Write a procedure named Read10 that reads exactly ten characters from standard input into an array of BYTE named myString. Use the LOOP instruction with indirect addressing, and call the ReadChar procedure from the book's link library. (ReadChar returns its value in AL.)

Answers

Answer 1

Answer:

Following are the solution to the given question:

Explanation:

Since a procedure has the Read10 parameter, the 10 characters from the input file are stored in the BYTE array as myString. The LOOP instruction, which includes indirect addressing and also the call to the ReadChar method, please find the attached file of the procedure:

Write A Procedure Named Read10 That Reads Exactly Ten Characters From Standard Input Into An Array Of

Related Questions

what are the functions of the windows button, Task View and Search Box? give me short answer

Answers

Answer:

Windows button = You can see a Start Menu

Task view = You can view your Tasks

Search Box = You can search any app you want in an instance

the grade point average collected from a random sample of 150 students. assume that the population standard deviation is 0.78. find the margin of error if c = 0.98.

Answers

Answer:

[tex]E = 14.81\%[/tex]

Explanation:

Given

[tex]n = 150[/tex]

[tex]\sigma = 0.78[/tex]

[tex]c = 0.98[/tex]

Required

The margin of error (E)

This is calculated as:

[tex]E = z * \frac{\sigma}{\sqrt{n}}[/tex]

When confidence level = 0.98 i.e. 98%

The z score is: 2.326

So, we have:

[tex]E = 2.326 * \frac{0.78}{\sqrt{150}}[/tex]

[tex]E = 2.326 * \frac{0.78}{12.247}[/tex]

[tex]E = \frac{2.326 *0.78}{12.247}[/tex]

[tex]E = \frac{1.81428}{12.247}[/tex]

[tex]E = 0.1481[/tex]

Express as percentage

[tex]E = 14.81\%[/tex]

A technician is able to connect to a web however, the technician receives the error, when alternating to access a different web Page cannot be displayed. Which command line tools would be BEST to identify the root cause of the connection problem?

Answers

Answer:

nslookup

Explanation:

Nslookup command is considered as one of the most popular command-line software for a Domain Name System probing. It is a network administration command-line tool that is available for the operating systems of many computer. It is mainly used for troubleshooting the DNS problems.

Thus, in the context, the technician receives the error "Web page cannot be displayed" when he alternates to access different web page, the nslookup command is the best command tool to find the root cause of the connection problem.

3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, process, and retrieve data whenever needed. b. Modern processors run so fast in term of megahertz (MHz). c. If millions of calculations are to be performed, a computer will perform every calculation with the same accuracy. d. It is very safe to store data and information on the computer independently. e. If some electrical or electronic damages occur, there are no any chances of data loss or damage f. The output devices of the computer like monitor, printer, speaker, etc. can store meaningful information, g. The input devices can display the output after processing. h. Students can also use computer as their learning tools.​

Answers

Answer:

a,b,c,d,f,g are true only e is false

Decomposing and modularizing software refers to the process of combining a number of smaller named components having well-defined interfaces that describe component interactions into a single, larger monolithic system.

a. True
b. False

Answers

Answer:

b. False

Explanation:

Decomposing and modularizing means that a large software is being divided into smaller named components that have a well-defined interfaces which basically describes the component interactions. The main goal is to place these different functionalities as well as the responsibilities in different components.

Decomposition and modularization forms the principle of software design.

Hence, the answer is false.

bao bì chủ động active packaging và bao bì thông minh intelligent packaging khác biệt như thế nào

Answers

answer:

yes....................

x-1; while x ==1 disp(x) end, then the result a. infinity or b. (1) ​

Answers

Answer:

1 is the answer because ur trying to trick us

Explanation:

Create a list of lists, named hamsplits, such that hamsplits[i] is a list of all the words in the i-th sentence of the text. The sentences should be stored in the order that they appear, and so should the words within each sentence. Regarding how to break up the text into sentences and how to store the words, the guidelines are as follows: Sentences end with '.', '?', and '!'. You should convert all letters to lowercase. For each word, strip out any punctuation. For instance, in the text above, the first and last sentences would be: hamsplits[0] == ['and', 'can', 'you', 'by', ..., 'dangerous', 'lunacy'] hamsplits[-1] == ['madness', 'in', 'great', ..., 'not', 'unwatchd', 'go']

Answers

Answer:

Explanation:

The following code is written in Python. It takes in a story as a parameter and splits it into sentences. Then it adds those sentences into the list of lists called hamsplits, cleaned up and in lowercase. A test case is used in the picture below and called so that it shows an output of the sentence in the second element of the hamsplits list.

def Brainly(story):

   story_split = re.split('[.?!]', story.lower())

   hamsplits = []

   for sentence in story_split:

       hamsplits.append(sentence.split(' '))

   for list in hamsplits:

       for word in list:

           if word == '':

               list.remove(word)

Given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a VendingMachine object that performs the following operations:

Purchases input number of drinks
Restocks input number of bottles
Reports inventory
The VendingMachine is found in VendingMachine.java. A VendingMachine's initial inventory is 20 drinks.

Ex: If the input is:

5 2
the output is:

Inventory: 17 bottles

Need this answer in java! !!!!!!!!!!!!

Answers

Answer:

import java.util.Scanner;

class Main {

 public static void main (String args[])

 {

   Scanner input = new Scanner(System.in);

   VendingMachine machine = new VendingMachine(20);

   System.out.print("Enter nr to purchase: ");

   int nrPurchased = input.nextInt();

   System.out.print("Enter nr to re-stock: ");

   int nrRestock = input.nextInt();

   machine.Transaction(nrPurchased, nrRestock);

   input.close();

 }

}

class VendingMachine {

 private int inventory;

 public VendingMachine(int initialInventory) {

   inventory = initialInventory;

 }

 public void Transaction(int nrToBuy, int nrToRestock) {

   inventory += nrToRestock - nrToBuy;

   System.out.printf("Inventory: %d bottles.\n", inventory);

 }

}

The program is an illustration of a sequential program, and it does not require loops, iterations and branches.

The program in java, where comments are used to explain each line is as follows:

import java.util.Scanner;

class Main {

public static void main (String args[]){

   //This creates a scanner object

  Scanner input = new Scanner(System.in);

  //This gets input for the number of purchases

  int Purchased = input.nextInt();

  //This gets input for the number of restocks

  int Restock = input.nextInt();

  //This calculates and prints the inventory

System.out.print("Inventory: "+(20 - Purchased + Restock)+" bottles");

}

}

At the end of the program, the net inventory is printed.

Read more about similar programs at:

https://brainly.com/question/22851981

Need help ASAP!

Which of the following statements is true?

1) A PCAP format is handy because there is no additional tool to read it.
2) Network traffic can be captured using the Tcpdump protocol analyzer.
3) Normally, traffic inside a network is recorded within a capture file.
4) Sniffer is a program to save the network capture to a specific format.

Answers

The statement that  is true is that  Network traffic can be captured using the Tcpdump protocol analyzer.

How is network traffic captured?

Network traffic can be taken in using the Tcpdump. This is known to be a kind of packet sniffer that is often used to look and record network traffic on an interface.

An example is when a person capture 1,000 packets through the use of tcpdump. One can then analyze network traffic by using actual network traffic analyzer, which is as Wireshark.

Learn more about Network traffic from

https://brainly.com/question/26199042

discuss three ways in which the local government should promote safe and healthy living​

Answers

Answer:

1. Secure drinkable water

2. Promote organic products through the provision of subsidiaries

3. Create a place for bioproducts to be sold

Explanation:

Whether drinking, domestic, food production, or for leisure purposes, safe and readily available water is important for public health. Better water supply and sanitation and improved water resource management can boost economic growth for countries and can make a significant contribution towards reduced poverty.some of the claimed benefits of organic food:

Without the use of pesticides and chemical products, organic farming does not toxic residues poison land, water, and air. Sustainable land and resource use in organic farming. Crop rotation promotes healthy and fertile soil.

In conventional farming, the use of pesticides contaminates runoff, which is a natural part of the water cycle. In groundwater, surface water, and rainfall, pesticide residues are found. This means that in food produced with pesticides, contamination may not be isolated, but also affect the environment.

Create a place for bioproducts to be sold

Biologics offer farmers, shippers, food processors, food retailers, and consumers a wide range of benefits. Biocontrols can also help protect the turf, ornamentals, and forests in addition to food use. They can also be used for disease and harm controls in public health, i.e., mosquitoes and the control of ticks.

The benefits of the use of biologicals in farming applications tend to be more direct, though they are indirect. The list includes benefits to crop quality and yield which help farmers supply consumer products worldwide with healthy and affordable fruit and vegetables. Biocontrols also allow farmers in their fields to maintain positive populations of insects (natural predators) through their highly-target modes of action, reducing their reliance on conventional chemical pesticides.

which of the following is an example of how science can solve social problems?
It can reduce the frequency of severe weather conditions.
It can control the time and day when cyclones happen.
It can identify the sources of polluted water.
It can stop excessive rain from occurring.

Answers

Answer:

It can identify the sources of polluted water.

Explanation:

Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.

A scientific method can be defined as a research method that typically involves the use of experimental and mathematical techniques which comprises of a series of steps such as systematic observation, measurement, and analysis to formulate, test and modify a hypothesis.

An example of how science can solve social problems is that it can identify the sources of polluted water through research, conducting an experiment or simulation of the pollution by using a computer software application.

In conclusion, science is a field of knowledge that typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life.

Answer:

It can identify the sources of polluted water.

Explanation:

Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector (except the last value) with the last value in the vector subtracted from each value. Output each value on a new line. Ex: If the input is -46 66 76 9 -1, the output is:
-55
57
67

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> nums;

int num;

cin>>num;

while(num != -1){

 nums.push_back(num);

 cin>>num; }  

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

return 0;

}

Explanation:

This declares the vector

vector<int> nums;

This declares an integer variable for each input

int num;

This gets the first input

cin>>num;

This loop is repeated until user enters -1

while(num != -1){

Saves user input into the vector

 nums.push_back(num);

Get another input from the user

 cin>>num; }

The following iteration print the vector elements

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

Describe computer in your own words on three pages

Answers

no entendi me explicas porfavor para ayudarte?

what was the computer works in binary functions

Answers

Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing.

preguntas sobre la búsqueda de alternativas de solución​

Answers

Answer:

Explanation:

Qué tipo de solución alternativa estás buscando

about system implementation in long

Answers

Answer:

Systems implementation & evaluation

What is systems implementation?

What are the tools for physical systems design?

What are the issues to consider before an information system is operational?

What are the key indicators of a quality system?

What are the techniques for systems evaluation?

Systems implementation is the process of:

defining how the information system should be built (i.e., physical system design),

ensuring that the information system is operational and used,

ensuring that the information system meets quality standard (i.e., quality assurance).

Systems design

Conceptual design – what the system should do

Logical design – what the system should look to the user

Physical design – how the system should be built

Physical system design using structured design approach:

à To produce a system that is easy to read, code, and maintain

1. Factoring: decomposition

2. Span of control: 9 subordinate modules

3. Reasonable size: 50-100 LOC

4. Coupling: minimize inter-module dependency

5. Cohesion: single module functionality

6. Shared use: multiple calls to lower level modules from different bosses

Structured design tools

· Organization of programs and program modules (structure chart)

· Processing logic specification in each module (pseudocode)

Structure chart – to show graphically

how the various program parts/modules of an information system are physically organized hierarchically

how the modules communicate with each other through data couple (data exchange) and flag (control/message)

how the modules are related to each other in terms of sequence, selection, and repetition

To access a ___ library, you will need a computer and Internet access.

Answers

To access an online library, you will need a computer and an internet connection.

What are online libraries?

Online libraries are digital collections of books, journals, and other materials that are available to users through a web browser.

With a computer and internet access, users can browse, search, and read or download materials from the online library. Many online libraries also offer features such as personalized user accounts, bookmarking, and citation tools.

Online libraries have become increasingly popular as more content becomes available in digital format, making it easier and more convenient for people to access information from anywhere with an internet connection.

Read more about online library here:

https://brainly.com/question/20406929

#SPJ1

Design a function char maxChar (char,char)- to return the smallest character from the arguments.
in java please please​

Answers

Answer:

Following are the program to the given question:

public class Main//defining Main method

{

   char maxChar (char x1,char x2)//defining a method maxChar that takes two char parameter

   {

       if(x1<x2)//use if to compare char value

       {

           return x1;//return first char value

       }

       else//else block

       {

           return x2;//return second char value

       }

       

   }

public static void main(String[] args)//defining main method

{

    char x1,x2;//defining char variable

    x1='d';//use char to hold value

    x2='a';//use char to hold value

    Main ob=new Main();//creating class Object

 System.out.println(ob.maxChar(x1,x2));//calling method and prints its return value

}

}

Output:

a

Explanation:

In this code, a method "maxChar" is defined that holds two char variable "x1,x2" in its parameters, and use if conditional statement that checks the parameter value and print its return value.

In the main method, two char variable is declared that hold char value and passing the value in the method and prints its return value.  

Let’s say you’re having trouble locating a file on your computer. Which of the following are good places to look for the file?

a. The Recycle Bin
b. Default folders like My Documents
c. The Downloads folder

Answers

Answer:

The downloads folder ( C )

Explanation:

when you have difficulty locating a file on your computer you can look for the file in any of the options listed ( The recycle bin, Default folders like My Documents  or The Downloads folder )

But the best place out of these three options is the Downloads folder. and this is because by default all files downloaded into your computer are  placed in the Downloads folder regardless of the type of file

In a certain game, a player may have the opportunity to attempt a bonus round to earn extra points. In a typical game, a player is given 1 to 4 bonus round attempts. For each attempt, the player typically earns the extra points 70% of the time and does not earn the extra points 30% of the time. The following code segment can be used to simulate the bonus round.
success - 0
attempts - RANDOM 1, 4
REPEAT attempts TIMES
IF (RANDOM 110 s 7
success - success + 1
DISPLAY "The player had"
DISPLAY attempts
DISPLAY "bonus round attempts and"
DISPLAY success
DISPLAY "of them earned extra points."
Which of the following is not a possible output of this simulation?
А. The player had 1 bonus round attempts and 1 of them earned extra points.
B The player had 2 bonus round attempts and of them earned extra points.
С The player had 3 bonus round attempts and 7 of them earned extra points.
D The player had 4 bonus round attempts and 3 of them earned extra points.

Answers

Answer:

С The player had 3 bonus round attempts and 7 of them earned extra points.

Explanation:

Given

See attachment for correct code segment

Required

Which of the options is not possible?

From the question, we understand that:

[tex]attempts \to [1,4][/tex] --- attempt can only assume values 1, 2, 3 and 4

The following "if statement" is repeated three times

IF RANDOM[1,10] <= 7:

   success = success + 1

This implies that the maximum value of the success variable is 3

The first printed value is the attempt variable

The second printed value is the success variable.

From the list of given options, (a), (b) and (d) are within the correct range of the two variable.

While (c) is out of range because the value printed for variable success is 7 (and 7 is greater than the expected maximum of 3)

Examine the following output:
4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62]
5 39 ms 39 ms 65 ms placa01gr00.bb.ispxy.com [154.11.12.11]
6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14]
7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [204.171.205.29]
8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1]
Which command produced this output?
a. tracert
b. ping
c. nslookup
d. netstat

Answers

Answer:

a. tracert

Explanation:

Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.

Given the following snippet of code, answer the following two questions based on the code: typedef enum {Sun, Mon, Tue, Wed, Thu, Fri, Sat} days; days x = Mon, y = Sat; while (x != y) { x++; } y++; printf("x = %d, y = %d", x, y); 1. What value will be printed for variable x? [ Select ] . 2. What value will be printed for variable y? [ Select ]

Answers

Answer:

1) The value of x will be 6.

2) The value of y will be 7.

Explanation:

1) The value of x will be 6.  

The enum values are labeled by default from 1. This means that Sun = 1, Mon = 2, Tue = 3 and so on.  

So, x = Mon = 2 and y = Sat = 6  

x increases up to y = 6 in the while loop.  

and then y also increments by 1.  

2)So the value of y = 7.  

You will need actual printf("Sun") or printf("Mon") for printing the actual text for the enum.

The ________ is the most important component in a computer because without it, the computer could not run software. Note: You may use an acronym to respond to this question.

Answers

Answer:

Central processing unit (CPU)

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Hence, the most important component in a computer is the central processing unit (CPU) because without it, it is practically impossible for the computer to run any software application or program.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

7. Lower than specified oil pressure is measured on a high-mileage engine. Technician A says that worn main or rod bearings could be the cause. Technician B says that a clogged
oil pump pickup screen could be the cause. Who is correct?

O A. Neither Technician A nor B

O B. Technician B

O C. Technician A

O D. Both Technicians A and B

Answers

Technician B as Technician A was a fraud

Compute the approximate acceleration of gravity for an object above the earth's surface, assigning accel_gravity with the result.
The expression for the acceleration of gravity is: (G*M)/(d2), where G is the gravitational constant 6.673 x 10-11, M is the mass of
the earth 5.98 x 1024 (in kg), and d is the distance in meters from the Earth's center (stored in variable dist_center)
Sample output with input: 6.3782e6 (100 m above the Earth's surface at the equator)
Acceleration of gravity: 9.81

Answers

Answer:

The summary of the given query would be summarized throughout the below segment. The output of the question is attached below.

Explanation:

Given values are:

[tex]G = 6.673e-11[/tex][tex]M = 5.98e24[/tex][tex]accel \ gravity = 0[/tex][tex]dist\ center=float(inp())[/tex]

here,

inp = input

By utilizing the below formula, we get

⇒ [tex]\frac{GM}{d^2}[/tex]

Now,

⇒ [tex]accel \ gravity=\frac{G\times M}{dist \ center**2}[/tex]

⇒ print("Acceleration of gravity: {:.2f}".format(accel_gravity))

Questions to ask people on how corona has affected the religion sectors​

Answers

Answer:

bcoz of corona all churches and temples are closed and pilgrimage are cancelled

trình bày ngắn gọn hiểu biết của bản thân về mạng máy tính theo mô hình OSI hoặc TCP/IP

Answers

Answer:

OSI đề cập đến Kết nối hệ thống mở trong khi TCP / IP đề cập đến Giao thức điều khiển truyền. OSI theo cách tiếp cận dọc trong khi TCP / IP theo cách tiếp cận ngang. Mô hình OSI, lớp truyền tải, chỉ hướng kết nối trong khi mô hình TCP / IP là cả hướng kết nối và không kết nối.

Explanation:

dab

Consider an array inarr containing atleast two non-zero unique positive integers. Identify and print, outnum, the number of unique pairs that can be identified from inarr such that the two integers in the pair when concatenated, results in a palindrome. If no such pairs can be identified, print -1.Input format:Read the array inarr with the elements separated by ,Read the input from the standard input streamOutput format;Print outnum or -1 accordinglyPrint the output to the standard output stream

Answers

Answer:

Program.java  

import java.util.Scanner;  

public class Program {  

   public static boolean isPalindrome(String str){

       int start = 0, end = str.length()-1;

       while (start < end){

           if(str.charAt(start) != str.charAt(end)){

               return false;

           }

           start++;

           end--;

       }

       return true;

   }  

   public static int countPalindromePairs(String[] inarr){

       int count = 0;

       for(int i=0; i<inarr.length; i++){

           for(int j=i+1; j<inarr.length; j++){

               StringBuilder sb = new StringBuilder();

               sb.append(inarr[i]).append(inarr[j]);

               if(isPalindrome(sb.toString())){

                   count++;

               }

           }

       }

       return count == 0 ? -1 : count;

   }

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       String line = sc.next();

       String[] inarr = line.split(",");

       int count = countPalindromePairs(inarr);

       System.out.println("RESULT: "+count);

   }

}

Explanation:

OUTPUT:

Describe what happens at every step of our network model, when a node of one network...

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

Other Questions
rearrange the words to make a complete sentence.she,interested,that,was,in,proposal,said,she,the. ANSWER ASAP IM TIMED 30 POINTSWhich shape below will form a tessellation?A. regular heptagonsB. regular pentagonsC. regular octagonsD. regular hexagons A school is ordering chairs for the teacher's lounge and some of the classrooms. Each classroom needs 17 chairs, while the teacher's lounge needs 16. Let n represent the number of classrooms included in the order and c represent the total number of chairs. Complete the table using the relationship between n and c. Melhoyo Corporation, a manufacturing company, has provided data concerning its operations for September. The beginning balance in the raw materials account was $37,000 and the ending balance was $29,000. Raw materials purchases during the month totaled $57,000. Manufacturing overhead cost incurred during the month was $102,000, of which $2,000 consisted of raw materials classified as indirect materials. The direct materials cost for September was: Group of answer choices 1. Ano ang basehan mo, ng iyong kamag-anak o maging ng iyong kaibigan sa pagpili ng restawran nakakainan? Read the excerpt from the General Prolgue to the Canterbury Tales.When the sweet showers of April have piercedThe drought of March, and pierced it to the root,And every vein is bathed in that moistureWhose quickening force will engender the flower;And when the west wind too with its sweet breathHas given life in every wood and fieldTo tender shoots, and when the stripling sunHas run his half-course in Aries, the RamRead the same excerpt from the Middle English version of the General Prologue to the Canterbury Tales.Whan that Aprille with his shoures soteThe droghte of Marche hath perced to the rote,And bathed every veyne in swich licour,Of which vertu engendred is the flour;Whan Zephirus eek with his swete breethInspired hath in every holt and heethThe tendre croppes, and the yonge sonneHath in the Ram his halfe cours y-ronneWhich statement best describes the relationship between the Middle English text and the modern English text?Because the English language has changed so much over time, the Middle English version of the text is unrecognizable to the modern reader. The two texts share no common words, and none of the words are remotely similar.The English language has changed very little since the time of Chaucer. Consequently, the Middle English version of the text mostly contains words that are used in the modern version as well. The Middle English version contains many words that are no longer in use. It also contains words that are similar, but they are not similar enough to allow modern readers to understand their meanings In the number 1326308 is between which two numbers in a million? Explanatory writing that explores the relationship between an action and its consequence is: cause and efect]compare and contrast]informitive]argumentive] Which reason best explains Thomas Jefferson's purpose for repeating the phrase "He has" in the list of grievances in the Declarationof Independence?isterly.to provide a parallel structure to the argumentargeOB.to increase the reader's interestghtmOC.to emphasize the wrongdoings by the kingOD. to justify the colonists' struggle for freedomceResetNextsingcee ofercise;ers of Which sentence best shows that striving toward personal fulfillment is an ongoing process? what type of white blood cell is activate memory cells ? The genetic material appearing like a thread in the nucleus is known as _____. the spindle chromatin DNA You and your family are planning a roadtrip. You determine that the distance you need to drive is 660 miles and that you can average 60 miles per hour for the entire trip. How many hours will your trip take? Pls help ..if A =[4 3] is a singular matrix, find 'a'[ a 3] Which can readers use to find the meaning of an unfamiliar word? Check all that apply.root wordsformal wordsword endingsparts of speechlength of speech (FIRST CORRECT FOR BRAINIEST) Solve for x Someone help me on this Problem !! Which business unit could have its shares quoted on the stock exchange? Lightning strikes one of Christys trees in her backyard and starts a fire that spreads to two other trees before firefighters are able to put it out. The fire department charges her $600 for responding to her call. Christys DP-2 policy has a Coverage A limit of $95,000. What is the maximum amount of indemnification that Christy can expect to receive for this loss (ignoring any deductible)? A box at rest is in a state of equilibrium half way up on a ramp. The ramp has an incline of 42 . What is the force of static friction acting on the box if box has a gravitational force of 112.1 N ?70 N80 N75 N85 N