Write a program that takes the length and width of a rectangular yard and the length and width of a rectangular house situated in the yard. Your program should compute the time required to cut the grass at the rate of two square metres per minute using console

Answers

Answer 1

To create a program that calculates the time required to cut the grass in a rectangular yard, we need to follow a few simple steps. First, we need to prompt the user to input the length and width of the yard and the house situated in the yard.

Once we have the dimensions of the yard and house, we can calculate the area of the yard by multiplying the length and width. We then subtract the area of the house from the total yard area to get the area that needs to be cut.

Next, we can calculate the time required to cut the grass by dividing the area that needs to be cut by the rate of two square meters per minute.

We can then display the time required to cut the grass to the user using the console. The code for this program would involve using input statements to get the necessary dimensions, performing the calculations, and printing the result to the console using print statements. With this program, users can quickly and easily determine how long it will take to cut their grass.

You can learn more about the program at: brainly.com/question/14368396

#SPJ11


Related Questions

Your programme coordinator asked you to create a database for your respective department at the university, you must populate a database and includea form, two queries, and a report

Answers

To create a database for your department at the university, you need to follow these steps: design the database structure, create a form, develop two queries, and generate a report.


1. Design the database structure: Identify the tables, fields, and relationships needed to store department information (e.g., students, courses, faculty, etc.).

2. Create a form: Design a user-friendly form to input and update data, such as adding new students or updating course information.

3. Develop two queries: Create two queries to retrieve specific data from the database (e.g., a list of students enrolled in a specific course or faculty members teaching a particular subject).

4. Generate a report: Design a report that presents the data from your queries in a well-organized and readable format.

By following these steps, you will have a functional and useful database for your department that includes a form, two queries, and a report.

To know more about database visit:

https://brainly.com/question/30634903

#SPJ11

Question 10 of 10
What may occur if it is impossible for the condition in a while loop to be
false?
A. The program will find a way to meet the condition.
B. The loop will iterate forever.
C. The game's performance will speed up.
D. The amount of code will not be manageable.
SUBMIT

Answers

The answer is B).

The loop will iterate forever.

write a program that lets the user enter 10 values into an array. the program should then display the largest and the smallest values stored in the array.

Answers

To start, we need to create an array to store the user's input. We can do this by declaring an array with 10 slots, like so:


```int[] values = new int[10];```

Next, we can use a loop to allow the user to input 10 values. We can use a for loop that loops 10 times, like this:

```
for(int i = 0; i < 10; i++) {
   System.out.print("Enter value #" + (i+1) + ": ");
   values[i] = scanner.nextInt();
}
```

This loop prompts the user to enter a value 10 times, and stores each value in the array.

Once we have the values stored in the array, we can find the largest and smallest values using a loop that iterates over the array. We can use a variable to keep track of the largest and smallest values, like so:

```
int largest = values[0];
int smallest = values[0];

for(int i = 1; i < values.length; i++) {
   if(values[i] > largest) {
       largest = values[i];
   }
   if(values[i] < smallest) {
       smallest = values[i];
   }
}
```

This loop starts at index 1 (since we already set the largest and smallest values to the first value in the array), and compares each value to the largest and smallest values so far. If a value is larger than the current largest value, we update the largest variable. If a value is smaller than the current smallest value, we update the smallest variable.

Finally, we can print out the largest and smallest values like this:

```
System.out.println("Largest value: " + largest);
System.out.println("Smallest value: " + smallest);
```

This will print out the largest and smallest values that were found in the array.

I hope this helps you with your programming question! Let me know if you have any further questions or need clarification.

For more such question on current

https://brainly.com/question/24858512

#SPJ11

what does the windows update delivery optimization function do? answer delivery optimization lets you set active hours to indicate normal use for your device. the device will not reboot to install updates during this time. delivery optimization lets you know when and if there are any urgent updates for your system and provides you with an option to download and install them. delivery optimization lets you view the updates you have installed. it also lets you uninstall an update if needed. delivery optimization provides you with windows and store app updates and other microsoft products.

Answers

Answer:

Delivery Optimization provides you with Windows and Store app updates and other Microsoft products.

Explanation:

Toothpicks are used to make a grid that is60toothpicks long and32toothpicks wide. How many toothpicks are used altogether?

Answers

Answer:

184 toothpicks

Explanation:

60 toothpicks+60 toothpicks+32 toothpicks + 32 toothpicks = 184 toothpicks

Answer:

3932

Explanation:

So, For 60×32 grid toothpicks required = 2x60x32 +60+32 = 3932*

The software crisis is aggravated by the progress in hardware technology?"" Explain with examples

Answers

The software crisis refers to the difficulties and challenges associated with developing and maintaining complex software systems. These challenges include issues related to software quality, productivity, cost, and reliability.

Hardware technology has been advancing rapidly over the years, with newer and more powerful computers, processors, and devices being introduced regularly. While these advancements have made it possible to build more complex and sophisticated software systems, they have also contributed to the software crisis in several ways.

Firstly, the progress in hardware technology has raised expectations for software performance and functionality. As hardware becomes more powerful, users and stakeholders expect software to make better use of the available resources and deliver faster, more reliable, and more feature-rich applications. This puts pressure on software developers to keep up with hardware advancements and build software that can leverage the latest hardware capabilities.

Secondly, hardware technology has made it easier to build complex software systems, but it has also made them more difficult to maintain and upgrade. With hardware advancements, software systems have grown in size and complexity, making them harder to debug, test, and update. This leads to maintenance issues and creates a situation where software systems become increasingly difficult to modify or extend.

Finally, hardware technology has also contributed to the proliferation of software systems, leading to a situation where organizations have to manage multiple software applications, platforms, and technologies. This has led to compatibility issues, integration challenges, and a lack of standardization, all of which contribute to the software crisis.

In summary, while hardware technology has enabled the development of more powerful and sophisticated software systems, it has also exacerbated the software crisis by raising expectations for software performance, making software systems more complex and difficult to maintain, and creating compatibility and integration challenges.

Learn more about technology visit:

https://brainly.com/question/30247796

#SPJ11

A retail store has a preferred customer plan where customers can earn discounts on all their purchases. the amount of a customer’s discount is determined by the amount of the customer’s cumulative purchases in the store as follows:

a. when a preferred customer spends $500, he or she gets a 5 percent discount on all future purchases.
b. when a preferred customer spends $1,000, he or she gets a 6 percent discount on all future purchases.
c. when a preferred customer spends $1,500, he or she gets a 7 percent discount on all future purchases.
d. when a preferred customer spends $2,000 or more, he or she gets a 10 percent discount on all future purchases.

required:
design a class named preferredcustomer, which extends the customer class.

Answers

The equivalence classes for testing the software program are: valid ecs for size representing valid values (twin, full, queen, king), valid ecs for distance representing valid values (1-15, 16-40, 41-80), invalid ecs representing invalid values (na), and boundary values (1, 15, 16, 40, u, 80).

A set of test cases for the software program would include: a valid test case with a twin size and distance of 1, a valid test case with a queen size and distance of 16, a boundary test case with full size and distance of 15, an invalid test case with a size of "na" and distance of 25, and a boundary test case with a king size and distance of 80.

These test cases cover all of the equivalence classes and boundary values for testing the software program.

In summary, the equivalence classes and boundary values for testing the software program have been determined, and a set of test cases has been designed to adequately test the program.

For more questions like Software click the link below:

https://brainly.com/question/985406

#SPJ11

You have just bought a new computer but want to use the older version of windows that came with your previous computer. windows was provided as an oem license. can you use this license key to install the software on your new pc

Answers

No, you cannot use the OEM license key from your previous computer to install the software on your new PC.

Is it possible to transfer an OEM license key to a new computer?

When you purchase a computer, the operating system pre-installed on it is often provided as an OEM license. This license is tied to the hardware of the computer it was originally installed on and cannot be transferred to a new computer. Therefore, you cannot use the OEM license key from your previous computer to install the software on your new PC.

If you want to use the older version of Windows on your new computer, you will need to purchase a new license or obtain a retail version of the operating system. The retail version of Windows allows you to transfer the license to a new computer, as long as it's only installed on one computer at a time.

Learn more about OEM license

brainly.com/question/17422536

#SPJ11

The data and information you need to complete this part of the project are provided to you. (See the Required Source Information and Tools section at the beginning of this document. ) In this part of the project, you need to conduct a survey of the existing hosts, services, and protocols within Corporation Techs' network. Specifically, you need to: 1. Access the PCAP data using NetWitness Investigator. 2. Identify hosts within the Corporation Techsâ network. 3. Identify protocols in use within the Corporation Techsâ network

Answers

To survey the existing hosts, services, and protocols within Corporation Techs' network, you will need to access the PCAP data using NetWitness Investigator. NetWitness Investigator is a powerful network traffic analysis tool that can be used to analyze captured network traffic and identify hosts, services, and protocols within the network.

Once you have accessed the PCAP data using NetWitness Investigator, you can begin to identify the hosts within the Corporation Techs' network. Hosts are typically identified by their IP address, and you can use NetWitness Investigator to filter the captured traffic by IP address to identify the hosts within the network. By analyzing the traffic to and from each host, you can also identify the services that are running on each host.

In addition to identifying the hosts and services within the Corporation Techs' network, you will also need to identify the protocols that are in use. Protocols are the rules and procedures that govern communication between devices on a network, and they can provide valuable insight into the types of activities that are taking place on the network. NetWitness Investigator can be used to identify the protocols in use by analyzing the headers of the captured network traffic.

To learn more about Network traffic, visit:

https://brainly.com/question/29039902

#SPJ11

The given program reads a list of single-word first names and ages (ending with -1), and outputs that list with the age incremented. the program fails and throws an exception if the second input on a line is a string rather than an integer. at fixme in the code, add try and except blocks to catch the valueerror exception and output 0 for the age.

ex: if the input is:

lee 18
lua 21
mary beth 19
stu 33
-1

Answers

This program reads a list of first names and ages, and its purpose is to output the list with incremented ages. However, the program encounters an issue if the second input on a line is a string instead of an integer, resulting in a ValueError exception.

To address this problem, you can use try-except blocks at the "fixme" point in the code. By implementing this structure, you can catch the ValueError exception and output 0 for the age whenever an invalid input is encountered.

Here's a simplified explanation of how the try-except blocks work:

1. The "try" block contains the code that may potentially cause an exception (in this case, converting the input to an integer).
2. If no exception is encountered, the program proceeds normally.
3. If an exception occurs, the program jumps to the "except" block, which specifies how to handle the error.

In your specific case, the "except" block should be designed to catch ValueError exceptions and output 0 for the age when it's triggered.

Following this approach will allow the program to handle invalid inputs gracefully and continue to process the rest of the list without any issues.

You can learn more about the program at: brainly.com/question/30613605

#SPJ11

Define a function named get_values with two parameters. the first parameter will be a list of dictionaries (the data). the second parameter will be a string (a key). get_values must return a list of strings. for each dictionary in the parameter, you will need the value it associates with the second parameter as a key. if the accumulator list does not contain that value, add it to the accumulator list. after processing the list of dictionaries, the accumulator list's entries will be the values associated with the second parameter, but without any duplicates. you should assume that all dictionaries in the parameter will have the second parameter as a key

Answers

The function named get_values takes two parameters: a list of dictionaries and a string key. The function returns a list of unique values associated with the key in each dictionary.

To implement this function, we can start by initializing an empty list to accumulate the values associated with the key. We can then loop through each dictionary in the list of dictionaries and extract the value associated with the key parameter using dictionary indexing. If the accumulator list does not already contain this value, we can add it to the list.

Here's an example implementation of the get_values function in Python:

def get_values(data, key):
   values = []
   for dictionary in data:
       value = dictionary[key]
       if value not in values:
           values.append(value)
   return values

To use this function, we can pass a list of dictionaries and a key parameter to the function and store the returned list of unique values in a variable. For example:

data = [
   {'name': 'John', 'age': 25},
   {'name': 'Jane', 'age': 30},
   {'name': 'Bob', 'age': 25},
   {'name': 'Alice', 'age': 30}
]

unique_ages = get_values(data, 'age')
print(unique_ages) # Output: [25, 30]

In this example, we pass a list of dictionaries representing people's names and ages, and the get_values function extracts and returns a list of unique ages. The output of the function call is [25, 30].

To learn more about Python programming, visit:

https://brainly.com/question/26497128

#SPJ11

in a recursive power function that calculates some base to a positive exp power, at what value of exp do you stop? the function will continually multiply the base times the value returned by the power function with the base argument one smaller.

Answers

In a recursive power function, the value of exp at which the recursion stops depends on the specific implementation of the function and the requirements of the program using the function.

Generally, the recursion stops when the exp value reaches 0 or 1, as any number raised to the 0th power equals 1, and any number raised to the 1st power equals itself. However, depending on the program's requirements, the recursion may stop at a different value of exp.

For example, if the program only needs to calculate the power of 2 up to a certain limit, the recursion could stop at that limit and not continue to calculate higher powers. It is important to consider the requirements of the program and choose an appropriate stopping point to avoid unnecessary calculations and improve efficiency.

You can learn more about recursive power at: brainly.com/question/13152599

#SPJ11

A structured program includes only combinations of the three basic structures: ____. A. Sequence, iteration, and loop b. Sequence, selection, and loop c. Iteration, selection, and loop d. Identification, selection, and loop

Answers

A structured program includes only combinations of the three basic structures: sequence, selection, and loop.

Structured programming is a programming paradigm that emphasizes the use of clear and well-organized code. It is based on the idea that a program can be broken down into smaller, more manageable parts or modules, using three basic structures: sequence, selection, and loop.

Sequence refers to the execution of code in sequential order, with one statement following another. Selection involves making decisions based on certain conditions and executing different parts of code accordingly.

Looping allows for the repetition of a section of code until a certain condition is met. These three structures are the building blocks of structured programming and can be combined to create more complex programs.

Overall, structured programming provides a clear and organized way to write programs, making them easier to understand and maintain. The three basic structures of sequence, selection, and loop are fundamental to this approach.

For more questions like Code click the link below:

https://brainly.com/question/31228987

#SPJ11

PLEASE HELP AGAIN WITH EASY JAVA CODING

Also please try to add the answer in the text box instead of adding a picture (if you can)
THANKYOU!
The question will be included in the picture

Answers

The  Java Code defines a BankAccount Class with deposit and withdraw methods, and tracks balance and account number using instance variables.

How does the work?

This code gives a definition the Bank_Account class, which provides 3    methods for depositing, withdrawing, and displaying the balance of a bank account

When an object is created, the init method is invoked and shows a welcome message.

The deposit and withdraw methods ask the user for an amount and then update the balance, whereas the display method just outputs the current balance. The code at the bottom generates a Bank_Account object, executes the deposit and withdraw methods, and shows the changed balance.

Learn more about Java:

https://brainly.com/question/29897053

#SPJ1

Complete the code for the provided Sequence class. Your code should provide the expected results when run through the provided SequenceTester class. Add code for these two methods in the Sequence class: public Sequence append(Sequence other) append creates a new sequence, appending this and the other sequence, without modifying either sequence. For example, if a is 1 4 9 16 and b is the sequence 9 7 4 9 11 then the call a. Append(b) returns the sequence 1 4 9 16 9 7 4 9 11 without modifying a or b. Public Sequence merge(Sequence other) merges two sequences, alternating elements from both sequences. If one sequence is shorter than the other, then alternate as long as you can and then append the remaining elements from the longer sequence. For example, if a is 1 4 9 16 and b is 9 7 4 9 11 then a. Merge(b) returns the sequence without modifying a or b. 3. 1 9 4 7 9 4 16 9 11

Answers

To complete the Sequence class to provide the expected results when running through the provided SequenceTester class, we need to add two methods: append() and merge().

The append() method creates a new sequence by appending the current sequence with another sequence without modifying either sequence. This can be achieved by creating a new Sequence object and adding the elements of both sequences to it. The resulting sequence will contain all the elements of both sequences in the order they were added.

The merge() method merges two sequences by alternating elements from both sequences. This can be achieved by creating a new Sequence object and adding elements alternately from both sequences until one sequence runs out of elements. If one sequence is shorter than the other, the remaining elements of the longer sequence are added to the end of the merged sequence.

When these methods are added to the Sequence class and called through the provided SequenceTester class, they should produce the expected results. The append() method should return a new sequence containing all the elements of both sequences in the order they were added, without modifying the original sequences. The merge() method should return a new sequence containing elements alternately from both sequences, followed by any remaining elements from the longer sequence.

By implementing these methods in the Sequence class, we can extend its functionality to include the ability to append sequences and merge sequences, making it a more versatile and useful tool for working with sequences of data.

To learn more about Programming, visit:

https://brainly.com/question/15683939

#SPJ11

which of the following statements are true about using a high-level programming language instead of a lower-level language? i - some algorithms can only be expressed in low-level languages, and cannot be expressed in any high-level languages ii - code in a high-level language is often translated into code in a lower-level language to be executed on a computer

Answers

Using a high-level programming language instead of a lower-level language has its own advantages and disadvantages. One of the advantages of high-level programming languages is that they are more user-friendly and easier to learn compared to low-level languages.

1)High-level languages allow programmers to write code using English-like words and phrases which make it easier to read, write and understand. Additionally, high-level languages have built-in library and functions that simplify the coding process and make it faster to develop software applications.

2)However, some algorithms can only be expressed in low-level languages and cannot be expressed in any high-level languages. This is because low-level languages provide direct access to the computer's hardware and operating system, allowing programmers to write code that is closer to the machine language. Low-level languages are also more efficient when it comes to memory usage and speed.

3)It's important to note that code in a high-level language is often translated into code in a lower-level language to be executed on a computer. This process is called compilation or interpretation. During compilation, the high-level language code is converted into machine language that can be executed by the computer. Interpreted languages, on the other hand, execute the high-level language code directly without the need for compilation.

In conclusion, both high-level and low-level programming languages have their own advantages and disadvantages. It's important to choose the language that best fits the requirements of the project and the skills of the programmer.

For such more question on library

https://brainly.com/question/31392496

#SPJ11

In linux, the most popular remote access tool is openssh. which software performs the same remote command line (cli) access from a windows machine

Answers

The most popular remote access tool for Windows machines is called PuTTY. PuTTY is free and open-source software that allows users to establish a secure shell (SSH) connection to a remote server or device.

It provides a CLI interface that enables users to access the command line interface of the remote device and execute commands remotely.

PuTTY is easy to use and offers a range of advanced features such as session logging, support for various encryption algorithms, and the ability to establish port forwarding. It also supports various protocols including Telnet, rlogin, and SSH. Additionally, PuTTY can be configured to use public key authentication, making it a highly secure remote access tool.

In summary, PuTTY is a widely used and trusted remote access tool for Windows users. It provides a secure and efficient means of accessing remote servers and devices via the command line interface.

You can learn more about Windows at: brainly.com/question/13502522

#SPJ11

PLEASE HELP WITH EASY JAVA CODING

Also if possible please type in your answer instead of adding a picture of the answer!

THANK YOU


read from a file, "some method" to determine IF it is a pangram, reprint with the labels as shown


The actual question is included in the picture and the text file that needs to be used will be added as 2 separate comments

Answers

The Java program that speaks to the above prompt is attached accordingly.

How does this work?

Note that the Java code that can tell you whether a statement is a pangram or a perfect pangram.

Input

Each input line is a sentence that concludes with a period. Other punctuation may be used as well. The input is terminated by a single period.

Output

The software  prints the key word for each phrase. PERFECT if the statement is a perfect pangram, PANGRAM if it is not, and NEITHER if it is neither. The software must additionally print a colon, a space, and the original phrase after the key word.

Learn more about java;
https://brainly.com/question/29897053
#SPJ1

Suggest at least two ways that such a person might use a handheld computer to work more efficiently as a manager in a supermarket professionals. ​

Answers

A handheld computer can be a valuable tool for a manager in a supermarket. By using this technology to track inventory levels, manage employee schedules, and access important data in real-time, managers can work more efficiently and effectively, which can help increase sales and reduce waste.

A handheld computer can help a manager in a supermarket in many ways, including:

1. Inventory management: By using a handheld computer, the manager can easily track inventory levels and make sure that products are always in stock. This can help reduce waste and increase sales by ensuring that customers always find what they are looking for.

2. Employee management: A handheld computer can help a manager keep track of employee schedules and tasks, making it easier to ensure that everyone is working efficiently and that all necessary tasks are being completed on time.

A handheld computer can be an incredibly valuable tool for a manager in a supermarket. With the ability to track inventory levels, manage employee schedules, and access important data in real-time, a handheld computer can help a manager work more efficiently and effectively. By using this technology, managers can make sure that products are always in stock, employees are working efficiently, and that they have access to the information they need to make informed decisions.


To know more about Inventory management visit:

https://brainly.com/question/13439318

#SPJ11

You are given to design an Aircraft Model which has ability to fly at low altitude with low engine noise. Explain why and what modelling type(s) will you chose to design, if you are required to analysis aircraft aerodynamics, its detection on enemy radar, and its behavior when anti-missile system is detected by aircraft

Answers

To design an aircraft model with low-altitude flight and low engine noise capabilities, choose a combination of computational fluid dynamics (CFD) and radar cross-section (RCS) modeling.

CFD would be used to analyze the aerodynamics of the aircraft, optimizing its shape and features to minimize drag and reduce noise. RCS modeling would help evaluate the aircraft's detectability on enemy radar, allowing for adjustments to the design to minimize radar reflection.

Additionally, incorporating electronic warfare (EW) modeling will simulate the aircraft's behavior when encountering anti-missile systems, informing the development of effective countermeasures. By integrating CFD, RCS, and EW modeling techniques, we can achieve an efficient, stealthy, and well-protected aircraft design suitable for low-altitude operations.

You can learn more about electronic warfare at: brainly.com/question/10106497

#SPJ11

Using the sequence of references from Exercise 5. 2, show the nal cache contents for a three-way set associative cache with two-word blocks and a total size of 24 words. Use LRU replacement. For each reference identify the index bits, the tag bits, the block o set bits, and if it is a hit or a miss.


references: 3, 180, 43, 2, 191, 88, 190, 14, 181, 44, 186, 253

Answers

Due to the complexity of the calculation and the formatting required to present the final cache contents, it is not possible to provide a complete answer within the 100-word limit.

What is the difference between a hit and a miss in the context of cache memory?

To solve this problem, we need to use the given references to simulate the behavior of a three-way set associative cache with two-word blocks and a total size of 24 words, using LRU replacement policy.

Assuming a cache organization where the index bits are selected using the middle bits of the memory address, and the tag bits are selected using the remaining high-order bits, we can proceed as follows:

Initially, all cache lines are empty, so any reference will result in a cache miss.

For each reference, we compute the index bits and the tag bits from the memory address, and use them to select the appropriate set in the cache.

We then check if the requested block is already in the cache by comparing its tag with the tags of the blocks in the set. If there is a hit, we update the LRU information for the set, and proceed to the next reference. Otherwise, we need to evict one of the blocks and replace it with the requested block.

To determine which block to evict, we use the LRU information for the set, which tells us which block was accessed least recently. We then replace that block with the requested block, update its tag and LRU information, and proceed to the next reference.

After processing all the references, the cache contents will depend on the order in which the references were made, as well as the cache organization and replacement policy. To report the final cache contents, we need to list the tag and block offset bits for each block in the cache, grouped by set, and ordered by LRU.

Note that we can compute the number of index bits as log2(number of sets), which in this case is log2(24/3) = 3. The number of tag bits is then given by the remaining bits in the address, which in this case is 16 - 3 - 1 = 12.

Due to the complexity of the calculation and the formatting required to present the final cache contents, it is not possible to provide a complete answer within the 100-word limit.

Learn more about Cache

brainly.com/question/15730840

#SPJ11

The minimum wage of a country today is $ 25,000 per month. the minimum wage has increased steadily at the rate of 3% per year for the last 10 years. write a program c to determine the minimum wage at the end of each year in the last decade. (solve using the concepts of loop controls with c programming)

Answers

The C program is given below that calculates the minimum wage at the end of each year for the last decade:

#include <stdio.h>

int main() {

   float wage = 25000.0;

   printf("Minimum wage at the end of each year for the last decade:\n");

   for (int i = 1; i <= 10; i++) {

       wage += wage * 0.03;

       printf("Year %d: $%.2f\n", i, wage);

   }

   return 0;

}

Explanation:

We start by initializing the minimum wage variable to $25,000.Then we use a for loop to iterate over the 10 years, using the loop variable i to keep track of the current year. Inside the loop, we update the minimum wage by adding 3% to it using the formula wage += wage * 0.03. Finally, we print out the year and the minimum wage at the end of that year using printf(). The %.2f format specifier is used to print the wage as a floating-point number with 2 decimal places.

To know more about the  for loop click here:

https://brainly.com/question/30706582

#SPJ11

Other Questions
Titan, with a radius of 2. 58 x 10^6 m, is the largest moon of the planet Saturn. If the mass of Titan is 1. 35 x10^23 kg, what is the acceleration due to gravity on the surface of this moon?A. 1. 35 m/s^2B. 3. 49 m/s^2C. 3. 49 x 10^6 m/s^2D. 1. 35 x 10^6 m/s^2 [Wind-Wolf] learned his basic numbers by helping his father count and sort the rocks he used in the sweat - lodge - seven rocks for a medicine sweat, say, or thirteen for the summer solstice ceremony Chris bought 5 tacos and 2 burritos for $13. 25. Brett bought 3 tacos and 2 burritos for $10. 75. The price of one taco is $The price of one burrito is $ the bronze statue of poseidon or zeus depicts a god as though he were causing destruction, either throwing his trident or a lightning bolt. what expression on the face of the god is more characteristic of the classical period of greece than of the later hellenistic period How can I get the answer for A=Vertex for y= Filling out a payroll sheet. Someone please do this for me and order your answers like the questions (1-9)A large part of a businesss operating expenses is made up of salaries and wages. Greg is planning to open the Doggie Daycare, a pet hotel. The shop will also offer pampering service. Much of the work will fall to him and his family, but he will also be hiring several other people. Some will work full-time and some part-time. Fill in the table to determine his operating expenses for wages and salaries. Pay particular attention to the number of hours and days Gregs employees will work. If you started with 20. 0 g of a radioisotope and waited for 3 half-lives to pass, then how much would remain? Explain the process to collect delinquent balances Let w = 2xy + y2 - 4x2, += st, y=,= Compute Bu (1.-3) - 88 -(1, -3) write a report in 250 words of an interview you had with a sport star What information can a scientist learn directly from a single fossil?A. How many offspring the organism producedB. The organism's shape and sizeC. How the organism is related to othersD. The life expectancy of similar organisms Using Conflict theory , address social control mechanisms and how racism, religion, education and federal government authority have been used to justify the atrocities and the forced assimilation and oppression of the Indigenous people. Please not short answers! A movie theater has a seating capacity of 349. The theater charges $5. 00 for children, $7. 00 for students, and $12. 00 for adults. There are half as many adults as there are children. If the total ticket sales was $ 2540, How many children, students, and adults attended? Evaluate the integral dy (tan-'[y/8)) (64+y?) ( 1 + dy (tan-'(4/8)) (64+y?) = A project is budgeted for 1,200 hours and will last 6 weeks. a technician will be 25% billable to the project for the first three weeks and then 100% for the final three weeks. if a technician normally works 40 hours per week, how many total hours will the technician bill to the job? What is the correct answer for 17? Plsss help 3. What was the "intolerable bureaucratic blockage" Brauman describes? One isotope of element J has an atomic mass of 78. 92u and a relative abundance of 50. 69%. The other major isotope of element J has an atomic mass of 80. 92u and a relative abundance of 49. 31%. Calculate the average atomic mass element J Uv rays, x-rays, some chemicals found in tobacco, and radioactive fallout are all examples of _____, agents that can damage dna and cause mutations. Give me the funniest joke the best one gets brainiest