Answers

Answer 1

Answer:

simple Reflex action it is the simplest from of reflex and does not depen on learning


Related Questions

A backbone network is Group of answer choices a high speed central network that connects other networks in a distance spanning up to several miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to thousands of miles). a network spanning exactly 200 miles with common carrier circuits.

Answers

Answer:

a high speed central network that connects other networks in a distance spanning up to several miles.

Explanation:

A backbone network functions just like the human backbone providing support for network systems by offering a network infrastructure that allows small, high speed internet connectivity. It is a principal data route between large interconnected networks which offers connection services spanning several miles. Most local area networks are able to connect to the backbone network as it is the largest data connection on the internet. This backbone networks are mainly utilized by large organizations requiring high bandwidth connection.

The Janitorial and Cafeteria departments are support departments. Samoa uses the sequential method to allocate support department costs, first allocating the costs from the Janitorial Department to the Cafeteria, Cutting, and Assembly departments. Determine the proportional (percentage) usage of the Janitorial Department by the:

Answers

Complete Question:

Departmental information for the four departments at Samoa Industries is provided below. Total Cost Cost Driver Square Feet Number of employees Janitorial $150,000 square footage serviced 200 Cafeteria 50,000 Number of employees 20,000 Cutting 1,125,000 4,000 120 Assembly 1,100,000 16,000 The Janitorial and Cafeteria departments are support departments Samoa uses the sequential method to allocate support department costs, first allocating the costs Department to the Cafeteria, Cutting and Assembly departments Determine the proportional (percentage) usage of the Janitorial Department by the a. Cafeteria Department b. Cutting Department c. Assembly Department

Answer:

Samoa Industries

Proportional (percentage) usage of the Janitorial Department:

Cafeteria = 50%

Cutting = 10%

Assembly = 40%

Explanation:

a) Data and Calculations:

                 Total Cost         Cost Driver             Square Feet       Number of

                                                                                                    employees

Janitorial   $150,000 Square footage serviced          200                40

Cafeteria      50,000 Number of employees        20,000                 12

Cutting     1,125,000                                                 4,000               120

Assembly 1,100,000                                               16,000                 40

Proportional (percentage) usage of the Janitorial Department:

Cafeteria = 50% (20,000/40,000 * 100)

Cutting = 10% (4,000/40,000 * 100)

Assembly = 40% (16,000/40,000 * 100)

Cost Allocation of the Janitorial Department:

Cafeteria = 50% * $150,000 = $75,000

Cutting = 10% * $150,000 =        15,000

Assembly = 40,% * $150,000 = 60,000

Total =                                    $150,000

Consider the following generalization of the Activity Selection Problem: You are given a set of n activities each with a start time si , a finish time fi , and a weight wi . Design a dynamic programming algorithm to find the weight of a set of non-conflicting activities with maximum weight.

Answers

Answer:  

Assumption: Only 1 job can be taken at a time  

This becomes a weighted job scheduling problem.  

Suppose there are n jobs

   Sort the jobs according to fj(finish time)

   Define an array named arr to store max profit till that job

       arr[0] = v1(value of 1st job)

       For i>0. arr[i] = maximum of arr[i-1] (profit till the previous job) or wi(weight of ith job) + profit till the previous non-conflicting job

   Final ans = arr[n-1]

The previous non-conflicting job here means the last job with end timeless than equal to the current job.  

To find the previous non-conflicting job if we traverse the array linearly Complexity(search = O(n)) = O(n.n) = O(n^2)  

else if we use a binary search to find the job Complexity((search = O(Logn)) = O(n.Log(n))

Write a program that will generate a personalized invitation within a text file for each guest in the guest list file using the event information found in the event details file. Put all the generated invitation files in a directory called invitations. Ensure that the name of each invitation file uniquely identifies each guest's invitation

Answers

Answer:

Code:  

import os   # os module to create directory  

event_file = open("event_details.txt", "r") # Getting event file  

event_details = ""  # event details to be stored  

for row in event_file:  # traversing through the event_file  

   event_details += row    # appending event details  

os.mkdir("./invitations")   # make directory in the same parent directory  

names = open("guest_list.txt", "r") # getting names of the people  

for name in names:  # traversing through names in guest_list file

   name = name.replace('\n', '')   # removing the ending '\n' from the name  

   invitation_msg = "Hi! " + name + ", You are heartly invited in the Ceremony.\nAt " + event_details # Generating the invitation message  

   file_name = '_'.join(name.split(' '))   # Spliting name in space and joining with the '_'  

   file_path = "./invitations/" + file_name + ".txt" # Generating each file path  

   invite_file = open(file_path, "w")  # Creating the file for each name  

   invite_file.write(invitation_msg)   # Write invitation to file

Output:

Write a Python program stored in a file q1.py to play Rock-Paper-Scissors. In this game, two players count aloud to three, swinging their hand in a fist each time. When both players say three, the players throw one of three gestures: Rock beats scissors Scissors beats paper Paper beats rock Your task is to have a user play Rock-Paper-Scissors against a computer opponent that randomly picks a throw. You will ask the user how many points are required to win the game. The Rock-Paper-Scissors game is composed of rounds, where the winner of a round scores a single point. The user and computer play the game until the desired number of points to win the game is reached. Note: Within a round, if there is a tie (i.e., the user picks the same throw as the computer), prompt the user to throw again and generate a new throw for the computer. The computer and user continue throwing until there is a winner for the round.

Answers

Answer:

The program is as follows:

import random

print("Rock\nPaper\nScissors")

points = int(input("Points to win the game: "))

player_point = 0; computer_point = 0

while player_point != points and computer_point != points:

   computer = random.choice(['Rock', 'Paper', 'Scissors'])

   player = input('Choose: ')

   if player == computer:

       print('A tie - Both players chose '+player)

   elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):

       print('Player won! '+player +' beats '+computer)

       player_point+=1

   else:

       print('Computer won! '+computer+' beats '+player)

       computer_point+=1

print("Player:",player_point)

print("Computer:",computer_point)

Explanation:

This imports the random module

import random

This prints the three possible selections

print("Rock\nPaper\nScissors")

This gets input for the number of points to win

points = int(input("Points to win the game: "))

This initializes the player and the computer point to 0

player_point = 0; computer_point = 0

The following loop is repeated until the player or the computer gets to the winning point

while player_point != points and computer_point != points:

The computer makes selection

   computer = random.choice(['Rock', 'Paper', 'Scissors'])

The player enters his selection

   player = input('Choose: ')

If both selections are the same, then there is a tie

   if player == computer:

       print('A tie - Both players chose '+player)

If otherwise, further comparison is made

   elif (player.lower() == "Rock".lower() and computer.lower() == "Scissors".lower()) or (player.lower() == "Paper".lower() and computer.lower() == "Rock".lower()) or (player == "Scissors" and computer.lower() == "Paper".lower()):

If the player wins, then the player's point is incremented by 1

       print('Player won! '+player +' beats '+computer)

       player_point+=1

If the computer wins, then the computer's point is incremented by 1

   else:

       print('Computer won! '+computer+' beats '+player)

       computer_point+=1

At the end of the game, the player's and the computer's points are printed

print("Player:",player_point)

print("Computer:",computer_point)

write a program to input 3 numbers and print the largest and the smallest number without using if else statement​

Answers

Answer:

def main():

   # input

   num1 = int(input("Type in a number: "))

   num2 = int(input("Type in another number: "))

   num3 = int(input("Type in another number: "))

   list1 = [num1, num2, num3]

   # sorts the array

   list1.sort()

   # list1[-1] prints the first element in the array

   print("The largest number is: " + str(list1[-1]))

   # -len(list1) takes the length of the list, in this case 3, and makes it a negative number.  

   # That negative number is then used as an index for the list1 array in order to print the lowest number.

   print("The smallest number is: " + str(list1[-len(list1)]))

main()

Explanation:

Hope this helped :) I left some comments so you know what's going on. You can also use max(list1) and min(list1) but I chose indexing because indexing is the better way of doing stuff like this.

Have a good day!

How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array

Answers

Answer:

Explanation:

260 cost units, Big O(n) complexity for a push

Coral Given three floating-point numbers x, y, and z, output x to the power of y, x to the power of (y to the power of z), the absolute value of x, and the square root of (x * y to the power of z).
Output all results with five digits after the decimal point, which can be achieved as follows:
Put result to output with 5 decimal places
Ex: If the input is:
5.0 2.5 1.5
the output is:
55.90170 579.32402 5.00000 6.64787
Hint: Coral has built-in math functions (discussed elsewhere) that may be used.

Answers

Answer:

The program is as follows:

float x

float y

float z

x = Get next input

y = Get next input

z = Get next input

Put RaiseToPower(x,y) to output with 5 decimal places

Put "\n" to output

Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places

Put "\n" to output

Put AbsoluteValue(x) to output with 5 decimal places

Put "\n" to output

Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places

Explanation:

This declares all variables

float x

float y

float z

This gets input for all variables

x = Get next input

y = Get next input

z = Get next input

This prints x^y

Put RaiseToPower(x,y) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints x^(y^z)

Put RaiseToPower (x,RaiseToPower (y,z)) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints |x|

Put AbsoluteValue(x) to output with 5 decimal places

This prints a new line

Put "\n" to output

This prints sqrt((x * y)^z)

Put SquareRoot(RaiseToPower (x * y,z)) to output with 5 decimal places

(viii) Word does not allow you to customize margins.
true/false:-​

Answers

In Word, each page automatically has a one-inch margin. You can customize or choose predefined margin settings, set margins for facing pages, allow extra margin space to allow for document binding, and change how margins are measured.

I would say false

Which is the first computer brought in nepal for the census of 2028 B.S​

Answers

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the Nepal government in lease (1 lakh 25 thousands per month) for the population census of 1972 AD (2028 BS). It took 1 year 7 months and 15 days to complete census of 1crore 12.5 lakhs population.

what is a computer memory

Answers

Answer:

it is your answer

Explanation:

it is the storage space where data is kept.

How do i connect WiFi on windows xp without icon?

Answers

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Answer:

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Irene llegó tarde al colegio_______________
ayúdenme


^_^^_^^_^^_^^_^^_^^_^^_^^_^​

Answers

Answer:

Explanation:

Absconding

Help Pls
I need about 5 advantages of E-learning​

Answers

Answer:

Explanation:

E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...

E-learning leads to better retention. ...

E-learning is consistent. ...

E-learning is scalable. ...

E-learning offers personalization.

Answer:

E- learning saves time and money

E-learning makes work easier and faster

E- learning is convenient

E- learning is consistent

E- learning is scalable

Explanation:

when you learn using the internet, you save a lot of time by just typing and not searching through books

You are going to purchase (2) items from an online store.
If you spend $100 or more, you will get a 10% discount on your total purchase.
If you spend between $50 and $100, you will get a 5% discount on your total purchase.
If you spend less than $50, you will get no discount.
Givens:
Cost of First Item (in $)
Cost of Second Item (in $)
Result To Print Out:
"Your total purchase is $X." or "Your total purchase is $X, which includes your X% discount."

Answers

Answer:

Code:-

using System;

using System.Collections.Generic;

class MainClass {

public static void Main (string[] args) {

int Val1,Val2,total;

string input;

double overall;

Console.Write("Cost of First Item (in $)");

      input = Console.ReadLine();

Val1 = Convert.ToInt32(input);

Console.Write("Cost of Second Item (in $)");

      input = Console.ReadLine();

Val2 = Convert.ToInt32(input);

total=Val1+Val2;

if (total >= 100)

{

overall=.9*total;

Console.WriteLine("Your total purchase is $"+overall);

}

else if (total >= 50 & total < 100)

{

overall=.95*total;

Console.WriteLine("Your total purchase is $"+overall);

}  

else

{

Console.WriteLine("Your total purchase is $"+total);

}  

}

}

Output:

Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.

Answers

Answer:

c

Explanation:

A company is deploying NAFDs in its office to improve employee productivity when dealing with paperwork. Which of the following concerns is MOST likely to be raised as a possible security issue in relation to these devices?
A. Sensitive scanned materials being saved on the local hard drive
B. Faulty printer drivers causing PC performance degradation
C. Improperly configured NIC settings interfering with network security
D. Excessive disk space consumption due to storing large documents

Answers

Answer:

D. Excessive disk space consumption due to storing large documents.

Explanation:

When a company is planning to use NAFDs in its office rather than paper work, the efficiency of employees will increase as unnecessary paper work takes time in handling and printing. When data is stored on disks there is a risk that employees store large or irrelevant files in the disk which will create storage issues.

what is computer? write about computer.​

Answers

Answer:

Is an electronic device used for storing and processing data.

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name of the most expensive fruit. Each item of the dictionary includes: A key: the name of the fruit A value: the price of the fruit.

Answers

Answer:

The program is as follows:

def get_price(fruits):

   AllPrice = fruits.values()

   value_iterator = iter(AllPrice)

   mostExpensive = next(value_iterator)  

   for item in fruits:

       if fruits[item]>=mostExpensive:

           mostExpensive = fruits[item]

           fruitName = item

   print(fruitName)

fruits = {}

n = int(input("Number of Fruits: "))

for i in range(n):

   name = input("Fruit name: ")

   price = int(input("Fruit price: "))

   fruits[name] = price

get_price(fruits)

Explanation:

This defines the get_price function

def get_price(fruits):

This gets all price in the dictionary fruit

   AllPrice = fruits.values()

This passes the values to a value iterator

   value_iterator = iter(AllPrice)

This initializes mostExpensive to the first price in the dictionary

   mostExpensive = next(value_iterator)

This iterates through the elements of the dictionary  

   for item in fruits:

If current element is greater than or equals most expensive

       if fruits[item]>=mostExpensive:

Set most expensive to the current element

           mostExpensive = fruits[item]

Get the corresponding fruit name

           fruitName = item

Print fruit name

   print(fruitName)

The main begins here

This initializes the fruit dictionary

fruits = {}

This gets input for the number of fruits

n = int(input("Number of Fruits: "))

This is repeated for every inputs

for i in range(n):

Get fruit name

   name = input("Fruit name: ")

Get fruit price

   price = int(input("Fruit price: "))

Append name and price to dictionary

   fruits[name] = price

Call the get_price function

get_price(fruits)

Which of the following definitions best describes the principle of separation of duties?

Answers

Answer:

A security stance that allows all communications except those prohibited by specific deny exceptions

A plan to restore the mission-critical functions of the organization once they have been interrupted by an adverse event

A security guideline, procedure, or recommendation manua

lAn administrative rule whereby no single individual possesses sufficient rights to perform certain actions

To nest one structure within another structure, you a. define both structures and then create a data member of the nested structure type within the other structure b. create a container that holds objects of the nested structure type and then include the container within another structure c. define the nested structure within another structure

Answers

Answer:

Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.

Explanation:

To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.

For example, we may need to store the address of an entity employee in a structure.

A desktop computer is a type of mobile device.

a. true
b. false

Answers

Answer:B.false
Answer B

A desktop computer is a type of mobile device: B. False.

What is a desktop computer?

A desktop computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output that's usable by an end user.

Generally, desktop computers are fitted with a power supply unit (PSU) and designed to be used with an external display screen (monitor) unlike mobile device.

In conclusion, a desktop computer is not a type of mobile device.

Learn more about desktop computer here: brainly.com/question/959479

#SPJ9

An engineer is configuring AMP for endpoints and wants to block certain files from executing. Which outbreak control method is used to accomplish this task

Answers

Question Completion with Options:

A. device flow correlation

B. simple detections

C. application blocking list

D. advanced custom detections

Answer:

The outbreak control method that is used to accomplish the task of configuring AMP for endpoints and to block certain files from executing is:

C. application blocking list

Explanation:

The application blocking list creates a list of application files, which the AMP continuously tracks and analyzes to compare the file activities with previous cyber attacks.  Specifically, the AMP for Endpoints is a cloud-managed endpoint security solution, which provides a retrospective alert to prevent cyber-security threats, and rapidly detects, contains, and remediates malicious files on the endpoints.

continuously tracks and analyzes files and file activities across your systems, and compares these events to what preceded or happened in past attacks. If a file exhibits malicious behavior, the AMP provides you with a retrospective alert which enables you to stop a potential threat from succeeding.

Given two integers that represent the miles to drive forward and the miles to drive in reverse as user inputs, create a SimpleCar object that performs the following operations:Drives input number of miles forwardDrives input number of miles in reverseHonks the hornReports car statusThe SimpleCar class is found in the file SimpleCar.java.100 4the output is:beep beepCar has driven: 96 milesimport java.util.Scanner;public class LabProgram { public static void main(String[] args) { Scanner scnr = new Scanner(System.in); /* Type your code here. */ }}

Answers

Answer:

Explanation:

The following code is written in Java. It creates the SimpleCar class with the variables for position, milesForward, and milesReverse. It contains the constructor, Honk, reportStatus, and setter methods needed and as requested. The scanner object is created in the main method and asks the user for the number of miles forward as well as the number of miles in reverse. A test case was created and the output can be seen in the attached image below.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("How many miles forward did the car drive?");

       int forward = in.nextInt();

       System.out.println("How many miles in reverse did the car drive?");

       int reverse = in.nextInt();

       SimpleCar beep = new SimpleCar(forward, reverse);

       beep.Honk();

       beep.reportStatus();

   }

}

class SimpleCar {

   int position;

   int milesForward;

   int milesReverse;

   public SimpleCar(int milesForward, int milesReverse) {

       this.milesForward = milesForward;

       this.milesReverse = milesReverse;

       this.position = 0;

   }

   public void Honk() {

       System.out.println("HONK");

   }

   public void reportStatus() {

       position = milesForward - milesReverse;

       System.out.println("Car is " + position + " miles from starting point.");

   }

   public void setMilesForward(int milesForward) {

       this.milesForward = milesForward;

       this.position += milesForward;

   }

   public void setMilesReverse(int milesReverse) {

       this.milesReverse = milesReverse;

       this.position -= milesReverse;

   }

}

Ellen is working on a form in Access and clicks on the Design tab in the Form Design Tools section. Ellen then clicks on the Controls button and clicks the Label icon. What is Ellen most likely doing to the form?
A.adding a title
B.adding an existing field
C.changing the anchoring setting
D.changing the font of a label

Answers

Answer:

D. changing the font of a label

Write down the short history of COMPUTER? ​

Answers

Answer:

Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer",he conceptualized and invented the first mechanical computer in the early 19th century.

What do LinkedIn automation tools do?

Answers

Answer:

Most of the tools are used to perform simple repetitive tasks that take a lot of time if done manually.

 

1. Sending Connection requests  

2. Running Direct messaging campaigns  

3. Endorsing people’s skills.  

4. Collecting leads data  

5. Extracting data from LinkedIn  

With automation, it may seem like you’ve been dealt the ultimate hand.    

In addition, some of the latest LinkedIn automation tools run personalized campaigns that result in increasing:

 

1. Increasing networks  

2. Connections  

3. Leads  

4. Sales

cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]

Answers

Answer:

please translate

Thank you✌️

Can someone compress this ipv6 address? 558c:0000:0000:d367:7c8e:1216:0000:66be

Answers

558c::d367:7c8e:1216:0:66be

Other Questions
Sort each phrase to the country it best describes? evaluate[tex] {( - 7)}^{ \frac{5}{3} } \times {( \frac{1}{56} )}^{ \frac{5}{3} } [/tex]please explain In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:What is your name? AmandaHow old are you? 15Hello Amanda! You were born in 2005. 1Select the correct answer.Simplify the following expression.O A.OB. 12Oc. 1OD.64ResetNext I need two examples of Solve a proportion with a mixed number in one of its numerators. SHOW ALL WORK!!!!!!!!!!!! Daniel paid interest of 1,020 in 5years at12%per annum on a loan. Hw much did he borrow If your body lacks enzymes that break down carbohydrates, it would be unable to get __A__ for energy production. If you lacked the enzyme to digest proteins, you may not absorb enough __B__. what is the hybridisation of the central carbon in CH3C triple bonded to N When the interest rate in an economy decreases, it is likely the result of either a/an ________ or a/an ________. When giving an informal presentation, speakers can best prepare bydressing in a new suit with a fresh haircut.creating graphs and maps to show.adding scientific language to the speech.finding a humorous story to use in the opening. Select the correct answer. This table represents a quadratic function. x y 0 -3 1 -3.75 2 -4 3 -3.75 4 -3 5 -1.75I really need one fast I give all my points According to "The Immigrant Contribution," how is the immigration a "gesture of faith in social mobility"? Plzzz answer the questioni will be marking as brainlylist Please help me out with this one! Calculus 3 Problem7. Determine if the field F(x, y, z) = ye^z i + xe^z j + xy e^z k is conservative. If it is, find a potential function. A company just paid a dividend of $1.75, and those dividends are expected to grow at a constant rate of 5.5% forever. The stock price of this company is $74.58, what is the stock's expected dividend yield? de acuerdo con la clasificacin de kppen,los climas de la zona ecuatorial se caracterizan por ser predominante mente clidos y hmedos.esta condicin climtica se debe a:A) alta radiacin solar que lleva a esta sonas ecuatoriales , los cuales origuinan lluvias todo el ao. B)existencias de grandes cadenas montaosas en las sonas ecuatoriales,los cuales origuinan lluvias todo el ao C) influencias de masas de aire procedentes de los polos, las cuales estn cargadas de una gran cantidad de agua.D) influencia de las cuatro estaciones en esta zona, las cuales permiten que ayan veranos planetas e inviernos.pliiisssss porfa f(x) = x2 + 3x + 2 is shifted 2 units left. The result is g(x). What is g(x)? Write the sentence as an inequality. The cost of a ticket t will be no more than $52. how seasons occur? how many seasons are there in a year?