fill in the blank. ___ is defined as the ratio of the compressor (or pump) work input to the turbine work output.

Answers

Answer 1

The term you are looking for is "thermodynamic efficiency."

In thermodynamics, efficiency is the measure of how well a system converts energy from one form to another. In this case, the thermodynamic efficiency is the ratio of the work input required to operate the compressor or pump to the work output generated by the turbine. It is an important concept in power generation, where maximizing efficiency is key to reducing costs and minimizing environmental impact.

The thermodynamic efficiency of a system is influenced by a range of factors, including the design and quality of the equipment, the operating conditions, and the type of fuel or energy source being used. In general, the higher the efficiency, the less energy is wasted as heat and the more useful work is generated. This is particularly important in power generation, where improving efficiency can lead to significant reductions in greenhouse gas emissions and other pollutants. To calculate the thermodynamic efficiency of a system, the work input and work output must be measured and compared. For example, in a gas turbine power plant, the compressor requires work input to compress the air before it is burned with fuel in the combustion chamber. The resulting high-pressure, high-temperature gases expand through the turbine, generating work output that drives the generator to produce electricity. The efficiency of the turbine is therefore defined as the work output divided by the work input. In practice, achieving high thermodynamic efficiency is a complex and ongoing challenge. Engineers and researchers are constantly working to improve the performance of equipment and optimize operating conditions to maximize efficiency and reduce costs. This includes innovations in materials, aerodynamics, and control systems, as well as new technologies such as carbon capture and storage and renewable energy sources.

To know more about thermodynamics visit:

https://brainly.com/question/1368306

#SPJ11


Related Questions

All of the following formats may contain incorrect or misleading information. on which should you be most careful about trusting the information you come across as it may seem academically reviewed but in fact is not?

Answers

Wikis is the one on which should you be most careful about trusting the information you come across as it may seem academically reviewed but in fact is not.

What is Wikis?

A wiki is known to be a form of a collaborative tool that is used and one that aids students to make their own contribution and change one or more pages of course linked materials.

Note that based on the above, Wikis is the one on which should you be most careful about trusting the information you come across as it may seem academically reviewed but in fact is not.

Learn more about Wikis from

https://brainly.com/question/25153373

#SPJ1

A developer created a helper class with a method that can be called from Visualforce pages, web services, triggers, and of even anonymous code. When the method is called from a trigger

Answers

Since the developer created a helper class with a method that can be called from Visualforce pages, the  method is as a result of a trigger known as option A. Check if Trigger.isExecuting ==true.

Who is a system developer?

A systems developer is known to be one among the type of software developer.

Note that they are known to be the person that is said to be responsible as they help to create and implement applications and programs for the backend processing systems that is said to be often used in regards to  businesses and organizations.

Note that Backend processing systems are said to be a behind-the-scenes aspect  of software and as such, Since the developer created a helper class with a method that can be called from Visualforce pages, the  method is as a result of a trigger known as option A. Check if Trigger.isExecuting ==true.

See full question below

A developer created a helper class with a method that can be called from Visualforce pages, web services, triggers, and of even anonymous code. When the method is called from a trigger, the developer needs to execute logic that should not be executed If the method Is called from anywhere else. How can the developer determine if the code Is executed in a trigger context?

A. Check if Trigger.isExecuting ==true

B. Check if Trigger.newMap !=null.

C. Check if System.executionContext =='Trigger'.

D. Use the executeOnTrigger annotation on the method definition.

Learn more about  developer from

https://brainly.com/question/11352260

#SPJ1

Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a fee.

Answers

Brenda also orders movies and television through the Internet via a(n) VOD provider, which allows users to download video for a fee.

What is the meaning of the term VOD?

The term video-on-demand (VOD) is known to be a kind of technology made to send video content, such as movies and television programs, directly to specific customers for quick viewing.

Note that technology is constantly growing and one need to grow along with it. services that are good is often adopted by people.

Hence, Brenda also orders movies and television through the Internet via a(n) VOD provider, which allows users to download video for a fee.

Learn more about movies from

https://brainly.com/question/27936956

#SPJ1

On a Local Area Network, or LAN, what identification do nodes use to communicate with each other internally

Answers

On a Local Area Network, or LAN. MAC addresses are the identification that nodes use to communicate with each other internally. This is further explained below.

What is the MAC address?

Generally, A media access control address, often known as a MAC address, is a one-of-a-kind identification that is given to a network interface controller (NIC) in order for it to be used as a network address in communications that take place inside a network segment. This use is typical in the vast majority of networking technologies based on IEEE 802, such as Ethernet, Wi-Fi, and Bluetooth.

In conclusion, On a LAN, or local area network. Nodes interact with each other inside using MAC addresses.

Read more about the MAC address

https://brainly.com/question/27960072

#SPJ1

True or false, the total number of clock cycles (cc) for a delay loop of 10 ms for 2-mhz 8086 clock is 10,000 cc.

Answers

Answer:

FALSE is the answer of that question

I HOPE IT HELP YOU

Say true or false
Computer is the main tool of ICT.
b. Cyber crimes play positive role for better use of ICT

Answers

It would be false so (b)
The answers are
a) true
b) false

Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change. Which one of the following terms best describes his goal

Answers

A terminology which best describe Kevin's goal in terms of expansion and contraction as needs change is: A. Scalability.

What is scalability?

Scalability can be defined as a measure of the ability of a system to change (expansion or contraction) in performance and cost as a result of changes in demands of application and system processing, especially in a network architecture.

In this context, we can logically deduce that a terminology which best describe Kevin's goal in terms of expansion and contraction as needs change is scalability.

Read more on scalability here: brainly.com/question/14301721

#SPJ1

Complete Question:

Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change.  Which one of the following terms best describes his goal? A. Scalability B. Elasticity C. Cost effectiveness D. Agility

Create a directory called projects directly inside /home/fparker. Change the owner of /home/fparker/projects to the fparker user and change the group to the fparker group. Create a user account named ljenkins and set password123 as the password. Format the third drive's only partition with the ext4 file system.

Answers

cd /home/fparker
mkdir projects
chown /home/fparker/projects fparker:fparker
adduser ljenkins (set password to password123 in menu)

Use either “fdisk” or “parted” to format the disk, I can’t completely answer that part of the question without knowing the hierarchy of the file system)

To perform the tasks you described, you would need administrative privileges or use the appropriate commands with 'sudo'.

What is directory?

A directory, also known as a folder, is a file system construct used to organize and store files and other directories. It acts as a container for grouping related files and subdirectories together in a hierarchical manner. Directories are an essential part of the file system structure in modern operating systems.

Here are the steps to achieve each task:

1.  Create a directory called "projects" directly inside /home/fparker:

mkdir /home/fparker/projects

2. Change the owner and group of /home/fparker/projects to the fparker user and group:

chown fparker:fparker /home/fparker/projects

3. Create a user account named ljenkins and set "password123" as the password:

useradd ljenkins                # Create the user account

passwd ljenkins password123    # Set the password for the user

After successfully completing these steps, you will have created the "projects" directory inside /home/fparker, changed its owner and group to fparker, created a new user account named ljenkins with the password "password123," and formatted the third drive's partition with the ext4 file system.

Learn more about directory on https://brainly.com/question/29757285

#SPJ2

The telephone system is an example of a ________ network

Answers

The telephone system is an example of a circuit-switched network.

Is telephone a circuit switched network?

Yes. The  Traditional telephone systems  such as landlines are known to be a common  example of a technology that are said to often make use of the circuit switching.

Hence, The telephone system is an example of a circuit-switched network is a true statement.

Learn more about telephone  from

https://brainly.com/question/917245

#SPJ1

Add a media query that applies when the viewport's width is at least 600px. Use the .benefits-container selector to set flex-direction: row;

Answers

The media query that applies when the viewport's width is at least 600px will be:

media only screen and (min-width: 600px) {

   .benefits-container {

       flex-direction: row;

   }

What are media queries?

Media queries are the key part of responsive web design that allows the user to create different layouts depending on the size of the viewport.

They can also be used to detect other things about the environment your site is running on.

Learn more about media query on:

https://brainly.com/question/13136637

#SPJ1

Refer to Table 8-4. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of dollars) for this economy equals

Answers

If one uses the data above (in billions of dollars), the Gross domestic product (in billions of dollars) for this economy equals  $1,200.

What is the GDP about?

Note that:

GDP (Gross Domestic Product):

Thus it will be :

Consumption + Investment + Government expenditure + (Export - Import)

Which is:

GDP = 800 + 200 + 300 + (100 - 200)

GDP = $1200 billions

See full question below

Consumption expenditures $800

Investment expenditures 200

Government purchases 300

Exports 100

Imports 200

Wages 800

8) Refer to Table above. Consider the data above (in billions of dollars) for an economy: Gross domestic product (in billions of dollars) for this economy equals

A) $2,200.

B) $1,600.

C) $1,400.

D) $1,200.

Learn more about GDP from

https://brainly.com/question/1383956

#SPJ1

Jenny wants to create a network that can be accessed from any room in her house without physically connecting. Which type of network medium should she use?

Answers

Well I use AT&T in my house it works in all the rooms I suggest using AT&T

The type of network medium Jenny should use is wireless networks.

Given data:

Jenny should use a wireless network medium to create a network that can be accessed from any room in her house without physically connecting.

Wireless networks use radio waves or infrared signals to transmit data between devices, allowing for flexible connectivity without the need for physical cables.

Devices such as smartphones, laptops, tablets, and smart home devices can connect to the wireless network and access the internet or communicate with each other.

To learn more about wireless networks, refer:

https://brainly.com/question/31630650

#SPJ3

A designer wraps up a final prototype of a language learning app in Adobe XD, and wants to share their work with the development team. Before they publish the prototype on the cloud, they name the file: LanguageApp-Version-Final. Does this file name reflect best practices

Answers

In the case above, file name do not reflect best practices and as such it is No. A file name must include the date, the author, and the version number.

Why should a filename reflect its contents?

A file name is known to be the key identifier of a file and a Good file name need to present some clues in regards to its content, status and version.

Hence, In the case above, file name do not reflect best practices and as such it is No. A file name must include the date, the author, and the version number.

See options below

Does this file name reflect best practices?1 point

Yes. A file name should include the project name and version.

No. A file name must include the date, the author, and the version number.

Learn more about file name from

https://brainly.com/question/1982059

#SPJ1

You are working for a large financial institution and preparing for disaster recovery and upcoming DR drills. A key component in the DR plan will be the MySQL database instances and their data. The Recovery Time Objective (RTO) is such that read replicas can be used to offload read traffic from the master database. Which items are key features of read replicas

Answers

The items that are key features of reading replicas are

inside AZ, across AZ, or even beyond the area - may establish RRAn individual database server instance was manually elevated to stand-alone statusEach RR with its own DNS destination may have up to five RRs per master.

This is further explained below.

What is the DR plan?

Generally, A disaster recovery plan, often known as a DRP, is a well-documented and organized strategy that outlines how an organization may swiftly go back to work in the aftermath of an unexpected event.

In conclusion, A disaster recovery plan, also known as a DR plan, is a formal document that is drafted by an organization and provides step-by-step instructions on how to react to unanticipated occurrences such as natural disasters, power outages, cyber-attacks, and any other kind of event that is disruptive.

Read more about the DR plan

https://brainly.com/question/2681783

#SPJ1

Header file guards are preprocessor directives whose primary role is to cause the compiler to _____

Answers

Header file guards are preprocessor directives with the primary role to cause the compiler to allow defining a function that are usable throughout a user's program.

What is a header file?

A header file can be defined as a type of file which comprises macro definitions and C declarations and they are meant to be shared between several source files.

In Computer programming, header file guards are preprocessor directives with the primary role to cause the compiler to allow defining a function that are usable throughout a user's program.

Read more on header file here: https://brainly.com/question/23678678

#SPJ1

Theorem: for any two real numbers, x and y, if x and y are both rational then x y is also rational. Which facts are assumed and which facts are proven in a proof by contrapositive of the theorem?

Answers

The facts that are assumed and the facts  that are proven in a direct proof of the theorem is that option a) Assumed: x is rational and y is rational and Proven: x + y is rational.

What is a theorem?

The term known as theorem is known to be a kind of a formula, or statement that is seen in a lot of mathematics field and it also known top  be the logic deduced.

Note that it is also seen as the result that is said to have been proved to be true (through the use of operations and facts that are said to be already known).

Therefore, The facts that are assumed and the facts  that are proven in a direct proof of the theorem is that option a) Assumed: x is rational and y is rational and Proven: x + y is rational.

Learn more about Theorem from

https://brainly.com/question/343682

#SPJ1

See full question below

Theorem: For any two real numbers, x and y, if x and y are both rational then x + y is also rational. Which facts are assumed and which facts are proven in a direct proof of the theorem?

a) Assumed: x is rational and y is rational

Proven: x + y is rational

b) Assumed: x + y is irrational

Proven: x is irrational and y is irrational

c) Assumed: x + y is rational

Proven: x is rational or y is rational

d) Assumed: x is rational or y is rational

Proven: x + y is rational

Discuss how progressive deepening uses a mixture of dfs and bfs to eliminate the disadvantages of both and at the same time finds the solution is a given tree. support your answer with examples of a few trees.

Answers

IDDFS is known to use both depth-first search’s space-efficiency and also the use of breadth-first search’s fast search due to the fact that  its nodes are closer to the root and IDDFS often calls DFS for a lot of depths starting from a starting value.

What is progressive deepening?

The term progressive deepening is known to be if a person is said to be making effort try to approximate a given answer at every level and they often work to go deep towards the leaf nodes based on the time limit that a person have for their move.

Hence, IDDFS is known to use both depth-first search’s space-efficiency and also the use of breadth-first search’s fast search due to the fact that  its nodes are closer to the root and IDDFS often calls DFS for a lot of depths starting from a starting value.

Learn more about deepening from

https://brainly.com/question/27353529

#SPJ1

LAB: Word frequencies - methods Define a method named getWordFrequency that takes an array of strings, the size of the array, and a search word as parameters. Method getWordFrequency then returns the number of occurrences of the search word in the array parameter (case insensitive). Then, write a main program that reads a list of words into an array, calls method getWordFrequency repeatedly, and outputs the words in the arrays with their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words. Ex: If the input is: 5 hey Hi Mark hi mark the output is: hey 1 Hi 2 Mark 2 hi 2 mark 2 Hint: Use the equalsignoreCase() method for comparing strings, ignoring case. The program must define and call a method: public static int getWordFrequency(String[] wordsList, int listSize, String currWord) LAB ACTIVITY 8.45.1: LAB: Word frequencies - methods 0 / 10 LabProgram.java Load default template... Слд 1 import java.util.Scanner; 2 3 public class LabProgram { 4 5 /* Define your method here */ 6 7 public static void main(String[] args) { 8 /* Type your code here. */ 9 } 10 } 11 NO

Answers

Using the knowledge in computational language in JAVA it is possible to write the code being methods define a method named getWordFrequency that takes an array of strings

Writting the code in JAVA:

import java.util.*;

public class WordFrequency {

       public static int getWordFrequency(String[] wordsList , int listSize , String currWord) {

               HashMap<String , Integer> hm = new HashMap<>();

               for(String st : wordsList) {

                       String str = st.toLowerCase();

                       hm.put(str, hm.getOrDefault(str, 0) + 1);

               }

               for(String st : wordsList) {

                       String str = st.toLowerCase();

                       System.out.println(st + " " + hm.get(str));

               }

               String currWordToLowerCase = currWord.toLowerCase();

               return hm.get(currWordToLowerCase);

       }

       public static void main(String[] args) {

               // TODO Auto-generated method stub

               String[] wordsList = {"hey" , "Hi" , "Mark" , "hi" , "mark"};

               int listSize = wordsList.length;

               String currWord = "hey";

               System.out.println("The frequency of " + currWord + " is : " + getWordFrequency(wordsList , listSize , currWord));

       }

}

See more about JAVA at brainly.com/question/12978370

#SPJ1

What technique is most commonly associated with the use of malicious flash drives by penetration testers

Answers

Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.

Explanation:

NEED HELP ASAP
If you had two proxy servers located in the same room, what use could you make of them?

nothing
create a hub
sell one of the servers
set up a network neutral zone

Answers

If you had two proxy servers located in the same room, what use could you make of them? B. Create a hub

What is a Proxy Server?

A proxy server is a server program used in computer networking that stands between a client requesting a resource and the server supplying that resource.

Every computer or Ethernet-based device linked to a network hub receives data that is broadcast to all of those devices and that's what two proxy servers would be used to do.

Read more proxy servers here:

https://brainly.com/question/28075045
#SPJ1

Classes that depend on field names from parent classes are said to be ____ because they are prone to errors.Group of answer choicesrobustinnovativefragileconstructive

Answers

Classes that depend on field names from parent classes are generally said to be fragile because they are very prone to coding errors.

What is a class?

A class can be defined as a user-defined blueprint (prototype) or template that is typically used by software programmers to create objects and define the data types, categories, and methods that should be associated with these objects.

In object-oriented programming (OOP) language, a class that is written or created to implement an interface would most likely implement all of that interface's method declarations without any coding error.

In Computer programming, we can infer and logically conclude that classes that are highly dependent on field names from parent classes are generally said to be fragile because they are very prone to coding errors.

Read more on class here: brainly.com/question/20264183

#SPJ1

What guidelines should you follow prior to ordering and installing memory in an hp business pc or notebook?

Answers

In computer, the guidelines that should be followed prior to ordering and installing memory in an hp business pc or notebook is to verify that the network cable is plugged in.

What is computer?

It should be noted that a computer simply means the electronic device that can be used to make one's work easier.

In this case, in computer, the guidelines that should be followed prior to ordering and installing memory in an hp business pc or notebook is to verify that the network cable is plugged in. This is important to allow for easy installation.

Learn more about computer on:

brainly.com/question/24540334

#SPJ1

________ software modules deal with setting employee objectives, performance, and compensation. scm prm drm erm sfa

Answers

ERM software modules deal with setting employee objectives, performance, and compensation. option D is the answer.

What are software modules?

Software module are component of a program and not the main programme.

They form essential part of the main programme with or more routines. One or more modules developed separately make up a program.

ERM software can be used for various businesses and in organization settings. It helps to identify compensation and monitor performance of the organization.

Enterprise risk software (ERM) is essential in managing various risk attached to a Job.

Therefore, ERM software modules deal with setting employee objectives, performance, and compensation

Learn more on software below

https://brainly.com/question/14635097

#SPJ1

Use the writeln() method of the document object to display the current platform in a

tag in the webpage. Hint: The platform property of the window.navigator object contains the current platform.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that the document object to display the current platform in a tag in the webpage

Writting the code in JAVA:

<TABLE>

     <ROWS>

     <TR>

     <TD>Shady Grove</TD>

     <TD>Aeolian</TD>

     </TR>

     <TR>

     <TD>Over the River, Charlie</TD>

     <TD>Dorian</TD>

     </TR>

     </ROWS>

     </TABLE>

   

See more about JAVA at brainly.com/question/12975450

#SPJ1

LAB: Word frequencies - methods Define a method named getWordFrequency that takes an array of strings, the size of the array, and a search word as parameters. Method getWordFrequency() then returns the number of occurrences of the search word in the array parameter (case insensitive). Then, write a main program that reads a list of words into an array, calls method getWordFrequency() repeatedly, and outputs the words in the arrays with their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words.
Ex: If the input is: 5 hey Hi Mark hi mark the output is: hey 1 Hi 2 Mark 2 hi 2 mark 2 Hint: Use the equalslgnoreCase() method for comparing strings, ignoring case. Hint: Use the equalslgnoreCase() method for comparing strings, ignoring case. The program must define and call a method: public static int getWordFrequency(String[] wordsList, int listSize, String currWord).

Answers

The program is an illustration of loops, functions and conditional statements

Loops are used for repetitionFunctions are used to group related code statements in a blockConditional statements are used to make decisions

The program in Java

The program written in Java, is as follows:

import java.util.Scanner;

public class Main {

   public static int getFrequencyOfWord(String[] wordsList, int listSize, String currWord) {

       int wordFreq = 0;

       for (int i=0; i<listSize; i++){

           if (wordsList[i].compareToIgnoreCase(currWord)==0){

               wordFreq++;

           }

       }

       return wordFreq;

   }

       public static void main(String[] args) {

           Scanner input = new Scanner(System.in);

           int N = input.nextInt();

           String myArr[] = new String[N];

           for (int i=0; i<N; i++){

               myArr[i] = input.next();

           }

           for (int i=0; i<N; i++){      

               String searchWord = myArr[i];

               int freqCount = getFrequencyOfWord(myArr,N,searchWord);

               System.out.println(searchWord + " " + freqCount);

       }              

  }

}

Read more about java programs at:

https://brainly.com/question/26642771

#SPJ1

In the context of customer relationship management (CRM) applications, which approach is often chosen by organizations with an established IT infrastructure

Answers

The on-premise approach is often chosen by organizations with an established IT infrastructure.

What is the On Premises?

In an on-premises method, resources are said to be given or deployed in-house and it is one that is found within an enterprise's IT infrastructure.

Customer relationship management (CRM) is known to be a form of a technology that is often used in the act of managing all of a firm's  relationships and communications with customers and also that of potential customers.

Therefore, The on-premise approach is often chosen by organizations with an established IT infrastructure.

Learn more about CRM from

https://brainly.com/question/27373018

#SPJ1

A router is connected to network 192.168.1.0/24 and network 192.168.2.0/24. The router is configured to use RIP and has learned both networks. The next hop router for network 192.168.3.0 has changed. You need to make the change with the least amount of effort possible. What should you do

Answers

In the case above, the thing that should be done is for one to Drop the packet.

What is a router?

A router is known to be a form of a physical or virtual tools that often helps one to pass information and it is said to be between two or more packet-switched computer networks.

Note that, In the case above, the thing that should be done is for one to Drop the packet.

Learn more about router from

https://brainly.com/question/24812743

#SPJ1

how to print in this on python
#
# #
# # #
# # # #
# # # # #

Answers

Answer:

triangular ##&((+ hhvbh. hhhb hhv

Answer:

for i in range(1, 6):

   print(("# " * i).rstrip())

Explanation:

You need to print one hashtag, then 2, then 3, and so on. We can use Python's string multiplication to get each line quicker.

String multiplication is an easy way to repeat the same string a certain number of times. It's done by multiplying the string to a number.

For example,

"hello" * 6

>> "hellohellohellohellohellohello"

If we multiply the string "#" by any number, we would get a number of hashtags side by side, without any space. To easily avoid this, we can multiply "# " instead to automatically put a space to the right of each hashtag.

We can use a for loop that goes through range(1, 6) to print out 5 rows.

for i in range(1, 6):

Then, we can print the string "# " multiplied by i.

print("# " * i)

However, this will also put a space at the end of the string, which we do not want to print. Hence, we can use the .rstrip() method to strip the string of any spaces on the right. We will first put the whole string in parentheses, then invoke rstrip on it.

print(("# " * i).rstrip())

Let's put both lines together.

for i in range(1, 6):

   print(("# " * i).rstrip())

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send e-mails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?.

Answers

In the case above, the productivity suite that Paul should consider is OpenOffice, G suite.

What is G Suite used for?

G Suite Basic edition is known to be a kind of a suite that is made up of collaborative productivity apps that tends to give one's business professional email, shared calendars, and others.

Hence, In the case above, the productivity suite that Paul should consider is OpenOffice, G suite.

See options below

Which productivity suites should he consider?

a. Prezi, G suite

b. G suite, Zoho

c. OpenOffice, G suite

d. Zoho, Apple iWork

Learn more about financial records from

https://brainly.com/question/4954869

#SPJ1

Completar Fill in the blanks with the correct familiar commands. dar (negative) 1 of 1 Question 2 with 1 blank hacer (affirmative) 1 of 1 Question 3 with 1 blank ir (negative) 1 of 1 Question 4 with 1 blank poner (affirmative) 1 of 1 Question 5 with 1 blank hacer (negative) 1 of 1

Answers

The affirmative command hacer is known as haz.

The affirmative tú command decir - diThe  affirmative tú command ir  - veThe  affirmative tú command poner -pon

What is the translation about?

The translation are:

The affirmative tú command to do is known as do.The affirmative tú command to say - diThe affirmative tú command ir - veThe affirmative tú command to put -pon

The Affirmative tú commands is known to be one that is said to be similar  as the él/ella/Ud.

Note that this  is seen as the conjugation of the present tense and it is one that is often  used to tell another person that you are familiar with that thing.

Hence, The affirmative command hacer is known as haz.

The affirmative tú command decir - diThe  affirmative tú command ir  - veThe  affirmative tú command poner -pon

Learn more about Spanish words from

https://brainly.com/question/26522612

#SPJ1

Other Questions
What factors will impact the competitiveness of a country's export? Complete the table below, indicating what percentage of your overall course grade is taken from each course component:In-Class Participation: 2 % (we'll assume this to be true for this question, though it might be different for your section)Graded Homework in WebAssign: 23%Midterm Tests (total for three tests): 50Final Exam: 25%%Let's assume that you earn 100% for your In-Class Participation score, 91% for your Graded Homework score 95%.on.Test 1,81% on Test 2, 97% on Test 3, and 86% on the Final Exam. What would your overall course grade be?xEnter a number. Read the passage from Harriet Tubman: Conductor on the Underground Railroad by Ann Petry.When Harriet heard of the sale of her sisters, she knew that the time had finally come when she must leave the plantation. She was reluctant to attempt the long trip North alone, not because of John Tubmans threat to betray her, but because she was afraid she might fall asleep somewhere along the way and so would be caught immediately. She persuaded all three of her brothers to go with her. Based on the details in this passage, which statement would Petry most likely agree with?Harriet was optimistic that her plan would work.Harriet was determined to leave no matter what. Harriet was anxious about traveling with her three brothers.Harriet was unconcerned about the danger of getting caught. Who Cannot claim deductions from gross income? Which fraction of representatives from both houses of the state legislature need to approve bringing a proposed amendment to the texas constitution to the people to vote? question 5 options: 1/3 1/2 2/3 3/4 (5,3)(-1,3)(2,-2)(-4,-2) Find the perimeter Support your position with clear reasons and specific examples. Try to use relevant words from the Word Generationlist in your response.attribute interest | project relocate statistics What is the area of a triangle with the base of 7 cm and the height of 12 cm? x^4+4x^3+7x^2+16x+12 world war ll resulted in increased attention to which of these by the roosevelt administration a. relief efforts for the unemployed b. expanded bargaining rights for unions c. the demands of civil rights leaders d. the need for stricter immigration laws Find the error with subject-verb agreement. Select the incorrect verb and type it correctly. Nurtrient-rich vegetables, including beet greens, watercress, and chard, helps reduce the risk of chronic diseases. Table 1.1 below shows the income elasticity of demand and cross elasticity of demand. Given that product, Y, is an inferior good with no close substitutes. It is a compliment to Z. Which best describes Y? Table 1.1 Income elasticity of demand Cross elasticity of demand with products A negative positive B positive negative C negative negative D positive positive Could the constitution have been produced if George Washington had not attended the convention? Explain. if JKLM is a parallelogram what is measure angle K How do you calculate gross total income example? Alicia went to the supermarket with $200. She bought 3 cans of peas for $9 each 5 bags of flour at $15 each and 7 packs of milk at $12.50 each. Calculate the change she received. What is a simple definition of repetition? I WILL GIVE BRAINIESTWrite an essay with 400 wordsabout what do you think inspires people to achieve success? Think about the qualities of a person you consider successful. Write an essay to your teacher explaining the causes and effects of success. You can include either positive or negative effects, or both. Explain using examples of successful individuals. Help me with this ill give the brainiest( please don't answer with random answers or from the question please answer if you know ) Mei and her friends went to the theater to see the latest action movie. After Mei spent $12.00 on the ticket, she had $9.25 left to buy snacks. How much money did Mei start with?