Write a removeDuplicates() method for the LinkedList class we saw in lecture. The method will remove all duplicate elements from the LinkedList by removing the second and subsequent elements. If there is only one copy of an element, it is not removed. The list size should shrink accordingly based on the number of duplicates removed.

Answers

Answer 1

Answer:

removeDuplicates() function:-

//removeDuplicates() function removes duplicate elements form linked list.

   void removeDuplicates() {

     

       //declare 3 ListNode pointers ptr1,ptr2 and duplicate.

       //initially, all points to null.

       ListNode ptr1 = null, ptr2 = null, duplicate = null;

       

       //make ptr1 equals to head.

       ptr1 = head;

        //run while loop till ptr1 points to second last node.

       //pick elements one by one..

       while (ptr1 != null && ptr1.next != null)

       {

               // make ptr2 equals to ptr1.

               //or make ptr2 points to same node as ptr1.

           ptr2 = ptr1;

           //run second while loop to compare all elements with above selected element(ptr1->val).

           while (ptr2.next != null)

           {

              //if element pointed by ptr1 is same as element pointed by ptr2.next.

               //Then, we have found duplicate element.

               //Now , we have to remove this duplicate element.

               if (ptr1.val == ptr2.next.val)

               {

                  //make duplicate pointer points to node where ptr2.next points(duplicate node).

                       duplicate = ptr2.next;

                       //change links to remove duplicate node from linked list.

                       //make ptr2.next points to duplicate.next.

                   ptr2.next = duplicate.next;

               }

               

             //if element pointed by ptr1 is different from element pointed by ptr2.next.

               //then it is not duplicate element.

               //So, move ptr2 = ptr2.next.

               else

               {

                   ptr2 = ptr2.next;

               }

           }

           

           //move ptr1 = ptr1.next, after check duplicate elements for first node.

           //Now, we check duplicacy for second node and so on.

           //so, move ptr1  by one node.

           ptr1 = ptr1.next;

       }

   }

Explanation:

Complete Code:-

//Create Linked List Class.

class LinkedList {

       //Create head pointer.

       static ListNode head;

       //define structure of ListNode.

       //it has int val(data) and pointer to ListNode i.e, next.

   static class ListNode {

       int val;

       ListNode next;

       //constructor to  create and initialize a node.

       ListNode(int d) {

               val = d;

           next = null;

       }

   }

//removeDuplicates() function removes duplicate elements form linked list.

   void removeDuplicates() {

       

       //declare 3 ListNode pointers ptr1,ptr2 and duplicate.

       //initially, all points to null.

       ListNode ptr1 = null, ptr2 = null, duplicate = null;

       

       //make ptr1 equals to head.

       ptr1 = head;

       

       

       //run while loop till ptr1 points to second last node.

       //pick elements one by one..

       while (ptr1 != null && ptr1.next != null)

       {

               // make ptr2 equals to ptr1.

               //or make ptr2 points to same node as ptr1.

           ptr2 = ptr1;

           //run second while loop to compare all elements with above selected element(ptr1->val).

           while (ptr2.next != null)

           {

              //if element pointed by ptr1 is same as element pointed by ptr2.next.

               //Then, we have found duplicate element.

               //Now , we have to remove this duplicate element.

               if (ptr1.val == ptr2.next.val)

               {

                  //make duplicate pointer points to node where ptr2.next points(duplicate node).

                       duplicate = ptr2.next;

                       

                       //change links to remove duplicate node from linked list.

                       //make ptr2.next points to duplicate.next.

                   ptr2.next = duplicate.next;

               }

               

             //if element pointed by ptr1 is different from element pointed by ptr2.next.

               //then it is not duplicate element.

               //So, move ptr2 = ptr2.next.

               else

               {

                   ptr2 = ptr2.next;

               }

           }

           

           //move ptr1 = ptr1.next, after check duplicate elements for first node.

           //Now, we check duplicacy for second node and so on.

           //so, move ptr1  by one node.

           ptr1 = ptr1.next;

       }

   }

   //display() function prints linked list.

   void display(ListNode node)

   {

       //run while loop till last node.

       while (node != null)

       {

               //print node value of current node.

           System.out.print(node.val + " ");

           

           //move node pointer by one node.

           node = node.next;

       }

   }

   public static void main(String[] args) {

       

       //Create object of Linked List class.

       LinkedList list = new LinkedList();

       

       //first we create nodes and connect them to form a linked list.

       //Create Linked List 1-> 2-> 3-> 2-> 4-> 2-> 5-> 2.

       

       //Create a Node having node data = 1 and assign head pointer to it.

       //As head is listNode of static type. so, we call head pointer using class Name instead of object name.

       LinkedList.head = new ListNode(1);

       

       //Create a Node having node data = 2 and assign head.next to it.

       LinkedList.head.next = new ListNode(2);

       LinkedList.head.next.next = new ListNode(3);

       LinkedList.head.next.next.next = new ListNode(2);

       LinkedList.head.next.next.next.next = new ListNode(4);

       LinkedList.head.next.next.next.next.next = new ListNode(2);

       LinkedList.head.next.next.next.next.next.next = new ListNode(5);

       LinkedList.head.next.next.next.next.next.next.next = new ListNode(2);

       //display linked list before Removing duplicates.

       System.out.println("Linked List before removing duplicates : ");

       list.display(head);

       //call removeDuplicates() function to remove duplicates from linked list.

       list.removeDuplicates();

       System.out.println("")

       //display linked list after Removing duplicates.

       System.out.println("Linked List after removing duplicates :  ");

       list.display(head);

   }

}

Output:-

Write A RemoveDuplicates() Method For The LinkedList Class We Saw In Lecture. The Method Will Remove

Related Questions

A coin is tossed repeatedly, and a payoff of 2n dollars is made, where n is the number of the toss on which the first Head appears. So TTH pays $8, TH pays $4 and H pays $2. Write a program to simulate playing the game 10 times. Display the result of the tosses and the payoff. At the end, display the average payoff for the games played. A typical run would be:

Answers

Answer:

Explanation:

The following code is written in Java. It creates a loop within a loop that plays the game 10 times. As soon as the inner loop tosses a Heads (represented by 1) the inner loop breaks and the cost of that game is printed to the screen. A test case has been made and the output is shown in the attached image below.

import java.util.Random;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       int count = 0;

       int loopCount = 0;

       while (loopCount < 10) {

           while (true) {

               Random rand = new Random();

               int coinFlip = rand.nextInt(2);

               count++;

               if (coinFlip == 1) {

                   System.out.println("Cost: $" + 2*count);

                   count = 0;

                   break;

               }

               loopCount++;

           }

       }

   }

}

3. Most widely used structure for recording database modifications is called
A. Scheduling
B. Buffering
C. Log
D. Blocking​

Answers

Answer:

C. log

Explanation:

The log is a sequence of log records, recording all the update activities in the database

hope this helps

Answer:

C. Log is the

answer

Explanation:

a sequence of log records recording all update activity in database

information technology please help​

Answers

Answer:

Read Technical Books. To improve your technical skills and knowledge, it's best to read technical books and journals. ...

Browse Online Tutorials. ...

Build-up online profile. ...

Learn new Tools. ...

Implement what you learned. ...

Enrich your skillset. ...

Try-out and Apply.

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance. True False

Answers

Answer:

True

Explanation:

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance.

Select the correct statement(s) regarding 4B5B encoding.
a. 4B5B is used to map four codeword bits into a five bit data word
b. 4B5B information bit rate is 80% of the total (information plus overhead) bit rate
c. 4B5B information bit rate is 20% of the total (information plus overhead) bit rate
d. all statements are correct

Answers

Answer:

b. 4B5B information bit rate is 80% of the total information plus overhead bit rate.

Explanation:

4B5B bit rate encoding means there is 80% of the bit rate which included all the information plus the overheads. There is 20% of lack in bit rate due to encoding code words which converts data into smaller bits.

Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint showing them). So is it possible to update???
Please help

Answers

Answer:

For me yes i guess you can update an app store in any deviceI'm not sure

×_× mello ×_×

How can COUNTIF, COUNTIFS, COUNT, COUNTA, and COUNTBLANK functions aide a company to support its mission or goals

Answers

Answer:

Following are the responses to these questions:

Explanation:

It employs keywords to autonomously do work tasks. Users can type numbers directly into the formulas or use the following formulae, so any data the cells referenced provide would be used in the form.

For instance, this leadership involves accounting, and Excel is concerned with organizing and organizing numerical data. In this Equation, I can discover all its information in the data. This idea is simple me count the number many cells containing a number, and also the number of integers. It counts integers in any sorted number as well. As both financial analysts, it is helpful for the analysis of the data if we want to maintain the same number of neurons.

Functions IN C LANGUAGE
Problem 1
Function floor may be used to round a number to a specific decimal place. The statement
y = floor( x * 10 + .5 ) / 10;
rounds x to the tenths position (the first position to the right of the decimal point). The
statement
y = floor( x * 100 + .5 ) / 100;
rounds x to the hundredths position (the second position to the right of the decimal
point).
Write a program that defines four functions to round a number x in various ways
a. roundToInteger( number )
b. roundToTenths( number )
c. roundToHundreths( number )
d. roundToThousandths( number )
For each value read, your program should print the original value, the number rounded to
the nearest integer, the number rounded to the nearest tenth, the number rounded to
the nearest hundredth, and the number rounded to the nearest thousandth.
Input Format
Input line contain a float number.
Output Format
Print the original value, the number rounded to the nearest integer, the number rounded
to the nearest tenth, the number rounded to the nearest hundredth, and the number
rounded to the nearest thousandth
Examples
Example 1
Input 1
24567.8
Output 1
24567.8 24568 24570 24600

Answers

Definitely C I am going to be home in a few wewwww

What is the default return type of a method in Java language?

A.Void

B.Int

C.None

D.Short

Answers

Answer:

The default return data type in function is int

Answer: Option (b)

Explanation:

The default return data type in a function is int. In other words commonly if it is not explicitly mentioned the default return data type of a function by the compiler will be of an integer data type.

If the user does not mention a return data type or parameter type, then C programming language will inevitably make it an int.

mark me brainlist

im sure its option b!!

HELP ASAP PLZZZZZ

Question 35(Multiple Choice Worth 5 points)

(03.01 LC)


To write a letter to your grandma using Word Online, which document layout should you choose?


APA Style Paper

General Notes

New Blank Document

Table of Contents

Answers

Answer:

third one

Explanation:

To write a letter to your grandma using Word Online, you should choose the "New Blank Document" layout.

What is Word?

Microsoft Word is a word processing application. It is part of the Microsoft Office productivity software suite, along with Excel, PowerPoint, Access, and Outlook.

To write a letter to your grandmother in Word Online, select the "New Blank Document" layout. This will open a blank page on which you can begin typing your letter.

The "APA Style Paper" layout is intended for academic papers and includes formatting guidelines and section headings that a personal letter may not require.

In Word Online, "General Notes" is not a document layout option.

The "Table of Contents" feature generates a table of contents based on the headings in your document, but it is not a document layout option.

Thus, the answer is "New Blank Document".

For more details regarding Microsoft word, visit:

https://brainly.com/question/26695071

#SPJ2

If the signal is going through a 2 MHz Bandwidth Channel, what will be the maximum bit rate that can be achieved in this channel? What will be the appropriate signal level?

Answers

Answer:

caca

Explanation:

To connect several computers together, one generally needs to be running a(n) ____ operating system
a. Network
b. Stand-alone
c. Embedded
d. Internet

Answers

Answer. Network

Explanation:

Which of the following restricts the ability for individuals to reveal information present in some part of the database?

a. Access Control
b. Inference Control
c. Flow Control
d. Encyption

Answers

Answer:

it would have to be flow control which would be C.

Explanation:

Flow Control is restricts the ability for individuals to reveal information present in some part of the database. Hence, option C is correct.

What is Flow Control?

The management of data flow between computers, devices, or network nodes is known as flow control. This allows the data to be processed at an effective rate. Data overflow, which occurs when a device receives too much data before it can handle it, results in data loss or retransmission.

A design concern at the data link layer is flow control. It is a method that typically monitors the correct data flow from sender to recipient. It is very important because it allows the transmitter to convey data or information at a very quick rate, which allows the receiver to receive it and process it.

The amount of data transmitted to the receiver side without any acknowledgement is dealt with by flow control.

Thus, option C is correct.

For more information about Flow Control, click here:

https://brainly.com/question/28271160

#SPJ5

Database multiple-choice question don't bs pls
Which of the following is not a common factor for database management system selection?
a. Cost
b. Features and tools
c. Software requirements
d. Hardware requirements
e. All of the above
f. None of the above
(D and F are wrong)

Answers

Answer:

f. None of the above

Explanation:

Considering the available options, the right answer is option F "None of the above."

Common factors for database management system selection are the following:

1. Cost: various DBMS vendors have different pricing, hence, interested buyers will consider the price before selections

2. Features and Tools: different types of DBMS have varied features and tools in carrying out the work.

3. Software requirements: there are various software requirements in various DBMS, such as encryption support, scalability, application-level data recovery, etc.

4. Hardware requirement: various DBMS vendors have different hardware requirements to consider, such as sizeable RAM, CPU value, etc.

Hence, in this case, the correct answer is option F.

A process needs 103 KB of memory in order to run. If the system on which it is to run uses paging with 2 KB pages, how many frames in memory are needed

Answers

Answer: 52

Explanation:

Following the information given in the question, we are informed that a process needs 103 KB of memory in order to run and that the system on which it is to run uses paging with 2KB pages, then the number of frames in memory that are needed will be:

= 103/2

= 51.5

= 52 approximately

Therefore, 52 frames in memory are needed.

how to identify mistakes in a html code??​

Answers

hello i am having a mental breakdown could u help me please?

Many companies possess valuable information they want to guard closely (ex. new chip design, competition plans, legal documents). Personal computer hard disks these days are full of important photos, videos, and movies. As more and more information is stored in computer systems, the need to protect it is becoming increasingly important. Which of the following statements is incorrect with respect to Security?
a. security has many facets; three of the more important ones are: the nature of the threats, the nature of intruders, and cryptography
b. data integrity means that unauthorized users should not be able to modify any data without the owner's permission
c. a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for
d. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes

Answers

Answer: D. in addition to threats caused by malicious users, data can be lost by accident; for example: rats gnawing backup tapes

Explanation:

Data security is essential to protecting unwanted people from having access to ones data, malicious attack should also be prevented and unusual behavior should be monitored.

Data security has many facets such as threat nature, the nature of intruders, and cryptography. Furthermore, data integrity means that unauthorized users should not be able to modify any data without the owner's permission. Also, the statement that a common category of intruders are driven by determined attempts to make money; for example: bank programmers attempting to steal from the bank they work for is correct.

It should be no noted that rats gnawing backup tapes cannot prevent data loss. Therefore, the correct option is D

command create database in oracle database ::((

Answers

Answer:

kdkskskiisidiodoosooddodod

now now now now mowewweedeeee

Answers

Answer:

15

Inside the type declaration, you specify the maximum length the entry can be. For branch, it would be 15.

I can't seem to type the full "vc(15)" phrase because brainly won't let me.

How many ways are there to arrange the letters in the word ALGORITHMS? Note, the letter arrangement does not have to spell a word in the dictionary, but the new word must contain all the letters and each letter can be used only once.

Answers

there are ten letters in the word, so for the first position we can choose out of 10 option.

no matter wich specific option we choose, we will have 9 letters left for the 2nd letter.

and 8 for the third place.

...

when we will have used up 9 of 10 letters, there will be only one option for the last place.

the number of possible decision-paths is therefore given by this expression:

10*9*8*7*6*5*4*3*2*1

wich is 3,628,800

there are quite a few ways to rearrange 10 letters

The sorting method which commands entries in a going to head predicated on each character without regard to space as well as punctuation, therefore there are 3628800 ways.

The word 'ALGORITHMS' has 10 letters. There is no repeated letter so, the first Letter can hold 10 places if we start taking one letter at a time. The second can then hold nine positions, the third can hold eight, and so on.

So, as [tex]\bold{ 10\times 9 \times 8.... \times 3 \times 2 \times 1 = 362,8800}[/tex] ways, we have such a total number of ways.

Learn more:

brainly.com/question/17276660

how much is this worth in dollars​

Answers

Answer:

This is worth 50 dollars.

Explanation:

١ - one

٢ - two

٣ - three

٤ - four

٥ - five

٦ - six

٧ - seven

٨ - eight

٩ - nine

٠ - zero

What you see above is the ten digits in Arabic.

Both 5 (٥) and 0 (٠) appear here, thus representing 50.

You know different types of networks. If two computing station high speed network link for proper operation which of the following network type should be considered as a first priority?

MAN

WAN

WLAN

LAN

All of these

Answers

Answer:

All of these.

PLZ MARK ME BRAINLIEST.

Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication.
i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks

Answers

Answer and Explanation:

I and II answered

Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.

Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.

Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.

Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.

9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input.

Answers

Answer:

Hence the code is given as follows,

import java.util.Scanner;

public class LabProgram {

   public static String createAcronym(String userPhrase){

       String result = "";

       String splits[] = userPhrase.split(" ");

       for(int i = 0;i<splits.length;i++){

           if(splits[i].charAt(0)>='A' && splits[i].charAt(0)<='Z')

               result += splits[i].charAt(0);

       }

       return result;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String s = scan.nextLine();

       System.out.println(createAcronym(s));

   }

}

Illustrate why Sally's slide meets or does not meet professional expectations?
Describe all the things Sally can improve on one of her slides?
Suggest some ways Sally can learn more PowerPoint skills.

Answers

The correct answer to this open question is the following.

Unfortunately, you did not provide any context or background about the situation of Sally and the problem with her slides. We do not know it, just you.

However, trying to be of help, we can comment on the following general terms.

When someone does not meet professional expectations, this means that this individual did not prepare her presentation, lacked technical skills, did not included proper sources, or missed the proper visual aids to make the presentation more attractive and dynamic.

What Sally can improve about her slides is the following.

She can design a better structure for the presentation to have more congruence.

Sally has to clearly establish the goal or goals for her presentation.

She has to add many visuals instead of plain text. This way she can better capture the interest of her audience.

If she can use more vivid colors instead of pale or dark ones, that would be best.

No paragraphs unless necessary. She better uses bullet points.

Take care of the tone of her voice. During her practice, she can record her vice to check how it sounds.

write an algorithm for finding the perimeter of a rectangle

Answers

A formula could be 2a+2b

Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute the ASCII value of each character of the string and sum them up. You will thus need to calculate two sums, one for each string. Then, return true if the first string has a larger ASCII sum compared to the second string, otherwise return false. In your main function, prompt the user to enter two strings with a suitable message and provide the strings to the function during function call. The user may enter multiple words for either string. Then, use the Boolean data returned by the function to inform which string has the higher ASCII sum.

Answers

Answer:

The program in Python is as follows:

def ASCIIsum(str1,str2):

   asciisum1 = 0;    asciisum2 = 0

   for chr in str1:

       asciisum1 += (ord(chr) - 96)

   for chr in str2:

       asciisum2 += (ord(chr) - 96)

   if asciisum1 > asciisum2:

       return True

   else:

       return False

str1 = input("Enter first string: ")

str2 = input("Enter second string: ")

if ASCIIsum(str1,str2) == True:

   print(str1,"has a higher ASCII value")

else:

   print(str2,"has a higher ASCII value")

Explanation:

This defines the function

def ASCIIsum(str1,str2):

This initializes the ascii sum of both strings to 0

   asciisum1 = 0;    asciisum2 = 0

This iterates through the characters of str1 and add up the ascii values of each character

   for chr in str1:

       asciisum1 += (ord(chr) - 96)

This iterates through the characters of str2 and add up the ascii values of each character

   for chr in str2:

       asciisum2 += (ord(chr) - 96)

This returns true if the first string has a greater ascii value

   if asciisum1 > asciisum2:

       return True

This returns false if the second string has a greater ascii value

   else:

       return False

The main begins here

This gets input for first string

str1 = input("Enter first string: ")

This gets input for second string

str2 = input("Enter second string: ")

If the returned value is True

if ASCIIsum(str1,str2) == True:

Then str1 has a greater ascii value

   print(str1,"has a higher ASCII value")

If otherwise

else:

Then str2 has a greater ascii value

   print(str2,"has a higher ASCII value")

A retail department store is approximately square, 35 meters (100 feet) on each side. Each wall has two entrances equally spaced apart. Located at each entrance is a point-of-sale cash register. Suggest a local area network solution that interconnects all eight cash registers. Draw a diagram showing the room, the location of all cash registers, the wiring, the switches, and the server. What type of wiring would you suggest?

Answers

Answer:

The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server

Explanation:

The local area network ( LAN ) solution  that will be used to interconnect all the POS  registers is ; The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server .  

This is because category 5e/6 twisted pair cable has a data rate transfer of up to 10 Mbps and it is best used for LAN connections

while The function of the three switches is to connect each cash register to the the central server been used .

attached below is a schematic representation

When rating ads, I should only consider my personal feelings on the ad.

Answers

Answer:

yes when rating ads you should only consider your personal feelings on the ad

You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the discussion forum. Which of the following would be appropriate in a post?
A. Including an advertisement for how to subscribe to the data analytics magazine.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.

Answers

Select All that apply

Answer:

These are the things that are would be appropriate in a post.

B. Checking your post for typos or grammatical errors.

C. Giving credit to the original author.

D. Including your own thoughts about the article.

Explanation:

The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.

Other Questions
According to the assumptions of the quantity theory of money, if the money supply increases 5 percent, then a. the price level would be unchanged and real GDP would rise by 5 percent. b. the price level would rise by 5 percent and real GDP would be unchanged. c. both the price level and real GDP would rise by 5 percent. d. both the price level and real GDP would be unchanged. I want to know the Answers Zach read a book for 10 minutes every weekend in the first month, 20 minutes in the second month, 40 minutes in the third month, and 80 minutes in the fourth month.Victoria read a book for 35 minutes every weekend in the first month, 50 minutes in the second month, 65 minutes in the third month, and 80 minutes in the fourth month.Which statement best describes the methods used by Zach and Victoria to increase the time they spent reading a book? (1 point)Select one:a. Zach's method is linear because the number of minutes increased by an equal factor every month.b. Victoria's method is linear because the number of minutes increased by an equal number every month.c. Both Victoria's and Zach's methods are exponential because the number of minutes increased by an equal factor every month.d. Both Victoria's and Zach's methods are exponential because the number of minutes increased by an equal number every month. A mystery writers group wants to hold public book discussions, with the group facing the audience and talking informally without prepared speeches and with the audience members asking them questions. What format would work best Use Cramer's Rule to solve (if possible) the system of linear equations. x1 + 2x2 =8- x1 + x2 = 1Required:Find the coefficient matrix. What are some of the major themes or big ideas found in the constitution The electric motor in the car is powered by a battery. To charge the battery, the car is plugged into the mains supply at 230 V The power used to charge the battery is 6.9 kW Calculate the current used to charge the battery. 11 Emilio makes metal fences.He is making a fence using this design.1.44 mDO NOT WRITE IN THIS AREA1.8 m.The fence will need3 horizontal metal pieces of length 1.8m2 tall metal pieces of length 1.44 m5 medium metal pieces6 short metal pieces as shown on the diagram.The heights of the tall, medium and short metal pieces are in the ratio 9:8:7.How many metres of metal in total does Emilio need to make the fence? every action produces an equal and opposite -- ---------- when one object exterts a force on another object,the second object pushes back with the same amount of--------- someone knows the answer An electron in a hydrogen atom is in a p state. Which of the following statements is true?a.The electrons wavefunction has at least one node (i.e., at least one place in space where it goes to zero).b.The electron has an energy of -13.6 eV.c.The electron has a total angular momentum of .d.The electron has a z-component of angular momentum equal to sqrt(2)* . Find the probability of selecting 3 cards from a standard deck withoutreplacing them and all 3 are hearts. The following is a scatterplot of the percent of children under age 18 who are not in school or in the labor force vs. the number of juvenile violent crime arrests for each of the 50 states. The least-squares regression line has been drawn in on the plot. We would like to predict what the number of juvenile violent crime arrests would be in a state if 25% of children are not in school or in the labor force. This is called Before reconciling its bank statement, Lauren Cosmetics Corporation's general ledger had a month-end balance in the cash account of $8,250. The bank reconciliation for the month contained the following items:Deposits in transit $870Outstanding checks 645Interest earned 20NSF check returned to bank 220Bank service charge 70Given the above information, what up-to-date ending cash balance should Lauren report at month-end?A. $7,380.B. $8,530.C. $7,980.D. $7,700. Circle the equation of a straight line that does not intersect the curve y = x2(1 my = 5X=-3y = 2x - 5y= -3x + 1 Plz help. How to convert this standard notation to scientific notation 549,755,813,888. What is the range of g?y--.97.6+5+4+3+2+1+.3{4}}-7 -6 -5 -4 -3 -2+++2 3 4 5 6 7-2-3-4+-5-6+77 For a project in his Geometry class, Tyler uses a mirror on the ground to measure the height of his school building. He walks a distance of 14.65 meters from his school, then places a mirror on flat on the ground, marked with an X at the center. He then steps 0.8 meters to the other side of the mirror, until he can see the top of the school clearly marked in the X. His partner measures the distance from his eyes to the ground to be 1.15 meters. How tall is the school? Round your answer to the nearest hundredth of a meter. In "Bernice Bobs Her Hair," representations of ____ demonstrate the changing values of the 1920s.A. family lifeB. femininity C. human emotions D. love Sofia bought a clothes iron that was discounted 15% off of the original price of $35. What was the sale price of the clothes iron? Please help ASAP! Which of the 4 strategies is best and why? 1) Curved sea walls2)Rock Armour 3)Beach replenishment 4)Nothing Coastal Management