafael should use word processor to type a report about class trip to the museum.

In order to generate, edit, and print documents, users need a word processor, which can be software or hardware. It gives you the ability to type text, store it electronically, display it on a screen, edit it by keying in instructions and characters, and print it.

The most popular computer program is word processing. The majority of word processors on the market today are either cloud services or software that users can install on their computers or mobile devices.

A word processor—sometimes shortened to WP—is a piece of software that can design, edit, save, and print typed documents. One of the most frequently used software applications on a computer nowadays is a word processor, with Microsoft Word being the most widely used word processor.

Text files (.txt), rich text files (.rtf), HTML files (.htm &.html), and Word files can all be produced by word processors (.doc & .docx). XML files can also be created by some word processors (.xml).

To know more about word processor click on the link:

https://brainly.com/question/2005847

#SPJ4

A systems manager is preplanning for the event that critical servers will fail. what would be the most likely plan of action?

Answers

An action plan is a written document that outlines the steps that must be performed to accomplish a particular objective.

An action plan's objectives are to specify the resources needed to achieve the goal, provide a schedule for when particular activities must be finished, and identify the resources needed.

Action plans are quick-term plans that assist us in achieving our objective. They must contain a particular activity or behavior that you wish to engage in and are confident we can successfully do. Action plans are helpful since they provide a framework for considering how you'll carry out a project successfully. They assist us in completing tasks in a logical sequence and in making sure that us don't overlook any important steps.

Learn more about action plan here-

https://brainly.com/question/28539621

#SPJ4

Which function would you insert to organize large or complex sets of information that are beyond the capabilities of lists?.

Answers

The function that you would insert to organize large or complex sets of information that are beyond the capabilities of lists is known as table.

What is the function of table in database?

All of the data in a database is stored in tables, which are database objects. Data is logically arranged in tables using a row-and-column layout akin to a spreadsheet. Each column denotes a record field, and each row denotes a distinct record.

A user-defined function that returns a table is known as a table function (also known as a table-valued function, or TVF). Anywhere a table may be used, so can a table function. Although a table function can take parameters, it behaves similarly to views.

Note that one can use tables to put together large or complex group of information, that are beyond the power of lists.

Learn more about Table function from

https://brainly.com/question/3632175

#SPJ1

Is this statement true or false?

Inner planets are solid, not gaseous.

Answers

Answer:

True, the inner planets are Venus, Earth, Mercury, and Mars. They are mostly made of rock. Outer planets are the gas giants, Jupiter, Saturn, Uranus, and Neptune.

Explanation:

The mlb. Tv platform reported that viewers watched 11. 5 billion minutes of content this year. When did mlb. Tv make its debut?.

Answers

MLB TV made its debut in 2002!

what spreadsheet tool allows you to control what can and cannot be entered in your worksheet in order to avoid typos?

Answers

Auto-correct is a type of software that detects misspelt words, uses algorithms to determine the words that were probably intended, and then corrects the text as necessary. Auto-correction is a frequently used feature in word processors and many communications platforms.

Explain about the Autocorrect feature?

The AutoCorrect tool allows you to automatically insert symbols and other text as well as repair typos, capitalization mistakes, and misspelt words. Standard misspellings and symbols are used by AutoCorrect by default, but you can change the entries in this list.

The program will automatically transform a user's input of "my words are not correct" to "My words are not correct." As you can see in this example, AutoCorrect capitalizes the first letter of the sentence in addition to correcting the type.

Its main function is to fix frequent spelling or typing errors as part of the spell checker, saving the user time. By identifying specific character usage, it can also be used to automatically format text or insert special characters, saving the user from having to perform more laborious operations.

To learn more about Autocorrect feature refer to:

https://brainly.com/question/2315475

#SPJ4

question number 1) how do you open a new finder window in the macos mojave operating system? click the file menu and click new finder window. click the new finder window menulet. click the file menu and click duplicate.\

Answers

In order to open a new finder window in the MacOS Mojave Operating system: "click the Finder icon in the Dock, then choose File > New Finder Window or press Command-N."

What is the MacOS Mojave Operating System?

MacOS Mojave is Apple Inc.'s desktop operating system for Macintosh computers. It is the fifteenth major edition of macOS. Mojave was unveiled on June 4, 2018 at Apple's Worldwide Developers Conference and was made available to the public on September 24, 2018.

We expect that, in accordance with Apple's release schedule, macOS 10.14 Mojave will no longer get security updates beginning in November 2021. As a result, we are discontinuing software support for all systems running macOS 10.14 Mojave, with support ending on November 30, 2021.

Learn more about Operating Systems:
https://brainly.com/question/22811693
#SPJ1

what specifies the behavior for objects of a class in java

Answers

The methods used by an object determine how it behaves. Instance variables are modified by methods to produce new states, and methods can also produce new instances of an object.

A class is a set of plans or instructions for creating a particular kind of item. It is an essential idea in object-oriented programming that is based on actual physical entities. An object's behavior and contents are controlled by its class in Java. An instance of a class is an object. In OOPS, an object is just a self-contained component with methods and properties that make a specific type of data usable. Consider the names of colors, tables, bags, and barking. An object receives a message that instructs it to invoke or carry out one of the class-defined methods. It has a dedicated memory space. The design of Java objects is a class hierarchy.

Learn more about methods here:

https://brainly.com/question/9325300

#SPJ4

Please help. Who is responsible for resolving code issues to make sure it works properly for the end user?
1) Commanders
2) Graphic designers
3)Programmers
4) Technical writers

Answers

Answer:  The correct answer is 3) Programmers

Explanation:  The other options are not related to end user code development.

what is it called when a class can have more than one method with the same name, of their arguments are different?

Answers

A method is a computer program that is defined as a class's procedure and is present in every object that belongs to that class in object-oriented programming. There might be multiple methods in a class and consequently in an object.

Explain about the method?

A method is a set of directives that carry out a task, just as a function. The distinction is that a function is not connected to an object like a method is. Let's look at a few built-in JavaScript methods.

The term "method" in Java refers to the same thing that "function" does in other languages. A function, often known as a process or subroutine, is a repeatable section of a program.

When two or more methods have the same name but different parameter lists—either a different number of arguments or different kinds of parameters—this is referred to as method overloading.

Method overloading is the practice of defining many methods with the same name in a class.

To learn more about method refer to:

https://brainly.com/question/25289437

#SPJ4

the ________ creates links between two tables.

Answers

Answer:

Answer down below

Explanation:

Question Answered: The _Foreign keys_ creates links between two tables.

What creates links between two tables?

Foreign keys.

What are Foreign keys?

"A foreign key is a column or columns of data in one table that connects to the primary key data in the original table."

What do foreign key" do?  "A foreign key" is column in a table points. To a column with unique values in another table (often the primary key column) to create a way of cross-referencing the two tables.  

Details on how to use a  foreign key:

(DEF)_ A foreign key is a constraint that links a column in one table. (table_1.column_a) to a column in a different table (table_2.column_b) and ensures that a value can be added to column_a only if the same value already exists in column_b.

Hope this helps :3

~~Wsfads~~

a coding error that produces the wrong results when the application is run is known as a group of answer choices runtime error user error logic error syntax error

Answers

Language usage issues include syntax faults. The various types of errors that might happen in a program can be divided into three categories: logical, runtime, and syntax problems.

The various types of errors that might happen in a program can be divided into three categories: logical, runtime, and syntax problems.

Language usage issues include syntax faults. Missing a comma, omitting a quote mark, or misreading a word are examples of syntax error. Syntax errors are indicated by MATLAB, which also displays an error notice. In MATLAB statements, typing errors are known as syntax errors (e.g., plog instead of plot).

The most frequent and catastrophic errors are these: Execution is halted by MATLAB, and an error message is shown. The error messages get better from one version of MATLAB to the next.

When Python tries to parse your program, it will run into these kinds of issues and exit with an error message. Similar to spelling or grammatical issues in a language like English, syntax errors are flaws in how the Python language is used.

To know more about syntax click on the link:

https://brainly.com/question/28792806

#SPJ4

Write a split_check function that returns the amount that each diner must pay to cover the cost of the meal.

Answers

Code for split_check function that returns the amount that each diner must pay to cover the cost of the meal:

bill = float(input())
people = int(input())
#Cost per diner at the default tax and tip percentages
print('Cost per diner:', split_check(bill, people))
bill = float(input())
people = int(input())
new_tax_percentage = float(input())
new_tip_percentage = float(input())
# Cost per diner at different tax and tip percentages
print('Cost per diner:', split_check(bill, people, new_tax_percentage, new_tip_percentage))

What is split check function?
After sending a check, you may utilise the Split Check function in TSR and bar operations to divide it up per item on the menu so that customers can pay for the things they've consumed. There are not equal splits. A piece of a guest check data can be transferred to a new cheque, which is given its own transaction record. Independent changes may be made to the new check and the initial check.

To learn more about split check function
https://brainly.com/question/17044564
#SPJ4

An internet article about fashion trends seen in europe was used to select inventory for a small boutique. What type of data was used in this scenario?.

Answers

Since the internet article about fashion trends seen in Europe was used to select inventory for a small boutique, the type of data that was used in this scenario is quantitative data.

Which is an quantitative data?

Data that can be measured or quantified in numerical terms is referred to as quantitative data. Discrete data and continuous data are the two basic categories of quantitative data.

An Examples of quantifiable data are height in feet, age in years, and weight in pounds. Data that is descriptive but not numerically expressed is considered qualitative data.

The goal of quantitative research is to quantify the data collection and processing process. It is derived from a deductive method that emphasizes the validation of theory and is influenced by the empiricist and positivist schools of thought.

Therefore, Numerical variables are the subject of quantitative data (e.g. how many; how much; or how often). Measures of "types" are said to be  known as qualitative data, which can be expressed using a name, symbol, or the use of numerical code.

Learn more about quantitative data from

https://brainly.com/question/96076
#SPJ1

HI,
does anyone know pseudocode like what it does i need help on it
and if anyone has examples on it ??

Answers

Answer:

Definition: Pseudocode is an informal way of programming description that does not require any strict programming language syntax or underlying technology considerations. It is used for creating an outline or a rough draft of a program. Pseudocode summarizes a program's flow, but excludes underlying details.

Explanation:

thanks me laterrrr

Which of the following statements about the Dynamic Host Configuration Protocol (DHCP) are true? (Select TWO.)

a. A workstation must request addressing information from a DHCP server.
b. It cannot be configured to assign the same IP address to the same host each time it boots.
c. It can only deliver IP addresses to hosts.
d. The DHCP server detects workstations when they attach to the network and automatically delivers IP addressing information to them.
e. It can deliver a DNS server address in addition to the host IP address.

Answers

Option A is correct. A workstation must request addressing information from a DHCP server.

A client/server protocol called Dynamic Host Configuration Protocol (DHCP) automatically assigns an Internet Protocol (IP) host with its IP address and other necessary configuration data like the subnet mask and default gateway. To guarantee that IP addressing is optimal, the Dynamic Host Configuration Protocol can assign IP addresses on the fly. By carrying out the four stages of operations—discovery, offer, request, and acknowledgment—DHCP makes sure of this. Dynamically allocating an Internet Protocol (IP) address to any device or node on a network so they can connect using IP is done using the network management protocol known as DHCP (Dynamic Host Configuration Protocol).

Learn more about protocol here-

https://brainly.com/question/27581708

#SPJ4

Other Questions
Emma younger brother and sister went on a carnival ride that has two separate circular track ana's brother rode in a blue car that traveled a total distance of 220 around the track and a sister Road in a green car that travels to total distance of 126 feet around the track and drew of the ride The light reactions require the cooperation of two photosystems to power linear electron flow from water to nadp .a. Trueb. False b. Judaismc. Buddhismd. Christianitye. Taoism5. What city of Mali was considered a center of learning and education?a. Tripolib. Gaoc. Accrad. Timbuktue. Luanda6. What group of workers were highly respected because they providea. Huntersb. Farmers Expand the logarithm fully using the properties of logs. Express the final answer interms of log a, and log y. Where is the stock market located in the United States. Marissa is selling paintings for $15 each and bracelets for $7 each. Her goal is to sell at least $800 in products, and she must sell at least 60 bracelets. Which of thefollowing combinations will satisfy these constraints?O20 paintings and 65 braceletsO25 paintings and 60 braceletsO26 paintings and 61 bracelets014 paintings and 45 bracelets How might energy and matter leave the ecosystem shown in the picture above? A 3.75 g piece of gold initially at 587.15 K is dropped into 20.6 mL of water at 295.75 K. Calculate the final temperature (in K). Assume that all heat transfer occurs between the gold and the water. The specific heat of water is 4.184 J/g*K and the density of water is 1 g/mL. The specific heat of gold is 0.129 J/g*K. if the lithosphere is resting on the asthenosphere and you put a lot of weight on the lithosphere, say ice in a glacier, how would the lithosphere respond? According to Aquinas, God wills:(A) none of theseB) Necessarily and contingentlyC) Absolutely, necessarily, and contingentlyD Absolutely A certain shade of pink is created by adding 3 cups of red paint to 7 cups of white paint A. how many cups of red paint should be added to one cup of white paint? B. What is the consistent of proportionality? How many moles of solute are in 750 ml of 4.9 M (Molar$ CaCI2? How many grams of CACI2 is this? what is another way to write to 72-(-25)?A.72+ 25B.-72-25C.72-25D.-72-(-25)what is the value of -27-8?A.-35B.-19C.19D.35How much is 37 +13A.-50B.-29C.29D.51What is the solution to 40+(-11)?A.-51B.-29C.29D.50What is the value of -31 +30?A.-61B.-1C.1D.61Am sorry to bother you is there any way you can help me I didn't know if I was supposed to send this for people helps Please help will mark BRAINLIESTThe staff of a restaurant consists of 25 people,including 8 waiters, 12 waitresses and 5 cooks. ForMother's Day, a total of 9 people will need to beselected to work. If the selections are made atrandom, determine the probability that 3 waiters, 4waitresses and 2 cooks will be selected. Solve for BA=4B+ 7C B= 200 chapattis is 50cm high how high will 10 chapattis be? what hormone helps control glucose levels by stimulating the use of noncarbohydrate sources to synthesize glucose and increasing the utilization of fatty acids as an energy source? multiple choice question. Draw a diagram depicting the energy transitions described in #1 be sure to label ground state exited state absorbing energy giving of light and the electron True or False: The currency can be changed in the Public Company Snapshot report in the Company/Security tab.TrueFalse HELPPPPP FAST Native Americans Which contributions did this group make to the war effort? in the American revolution