What is the name of the file in which this
program is stored: public class myProgram
A. myProgram.class
B. myProgram.java
C. myProgram.jgrasp
D. myProgram.doc

Answers

Answer 1

Answer:

B

Explanation:

i’m an information technology  student and as I remember we used this  name


Related Questions

Kim wants to add a new tab on the ribbon named “Paste as Pictures” for a group of special commands. Put the steps in the correct order to explain how she can accomplish this task.

Step 1: Go to the Backstage view.

Step 2: Select Customize Ribbon.

Step 3: After a dialog box opens, navigate to the right side.

Step 4:

Step 5:

Step 6: Then, click OK.

Answers

✔ Click Options.

✔ Click New tab.

✔ Click Rename.

✔ Type a name.

Gloria is adding footers to a PowerPoint template for students to use in a literature class. Each student must choose an author and make a presentation about their life and work. She wants the first slide in each presentation to show only the author’s name and photo. On subsequent slides, she wants to include a footer with a date and time that changes depending on the actual date of each presentation.

After selecting the Slide Master view, how should Gloria proceed?

She should select
.

Next, she should select
.

Then, she should select
.

Finally, she should make changes in the
.

Answers

Answer:

✔ the Slide Master thumbnail

✔ the Insert tab

✔ Header & Footer

✔ Slide tab in the dialog box

Explanation:

On edg

The Slide Master thumbnail, the Insert tab and Header & Footer and  Slide tab in the dialog box.

What is Dialog box?

A dialog box, often known as a dialog or a conversation box, is a typical form of window in an operating system's graphical user interface (GUI).

In addition to displaying more details, the dialog box also prompts the user for input.

For instance, you interact with the "File Open" dialog box when you want to open a file while using a software. The Properties dialog box appears in Microsoft Windows when you right-click a file and select Properties.

A dialog box, often known as a dialog or a conversation box, is a typical form of window in an operating system's graphical user interface (GUI). In addition to displaying more details, the dialog box also prompts the user for input.

Therefore, The Slide Master thumbnail, the Insert tab and Header & Footer and  Slide tab in the dialog box.

To learn more about Software, refer to the link:

https://brainly.com/question/985406

#SPJ3

Harry is creating a PowerPoint presentation and wants all the slides to have a uniform look.

The first thing Harry should do is select the
.

Next, he should use the command groups to edit the
.

Finally, he should save the file as a new
.

Answers

Answer: all answers for test are

Slide Master View

Layout and Theme

PowerPoint Template

A.

C.

Slide Master Thumbnail, Insert Tab, Header &Footer, Slide tab in the dialog box.

D.

C.

D.

Explanation:

The first thing Harry should do is select the Slide Master View, Next, he should use the command groups to edit the Layout and Theme. Finally, he should save the file as a new PowerPoint Template.

What is PowerPoint?

It is a presentation-based programme that employs graphics, movies, etc. to enhance the interactivity and appeal of a presentation.

A saved Powerpoint presentation has the ".ppt" file extension. PPT is another name for a PowerPoint presentation that includes slides and other elements.

This right-sided brain activity is perfectly suited to the principal function of PowerPoint presentations.

For his PowerPoint presentation, Harry wants each slide to have a consistent appearance.

Harry must first choose the Slide Master View before using the command groups to change the Layout and Theme. The file should then be saved as a fresh PowerPoint Template.

Thus, this way, Harry can create a uniform look.

For more details regarding PowerPoint, visit:

https://brainly.com/question/14498361

#SPJ2

What is the output of the following program?
S = "foo"
t = "bar"
print(((s+t)*3).count("barf"))

Answers

´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶´´´´´´´´´´´´´´´´´´´´¶¶´´´´´´´´´´¶¶´´´´´´¶¶¶¶¶´´´´´´´¶¶´´´´´´´´´´´´´´¶¶´´´´´¶´´´´´¶´´´´¶¶´´´´´¶¶´´´´¶¶´´´´´¶¶´´´´´¶´´´´´¶´´´¶¶´´´´´´¶¶´´´´¶¶´´´´´´´¶¶´´´´´¶´´´´¶´´¶¶´´´´´´´´¶¶´´´´¶¶´´´´´´´´¶¶´´´´´´¶´´´¶´´´¶´´´´´´´´´´´´´´´´´´´´´´´´´¶¶´´´´¶¶¶¶¶¶¶¶¶¶¶¶´´´´´´´´´´´´´´´´´´´´´´´´¶¶´´´¶´´´´´´´´´´´´¶´¶¶´´´´´´´´´´´´´¶¶´´´´´¶¶´´¶¶´´´´´´´´´´´´¶´´¶¶´´´´´´´´´´´´¶¶´´´´´¶¶´¶¶´´´¶¶¶¶¶¶¶¶¶¶¶´´´´¶¶´´´´´´´´¶¶´´´´´´´¶¶´¶´´´´´´´´´´´´´´´¶´´´´´¶¶¶¶¶¶¶´´´´´´´´´¶¶´¶¶´´´´´´´´´´´´´´¶´´´´´´´´´´´´´´´´´´´´¶¶´´¶´´´¶¶¶¶¶¶¶¶¶¶¶¶´´´´´´´´´´´´´´´´´´´¶¶´´¶¶´´´´´´´´´´´¶´´¶¶´´´´´´´´´´´´´´´´¶¶´´´¶¶¶¶¶¶¶¶¶¶¶¶´´´´´¶¶´´´´´´´´´´´´¶¶´´´´´´´´´´´´´´´´´´´´´´´¶¶¶¶¶¶¶¶¶¶¶

The output of the following program is 2.

What is output of this program?

S = "foo"

t = "bar"

print(((s+t)*3).count("barf"))

here we get The output is 2

Information that is processed and sent out by a program or another electronic device is considered its output. The output is anything that is audible on the display screen, such as the words you type on the keyboard.The term "output" refers to any data that a computer or other electronic device processes and sends. Anything that can be seen on a computer screen, such as the text you write on a keyboard, is an example of output.

To learn more about output refer to:

https://brainly.com/question/27646651

#SPJ2

How many parameters (values inside of the
parenthesis) does a message dialog box take?
A. 1
B. 2.
C. O
D. 3

Answers

Answer:

The answer to this question is given below.

Explanation:

The message dialog box contains many parameters, but primarily three parameters are used such message, title, and button.

So the correct answer to this question is 3.

The message dialog box contains three parameters such as message, title, and buttons.

2. What types of news can be created?

Answers

Answer:

Print Media

Broadcast Media

Explanation:

It can be made manually/artificially (meaning that someone caused something to happen on purpose) or naturally (meaning it just happened with out outside assistance)

Hope this helps you

To close a window in Windows 10, you can _____. Select all that apply. A. right-click its button on the taskbar, then click Close window B. click the Close button in the upper-right corner of the window C. click the Close button in the window's thumbnail on the taskbar D. click the Start button and click the program name or icon

Answers

Answer:

A, B and C

Explanation:

A, B and C

(The following is unrelated to the answer just to fill the letters criteria)

For closing the window in Windows 10, the following steps should be considered:

The right-click should be done on the taskbar and then click on the close window.On the upper-right corner of the window, click on the close button.On the window thumbnail that shows on the taskbar, click on the close button.

Now if we click on the start button and then click the program icon so the particular program opens instead of closing it.

Therefore the above steps are considered for closing out the window in windows 10.

Learn more about windows 10 here: /brainly.com/question/19652025

Describe the two best practices for making html code more readable.

Answers

Answer:

1 - Commenting and Documentation.

2 - Consistent Indentation.

3 - Avoid Obvious Comments.

4 - Code Grouping.

5 - Consistent Naming Scheme.

6 - DRY Principle.

7 - Avoid Deep Nesting.

8 - Limit Line Length.

Explanation:

Hope this helped

HEY DO U LIKE TRAINS!

Answers

Answer:

yes

Explanation:

yes

Gloria is adding footers to a PowerPoint template for students to use in a literature class. Each student must choose an author and make a presentation about their life and work. She wants the first slide in each presentation to show only the author’s name and photo. On subsequent slides, she wants to include a footer with a date and time that changes depending on the actual date of each presentation.

To insert the footer according to her plan, what must Gloria click in the Header & Footer dialog box?

Fixed
Preview
Slide number
Don’t show on title slide

Answers

Answer:

Its D

Explanation:

On edg

Answer: don’t show on title slide

Explanation:

6.12 Nested Increments Write a program for spiritual lumberjacks who want to show their appreciation for each tree they 'kill' by celebrating its years of life. Ask the lumberjack how many trees he wants to cut. Verify you got the number correctly by printing it to output. Write a loop that iterates over all the trees the lumberjack wants to cut down. Print the tree number to the screen to make sure your loop is working correctly. Query the lumber jack for how many rings are in this tree and print this number to make sure you got the correct number of rings. Write an inner loop that iterates over the years of the tree. Print each year to make sure you are iterating correctly and hitting each year that it lived. Change the necessary print statements and to match the correct formatting from the output examples.

Answers

Answer:

trees_to_cut = int(input("How many trees do you wants to cut? "))

print(str(trees_to_cut) + " tree(s) will be cut.")

for i in range(trees_to_cut):

   print("Tree #" + str(i))

   

   rings = int(input("How many rings in tree " + str(i) + "? "))

   print("There are " + str(rings) + " ring(s) in this tree.")

   for j in range(rings):

       print("Celebrating tree #" + str(i) + "'s " + str(j+1) + ". birthday.")

Explanation:

*The code is in Python.

Ask the user to enter the number of trees to cut

Print this number

Create a for loop that iterates for each tree

Inside the loop:

Print the tree number. Ask the user to enter the number of rings. Print the number of rings. Create another for loop that iterates for each ring. Inside the inner loop, print the celebrating message for each birthday of the tree

Dawn needs to insert a macro into a Word document. Where can she find the Insert Macro dialog box?
Insert tab
Developer tab
Advanced tab
Design tab

Answers

Answer:

Developer tab

Explanation:

Inserting the Macro dialog box can be confusing for many people because the "Developer tab," where it can be found, is hidden by default in Microsoft Word. In order to add this to the ribbon, all you have to do is to go to the File tab, then click Options. After this, click Customize Ribbon. Under this, choose Main Tabs, then select the Developer check box. The Developer tab will then become visible. You may now insert a macro.

Answer:

B- Developer tab

What happens when you forward an Outlook contact item to a non-Outlook user?

Answers

Answer:

It's A. The recipient will not be able to open the contact item.

Explanation:

Correct on edg

Answer:

A on edg

Explanation:

Which of the following takes place during the research phase

Answers

i would say a formulation of the hypothesis

I am unsure if this is the correct question, but I think this is the full question:

Which of the following takes place during the research phase? (choose all that apply)

O software requirements are gathered

O software requirements are implemented in code

O software requirements are analyzed

O software requirements are detailed in a specification document

The answers to this question are software requirements are gathered, software requirements are analyzed, and software requirements are detailed in a specification document (1st, 3rd, and 4th options).

Please help I upped the points and please don't answer if you don't have the answer..

3. Describe two of your long-term financial goals, and explain why these goals are important to you. List three steps that might help you accomplish this goal. (4-6 sentences. 2.0 points)

4. Describe and example of common financial resource, and example, and a debt. These can be examples from your own life or from other people you know or can imagine. (3-6 sentences. 3.0 points)

Answers

Answer:

3. Paying for my daughter to attend college and building a life outside of struggle. These goals must be accomplished by me finishing school, going onto college and maybe even starting my own business. I must set an appropriate example for my daughter to learn from someone who she believes in. Starting a family business to pass down to generations will be an excellent way to start financially planning now ahead of time.

4. Living in a family of mines, common financial resource is either government assisted or public security.An expense that I cannot escape now is the caring for of my daughter which will vary as she get older. Lastly a debt would be the over spending of credit cards with no money to pay it back as the interest rates climb.

Explanation:

What is a backdoor?
A. A different sign-in page to log into a computer
B. An unrecognized entry into a computer or system
C. A fake version of software to access a computer system
D. An administrative login feature of computer software

Answers

B. Generally backdoors are logins/access to something without permission and without admins knowing.

Write a function index(elem, seq) that takes as inputs an element elem and a sequence seq and returns the index of the first occurrence of elem in seq. The sequence seq can be either a list or a string. If seq is a string, elem will be a single-character string; if seq is a list, elem can be any value. If elem is not an element of seq, the function should return the length of the sequence. Dont forget that the index of the first element in a sequence is 0. Here are some examples: >>> index(5, [4, 10, 5, 3, 7, 5]) solution

Answers

Answer:

def index(elem, seq):

   for i in range(len(seq)):

       if elem == seq[i]:

           return i

   

   return len(seq)

print(index(5, [4, 10, 8, 5, 3, 5]))

Explanation:

Create a function named index that takes elem and seq as parameters

Create a for loop that iterates through the seq. If elem is equal to the item in the seq, return the i, index of the item.

If the elem is not found in the seq, this means nothing will be returned in the loop, just return the length of the seq, len(seq)

Call the function with given parameters and print the result

Note: Since 5 is in the list in the example, the index of the 5 which is 3 will be returned

In this exercise we have to use the knowledge of computational language in Python, so we have that code is:

It can be found in the attached image.

What is an index in Python?

An index, in your example, refers to a position within an ordered list. Python strings can be thought of as lists of characters; each character is given an index from zero  to the length minus one.

So, to make it easier, the code in Python can be found below:

def index(elem, seq):

  for i in range(len(seq)):

      if elem == seq[i]:

          return i

  return len(seq)

print(index(5, [4, 10, 8, 5, 3, 5]))

See more about python at brainly.com/question/26104476

In this lab you are asked to declare two variables of type integer: userNum and x. The user should input should be stored using scanf statements. Then you are asked to divide the value for userNum by x three times(three different operations). Each time you do the division, assign the value to userNum overwriting the previous value and print it out using a print statement. Do this three times. In this case there is only one new line print statement at the end.
#include
int main(void) {
int x;
int userNum;
scanf("%d %d" , &userNum, &x);
userNum = (double)userNum / x;
printf("%d " , userNum);
userNum = (double)userNum / x;
printf("%d " , userNum);
userNum = (double)userNum / (double)x;
printf("%lf\n" , (double)userNum);
return 0;
}
my input is 100 2
my output is 50 25 12.000
8 months ago

Answers

Answer:

See Explanation

Explanation:

Your program is correct and it follows the correct sequence; however, the reason you keep getting integer result is because the question requires that you declare both variables as integer.

The only modification required in your program is to change change #include to #include <stdio.h> for the program to be free of error.

Donna wants to save personal files on her computer. Which characteristic of the computer is must useful for her​

Answers

Answer:

D. Storage

Explanation:

When Donna wants to save personal files on her computer, the storage characteristic of the computer would be most useful to her. This feature of the computer allows files to be stored in several forms. The computer has the primary and secondary storage.

The primary storage includes assets such as the Random Access Memory while the secondary storage includes assets like the SD card, DVD, etc. Storage is important as it makes files easily retrievable when needed.

The storage characteristic of the computer is most useful to her in this scenario.

The Storage components in a computer helps to stores and facilitate easy retrieval of various type of data on the system.

The primary storage includes component of the Random Access Memory while the secondary storage includes SD card, Flash drives, External CD-rome, etc.

Therefore, she can save her personal files on her internal or external storage so as to facilitate easy retrieval at the time of future use.

Learn more about this here

brainly.com/question/272186

Sue conducted an experiment to determine which paper towel is the most absorbent among three different brands. She decides to present her data using a chart.

Why would Sue want to present her data using a chart?

to analyze alphanumeric data in a table
to analyze alphanumeric values in a spreadsheet
to present numeric values in a visually meaningful format
to present numeric values in a meaningful spreadsheet format

Answers

Answer:

c

Explanation:

Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns their count (that is, how many there are) So if the input was:
hooligan sausage economy
ruin palatial
the function would return 5 because there are 5 strings there.

Answers

Answer:

The function written in C++

int str(string word) {

int count = 1;

for(int i =0; i<word.length();i++) {

 if(word[i] == ' ') {

  count++;

 }

}

return count;

}

Explanation:

This line defines the function

int str(string word) {

This line initializes count to 1

int count = 1;

This line iterates through the input string

for(int i =0; i<word.length();i++) {

This line checks for blank space

 if(word[i] == ' ') {

Variable count is incremented to indicate a word count

  count++;

 }

}

return count;

}

See attachment for full program

What is Naptha used for?

Answers

Answer:

Naphtha is used to dilute heavy crude oil to reduce its viscosity and enable/facilitate transport; undiluted heavy crude cannot normally be transported by pipeline, and may also be difficult to pump onto oil tankers. Other common dilutants include natural-gas condensate, and light crude.

Answer:

Naphtha is used for laundry soaps and clearing fluids

High Hopes^^

Barry-

Write your code to define and use two functions. The Get User Values function reads in num Values integers from the input and assigns to user Values. The Output Ints Less Than Or Equal To Threshold function outputs all integers in user Values that are less than or equal to maxVal. num Values indicates the number of integers in user Values. void Get User Values(int user Values[], int num Values) void Output Ints Less Than Or Equal To Threshold (int user Values[], int maxVal, int num Values)

Answers

Answer:

#include <iostream>

#include <vector>

using namespace std;

/* Define your function here */

vector<int> GetUserValues(vector<int>& userValues, int numValues) {

  int tmp = 0;

  vector<int> newVec;

 

  for(int i = 0; i < numValues; i++) {

     cin >> tmp;

     newVec.push_back(tmp);

     

  }

 

  return newVec;

}

void OutputIntsLessThanOrEqualToThreshold(vector<int> userValues, int upperThreshold) {

  for (int i = 0; i < userValues.size(); ++i) {

     if(userValues.at(i) < upperThreshold) {

          cout << userValues.at(i) << " ";

     }

  }

 

  cout << endl;

}

int main() {

  vector<int> userValues;

  int upperThreshold;

  int numValues;

 

  cin >> numValues;

  userValues = GetUserValues(userValues, numValues);

  cin >> upperThreshold;

  OutputIntsLessThanOrEqualToThreshold(userValues, upperThreshold);

  return 0;

}

Explanation:

Perhaps their is a better way to code this, but I couldn't figure out what to do with the pointer in the first function.

Describe yourself as a programming object and give at least 5 properties and 5 methods that you think you are equipped with.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

I consider myself a programming object, then the following are my properties and methods.

Properties (represents the features)

name.height.weight.skin color.eye color,hair style

Methods (represents the behavior)

Walk.Eat,ListenSpeakDrink

______________ helps you see how your document will appear on the paper. ​

Answers

Answer:

Print Preview

Explanation:

The "Print Preview" gives a person the idea on how his/her document will look like once it is printed out. Having an overview of the document will let you know whether you need to do some adjustments or edit some things before you actually print it.

There's a shortcut for this when it comes to the "Microsoft Word." All you have to do is to press ctrl + F2. Nevertheless, more modern computers don't need the print preview anymore since you can see the whole document on the actual print page.

There are a multitude of items that Cyber Security professionals view as attack vectors but none are more prevalent and exploitable than application code or as readily available as the network perimeter. There are many ways that these areas are exploited. The application side has its beginning with code which is poorly designed from a security perspective. One of the code items that is exploited by fraudsters to pivot across an organization's internal network is the Web.cfg file - in this file non security minded programmers often leave the User ID and password for connecting to the associated database in plaintext.
For part one of this assignment, write a 1 page summary that explains to a non IT person what this attack is, how it works and how to prevent it.
The second part of this assignment is about the secure perimeter. Using your choice of reference for securing a network (NIST, Rainbow Series Red Book, Common Criteria etc.) research on how to design a secure network perimeter that will protect the internal applications, even poorly written ones like the one above from being exploited. Include a diagram of your solution and on the bottom half - a written explanation, in APA format, of your solution.

Answers

AnsweR

RRR

Explanation:

Which tasks can Kim complete using the Customize Ribbon dialog box? Check all that apply.

Rename existing ribbon tabs.
Rearrange ribbon commands.
Add a new main tab to the ribbon.
Add commands to existing groups.
Create new PowerPoint commands.
Add a new contextual tab to the ribbon.

Answers

Answer:

Its A, B, C, and F

Explanation:

On edg

Rename existing ribbon tabs, Rearrange ribbon commands, Add commands to existing groups and Add a new contextual tab to the ribbon.

What is PowerPoint presentation?

A PowerPoint presentation is a type of visual aid that creates a slideshow of information that can be presented to an audience using Microsoft PowerPoint software.

It is typically made up of a series of slides that include text, images, charts, graphs, and other multimedia elements to convey information to the audience.

Kim can complete the following tasks by using the Customize Ribbon dialog box:

Existing ribbon tabs can be renamed.Rearrange the commands on the ribbon.To existing groups, add commands.To the ribbon, add a new contextual tab.

Thus, Kim cannot use the Customize Ribbon dialog box to add new PowerPoint commands or a new main tab to the ribbon.

For more details regarding presentation ,visit:

https://brainly.com/question/14498361

#SPJ7

Bluetooth's pan are also known as______.​

Answers

Answer:

personal area network..??

Explanation:

Two Smallest (20 points). Write a program TwoSmallest.java that takes a set of double command-line arguments and prints the smallest and second-smallest number, in that order. It is possible for the smallest and second-smallest numbers to be the same (if the sequence contains duplicate numbers). Note: display one number per line. Hint: Double.MAX_VALUE is the largest real number that can be stored in a double variable. java TwoSmallest 17.0 23.0 5.0 1.1 6.9 0.3 0.3 1.1 java TwoSmallest 1.0 35.0 2.0 1.1 6.9 0.3 0.3 6.7 0.3 0.3

Answers

Answer:

Written in Java

import java.util.*;

public class Main {

   public static void main(String args[]) {

     int n;

     Scanner input = new Scanner(System.in);

     n = input.nextInt();

     double nums []= new double [n];

     for (int i=0; i<n;i++)

     {

         nums[i] = input.nextDouble();

     }

     

     Arrays.sort(nums);

     System.out.println("The two smallest are: ");

     for (int i=0; i<2;i++)

     {

         System.out.println(nums[i]);

     }

   }

}

Explanation:

This line declares number of input

     int n;

This line calls the Scanner function

     Scanner input = new Scanner(System.in);

This line gets input from user

     n = input.nextInt();

This line declares an array of n elements

     double nums []= new double [n];

The following iteration gets input into the array

     for (int i=0; i<n;i++)

     {

         nums[i] = input.nextDouble();

     }

This line sorts the array

     Arrays.sort(nums);

The following iteration prints the two smallest

     System.out.println("The two smallest are: ");

     for (int i=0; i<2;i++)

     {

         System.out.println(nums[i]);

     }

If you are wanting to change programs, when do you need to make this request?
a.To change programs, you must contact your advisor or counselor and complete the change of program application during an open application window.
b.You can change at any time; just email your advisor regarding the change.
c.You can never change programs.
d.You do not need to notify anyone. You just need to start taking courses for the desired program.

Answers

Answer:

If your discussing colleges and degrees, you cant take courses your not autorized to take.

So if you have one major and wish to change to another then you need to discuss with a student advisor or counseler so they can make the changes. They will also discuss which classes are necessary for your program of choosing, making sure all your requirements are completed.

Explanation:

Other Questions
what is 4/9 divided by 5? Which is true about proteorhodopsins?A) They use light to create energy.B) They are not photosynthetic.C) They may be sources of alternative energy.D) all of the above Pls help me fast! Thank you! 10 points Which statement best synthesizes information from these passages? The Declaration of Sentiments was written at the Seneca Falls Convention to explain why women should be afforded equal rights. In 1848, delegates at the Seneca Falls Convention used the Declaration of Independence to explain why women should have equal rights. The Declaration of Independence built on the ideas of Enlightenment thinkers and has served as inspiration for many people. In 1776, colonists came together to discuss the rights of colonists. Similarly, in 1848, Americans came together to discuss the rights of women. How are enzymes able to speed up reactions?there r no choices Both union and confederate forces ____.A. honored Stand Waite for his contributions to the warB. recruited African Americans to their armiesC. looted tribal livestock and damaged propertyD. Signed peace treaties with the Five Tribes to end the war in the Indians Territory Who was Squanto?a Pequot Indian who fought New England colonistsa Pequot Indian who taught colonists how to survivea representative of the Wampanoag Indians who refused to recognize the colonistsa representative of the Wampanoag Indians who negotiated peace with the colonists la function exponencial f(x) =2^x tiene intercepto en "y" al igual a A downhill skier was able to move 560 meters in 25 seconds. What is the skiers average speed? (Round your answer to the nearest tenth of a meter per second.) The two triangles below are similar. Which pair are corresponding sides?LN and MNMN and QRLM and QRLM and PQhola estas ahi What is the difference between the legislative, executive, judicial branches? President Nixon's action to end the gold standardA. created a budget deficitB.meant gold was no longer valuable.C.meant the value of the dollar changed.D.ended the US economic downturn. What is the design of the following study? The Coca-Cola Company introduced New Coke in 1985. Within three months of this introduction, negative consumer reaction forced Coca-Cola to reintroduce the original formula of Coke as Coca-Cola Classic. Suppose that two years later, in 1987, a marketing research firm in Chicago compared the sales of Coca-Cola Classic, New Coke, and Pepsi in public building vending machines. To do this, the marketing research firm randomly selected 10 public buildings in Chicago having both a Coke machine (selling Coke Classic and New Coke) and a Pepsi machine. The researchers recorded the number of cans sold over a given period of time. Which selection listed below is a way in which the Legislative Branch in the US checks the power of the Executive Branch?Select one:A. vetoing Executive ordersB. ruling the actions of the President or other Executive officials unconstitutionalC. impeaching the President or other Executive officials if they have committed crimes 8Write the equation of the line through thepoints (-8, -2) and (-4,-3) in POINT-SLOPEFORM What is the mass of the object on the triple beam balance? In part of which layer does heat flow by convection?I think is inner core but I am not sure about it Math question please answer 1.Where is the deltoid muscle located?a. shoulderb. front of armc. back of armd. back2.Where is the triceps muscle located?a. shoulderb. stomachc. back of armd. back of thigh3.Where are the gluteal muscles located?a. back of thighb. hip and buttocksc. front of armd. chestDat e:4.Where are the trapezius and rhomboid muscles located?a. shoulderb. hip and buttocksc. stomachd. back5.Where are the gastrocnemius and soleus muscles located?a. calfb. hip and buttocksc. front of thighd. back of thigh6.Muscle The large muscle group located in the front of your upper leg is called:a. Deltoidsb. Bicepsc. Quadricepsd. Gastrocnemius7.Where are the pectoral muscles located?a. calfb. chestc. shoulderd. front of thigh8.The large muscle group located on the back part of your upper leg is called:a. Hamstringsb. Trapeziusc. Latisimus Dorsid. Quadriceps9.Where are the abdominal muscles located?a. backb. hip and buttocks c. bellyd. front of arm10.Where is the biceps muscle located?a. back of thighb. front of armc. back of armd. shouldere. A triangle has vertices A(2, 2) , B(- 3, 5) and C(0, - 1) . Find the area of the triangle?