Write a C++ program that reads a number and determines whether the number is positive, negative or zero using Switch operator method

Answers

Answer 1

Answer:

#include <iostream>

using namespace std;

template <typename T> int sgn(T val) {

   return (T(0) < val) - (val < T(0));

}

int main()

{

   cout << "Enter a number: ";

   int number;

   cin >> number;

   switch (sgn(number)) {

   case -1: cout << "The number is negative";

       break;

   case 0: cout << "The number is zero";

       break;

   case 1: cout << "The number is positive";

       break;

   }

}

Explanation:

You need the special sgn() function because a switch() statement can only choose from a list of discrete values (cases).


Related Questions

tools used to type text on Ms paint​

Answers

this is ur answer hope this answer will help u

Challenge: What is the largest decimal value you can represent, using a 129-bit unsigned integer?

Answers

Answer:

680564733841876926926749214863536422911

Explanation:

2¹²⁹ - 1 = 680564733841876926926749214863536422911

An electronic ____ is an application you use to perform numeric calculations and to analyze and present numeric data.

Answers

An electronic [tex]\sf\purple{spreadsheet}[/tex] is an application you use to perform numeric calculations and to analyze and present numeric data.

[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]

An electronic spreadsheet is an application you use to perform numeric calculations and to analyze and present numeric data.

What is electronic spreadsheet?

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Microsoft Excel, Sheets, and Apple Numbers are a few examples of electronic spreadsheets.

Text, number, logical, and error data are the four categories of data. Each type can be used for a variety of tasks, so knowing which to use and when to use it is crucial.

You might also keep in mind that while exporting data into a spreadsheet, some data types might change.

You may examine and show numerical data as well as execute numerical calculations using an electronic spreadsheet.

Thus, the answer is electronic spreadsheet.

For more details regarding spreadsheet, visit:

https://brainly.com/question/8284022

#SPJ6

In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers

Answers

Answer:

Centralized Processing

Explanation:

Centralized processing was developed to process all of the data in a single computer, and since the first computers were stand-alone with all input and output devices in the same room, only the largest organizations could afford to use centralized processing.

You issue a transmission from your workstation to the following socket on your LAN: 10.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using

Answers

Answer:

POP

Explanation:

The application layer protocol that is been used here is POP, given that you issued a transmission to the socket on you LAN: 10.1.145:110.  and you use a standard port designation

Reason:

110 ( port number ) represents a POP3 process that is always used in a TCP/IP network , and the socket address started with an IP address as well. hence we can say that the application layer protocol is POP

Write a class named Pet, with should have the following data attributes:1._name (for the name of a pet.2._animalType (for the type of animal that a pet is. Example, values are "Dog","Cat" and "Bird")3._age (for the pet's age)The Pet class should have an __init__method that creates these attributes. It should also have the following methods:-setName -This method assigns a value to the_name field-setAnimalType - This method assigns a value to the __animalType field-setAge -This method assigns a value to the __age field-getName -This method returns the value of the __name field-getAnimalType -This method returns the value of the __animalType field-getAge - This method returns the value of the __age fieldWrite a program that creates an object of the class and prompts the user to enter the name, type, and age of his or her pet. This should be stored as the object's attributes. Use the object's accessor methods to retrieve the pet's name, type and age and display this data on the screen. Also add an __str__ method to the class that will print the attributes in a readable format. In the main part of the program, create two more pet objects, assign values to the attirbutes and print all three objects using the print statement.Note: This program must be written using Python language

Answers

Answer:

Explanation:

The following is written in Python, it contains all of the necessary object attributes and methods as requested and creates the three objects to be printed to the screen. The first uses user input and the other two are pre-built as requested. The output can be seen in the attached image below.

class Pet:

   _name = ''

   _animalType = ''

   _age = ''

   def __init__(self, name, age, animalType):

       self._name = name

       self._age = age

       self._animalType = animalType

   def setName(self, name):

       self._name = name

   def setAnimalType(self, animalType):

       self._animalType = animalType

   def setAge(self, age):

       self._age = age

   def getName(self):

       return self._name

   def getAnimalType(self):

       return self._animalType

   def getAge(self):

       return self._age

   def __str__(self):

       print("My Pet's name: " + str(self.getName()))

       print("My Pet's age: " + str(self.getAge()))

       print("My Pet's type: " + str(self.getAnimalType()))

name = input('Enter Pet Name: ')

age = input('Enter Pet Age: ')

type = input('Enter Pet Type: ')

pet1 = Pet(name, age, type)

pet1.__str__()

pet2 = Pet("Sparky", 6, 'collie')

pet3 = Pet('lucky', 4, 'ferret')

pet2.__str__()

pet3.__str__()

Explain briefly the FIREWALLS

Answers

Answer:

Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!

Explanation:

how can you reduce the size of icons on the Taskbar by using the control panel is there another method of doing the same using right click explain​

Answers

Answer:

Right-click on any empty area of the taskbar and click “Taskbar Settings.” In the settings window, turn on the “Use small taskbar icons” option. As you can see, almost everything is the same except that the icons are smaller and you can cram a few more into the space.

how can you explain that algorithm and flowchart are problem solving tools?​

Answers

Answer:

Algorithm and flowchart are the powerful tools for learning programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way. Algorithm and flowcharts helps to clarify all the steps for solving the problem.

Dan frequently organizes meetings and would like to automate the handling of the meeting responses. What should he
do to automatically move those responses into a subfolder?
O Configure an automatic reply.
O Configure the default meeting request options.
O Configure a Meeting Response Rule.
O Nothing, Dan must respond individually.

Answers

Answer:

Configure an automatic reply.

Explanation:

Dan's best option would be to configure an automatic reply. This reply will instantly be sent to any individual that messages Dan requesting a meeting. Once configured, Dan will no longer need to manually respond to each one of the messages and it will instead be handled automatically. These messages will also be automatically moved to the outbox where the messages that have been sent usually go.

Answer:

C

Explanation:

If the code for JAVA is LCXC, what is the code for BASIC?

Answers

Answer:

DCUKE

Explanation:

Given that,

Code for JAVA = LCXC

To find,

Code for BASIC = ?

As we observe the pattern,

In "JAVA", every letter moved two-letter forward in their alphabetical order or we can say that every third alphabet of the given letter is used to make the code:

J + 2 = L

A + 2 = C

V + 2 = X

A + 2 = C

Similarly,

B + 2 = D

A + 2  = C

S + 2 = U

I + 2  = K

C + 2 = E

Thus, DCUKE is the code for BASIC.

The code for BASIC given the code for JAVA is; DCUKE

We are given the code for JAVA as LCXC

From that code for "JAVA", we see that every letter is moved forward two letters in their alphabetical order. This means

J = L because L comes after J and KA = C because C comes after A and BV = X because X comes after V and UA = C because C comes after A and B

Similarly for BASIC;

B = D because D comes after B and CA = C because C comes after A and BS = U because U comes after S and TI = K because K comes after I and JC = E because E comes after C and D

Thus, finally the code for BASIC is DCUKE

Read more about JAVA at; https://brainly.com/question/18554491

explain any two factors to consider when classifying computer systems​

Answers

Answer:

The following classifications can be made of the computer systems:

1. According to size.

2. Functionality based on this.

3. Data management based. 

Explanation:

Servers:-

Servers are only computers that are configured to offer clients certain services. Depending on the service they offer, they are named. For example security server, server database.

Workstation:-

These are the computers which have been designed mainly for single users. They operate multi-user systems. They are the ones we use for our daily business/personal work.

Information appliances:-

They are portable devices that perform a limited number of tasks such as basic computations, multimedia playback, internet navigation, etc. They are commonly known as mobile devices. It has very limited storage and flexibility and is usually "as-is" based.

Design an if-then statement ( or a flowchart with a single alternative decision structure that assigns 20 to the variable y and assigns 40 to the variable z if the variable x is greater than 100?

Answers

Answer:

The conditional statement and its flowchart can be defined as follows:

Explanation:

Conditional statement:

if x>100 Then //defining if that check x value greater than 100

y=20//holding value in the y variable

z=40//holding value in z variable

End if

Which XXX declares a student's name. public class Student { XXX private double myGPA; private int myID; public int getID() { return myID; } } Group of answer choices String myName; public String myName; private myName; private String myName;

Answers

Question:

Which XXX declares a student's name.

public class Student {

   XXX

   private double myGPA;  

   private int myID;

   public int getID() {

        return myID;

   }

}

Group of answer choices

a. String myName;

b. public String myName;

c. private myName;

d. private String myName;

Answer:

private String myName;

Explanation:

To declare a student's name, the following should be noted.

i. The name of the student is of type String

ii. Since all of the instance variables (myGPA and myID) have a private access modifier, then myName (which is the variable name used to declare the student's name) should be no exception. In other words, the student's name should also have a private access.

Therefore, XXX which declares a student's name should be written as

private String myName;

Option (a) would have been a correct option if it had the private keyword

Option (b) is not the correct option because it has a public access rather than a private access.

Option (c) is not a valid syntax since, although it has a private access, the data type of the variable myName is not specified.

Option (d) is the correct option.

what are the different steps while solving a problem using computer? explain​

Answers

Explanation:

The following six steps must be followed to solve a problem using computer.

Problem Analysis.

Program Design - Algorithm, Flowchart and Pseudocode.

Coding.

Compilation and Execution.

Debugging and Testing.

Program Documentation.

You're installing two new hard drives into your network attached storage device. Your director asks that they be put into a RAID solution that offers redundancy over performance. Which would you use?
a. RAID 0
b. RAID 1
c. RAID 5
d. RAID 6
e. RAID 10

Answers

Answer:

d. RAID 6

Explanation:

RAID is a data storage technology that combines multiple physical disk drive components into a single logical unit. The functions of RAID is to provide performance and redundancy.

RAID 0 provides data stripping but it does not offer data stripping.

RAID 1 increases performance to about 2x but it limits the disk capacity to about 50%

RAID 5 provides redundancy and increased perfomance but it is limited to small disk drive.

RAID 6 also provides redundancy but it slows performance

RAID 10 increases performance and data protection.

RAID 6 is the best drive that offers redundancy over performance.

five technology tools and their uses​

Answers

Answer:

Electronic boards

Videoconferencing ability

Search engines

Cloud services

Computing softwares

Explanation:

Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :

The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.

Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.

Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.

Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.

Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.

What help in executing commands quickly

Answers

Answer:99

Explanation:  Last summer, my family and I took a trip to Jamaica. My favorite part of the trip was when we went to a place called the Luminous Lagoon. We ate dinner and waited for the sun to go down. Then we boarded a boat and went out into the lagoon. That’s when the magic started.

At first we could not see very much in the darkness except for the stars in the sky. After a few minutes, however, I noticed some fish swimming in the water. They didn’t look like ordinary fish. These fish were glowing! Our guide explained that the glow came from tiny creatures in the water called dinoflagellates. These little animals are not visible to us, but their bodies produce light using something called bioluminescence, just like fireflies. There are so many of these creatures in Luminous Lagoon that the water around them seems to glow.

After our guide explained these facts to us, he told us to put our hands in the water. I was not sure if it would work, but I tried it. When I did, my hand looked like it belonged to a superhero! It was glowing bright blue. I hope someday I get to return to the Luminous Lagoon. The lights in the water were much more entertaining than the ones in the sky.

Problem:

audio

The Greek prefix dinos- means “whirling” and the Latin root word flagellum means “whip”. What does dinoflagellate most likely mean as it is used in the passage?

audio

the production of light from an organism’s body

audio

the study of creatures that live in the ocean

audio

to move around underwater water like a fish

audio

an organism with a whip-like part it uses to move around in the water

How laggy is you're game cause I even lag in offline games this is just a random question. ​

Answers

Answer: its bad

Explanation:

Answer:

Lagging in offline games suggests there is something wrong with the computer, not the internet. There are various speed tests you can use to determine the speed of your internet! One being https://www.speedtest.net/ which is a more well known and trusted site. Depending on how old your computer is or if it is a laptop not build for games can influence your gameplay experience greatly.

Write a public static method named print Array, that takes two arguments. The first argument is an Array of int and the second argument is a String. The method should print out a list of the values in the array, each separated by the value of the second argument.
For example, given the following Array declaration and instantiation:
int[] myArray = {1, 22, 333, 400, 5005, 9}; printArray(myArray, ", ") will print out 1, 22, 333, 400, 5005, 9
printArray(myArray, " - ") will print out 1 - 22 - 333 - 400 - 5005 - 9

Answers

Answer:

Here is the output.

Explanation:

import java.util.Arrays;  

public class Main{  

   public static void main(String[] args){        

       int[] array={43,42,23,42,4,56,36,7,8,676,54};

       System.out.println(Arrays.toString(array));

       printArray(array,"*");

       System.out.println(""+getFirst(array));

       System.out.println(""+getLast(array));

       System.out.println(Arrays.toString(getAllButFirst(array)));

       System.out.println(""+getIndexOfMin(array));

       System.out.println(""+getIndexOfMax(array));

       System.out.println(Arrays.toString(swapByIndex(array, 1,2)));

       System.out.println(Arrays.toString(removeAtIndex(array,3)));

       System.out.println(Arrays.toString(insertAtIndex(array,3,65)));

   }  

   //---1----

   public static void printArray(int[] arr, String sep){  

       for(int i=0; i<arr.length-1;i++){  

           System.out.print(" "+arr[i]+" "+sep);  

       }  

       System.out.println(" "+arr[arr.length-1]);  

   }  

   //---2----  

   public static int getFirst(int[] arr){  

       return arr[0];  

   }

   //---3----  

   public static int getLast(int[] arr){  

       return arr[arr.length-1];  

   }  

   //---4-----  

   public static int[] getAllButFirst(int[] arr){  

       int[] anotherArray=new int[arr.length-1];  

       for(int i=1; i<arr.length;i++){  

           anotherArray[i-1]=arr[i];  

       }

       return anotherArray;

   }

//---5------  

   public static int getIndexOfMin(int[] arr){  

       int index=0;  

       int min=arr[0];  

       for(int i=1; i<arr.length;i++){  

           if(min>arr[i]){  

               min=arr[i];  

               index=i;  

           }  

       }

       return index;  

   }  

   //---6------  

   public static int getIndexOfMax(int[] arr){  

       int index=0;  

       int max=arr[0];  

       for(int i=1; i<arr.length;i++){  

           if(max<arr[i]){  

               max=arr[i];  

               index=i;  

           }  

       }  

       return index;  

   }  

   //---7------  

   public static int[] swapByIndex(int[] arr, int a , int b){  

       int temp=arr[a];  

       arr[a]=arr[b];  

       arr[b]=temp;  

       return arr;  

   }  

   //---8------  

   public static int[] removeAtIndex(int[] arr, int index){  

       int[] anotherArray = new int[arr.length - 1];  

for (int i = 0, k = 0; i < arr.length; i++) {  

if (i == index) {  

continue;  

}  

anotherArray[k++] = arr[i];  

}  

// return the resultant array  

return anotherArray;  

   }  

//---9------  

   public static int[] insertAtIndex(int[] arr, int index, int element){  

       int[] anotherArray = new int[arr.length + 1];  

for (int i = 0, k=0;k < arr.length+1; k++) {  

if (k == index) {  

anotherArray[k]=element;  

               continue;  

}  

anotherArray[k] = arr[i++];  

}  

// return the resultant array  

return anotherArray;  

   }  

//---10------  

   public static boolean isSorted(int[] arr){  

       for(int i=0; i<arr.length-1;i++){  

           if (arr[i+1]<arr[i]){  

               return false;  

           }  

       }  

       return true;  

   }  

}

Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.

Answers

Answer:

128 KB      

Explanation:

Given data :

The block size = 512 bytes

Block pointer size = 2 bytes

In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.

Therefore, the maximum number of block pointer in 1 block :

[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]

[tex]$=\frac{512}{2}$[/tex]

= 256

Thus, a block can hold maximum 256 pointers.

It is given the level of indexing is one. So,

Maximum size of the file =  maximum number of block pointers in 1 file x block size

                                          = 256 x 512

                                          [tex]$=2^8 \times 2^9$[/tex]

                                          [tex]$=2^{8+9}$[/tex]

                                           [tex]$=2^{17}$[/tex]

                                          [tex]$=2^7 \times 2^{10}$[/tex]

                                          [tex]$=128 \times 2^{10}$[/tex]

                                          = 128 KB   (∵ 1 KB = [tex]2^{10} \ B[/tex] )

Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.

Write a program that reads a string and outputs the number of times each lowercase vowel appears in it. Your program must contain a function with one of its parameters as a string variable and return the number of times each lowercase vowel appears in it. Also write a program to test your function. (Note that if str is a variable of type string, then str.at(i) returns the character at the ith position. The position of the first character is 0. Also, str.length() returns the length of the str, that is, the number of characters in str.)

Answers

Answer:

Here the code is given as follows,

Explanation:

#include <iostream>

#include <string>

using namespace std;

void Vowels(string userString);

int main()

{

   string userString;

   //to get string from user

   cout << "Please enter a string: ";

   getline(cin,userString,'\n');

   Vowels(userString);

   return 0;

}

void Vowels(string userString)

{

   char currentChar;

   //variables to hold the number of instances of each vowel

   int a = 0, e = 0, i = 0, o = 0, u = 0;  

   for (int x = 0; x < userString.length(); x++)  

   {

       currentChar = userString.at(x);

       switch (currentChar)  

       {

           case 'a':

               a += 1;

               break;

           case 'e':

               e += 1;

               break;

           case 'i':

               i += 1;

               break;

           case 'o':

               o += 1;

               break;

           case 'u':

               u += 1;

               break;

           default:

               break;

       }

   }

   // to print no of times a vowels appears in the string

   cout << "Out of the " << userString.length() << " characters you entered." << endl;

   cout << "Letter a = " << a << " times" << endl;

   cout << "Letter e = " << e << " times" << endl;

   cout << "Letter i = " << i << " times" << endl;

   cout << "Letter o = " << o << " times" << endl;

   cout << "Letter u = " << u << " times" << endl;

}

Hence the code and Output.

Please enter a string

Out of the 16 characters you entered.

Letter a = 2 times

Letter e = 1 times

Letter i = 0 times

Letter o = 1 times

Letter u = 0 times.

Write a function called reverse Return that is almost the same job as reverse, but instead of printing the letters straight to the screen, it returns a String in which the letters have been reversed. The function call would look like:

Answers

Answer:

The function in Python is as follows:

def reverse(inputstr):  

   outputstr = ""

   for i in inputstr:

       outputstr = i + outputstr

   return outputstr

Explanation:

This defines the function

def reverse(inputstr):

This initializes the output string

   outputstr = ""

This iterates through the input string

   for i in inputstr:

This generates the output string by reversing the input string

       outputstr = i + outputstr

This returns the reversed string

   return outputstr

why stress testing is needed?​

Answers

Answer:

To be able to test a product if it can withstand what it is supposed to before being released to the public for saftey reasons.

Answer:

Stress testing involves testing beyond normal operational capacity, often to a breaking point, to observe the results. Reasons can include:

Helps to determine breaking points or safe usage limits Helps to confirm mathematical model is accurate enough in predicting breaking points or safe usage limits Helps to confirm intended specifications are being met Helps to determine modes of failure (how exactly a system fails) Helps to test stable operation of a part or system outside standard usage Helps to determine the stability of the software.

Stress testing, in general, should put computer hardware under exaggerated levels of stress to ensure stability when used in a normal environment.

2. 5s is a Chinese principle adapted for use in the workplace.
True or False​

Answers

Answer:

A. true

Explanation:

because 5s is the.................

Exam Lesson Name: Introduction to Design Technology
Exam number. 700796RR
> Exam Guidelines
Exam Instructions
Question 8 of 20 :
Select the best answer for the question
8. Cycling through the design process to create several models that incrementally improve a solution is called what?
O A. Six Sigma
B. Success criteria
C. Just-in-time production
D. Iterative design
Mark for review (Will be highlighted on the review page)
Type here to search
O
Bi
S

Answers

Answer:

D. Iterative design

Explanation:

An iterative design can be defined as a cyclic process which typically involves prototyping, testing, evaluating or analyzing and refining of a product, so as to continually improve the product.

In an iterative design process, the following steps are adopted;

1. A prototype of the product is first created and tested by the manufacturer.

2. The product is then evaluated to check for any defect or flaw.

3. The defect or flaw is fixed through a refining process.

4. The previous steps are repeated incrementally until an improved version of the product is created.

Hence, cycling through the design process to create several models that incrementally improve a solution is called iterative design.

Answer:

Iterative Design

Explanation:

A. It seeks to figure what it defective

B. It reaffirms if all requirements are met to solve a problem

C. It's main goal was to avoid excess products that might not end up making sales in the near future

D. Making several revision on problems to take out an efficient solution

D makes the most sense here.

A wireless router is what kind of networking device?
Select one
a. End device
b. Intermediary device
c Peripheral Device
d. Connecting Device​

Answers

Answer:

D, routers enable us to connect to the internet.

What are the steps in finding the average height? Plz help ty :>


(Problem-solving questions
Use the problem-solving steps to develop an algorithm to solve the following problem
...Calculating the average height of all the children in your class)

Answers

Answer:

to calculate average, first add all the figures. Then divide by the amount of figures there are

21
22
23
24
25
26
27
28
29
30
TIME REMA
01:08:
Which view is most often used to reorder slides in a presentation that has already been created?
HERE
ОО
Outline view
Slide Sorter view
O Reading view
O Normal view

Answers

Answer:

slide sorter view

Explanation:

Explanation: while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.

Slide sorter view. while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.

What is Slide sorter view?

You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view.

The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here.

  All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in the PowerPoint Slide Sorter view

Therefore, Slide sorter view. while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.

To learn more slide sorter view, refer to the link:

https://brainly.com/question/7696377

#SPJ7

Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.

a. True
b. False

Answers

Answer:

False

Explanation:

They are not applied in the hardware and software of information systems.

Other Questions
plz help now i need it like now In a solution containing 21.2 g sodium carbonate in 1.50 L of solution, calculatethe concentration of the sodium and carbonate ions. Those who argue that objectivity is impossible are known as activitists.O TrueO FalseASAPAND THANK YOU A 45 foot ladder is set against the side of a house so that it reaches up 27 feet. If Nicole grabs the ladder at its base and pulls it 4 feet farther from the house, how far up the side of the house will the ladder reach now? (The answer is not 23 ft.) Round to the nearest tenth of a foot. 1. Find the numbers a, b, c such that2x4 + 2x3 +5x2 + 3x + 3 = (x2 + x +1)(ax2+bx+c)for all values of x. Which sentence in the paragraph is structured differently than the others? Jasmine drew triangles on a globe and on a flat map of the world, as shown below.Which is a true statement comparing Jasmines two drawings?A. The angle sum of the triangle on the globe is equal to the angle sum of the triangle on the map.B. The angle sum of the triangle on the globe is greater than the angle sum of the triangle on the map.C. The New York to Buenos Aires line and the Paris to Buenos Aires line intersect at only one point on the map and only one point on the globe.D. There is only one line connecting New York to Paris on the map but more than one line connecting New York to Paris on the globe Find the missing side Read and classify each selection as a topic or a thesis. Drag the items on the left to the correct location on the right.topicthesis What are the coordinates of the point plotted on this graph? Youve borrowed $21,518 on margin to buy shares in Ixnay, which is now selling at $40.6 per share. You invest 1,060 shares. Your account starts at the initial margin requirement of 50%. The maintenance margin is 35%. Two days later, the stock price changes to $38 per share. a. Will you receive a margin call? Muffins are sold in packages of 18 and cost $27 per package. Each of 6 friends gets an equal share of muffins from p packages of muffins. Write an expression to represent how much each friend must pay. Add.3 7/11 + 9 6/11Write your answer as a mixed number in simplest form.Help Spackel Corporation recorded the following events last year: Issuance of shares of the company's own common stock $ 380,000 Purchase of long-term investment $ 40,000 Dividends paid to the company's own shareholders $ 18,000 Cash paid to suppliers for inventory purchases $ 12,000 Repayment of principal on the company's own bonds $ 370,000 Interest paid to lenders $ 6,000 Collection by Spackel of a loan made to another company $ 110,000 Purchase of equipment $ 350,000 On the statement of cash flows, some of these events are classified as operating activities, some are classified as investing activities, and some are classified as financing activities. Based solely on the information above, the net cash provided by (used in) investing activities on the statement of cash flows would be: Multiple Choice $(280,000) $(760,000) $(1,286,000) $(390,000) Solve for x. Assume that lines which appear tangent are tangent. x= What is the solution to the system of equations In the retail industry, ABC tries to add value to their products and services so they can attract customers who are willing to pay a higher price. ABC can be described as utilizing which of the following strategy?A. Differentiation strategy.B. Local strategy.C. Regional strategy.D. Cost-leadership strategy.E. Global strategy. The student is now told that the four solids, in no particular order, are barium chloride (BaCl2), sugar (C6H12O6), butanoic acid (C3H7COOH), and sodium bromide (NaBr). Assuming that conductivity is correlated to the number of ions in solution, rank the four substances based on how well a 0.20 M solution in water will conduct electricity. Rank from most conductive to least conductive. The number of pulses per second from IGBTs is referred to as Luisa's aunt has decided to put her baby up for adoption, but she has to decide what type of adoption she wants to pursue. After the baby is born and adopted, she does not want to stay in contact with the parents and does not want the baby to know her as her birth mother. She would like privacy. Which type of adoption would be the best choice for Luisa's aunt? A closed adoption A flexible adoption An adoption by relative An open adoption