C++ please
Write a program that does the following.
Create a dynamic two dimensional squarearray of unsigned integers (array_one). Prompt the user to enter the number of rows and columns they want (maximum of 30) (rows and columns must be the same for a square array)
Pass the array to a function that will initialize the two dimensional array to random numbers between 0 and 4000 using the rand() library function. Here is the kicker: The array cannot have any repeated values!
Create another dynamic two dimensional array of the same size (array_transpose)
Pass both arrays to a function that will generate the transpose of array_one returning the values in array_transpose. (If you don’t already know the transpose swaps the rows and columns of an array.) Example: Suppose you have a 4 x 4 array of numbers (array_one). The transpose is shown below (array_transpose)
Array One Array Transpose
1 2 3 4 1 5 9 13
5 6 7 8 2 6 10 14
9 10 11 12 3 7 11 15
13 14 15 16 4 8 12 16
Pass each array to a print_array function that will print (to the screen or a file) the results of a test case with a 20 by 20 array.

Answers

Answer 1

Answer:

#include <iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   int n;

   cout<< "Enter the row and column length: ";

   cin>> n;

   int array_one[n][n];

   int array_transpose[n][n];

   for (int i = 0; i < n; i++){

      for (int j= 0; j < n; j++){

           srand((unsigned) time(0));

           array_one[i][j] = (rand() % 4000)

           array_transpose[j][i] = array_one[i][j];

       }

   }

}

Explanation:

The C source code has three variables, 'array_one', array_transpose' (both of which are square 2-dimensional arrays), and 'n' which is the row and column length.

The program loops n time for each nth number of the n size to assign value to the two-dimensional array_one. the assign values to the array_transpose, reverse the 'i' and 'j' values to the two for statements for array_one to 'j' and 'i'.


Related Questions

Question #11
If A = 5 and B = 10, what is A* B equal to?
estion #2
estion # 3
restion #4
testion5
O 15
O Five
OTwo
O 50
Read Question

Answers

Answer:

Option 4: 50 is the correct answer.

Explanation:

Arithmetic operations can be performed using the programming languages. Some symbols used in programming languages are different from what we use in mathematics.

The symbol * is used to represent multiplication in programming languages.

Given

A = 5

B = 10

So, A*B will be equal to: 5*10 = 50

Hence,

Option 4: 50 is the correct answer.

Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?

Answers

Answer:

120

Explanation:

This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.

5 permutation of 4

To find permutation, we use the formula

P(n, r) = n! / (n - r)!

Where

n is the size of the shirts available, 5

r is the color of each shirt available, 4

P(5, 4) = 5! / (5 - 4)!

P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!

P(5, 4) = 120 / 1

P(5, 4) = 120

Therefore, the total number of shirts available is 120

Which attitudes are most common among successful IT professionals?

Answers

openness to learning new things and interest in technology

emotional resilience and enjoyment of leadership positions

tough-mindedness and a focus on financial gain

empathetic and motivated by a concern for others


hopefully that helps!

Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet (using a standard header with no options) and that the TCP packet gets put into an IP packets. What is the % of overhead that is added in because of TCP and IP combines?
1) 40%
2) 10%
3) 20%
4) 70%

Answers

Answer:

1) 40%

Explanation:

Given the data size = 60 byte

data traversed through TSP then IP

Header size of TCP = 20 bytes to 60 bytes

Header size of IP = 20 bytes to 60 bytes

Calculating overhead:

By default minimum header size is taken into consideration hence TCP header size = 20 bytes and IP header size = 20 bytes

Hence, the correct answer is option 1 = 40%

The question is in the photo

Answers

Answer:

a

the most suitable answer

Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?

Answers

Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.

The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False

Answers

Answer:

False

Explanation:

The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares

The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability

The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing

Answers

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

Create a function copy() that reads one file line by line and copies each line to another file. You should use try-except statements and use either open and close file statements or a with file statement.>>>def copy(filename1, filename2) :

Answers

Answer:

See attachment for answer

Explanation:

I could not add the answer; So, I made use of an attachment

The program is written on 9 lines and the line by line explanation is as follows:

Line 1:

This defines the function

Line 2:

This begins a try except exception that returns an exception if an error is encountered

Line 3:

This open the source file using open and with statement

Line 4:

This open the destination file using open and with statement and also makes it writable

Line 5:

This iterates through the content of the source file; line by line

Line 6:

This writes the content to the destination file

Line 7 & 8:

This is returned if an error is encountered

Line 9:

This prints that the file has been successfully copied        

To call the function from main; use

copy(filename1, filename2)

Where filename1 and filename2 are names of source and destination files.

Take for instance:

filename1 = "test1.txt"

filename1 = "test2.txt"

copy(filename1, filename2)

The above will copy from test1.txt to test2.txt

The function copies text from one file to another. The program written in python 3 goes thus

def copy(filename1, filename2):

#initialize a function names copy and takes two arguments which are two files

try:

#initiate exception to prevent program throwing an error

with open(filename1, "r") as file1 :

#open file1 in the read mode with an alias

with open(filename2, "w") as file2:

#open file 2 in write mode with an alias

for line in file1:

#loop through each line in file 1

file2.write(line)

#copy / write the line in file2

except:

print("Error copying file")

#display if an error is encountered

print("File Copied")

#if no error, display file copied

Learn more : https://brainly.com/question/22392664

What is meant by the term visual communication?

Answers

Answer:

eye contact

Explanation:

The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cycle if at least one edge can still be relaxed after performing nm times of relaxations. The algorithm, however, does not specify which cycle is a negative cycle. Design an algorithm to report one such cycle if it exists. You should make your algorithm runs as fast as possible.

Answers

Answer:

- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.

- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".

- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.

- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.

Explanation:

The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.

Chegg Suppose the heap is a full tree, size 2^n-1. what is the minimum number of steps to change a min heap to a max heap. Show your logic.

Answers

Answer:

Explanation:

We start from the bottom-most and rightmost internal node of min Heap and then heapify all internal modes in the bottom-up way to build the Max heap.

To build a heap, the following algorithm is implemented for any input array.

BUILD-HEAP(A)

   heapsize := size(A)

   for i := floor(heapsize/2) downto 1

       do HEAPIFY(A, i)

   end for

Convert the given array of elements into an almost complete binary tree.

Ensure that the tree is a max heap.

Check that every non-leaf node contains a greater or equal value element than its child nodes.

If there exists any node that does not satisfy the ordering property of max heap, swap the elements.

Start checking from a non-leaf node with the highest index (bottom to top and right to left).

Why is a bedroom considered a poor study environment?

Bedrooms are dimly lit.
Bedrooms are too small.
Bedrooms are too comfortable.
Bedrooms are messy and cluttered.

Answers

Bedrooms are too comfortable, I'm not sure if this is the answer

Answer:

It would basically be based on how you study and what your room is like. But my opinion would be

Bedrooms are Too Comfortable- which causes you to want to sleep or not due your work

Bedrooms are dimly lit- Which makes it hard for you to see your work and see anything

Bedrooms are too small- You will fell crushed and hard to focus (I would most likely choose this answer)

Bedrooms are messy and cluttered- You will not be able to concentrate and make it hard to study or do school work. ( I would choose this because I have experienced with this and I score higher in a cleaner environment and able to focus more)

Explanation: This would all depend on how you best work.

Hope this Helps!!

Which interpersonal skill is the most important for a telecom technician to develop?
teamwork
active listening
conflict resolution
social awareness

Answers

Answer: Interpersonal communication is the process of face-to-face exchange of thoughts, ideas, feelings and emotions between two or more people. This includes both verbal and nonverbal elements of personal interaction.

Explanation:

i think plz dont be mad

What is the best use of network in homes

Answers

Answer:

Spectrem

Explanation:

What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?

Answers

Answer:

dd if=/dev/drive1 of=/dev/backup

Explanation:

Linux operating system is an open-source computer application readily available to system operators. The terminal is a platform in the operating system used to write scripts like bash and directly communicate with the system kernel.

There are two commands used in bash to copy files, the "cp" and "dd". The dd is mostly used to copy files from one storage or partition to another. The syntax of dd is;

dd if= (source partition/directory) of= (target partition/directory)

Write the code for the method getNewBox. The method getNewBox will return a GiftBox that has dimensions that are m times the dimensions of its GiftBox parameter, where m is a double parameter of the method.
For example, given the following code segment:
GiftBox gift = new Gift Box (3.0, 4.0, 5.0):
The call
getNewBox , 0, 5).
would return a GiftBox whose dimensions are: length = 1.5, width = 2.0, and height = 2.5 .

Answers

Answer:

public class GiftBox{

private int length;

private int width;

private int height;

 

public GiftBox(double length, double width, double height) {

this.length = length;

this.width = width;

this.height = height;

}

 

public static GiftBox getNewBox(GiftBox giftBox, double m) {

return new GiftBox(m * giftBox.length, m * giftBox.width, m * giftBox.height);

}

 

private boolean fitsInside(GiftBox giftBox) {

if(giftBox.length < this.length && giftBox.width <this.width

&& giftBox.height < this.height) {

return true;

}

return false;

}

 

public static void main(String []args){

GiftBox giftBox = new GiftBox(3.0 , 4.0, 5.0);

GiftBox newGiftBox = getNewBox(giftBox, 0.5);

System.out.println("New Box length: " + newGiftBox.length);

System.out.println("New Box width: " + newGiftBox.width);

System.out.println("New Box height: " + newGiftBox.height);

 

GiftBox gift = new GiftBox(3.0 , 4.0, 5.0);

GiftBox other = new GiftBox(2.1 , 3.2, 4.3);

GiftBox yetAnother = new GiftBox(2.0 , 5.0, 4.0);

 

System.out.println(gift.fitsInside(other));

System.out.println(gift.fitsInside(yetAnother));

}

}

Explanation:

The getNewBox is a public method in the GiftBox class in the Java source code above. It returns the GiftBox object instance increasing or multiplying the dimensions by the value of m of type double.

A method which applies to the class in which it is declared as a whole and not in response to method calls on a specific object is called a:_______

a. method call
b. an object method
c. private method
d. static method

Answers

Answer:

D) Static method

Explanation:

A static method is a method that is created only for the class and not it's instance variables or objects. Such methods can only be accessed by calling them through the class's name because they are not available to any class instance. A static method is created by prefixing the method's name with the keyword static.

A static method cannot be overridden or changed. You create a static method for a block of code that is not dependent on instance creation and that can easily be shared by all instances or objects.

What line of code makes the character pointer studentPointer point to the character variable userStudent?char userStudent = 'S';char* studentPointer;

Answers

Answer:

char* studentPointer = &userStudent;

Explanation:

Pointers in C are variables used to point to the location of another variable. To declare pointer, the data type must be specified (same as the variable it is pointing to), followed by an asterisk and then the name of the pointer. The reference of the target variable is also assigned to the pointer to allow direct changes from the pointer variable.

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True
b. False

Answers

Answer:

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True

Explanation:

Yes.  It is in the best interest to choose option A which dominates choice B.  A Multiple Attribute Utility involves evaluating the values of alternatives in order to make preference decisions over the available alternatives.  Multiple Attribute Utility decisions are basically characterized by multiple and conflicting attributes.  To solve the decision problem, weights are assigned to each attribute.  These weights are then used to determine the option that should be prioritized.

Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time. If a review contains the desired word you should make a note of the review score in an accumulator variable. Finally, produce some output that tells your user how that word was used across all reviews as well as the classification for this word (any score of 2.0 or higher can be considered

Answers

Answer:

import numpy as np

word = input("Enter a word: ")

acc = []

with open("Downloads/record-collection.txt", "r") as file:

   lines = file.readlines()

   for line in lines:

       if word in line:

           line = line.strip()

           acc.append(int(line[0]))

   if np.mean(acc) >= 2:

       print(f"The word {word} is a positive word")

       print(f"{word} appeared {len(acc)} times")

       print(f"the review of the word {word} is {round(np.mean(acc), 2)}")

   else:

       print(f"the word {word} is a negative word with review\

{round(np.mean(acc), 2)}")

Explanation:

The python program gets the text from the review file, using the user input word to get the definition of reviews based on the word, whether positive or negative.

The program uses the 'with' keyword to open the file and created the acc variable to hold the reviews gotten. The mean of the acc is calculated with the numpy mean method and if the mean is equal to or greater than 2 it is a positive word, else negative.

I really need help on this if you get it right I will say thank you my friend

Answers

I Think the answer is C

Answer:

A

Explanation:

A. Makes the the most sense

B. Not exactly

C. Doesn't make any sense

D. Complete Garbage

Which of the following is a characteristic of vector graphics?

Answers

Answer:

A

Explanation:

Vector graphics consist of mathematical descriptions of shapes as a combination of these numerical vectors. Because the vector graphics define the path that the lines should take, rather than a set of points along the way, they can be used to calculate any number of points, and so can be used at any image resolution.

The characteristics of vector graphics are they are based on mathematical/geometric expression. The correct option is A.

What are vector graphics?

Vector graphics are mathematical descriptions of shapes created by combining these numerical vectors. Because vector graphics indicate the course that the lines should travel rather than a set of locations along the way, they may be used to calculate any number of points and thus work at any image resolution.

Raster images generate commonly used image files such as gif, jpeg, jpg, and so on. These can be made with picture editing software such as "Photoshop." Because these work on pixels, when we zoom the image, we can see tiny squares that are nothing more than pixels.

Therefore, the correct option is A, they are based on mathematical/geometric expression.

To learn more about vector graphics, refer to the link:

https://brainly.com/question/9759991

#SPJ2

Write a Python program to keep track of data for the following information in a medical clinic: doctors, patients, and patient_visits

Patients and Doctors have an ID, first name, and last name as common attributes. Doctors have these additional attributes: specialty (e.g. heart surgeon, ear-nose-throat specialist, or dermatologist), total hours worked, and hourly pay. Further, doctors keep track of the patient_visits. A patient_visit has the following attributes, number_of_visits to the clinic, the patient who is visiting, the doctor requested to be visited, and the number of hours needed for consultation. Based on the number of consultation hours, the doctor will get paid.


The following functions are required:

1. addVisit: this function adds a patient_visit to the doctor. A new visit will NOT be added if the doctor has already completed 40 hours or more of consultation. If this happens, an error is thrown mentioning that the doctor cannot have more visits this week.

2. calculatePay: this function calculates the payment for the doctor using the following logic: Each hour is worth AED 150 for the first two visits of the patient and all further visits are billed at AED 50.


3. calculateBill: this function calculates the bill for the patient, which displays the doctor's details, patient details, and payment details. An additional 5% of the total is added as VAT.


The student is required to identify classes, related attributes, and behaviors. Students are free to add as many attributes as required. The appropriate access modifiers (private, public, or protected) must be used while implementing class relationships. Proper documentation of code is mandatory. The student must also test the code, by creating at-least three objects. All classes must have a display function, and the program must have the functionality to print the current state of the objects.

Answers

This is too much to understand what you need the answer too. In my opinion I can’t answer this question

Answer for 3 and 4 please

Answers

Answer:

3. D: px

4. B: web page

Explanation:

All font sizes are measured in px unless specified otherwise (in em's for example).

The correct answer is a web page because itself is a unique file that displays multimedia components.

Answer:

Q3: Font size is measured in pt (point)  which can be converted into centimeter(cm)

Q4: The answer is webpage

Explanation:

Q3: Font size is measured in pt (point)  which can be converted into centimeter(cm)

Q4: A unique file with unique name and address is  a webpage.

because webserver and browser are software while website is collection of webpages.

A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to create nearly duplicate bank transfers but alters the target account to steal the funds. The attacker is reproducing traffic to re- create an event from previous transactions. This is an example of what type of attack?
A. Xmas attack
B. Smurf attack
C. DDoS attack
D. Replay attack

Answers

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

Hackers use packet sniffing attacks to intercept or steal potentially unprotected data from networks. A network-generated threat is a sniffing attack, also known as a packet sniffing assault. Thus, option D is correct.

What are the hacker using sniffing network?

Snooping gives ethical hackers a lot of information about how a network functions and how its users behave, which can be used to improve a company's cybersecurity.

Sniffing can, however, be utilized by unscrupulous hackers to conduct catastrophic attacks against gullible targets.

A network sniffer can detect someone using excessive bandwidth at a college or commercial organization and hunt them down.

Therefore, replay attacks are employed so that the attacker can find the hash and obtain the desired object. Once the attacker has received the object, the replay attack causes the object to return to the original connection.

Learn more about  sniffing network here:

https://brainly.com/question/10316246

#SPJ5

Research the significance of the UNIX core of macOS and write a few sentences describing your findings.

Answers

Answer:

The Unix core used in Apple's macOS is called Darwin which is similar to the BSD Unix operating system. The Darwin in macOS has evolved, providing a slick aqua-graphical user interface for users to interact with the application by clicking rather than writing Unix commands in terminals.

Explanation:

The macOS is the operating system used by Apple computer brands. The operating system is a subset of the Unix's BSD operating system. It still makes use of the traditional Unix terminal and scripts but with a few alterations.

The significance of the UNIX core of macOS can be briefly described as:

It makes use of an aqua-graphical user interface to easily communicate with the application for seamless use.

What is UNIX core?

This refers to the different kernel subsystems which are a part of the process management and memory allocation of a device.

Hence, the significance of the UNIX core of macOS has made it very easy for Apple users to communicate with their device in real time and also to power the phone.

Read more about UNIX here:

https://brainly.com/question/26338728


Which heading function is the biggest?
1. h1
2. h2
3. h3

Answers

Answer:

h3

Explanation:

sub to Thicc Panda on YT

The answer for this question is number 1

What is the main reason for assigning roles to members of a group?

Answers

So that people with strengths in different areas can work on what they do best, plus it divides the workload.

(10 points) Make a user interface to get 3 points from the user which will be placed on the coordinate plane. Then write a Python3 function to check whether the points entered forms a right triangle. And another Python3 function to check whether the points entered forms a equilateral triangle. Call your functions for three user-entered points on the coordinate plane.

Answers

Answer:

def cord_input():

Global coordinates

coordinates = {'x1': 0, 'y1': 0, 'x2':0, 'y2':0, 'x3':0, 'y3':0}

for key, i in enumerate(coordinates.keys()):

if i < 2:

index = 1

coordinates [key] = float(input(f"Enter {key} coordinate for point {index}: "))

elif i >= 2 and i < 4:

index = 2

coordinates [key] = float(input(f"Enter {key} coordinate for point {index}: "))

else:

index = 3

coordinates [key] = float(input(f"Enter {key} coordinate for point {index}: "))

def sides(p1, p2, p3):

nonlocal a, b, c

a = ((p2[0] - p1[0])**2) + ((p2[1] - p1[1])**2)

b = ((p3[0] - p2[0])**2) + ((p3[1] - p2[1])**2)

c = ((p3[0] -p1[0])**2) + ((p3[1] - p2[1])**2)

def is_right_triangle(p1, p2, p3):

sides(p1, p2, p3)

if a+b == c or b+c == a or a+c == b:

print(f"Sides {a}, {b} and {c}")

return True

else:

return False

def is_equilateral(p1, p2, p3):

sides(p1, p2, p3)

if a==b and b==c:

print(f"Sides {a}, {b} and {c}")

return True

else:

return False

cord_input()

Explanation:

The python code above defines four functions, cord_input (to input a global dictionary of coordinates), sides ( to calculate and assign the sides of the triangle), is_right_triangle ( to check if the coordinates are for a right-angle triangle), and is_equilateral for equilateral triangle check.

Other Questions
What is the result of factoring out the GCF from the expression ( 24 + 36 ) ? A compound with a formula mass of 45.08 g/mol is found to be 85.64% Carbon and the remainder Hydrogen. Find the molecular formula: Aiden earned $184.50 at his job when he worked for 9 hours. What did he earn in onehour? Can you write a ten sentence short story that somehow includes soda, a porcupine, fallen stars, and a river? Use your imagination! Have fun writing, and Ill give brainliest to my favorite one! what would be observed when a growing seedling is placed horizontally A tennis ball forgotten on the court after match is:A. Potential energyB. Kinetic energyC. Forgotten energy HELP PLEASE!!!! I ONLY HAVE 3 MORE MATH RIDDLES LEFT!!!! PLEASE HELP PLEASE EMERGENCY what type of stage would accommodate a large house ? A) a thrust B) a proscenium C) a black box D) no answer text provided Dynamic stretching involves moving parts of the body continuously while gradually increasing reach to a full range ofmotionTrueFalse what type of power has been used by presidents to acquire louisiana and work on immigration issues A private college allows local residents to use athletic facilities such as the gym and the pool for a fee. The college charges a one time registration fee of $25 and also charges a fee of $18 per semester of use. complete the table to show the total cost of using the athletic facilities after each semester listed. Estimate (a) the maximum, and (b) the minimum thermal conductivity values (in W/m-K) for a cermet that contains 76 vol% carbide particles in a metal matrix. Assume thermal conductivities of 30 and 67 W/m-K for the carbide and metal, respectively. Based on your knowledge why was Buddhism easily diffused into the Chinese culture during the Tang Dynasty? Ms. Frank purchased notebooks for $12.57 before tax. If the sales tax on her purchase was 6%, how much money should Ms. Frank have to pay for the notebooks in total. PLEASE ASAP!!Read the following scenario:A stage play is in production about an aging movie starlet who is trying to regain some of her lost fame in one finalfeature film. The character is proud and haughty, but also extremely vulnerable. Once the epitome of fashion andglamour, she is now on the outside of the "t" crowd looking in. Which of the following might a costume designer do tohelp the audiences see this character's qualities?A. Dress the character in muted blues and purples to convey a sense of loneliness and melancholy.B. Dress the character in out-dated high fashions that would have been state-of-the-art when the character was in her prime.C. Dress the character in bright and festive colors that make her stand out in the crowd.D. Dress the character in up-to-date, contemporary fashions that would allow her to blend in with the new set of actresses. Match the landmark with the city in which it is located. Column A 1.Sankore Mosque and University:2.The Great Mosque3. Djinguereber Mosque4. The Tomb of Askia Muhammad:Column Ba.Timbuktub.Djennc.Gao Mr. Jones and Mr. Smith occupy adjacent beds in the ICU. Smith needs his IV changed every 15 hours. Jones needs his IV changed every 9 hours. The nurse changes both IVs together when a 12-hour clock reads 3:00. What does that clock read the next time the nurse changes IVs together?a. 9:00b. 12:00c. 3:00d. 6:00 PLEASE HELP WILL GIVE BRAINLIEST.What is the slope-intercept form of the function described by this table?x 1 2 3 4y 2 6 10 14Enter your answers by filling in the boxes.y = x + Claudia spends $2.15 day for lunch.Her cafeteria lunch account has a balance of 48.00.Which equation can be used to determine the maximum number of days,d,that she can eat without adding money to her lunch account?