which is better microprocessor or vacuum tube explain​

Answers

Answer 1

Answer:

explain the role importance of communication in economic development of Nepal?


Related Questions

You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to configure the proxy server settings as follows: Port: 9000

Answers

Answer:

okay if I am it administration I will port 10000

To configure the computer in the lobby to use the corporate proxy server, you will need to follow these steps:

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

What is Proxy Server?

A proxy server is a device or router that acts as a connection point between users and the internet.

Proxy Server settings would be the same for both Wifi and Ethernet connections, explaining about the configuration in Windows Operating System.

Open the internet browser on the laptop and go to the settings or preferences page. The exact location of the proxy settings will vary depending on the browser you are using.

In the settings or preferences page, look for the "Proxy" or "Network" section.

In the proxy settings, select the option to use a proxy server.

Enter the address of the corporate proxy server in the "Server" or "Address" field.

Enter the port number "9000" in the "Port" field.

Save the changes and close the settings or preferences page.

Test the proxy server configuration by attempting to access a website. If the configuration is correct, the laptop should be able to access the internet through the proxy server.

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

To learn more about the Proxy Server settings click here:

https://brainly.com/question/14403686

#SPJ12

how OS manages the reusable resources

Answers

Answer:

Resources

A resource is anything required by a process.

Anything - os as resource manager.

Process - owns the resource.

Required - no resource, no progress; adaptive processes.

Resources - sharable, serially reusable, and consumable.

Explanation:

Resource durability determines how a resource reacts to being used. A reusable resource remains after being used. Disks, networks, CPUs are reusable resources.Oct 9, 201

Write a program that asks the user to enter 5 test scores. The program will display a letter grade for each test score and an average grade for the test scores entered. Three functions are needed for this program.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

double average(double s1, double s2, double s3, double s4, double s5){

   double avg = (s1 + s2 + s3 + s4 + s5)/5;

   return avg;}

char lGrade(double score){

   char grade;

   if(score>= 90 && score <= 100){ grade ='A'; }

   else if(score>= 80 && score <= 89){ grade ='B'; }

   else if(score>= 70 && score <= 79){ grade ='C'; }

   else if(score>= 60 && score <= 69){ grade ='D'; }

   else if(score < 60){ grade ='F'; }

   return grade;}

int main(){

   double s1,s2,s3,s4,s5;

   cin>>s1>>s2>>s3>>s4>>s5;

   double avg = average(s1,s2,s3,s4,s5);

   cout<<s1<<" "<<lGrade(s1)<<endl;

   cout<<s2<<" "<<lGrade(s2)<<endl;

   cout<<s3<<" "<<lGrade(s3)<<endl;

   cout<<s4<<" "<<lGrade(s4)<<endl;

   cout<<s5<<" "<<lGrade(s5)<<endl;

   cout<<avg<<" "<<lGrade(avg)<<endl;

   return 0;}

Explanation:

The three functions to include in the program are not stated; so, I used the following functions in the program

1. The main function

2. average function

3. Letter grade function

The average function begins here

double average(double s1, double s2, double s3, double s4, double s5){

This calculates the average

   double avg = (s1 + s2 + s3 + s4 + s5)/5;

This returns the calculated average

   return avg;}

The letter grade function begins here

char lGrade(double score){

This declares the grade

   char grade;

If score is between 90 and 100 (inclusive), grade is A

   if(score>= 90 && score <= 100){ grade ='A'; }

If score is between 00 and 89 (inclusive), grade is B

   else if(score>= 80 && score <= 89){ grade ='B'; }

If score is between 70 and 79 (inclusive), grade is C

   else if(score>= 70 && score <= 79){ grade ='C'; }

If score is between 60 and 69 (inclusive), grade is D

   else if(score>= 60 && score <= 69){ grade ='D'; }

If score is less than 60, grade is F

   else if(score < 60){ grade ='F'; }

This returns the calculated grade

   return grade;}

The main begins here

int main(){

This declares the 5 scores

   double s1,s2,s3,s4,s5;

This gets input for the 5 scores

   cin>>s1>>s2>>s3>>s4>>s5;

This calls the average function for average

   double avg = average(s1,s2,s3,s4,s5);

This calls the letter grade function for the 5 scores

   cout<<s1<<" "<<lGrade(s1)<<endl;

   cout<<s2<<" "<<lGrade(s2)<<endl;

   cout<<s3<<" "<<lGrade(s3)<<endl;

   cout<<s4<<" "<<lGrade(s4)<<endl;

   cout<<s5<<" "<<lGrade(s5)<<endl;

This calls the average function for the average

   cout<<avg<<" "<<lGrade(avg)<<endl;

Explain how you would find a book on a given subject in the library.

Answers

Answer:

In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.

Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?

Answers

Answer:

public void removePrefixStrings(List<String> list , String prefix) {

if(list==null || list.size()==0)

return;

for(int i=0; i<list.size();) {

if(list.get(i).startsWith(prefix))

list.remove(i);

else

++i;  

}  

}  

Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2

Then removal is also n  

So the total time complexity is O(n3)

Viết chương trình nhập vào họ tên của bạn rồi in nội dung chuỗi đó lên màn hình.Ví dụ:Nếu họ tên nhập vào là: NGUYEN BINH MINH thì kết quả màn hình như sau

Answers

Why people spam this nugen thing

a which is the smallest chunk of information of computer can work with​

Answers

Answer:

I still mad for that spam

Explanation:

Answer:

The bits are the smallest chunk of info that is used by computers.

Explanation:

Bit: A short abbreviation for binary digit which is the smallest unit of data.

You're welcome.

I hope I helped you.

What are the application of computer? explain.​

Answers

Computers play a role in every field of life. They are used in homes, business, educational institutions, research organizations, medical field, government offices, entertainment, etc.

Home

Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail. They help to avail work from home facility for corporate employees. Computers help the student community to avail online educational support.

Medical Field

Computers are used in hospitals to maintain a database of patients’ history, diagnosis, X-rays, live monitoring of patients, etc. Surgeons nowadays use robotic surgical devices to perform delicate operations, and conduct surgeries remotely. Virtual reality technologies are also used for training purposes. It also helps to monitor the fetus inside the mother’s womb.

Entertainment

Computers help to watch movies online, play games online; act as a virtual entertainer in playing games, listening to music, etc. MIDI instruments greatly help people in the entertainment industry in recording music with artificial instruments. Videos can be fed from computers to full screen televisions. Photo editors are available with fabulous features.

Industry

Computers are used to perform several tasks in industries like managing inventory, designing purpose, creating virtual sample products, interior designing, video conferencing, etc. Online marketing has seen a great revolution in its ability to sell various products to inaccessible corners like interior or rural areas. Stock markets have seen phenomenal participation from different levels of people through the use of computers.

Education

Computers are used in education sector through online classes, online examinations, referring e-books, online tutoring, etc. They help in increased use of audio-visual aids in the education field.

Government

In government sectors, computers are used in data processing, maintaining a database of citizens and supporting a paperless environment. The country’s defense organizations have greatly benefitted from computers in their use for missile development, satellites, rocket launches, etc.

Banking

In the banking sector, computers are used to store details of customers and conduct transactions, such as withdrawal and deposit of money through ATMs. Banks have reduced manual errors and expenses to a great extent through extensive use of computers.

Business

Nowadays, computers are totally integrated into business. The main objective of business is transaction processing, which involves transactions with suppliers, employees or customers. Computers can make these transactions easy and accurate. People can analyze investments, sales, expenses, markets and other aspects of business using computers.

Training

Many organizations use computer-based training to train their employees, to save money and improve performance. Video conferencing through computers allows saving of time and travelling costs by being able to connect people in various locations.

Arts

Computers are extensively used in dance, photography, arts and culture. The fluid movement of dance can be shown live via animation. Photos can be digitized using computers.

Science and Engineering

Computers with high performance are used to stimulate dynamic process in Science and Engineering. Supercomputers have numerous applications in area of Research and Development (R&D). Topographic images can be created through computers. Scientists use computers to plot and analyze data to have a better understanding of earthquakes

__________ is a software development methodology that seeks to create multiple sample versions of a project for client review, allowing for plenty of feedback and ease of data refinement, but leaving the potential for major changes high.

Answers

Answer:

Prototyping!! :)

Explanation:

Prototyping is a software development methodology that seeks to create multiple sample versions of a project for client review, allowing for plenty of feedback and ease of data refinement, but leaving the potential for major changes high.

What is software development?

The process of writing code to develop a program is handled by a computer programmer.

A software developer oversees every step of the process, defining the project's requirements before collaborating with programmers to construct the code.

According to that, software developer differs from computer programmer since they need leadership abilities because they have to oversee every step of the program-making process and interact with others.

Therefore, the goal of the software development approach known as prototyping is to provide numerous test versions of a project for client assessment.

To learn more about software development, refer to the link:

https://brainly.com/question/24085818

#SPJ5

Define that function in a program whose inputs are the car's miles/gallon and the gas dollars/gallon (both floats). Output the gas cost for 10 miles, 50 miles, and 400 miles, by calling your DrivingCost function three times.
Ex: If the input is 20.0 3.1599, the output is:
Write a function DrivingCost with parameters drivenMiles, milesPerGallon, and dollarsPerGallon, that returns the dollar cost to drive those miles. All items are of type float.
Ex: If the function is called with 50 20.0 3.1599, the function returns 7.89975.

Answers

Answer:

Explanation:

The following is written in Java. The first DrivingCost function requested in the question cannot be made and will not work because the cost cannot be calculated without the miles driven being input as a seperate variable. The second DrivingCost function with all three variables was created and tested using the example in the question. The test and output can be seen in the attached image below highlighted in red.

   public static float DrivingCost(float drivenMiles, float milesPerGallon, float dollarsPerGallon) {

       float gallonsUsed = drivenMiles / milesPerGallon;

       float cost = dollarsPerGallon * gallonsUsed;

       return cost;

   }

Select the correct answer.
Which of these statements is true of dynamic design diagrams?
A.
They demonstrate objects.
B.
They demonstrate relationships.
C.
They demonstrate the behavior of system aspects.
D.
They include structure diagrams.

Answers

Answer:

They demonstrate the behavior of system aspects.

The statement true regarding the dynamic design diagram is that it demonstrates the behavior change in the system. Thus, option C is correct.

What is a dynamic design diagrams?

A dynamic design diagram is given as the model that has been expressing the development of the operations, actions, and the behavior of the system over time.

The dynamic design diagram is thereby the demonstration of the behavior of system aspects. Thus, option C is correct.

Learn more about dynamic design, here:

https://brainly.com/question/14956129

#SPJ2

1. You purchase a new desktop computer that does not have wireless capability, and then you decide thar you want to use a wireless connection to the internet. Give two solutions to upgrade your system to wireless.
2. You are replacing a processor on an older motherboard and see that the board has the LGA1155 socket. You have three processors on hand: Intel Core i3-2100, Intel Core i5-8400, and Intel Core i5-6500. Which of these three processors will most likely fit the board? Why?a. 4.b. 5.c. 6.d. 7.

Answers

Answer:   1.)  You can use a USB WiFi adapter, install a dedicated PCIe WiFi card, or upgrade to a new motherboard with built-in WiFi. (That's three solutions but just want to give you flexibility with your problem.)

Answer:    2.)  None of the processors would fit because they all have different series sockets. (The i5 processors have LGA1151 sockets and the i3 has an LGA1156 socket.)

Explanation: 1.)  Usb WiFi adapter, dedicated PCIe WiFi card, OR a new motherboard with built-in WiFi

                     2.)  None of the processors work

examples in types of experimental methods

Answers

Lab Experiment

Field Experiment

Natural Experiment.

Answer:

Experimental research for individuals in the physical sciences and many other fields is the best-known kind of research design. The main reason is that experimental research is a typical scientific experiment, similar to that carried out in secondary schools.

Explanation:

The types of research designs are determined by how the researchers assign subjects to various conditions and groups. They are of three different types: pre-experimental, almost experimental, and real experimental research.

Pre-experimental Research Design:-

In pre-experimental research, the effect of the application of a supposedly changing independent variable is observed by either a group or different dependent groups. It is the simplest form of experimental design and does not involve a control group.

Quasi-experimental Research Design:-

The term "almost" refers to partial, half, or pseudo. The quasi-experimental research therefore resembles, but not the same, the real experimental research. The participants are not assigned randomly in quasi-examples and are therefore used in environments that are difficult or unable to randomize.

True Experimental Research Design:-

To confirm or refute a hypothesis, real experimental research is based on statistical analyses. It is the most exact experimental type and can be performed on two randomly assigned subjects with, or without a pretest.

The true experimental design of the research must include a control group, a variable that the researcher can manipulate and the distribution must be random.

Which support function under Tech Mahindra is governing data privacy and protection related requirements

Answers

Answer:

Privacy Policy

Explanation:

PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.

Given that support functions are functions which assist and in a way contribute to the company goal.

Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.

The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.

what is operating system?

Answers

Answer:

operating system (os)is translator between the operator (user)and the computer

Operating system (OS) is the low-level software that supports a computer's basic functions, such as scheduling tasks and controlling peripherals.

Draw any five (5) basic symbols used for flowcharting

Answers

Answer:

Image below ⏬

If there are 18 people in your class and you want to divide the class into programming teams of 3
members, you can compute the number of different teams that can be arranged using this formula
(n!/r!(n−r)!).

Answers

Using a combination method to determine how many ways can 18 people be divided into programming teams of 3 members, the number of programming teams can be arranged in 816 ways.

What is Combination?

In mathematical model, a combination is a mathematical approach for calculating the number of potential arrangements in a set of things without taking the order arrangement of the items is into consideration.

It can be expressed by using the formula;

[tex]\mathbf{ _nC_r = \dfrac{n !}{ r!(n-r)! } }[/tex]

where:

[tex] \mathbf{ _nC_r = number \: of \: combinations \: \} }[/tex]n = total number of set objects = 18r = number of choosing objects = 3

[tex] \mathbf{ _nC_r = \dfrac{18!}{ 3!(18-3)! } }[/tex]

[tex]\mathbf{ _nC_r = \dfrac{18!}{ 3!(15)! } }[/tex]

[tex] \mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 \times 15!}{ 3!(15)! } }[/tex]

[tex]\mathbf{ _nC_r = \dfrac{18 \times \: 17 \times \: 16 }{ 3 \times \: 2 \times 1} }[/tex]

= 816 ways

Learn more about combinations here:

https://brainly.com/question/11732255

When you are making multiples of a brownie recipe, you cannot - without great difficulty - use a fraction of an egg. The calculate_eggs function uses the ceil function in the math module to always round up and provide the total number of eggs you need on hand to make your recipe.
1. On Line 2, import just the ceil function from the math module
2. On Line 6, call the ceil function to calculate 0.6*servings
When you run the code, it should match the output under Desired Output
# Import ceil function only from the math module
import math.ceil
# Define Function
def calculate_eggs(servings):
total_eggs = (0.6*servings)
return total_eggs
# Call Function
print(calculate_eggs(14))
Desired Output = You need 9 eggs

Answers

The answer is one ☝️ question for the poll of a vote

Calculate the number of telephone
towers required to cover the entire
Country asurning the entire country is
interconnected to provide network
coverage

Answers

Answer:

yho

Explanation:

hayi no ntwana.... lala boy

if someone wants to use a technology that allows the automation of manufacturing cars in a factory was technology should they use?

Answers

Answer:

Physical Robots with specific coded instructions

Explanation:

In this specific scenario, they would need to use Physical Robots with specific coded instructions. Each robot would need to be coded to perform a specific and unique task, so that they are able to physically create the part that is needed for the manufacturing of the car, just like a real human employee would need to do. The different robots would create all the necessary parts and then another set of robots would put those pieces together. Artificial Intelligence could also be implemented to increase efficiency and prevent future errors.

a. Daily Life Magazine wants an analysis of the demographic characteristics of its readers. The marketing department has collected reader survey records containing the age, gender, marital status, and annual income of readers. Design an application that allows a user to enter reader data and, when data entry is complete, produces a count of readers by age groups as follows: younger than 20, 20-29, 30-39, 40-49, and 50 and older. b. Modify the Daily Life Magazine program so that it produces a count of readers by gender within age group-that is, under-20 females, under-20 males, and so on. c. Modify the Daily Life Magazine program so that it produces a count of readers by income groups as follows: under $30,000, $30,000-$49,999, $50,000-$69,999, and $70,000 and up.

Answers

Answer:

uh

Explanation:

Prepare algorithm and draw a corresponding flowchart to compute the mean value of all odd numbers between 1 and 100 inclusive.​

Answers

Answer:

it has to be 35 it's definitely 35

program 2. write a VB.NET program to solve the linear equation of the form Ax+B=C, i.e x=(C=B)/A (Eg:2x+3=7, where B and C are consonants, A is the coefficient of x)​

Answers

Answer:

Module Program

   Sub Main()

       Dim A, B, C, x As Double

       A = 2.0

       B = 3.0

       C = 7.0

       x = (C - B) / A

       Console.WriteLine($"Solution for {A}x + {B} = {C} is x = {x}")

       Console.ReadKey()

   End Sub

End Module

Explanation:

For A=0, the program wouldn't work, because then any x would be a solution.

have fire have ....

babi​ from babi098

Answers

Answer:

yessss I tooo have a fire at my home

lolololololololololo

ok have a great day what is your name ?

Answer:

..... ....

.... .....

....................

....................

You are required to copy in your attendees' emails from outside of Outlook when creating a meeting
O True
O False

Answers

False because you just need a specific email not copy and paste.

Hope this helps

Microsoft outlook is a part of the office suite which allows users to scheuie meetings usually within an organization. Hence, copying attendees email from outside of outlook is false.

Uisng the Calendar, a meeting schedule Can be initiated by opting to create a new meeting.

The teams should be selected and the required information filled out.

From outlook, the information of attendees including email can be added with a click, rather from outside outlook.

Hence, the statement is False.

Learn more : https://brainly.com/question/20388678

When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.

Answers

when an external device becomes ready to be serviced by the processor the device sends a(n) interrupt signal to the processor

Difference between array processor and vector processor​

Answers

Answer:

An array is used for the storaging the paticular given size element that is either fixed or given by the user. However an vector is also used for storing purpose but the size of the table is assign automatically during the running time of the program or we say dynamic size assign to table.

Answer:

An array is made up of indexed collections of information called indices, the plural form of the word "index." Though an array can, in rare cases, have only one index collection, a vector is technically indicative of an array with at least two indices. Vectors are sometimes referred to as "blocks" of computer data.

Explanation:

Array stores a fixed-size sequential collection of elements of the same type and it is index based. Vector is dynamic in nature so, size increases with insertion of elements. As array is fixed size, once initialized can't be resized. Vector occupies more memory.

Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a sudden it stops working and generates an error message that the account has been locked. Which of the following is the best possible reason why?

a. The password has expired.
b. The IP address of the server the process is typically accessing has changed. *
c. The ACL with the allowed list of users has changed.
d. Someone has tried to hack into the system using that account.

Answers

Answer:

b. The IP address of the server the process is typically accessing has changed

Explanation:

IP address stands for Internet Protocol address. It refers to a numerical value which is assigned to a every device which is connected to a computer network using the internet protocol for any communication.

Every device is allotted a unique IP address number.

In the context, Keely who works on an automation tool suddenly gets an error message that the account has been locked. This is mainly due to the changed in the IP address of the server that accesses the process.

The account gets closed or clocked whenever the IP address of the server changes.

Therefore, the correct option is (b).

Joanne is working on a project and goes to access one of the web applications that her organization provides to retrieve some data. Upon searching for the data that she needs, she receives a pop-up message that top-secret clearance is required and she only has secret clearance. Which of the following access control methods does her organization use?

a. DAC
b. RBAC
c. MAC
d. TSAC

Answers

Answer:

The answer is "Option c".

Explanation:

This required user access policy is a tool used for a central authority that assigns access privileges depending on regulations.

It is a security method that limits the capacity of foreign firms to give or refuse access to a file program's resource objects.

It is a system that imposed access control on the premise of object labels and subject clearance. Such topics and items, like confidential, secret, and top-secret, have clearances and designations, appropriately.

The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development

Answers

Answer:

The modern computer system has been evolutionary. Modern computers have allowed for us to complete hard tasks rather easily. With modern computers, we are able to calculate advanced equations with the click of a button. Trends in computing like RTX can rapidly improve performance, rendering, and tons of other graphical heavy actions. In September of 2018, we got the first RTX card, now in 2021, RTX has become exponentially better than what it was in 2018. With the modern computers comes quantum computers. Quantum computing is estimated to be 100 million times faster than any modern computer. IBM, the company to make the first computer stated that we are in the decade of quantum computing. And who knows? Maybe quantum computing will come sooner rather than later.

Explanation:

You probably should modify this a little so you don't get in trouble. I researched each topic I put into this for about an hour so I hope this is what you need. If it isn't, please don't hesitate to tell me what I didn't add or what went wrong.

Have a good day :)

Other Questions
The United States is located south of Canada and north of Mexico. This is anexample of what?A. absolute locationB. relative locationC. zip codeD. road intersections Who can do 20 assignments in math for me rn needs to b finish in 5 hours? A system must include _______.A.an input, an output and a process.B.something to do with a form of transport.C.a microprocessor.D.fuel, water and electricity. READING TOOL Sequence of Events List in order the parts of a typical experiment that usesscientific methodology. Use the headings in your text as a guide. Whats an example of personification NO copy and paste what is an example of a quintic bionomial? Which of the following terms is the lifecycle of a living cell?A. g1B. cell cycleC. interphaseD. mitosis How would a Kantian deontologist evaluate lying? a.) It is morally wrong because if everyone did it, nobody could be trusted anymore. b.) It is morally wrong because a person with good intentions cannot lie. c.) It is morally right because it can have good effects. d.) It is morally right when it is done to respect another's feelings. What is the quadratic regression equation that fits these data?Number of seconds Helght (In feet)01211421531441056O A. y=-1.94x2 + 0.62x+ 9.62B. y = -3.69x2 + 2.08x+8.07O C. y = 15.68(0.88)O D. y=-0.89x2 + 3.24x+11.93SUBMIT Find the lateral surface area of thefollowing prism:5 cm5 cm-apothem = 3.44 cm5 cm5 cm10 cm5 cm what is the impression of the war does Casablanca portray why can't sodium salt be prepared by double decomposition You observe that you see more mockingbirds in small trees and more hawks in large trees. Which of the following is an appropriate scientific question based on this observation?How does the size of a tree affect the bird species that prefer to live in it?How do birds fly?What type of food do birds eat?What time of year to birds mate? explain any 3 factor that affect the mortality rate of nepal 4 of 204 of 20 QuestionsQuestion 4What is the equation of the line that is parallel to y5=13(x+2) and passes through the point (6,1)? which force is responsible for the moon revolving round the earth ? Simplify the complex number -16+8. Which will result in a difference of squares? a(negative 7 x + 4)(negative 7 x + 4) b(negative 7 x + 4)(7 x minus 4) c(negative 7 x + 4)(negative 7 x minus 4) d(negative 7 x + 4)(4 minus 7 x) What is the 21st term of the sequence with a1 = -6 and d = 4?a) 70b) 74c) -40d) 78 In a game of pool, the cue ball moves at a speed of 2 m/s toward the eight ball. When the cue ball hits the eight ball, the cue ball bounces off with a speed of 0.8 m/s at an angle of 20', as shown in the diagram below. Both balls have a mass of 0.6 kg.a) what is the momentum of the system before the collision b) what is the momentum after the collision c) what angle dose the right ball travel after the collision d) what is the magnitude of the eight balls velocity after the collision