consider a multiple-issue design. suppose you have two execution pipelines, each capable of beginning execution of one instruction per cycle, and enough fetch/decode bandwidth in the front end so that it will not stall your execution. assume results can be immediately forwarded from one execution unit to another, or to itself. further assume that the only reason an execution pipeline would stall is to observe a true data dependency. now how many cycles does the loop require?

Answers

Answer 1

In a multiple-issue design with two execution pipelines, each capable of beginning execution of one instruction per cycle, the number of cycles required for the loop depends on the instructions within the loop and their dependencies.

1)Assuming there are no true data dependencies, the execution pipelines will not stall and the loop can be executed in a single cycle. However, if there are true data dependencies, the pipelines may stall to observe them, which can increase the number of cycles required for the loop.

2)To calculate the number of cycles required for the loop, we need to analyze the instructions within the loop and identify any data dependencies. If there are no dependencies, the loop can be executed in a single cycle. If there are dependencies, the number of cycles required will depend on the depth of the dependencies and the ability of the pipelines to forward results to each other or to themselves.

3)Overall, the number of cycles required for the loop will depend on the specific instructions and their dependencies within the loop, as well as the capabilities of the execution pipelines and the front end fetch/decode bandwidth. However, with immediate forwarding and no data dependencies, the loop can be executed in a single cycle.

For such more question on dependencies

https://brainly.com/question/29610667

#SPJ11


Related Questions

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

Write a while loop that replaces every occurrence of “cat” in the message with “dog” using the indexOf and substring methods.

Given:
public class ChallengeReplace
{
public static void main(String[] args)
{
String message = "I love cats! I have a cat named Coco. My cat's very smart!";

// Write a loop here that replaces every occurrence of "cat"
// in the message with "dog", using indexOf and substring.






}
}

Answers

Answer:

Complete the program using:

int index = message.indexOf("cat");

while(index != -1){

message = message.replace("cat","dog");

index = message.indexOf("cat");

}

System.out.print(message);

}

}

Explanation:

The line gets the index of string "cat"

int index = message.indexOf("cat");

The following operation is repeated until all occurrence of "cat"s has been replaced with dog

while(index != -1){

message = message.replace("cat","dog");

index = message.indexOf("cat");

}

This prints the new string

System.out.print(message);

}

}

The program illustrates the use of loops.

Loops are used to perform repetitive and iterative operations.

The code segment where comments are used to explain each line, is as follows:

//This gets the index of "cat" in the string message

int index = message.indexOf("cat");

//The following loop is repeated, until there is no occurrence of "cat" in the string

while(index != -1){

//This replaces "cat" with "dog"

message = message.replace("cat","dog");

//This gets another index of "cat" in the string message

index = message.indexOf("cat");

}

//This prints the new string

System.out.print(message);

}

}

At the end of the loop, all occurrence of "cat" are replaced with "dog".

Read more about similar programs at:

https://brainly.com/question/20461017

All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.

Answers

Answer:

The correct option is;

MapReduce runs without fault tolerance

Explanation:

Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.

PLEASE HELP!!~~~~
What is the total number of time zones that can be configured to show by default in a calendar in Outlook 2016?


1

2

3

4

Answers

Answer:

2

Explanation:

The total number of time zones that can be configured to show by default in a calendar in Outlook 2016 is 2. The correct option is b.

What are time zones?

A time zone is a region that adheres to a common standard of time for social, commercial, and legal activities. All events on the calendar are updated when you open Outlook.

Outlook uses the time zone that is set as the default when you create a new event in the calendar. When establishing an event, you have the option of choosing a different time zone.

The Calendar in the most recent iterations of Outlook for Microsoft 365 can show three different time zones. You can view two time zones in other versions of Outlook, such as Outlook 2019 Volume License, Outlook 2016, Outlook 2013, and Outlook 2010.

Therefore, the correct option is b. 2.

To learn more about Outlook 2016, refer to the link:

https://brainly.com/question/28579226

#SPJ6

blogs may refer to any kind of communication over the internet is true​

Answers

Answer:

Yes It's true but You forgot email

Explanation:

Which of the following statements about application programming interfaces are true? Select 3 options. Programmers can solve problems using APIs. Programmers can solve problems using APIs. Companies that have a lot of data use APIs to find the target audience. Companies that have a lot of data use APIs to find the target audience. APIs can only be created to be private. APIs can only be created to be private. Programmers can send their request to an API using any language they choose without following any rules. Programmers can send their request to an API using any language they choose without following any rules. APIs can be driven by data.

Answers

Application programming interfaces (APIs) help programmers solve problems, help to find the target audience, and are driven by data.

What are APIs?

APIs are the application programming interfaces that provide the access to program data and information found in the databases. They are used to help in setting the link between the new devices and between the device and humans.

APIs allow the interaction of the two applications and act as the messenger. They allow the sharing of the application data to a third party within the company.

Learn more about APIs here:

https://brainly.com/question/4140629

#SPJ1

It was brought to Dennis's attention that some of his employees' e-mail practices were unethical. Read the scenarios described below and identify the unethical practices.


Darlene sends a memo to all employees outlining the new procedure for tracking inventory in the database.

Luke sends out an e-mail to co-workers asking them to sponsor him in a walkathon next month.

Nancy sends the latest computer jokes out to all the company's employees to brighten their day.

Bob forwards a customer inquiry to the sales representative assigned to the account.

Answers

Answer:

Answer: B (Luke sends out an e-mail to co-workers asking them to sponsor him in a walkathon next month.)

Explanation:

The answer would be B, if you can add multiple then C could also fall under the unethical catoagory.

Which of the following are true statements about the Java wrapper classes (Select all that apply.): Select one or more: a. Objects of these type are immutable b. Objects of these types are mutable c. The wrapper classes do not have no-arg constructors d. The wrapper classes do have no-arg constructors

Answers

Answer:

a. Objects of these type are immutable.

Explanation:

Java wrapper classes are used to convert data into objects. The primitive data is not object and it does not belong to any class. Therefore Java wrapper classes help the user to convert primitive data into object. These objects are immutable and they have no arg constructor.

smart tv has _____ intergrated with it

Answers

Answer:

an operating system

Explanation:

pedro has written a program in high level language to do some calculations for a friend

Answers

Answer:

That's great! Programming is a useful skill, and it's always great to help out friends. What kind of calculations is Pedro's program doing?

HeLp PleASeeee
Lyla is using a computer repair simulator. This program can help her

determine the best brand of computer
find the fastest processor
identify the best operating system
learn the different types of hardware

Answers

Answer:   A

Explanation:   Determine the best brand of computer find the fastest processor

Some scientists have reported manipulating the experimental data used for computer simulations to get the desired results and then used these results to publish research papers in academic journals. Based on ethical and moral topics you have studied in this unit, what can be some of the reasons behind such practices.
How can such practices be discouraged to protect the integrity of computer simulations and academic research?

Answers

To discourage such practices and protect the integrity of computer simulations and academic research, it is essential to foster a culture of research integrity, promote transparency and accountability, and enforce rigorous ethical guidelines.

The manipulation of experimental data for desired results in computer simulations and subsequent publication in academic journals goes against the principles of research integrity. Some scientists may engage in such practices due to various reasons. Pressure to produce positive results and publish groundbreaking findings can create a culture where researchers may feel compelled to manipulate data to meet expectations. Career advancement motives, such as securing grants, promotions, or tenure, can also drive unethical behavior. Additionally, the desire for recognition and funding may tempt researchers to manipulate data to support their hypotheses or secure funding opportunities.

To discourage such practices and protect the integrity of computer simulations and academic research, several measures can be implemented. First and foremost, there should be a strong emphasis on fostering a culture of research integrity within the scientific community. This includes promoting ethical conduct, honesty, and transparency in research practices. Education and training programs on research ethics can help raise awareness and provide researchers with the necessary knowledge and skills to conduct ethical research.

Clear policies and procedures should be established for data collection, analysis, and reporting. This includes ensuring proper documentation, adhering to standardized protocols, and maintaining data integrity. Peer review processes play a crucial role in evaluating the validity and reliability of research findings. Strengthening the peer review system by involving qualified experts and implementing rigorous evaluation criteria can help identify and prevent the publication of manipulated or fraudulent research.

Learn more about simulations here : brainly.com/question/2166921

#SPJ11

What can you use on the Internet to look for information?

Answers

Answer:

I use Wikipedia to know anything

It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.

Answers

Answer:

A. after you've created the presentation.

Explanation:

A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.

Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.

Can someone help me please and thank u

Can someone help me please and thank u

Answers

I believe the answer is c

Answer:

I think its C but don't quote me on it, it can also be A.

Explanation:

Immunization is important because it can show if you are vulnerable to diseases and illnesses.

Hope it helps

(Also you have very nice handwriting!)

create a parameter query where the user will enter a value to use as the criterion

Answers

Click in the Criteria row in the InsuranceType column and type [Enter Insurance Type]. Click the Run button. Type dental when prompted. Click OK.

Fred has asked a shipping company if they could deliver the goods of another company on a certain date. Which factor of transportation is he
concerned about?
O A. cost
OB. reliability
O C. transit
O D. safety
O E. maintenance

Answers

A. Because if he is asking a shipping company to deliver goods from another company on a certain date, it would most likely cost more than from the actual company.
I think he might be concerned about the reliability of the other company.

Remove elements 2, 4, and 6 from row array pending Tasks. function pending Tasks = Remove Tasks(pending Tasks) % pending Tasks: Array of tasks ids %Remove element 2, 4, and 6 from pending Tasks pending Tasks = 0; end Code to call your function when you click Run Remove Tasks ([1, 2, 3, 4, 5, 6, 7, 8, 9, 10])

Answers

The code is mentioned below.

What is array ?

An array is a data structure in programming that stores a collection of values of the same data type. Arrays are used to group together related pieces of data so that they can be easily manipulated and processed as a unit.

In most programming languages, arrays are indexed, meaning that each element in the array is assigned a unique numeric identifier called an index. The first element in the array is typically assigned an index of 0, the second element an index of 1, and so on.

Arrays can be one-dimensional, meaning they consist of a single row or column of elements, or they can be multi-dimensional, consisting of two or more rows and columns of elements.

Arrays are a fundamental data structure in computer programming and are used in a wide variety of applications, including data processing, graphics rendering, and scientific computing.

The code to remove elements 2, 4, and 6 from a row array “pending Tasks” would be:

function pendingTasks = RemoveTasks(pendingTasks) % pendingTasks: Array of task ids % Remove elements 2, 4, and 6 from pendingTasks pendingTasks([2, 4, 6]) = []; end

To call the function with the input array [1, 2, 3, 4, 5, 6, 7, 8, 9, 10], you would use the following code:

pendingTasks = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]; pendingTasks = RemoveTasks(pendingTasks);

After running this code, the variable “pendingTasks” will contain the row array with elements 2, 4, and 6 removed

To know more about function visit:

https://brainly.com/question/2664495

#SPJ1

You have been hired to develop the website for a popular speaker. He has asked that you include the PowerPoint slides from his last major presentation on his website. However, you know that most users won’t download PowerPoint slides. What method would you suggest for including the slides on the website?

Answers

The method would you suggest for including the slides on the website are:

First one need to Download WOWSlider and then register for it.Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.Then Export your slider.You also need to add the slider to your own webpage.

What are the different ways of creating slides?

PowerPoint are known to be one that gives about different ways to create a presentation.

One can use Blank presentation, one can also used  other Design Template and also From AutoContent Wizard.

Note that in the case above, The method would you suggest for including the slides on the website are:

First one need to Download WOWSlider and then register for it.Then one can make your slider. You need to have some images ready to add to the slideshow that you want to make.Then Export your slider.You also need to add the slider to your own webpage.

Learn more about slides from

https://brainly.com/question/24653274

#SPJ1

TCP/IP standards are set at the ________.
A) physical layer
B) transport layer
C) both A and B
D) neither A nor B

Answers

TCP/IP standards are set by the Internet Engineering Task Force (IETF)

The IETF is an open standards organization responsible for developing and promoting the standards and protocols used on the Internet, including TCP/IP. It is composed of volunteers from around the world, including engineers, researchers, and other interested individuals who collaborate to define and refine the specifications of Internet protocols. The IETF follows a process of consensus-driven decision.

learn more about :- TCP/IP standards here

https://brainly.com/question/27742993

#SPJ11

In JAVA Please and comments included
Implement Depth First Search (DFS) using a stack. The depth-first search (dfs) algorithm described in Listing 28.8 uses recursion. Design a new algorithm without using recursion. First, describe it using pseudocode and copy that pseudocode into the assignment submittal. Next, implement it by defining a new class named UnweightedGraphWithNonrecursiveDFS that extends UnweightedGraph (shown in Listing 28.4) and overrides the [Depth First Search] dfs method.
NOTE: when you review AbstractGraph.java Listing 28.3 you will notice that there are two dfs methods (page 1031). You need to override the method dfs(int v), (line 164, page 1031) not the other one with the longer list of parameters.

Answers

Using the knowledge in computational language in python it is possible to write a code that design a new algorithm without using recursion.

Writting the code:

# DFS algorithm

def dfs(graph, start, visited=None):

if visited is None:

visited = set()

visited.add(start)

print(start)

for next in graph[start] - visited:

dfs(graph, next, visited)

return visited

graph = {'0': set(['1', '2']),

'1': set(['0', '3', '4']),

'2': set(['0']),

'3': set(['1']),

'4': set(['2', '3'])}

dfs(graph, '0')

What is Microsoft Graph Explorer?

Graph Explorer is a developer tool that lets you learn about Microsoft Graph APIs. Use Graph Explorer to try the APIs on the default sample tenant to explore capabilities, or sign in to your own tenant and use it as a prototyping tool to fulfill your app scenarios

See more about JAVA at brainly.com/question/18502436

#SPJ1

In JAVA Please and comments includedImplement Depth First Search (DFS) using a stack. The depth-first

What is the excel formula to fill cell below with cell above until value changes?

Answers

To fill a cell below with the cell above's value until the value changes in Excel, you can use the IF function.

The IF function can be used in combination with the ROW and INDEX functions.

1. Assuming your data starts in cell A1, go to cell A2 and enter the formula:
`=IF(A1="",IF(ROW(A1)=MIN(INDEX(ROW($A$1:A1)*(($A$1:A1)<>"")+ROW($A$1:A1)*0,)),A1,A2),"")`
2. Press Enter to complete the formula.
3. Now, copy the formula down the column by clicking on the bottom right corner of cell A2 and dragging it down until the desired range is covered.

This formula will fill the cell below with the value of the cell above until a new value is encountered. If a new value is found, the formula will display that new value and continue the process.

To know more about Excel formulas visit: https://brainly.com/question/29280920

#SPJ11

Sorry to bother you guys but for some reason it wont let me comment. How can i fix this?

Answers

Explanation:

I would just say close the app and come back in after

Answer:

refresh it or go out and go back in if that dosnt work you can

always restart whatever you use to get on :P

Explanation:

URGENT!! Will give brainiest :)

How is abstraction achieved?

A. By displaying only the most complex computing details to the
user

B. By hiding unnecessary computing details from the user

C. By providing the user with unlimited access to computing details

D. By deleting any unnecessary computing details from the device

URGENT!! Will give brainiest :) How is abstraction achieved?A. By displaying only the most complex computing

Answers

The correct answer is B.

Abstraction is achieved by hiding unnecessary computing details from the user. Abstraction is a technique used in computer science to manage complexity and make systems easier to use and understand. It involves hiding complex implementation details and exposing only the essential features and functionalities to the user. By doing so, abstraction provides a simplified view of a system, making it easier to use and understand without having to worry about the complex details underneath.

Answer:

Option B

Explanation:

The correct answer is B. Abstraction is achieved by hiding unnecessary computing details from the user. Abstraction is a key concept in computer science that involves simplifying complex systems to make them more manageable and easier to use. In the context of programming, abstraction is achieved by hiding the underlying complexity of a system from the user and providing them with a simplified interface or set of tools that they can use to interact with the system. This allows users to focus on the high-level functionality of a system without needing to understand the low-level details of how it works. By hiding unnecessary computing details, abstraction makes it easier to write, read, and maintain complex programs, and is essential for the development of large-scale software systems.

\(\huge{\colorbox{black}{\textcolor{lime}{\textsf{\textbf{I\:hope\:this\:helps\:!}}}}}\)

\(\begin{align}\colorbox{black}{\textcolor{white}{\underline{\underline{\sf{Please\: mark\: as\: brillinest !}}}}}\end{align}\)

\(\textcolor{blue}{\small\textit{If you have any further questions, feel free to ask!}}\)

\({\bigstar{\underline{\boxed{\sf{\textbf{\color{red}{Sumit\:Roy}}}}}}}\\\)

Calculate the Branch-CPI-Penalty for a system like the one in Lesson 14, Slide 21, whose buffer hit rate = 0.88 and whose prediction accuracy for entries in the buffer = 0.91. Assume the probability of a branch not in BTB being taken = 0.59. Round your answer to three decimal places.

Answers

Based on the information, the Branch-CPI-Penalty for the given system is approximately 0.5716.

How to calculate the value

Given the prediction accuracy for entries in the buffer (P1 = 0.91), we can calculate the branch misprediction penalty using the formula:

Branch-Misprediction-Penalty = 1 - P1

Branch-Misprediction-Penalty = 1 - 0.91

= 0.09

Given the buffer hit rate (P2 = 0.88) and the probability of a branch not in BTB being taken (P3 = 0.59), we can calculate the BTB miss penalty using the formula:

BTB-Miss-Penalty = 1 - (P2 * P3)

BTB-Miss-Penalty = 1 - (0.88 * 0.59)

= 1 - 0.5184

= 0.4816

Branch-CPI-Penalty = Branch-Misprediction-Penalty + BTB-Miss-Penalty

= 0.09 + 0.4816

= 0.5716

Therefore, the Branch-CPI-Penalty for the given system is approximately 0.5716.

Learn more about system on

https://brainly.com/question/28561733

#SPJ4

WAP to input principle amount, number of year and rate of interest from user and calculate the simple interest.
#include<stdio.h>
#include<conio.h>
void main()
{
float p,r,t,SI;
printf ("enter the principle:");
scanf ("%f", &principle amount);
printf ("enter the rate of interest per anum:");
scanf ("%f", &rate);
printf (enter the time period of interest in years :");
scanf ("%f", &time);
si =(p×r×t)/100;
printf ("simple intesrest:%f",SI);
getch();
}

}​

Answers

Answer:

Explanation:

jnmmnm

Company B is setting up commercial printing services on their network. Which of these are advantages of centrally managed commercial printers? Check all that apply.

Answers

Answer:

Centralized management of printing activities, allowing administrators to manage all print devices using a network.

Explanation:

The advantages of centrally managed commercial printers are:

Printers can be easily created and deployed in virtual sessions such as Citrix or VMwareCentralized management of printing activities, allowing administrators to manage all print devices using a network.Reduces the number of printer related issues thereby increasing productivity.It provides a way of keeping record those who are printing and what have been printerAll print related jobs can be easily managed from a central controlled network.Increased security as a print server allows you to total control over who can print what and where High availability and redundancy due to pooling of printers Easily customize printer profile

this website is using a security service to protect itself from online attacks.

Answers

Answer:

yes it has an ssl certificate making it impossible to hack

Write an algorithim and flowchart to check it the temperature is more than 25°. If it more than 25°C switch fan on else off.​

Answers

Answer:

write the sly flowchart

Explanation:

#stdlib.etc

main()
{

    int temp;
    bool fan = false;

    print("enter the frigin temperature: ");

    read(temp);

    if (temp > 25)

     {
         fan = true;
         print("the fan is on");
     }
     else
      {

           print("the fan is off");

      }

      return 0;

}

A data ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of the business.

Answers

Answer:

Data mart

Explanation:

Other Questions
What is a major factor in the decline of some occupations, such as those in the textiles and clothing industries?A) shifting consumer tastesB) overseas labor costsC) changing technologiesD) aging populationsI think it's C but I don't know On April 13, 2029 (Friday the 13th!), the asteroid 99942 mi Apophis will pass within 18600 mi of the earth-about 1/13 the distance to the moon! It has a density of 2600 kg/m^3, can be modeled as a sphere 320 m in diameter, and will be traveling at 12.6 km/s. 1)If, due to a small disturbance in its orbit, the asteroid were to hit the earth, how much kinetic energy would it deliver? 2)The largest nuclear bomb ever tested by the United States was the "Castle/Bravo" bomb, having a yield of 15 megatons of TNT. (A megaton of TNT releases 4.184x10^15 J of energy.) How many Castle/Bravo bombs would be equivalent to the energy of Apophis? The residential smoke detector. Residential smoke detectors use a simple ionization chamber, open to the air, and a small radioactive pellet that ionizes the air inside the chamber at a constant rate. The source is americum-241 (Am-241), which produces mostly heavy particles (these are easily absorbed in air and can only propagate about 3 cm ). Smoke detectors contain approximately 0.3g of Am-241. The activity of Am241 is 3.710 4Bq and the ionization energy of the particles it emits is 5.48610 6eV. a. Assuming the efficiency is 100%, calculate the ionization current that will flow in the chamber if the potential across the chamber is high enough to attract all charges without recombination. b. If the smoke detector circuit is fed by a 9 V battery with a capacity of 950mAh and the electronic circuits consume an average of 50A in addition Each of these are factors considered when establishing a fair wage for a specific career:job responsibilityrequired experiencevacationadverse working conditions Who is tallest Sam 35 5/6Jesse 35 3/8Ellis 35 1/4Elsa 35.1Jonah 35.7 What is matter? help mee What is the wall height for H?? Mountain Range given with the function: f(x,y)=cosxsinx+siny a.) Plot the function. b.) Plot the contour map along with gradient vector field. c.) Compute the gradient at (,). What does the result mean 3/4(6x + 2) = 15Help me please Consider the function $f(x)=5 x-8$ and find the following:a) The average rate of change between the points $(-1, f(-1))$ and $(3, f(3))$.b) The average rate of change between the points $(a, f(a))$ and $(b, f(b))$. pls help!!! i dont know how to do this . The base of the pyramid is a square of side 12cm.The height of the pyramid is 8cm.X is the midpoint of QR and XT = 10cm.A) Draw the front elevation of the pyramid from the direction of the arrow. Use a scale of 1 square to 1cm.B) Work out the total surface area of the pyramid. change 27 km 280m into metre Mm, mm, mm, mm, mm, mm, uhI can't breathe (Chopsquad), I can't breathe, 999Waiting for the exhaleI toss my pain with my wishes in a wishing wellI can't breathe, I'm waiting for the exhaleToss my pain with my wishes in a wishing wellStill no luck, but oh, wellI still try even though I know I'm gon' failStress on my shoulders like a anvilPerky got me itching like a ant-hillDrugs killing me softly, Lauryn HillSometimes I don't know how to feelRing-ring, phone call from depressionYou used my past and my memories as a weaponOn the other line, I talk to addiction, huhSpeakin' of the devil, all the drugs, I miss themThis can't be real, is it fiction?Somethin' feels broke, need to fix itI cry out for help, do they listen?I'ma be alone until it's finishedThis is the part where I tell you I'm fine, but I'm lyingI just don't want you to worryThis is the part where I take all my feelings and hide 'em'Cause I don't want nobody to hurt meI can't breathe, I'm waiting for the exhaleToss my pain with my wishes in a wishing wellStill no luck, but oh, wellI still try even though I know I'm gon' failStress on my shoulders like a anvilPerky got me itching like a ant-hillDrugs killing me softly, Lauryn HillSometimes I don't know how to feelSometimes I don't know how to feelLet's be for realIf it wasn't for the pills, I wouldn't be hereBut if I keep taking these pills, I won't be here, yeahI just told y'all my secret, yeahIt's tearing me to piecesI really think I need themI stopped taking the drugs and now the drugs take meThis is the part where I tell you I'm fine, but I'm lyingI just don't want you to worryThis is the part where I take all my feelings and hide 'em'Cause I don't want nobody to hurt meI can't breathe, I'm waiting for the exhaleToss my pain with my wishes in a wishing wellStill no luck, but oh, wellI still try even though I know I'm gon' failStress on my shoulders like a anvilPerky got me itching like a ant-hillDrugs killing me softly, Lauryn HillSometimes I don't know how to feel find the gradient and y intercept of a)y+x+5=0 Suppose a 1,500 kg speedboat is traveling with a velocity of 13 m/s. what is the speedboats momentum? 115 kg meters per second 1,513 kg meters per second 19,500 kg meters per second If 6 electrons are available to fill five empty 6d atomic orbitals, how will the electrons be distributed in the five orbitals?one electron in each orbitaltwo electrons in 3 orbitals and none in the other 2two electrons in one orbital and one electron in the other foursix electrons cannot fill five empty 6d atomic orbitals Which expression correctly represents the perimeter of a rectangle that is 12 centimeters long and 7 centimeters wide? THE ANSWER!!! Please please help me with this problem