Convert to hexadecimal and then to binary in 16-bit format (5
point)
456.89(10)

Answers

Answer 1

The decimal number 456.89 can be converted to hexadecimal and then to binary in a 16-bit format.

To convert the decimal number to hexadecimal, we divide the integer part of the number by 16 repeatedly until the quotient becomes zero. The remainders at each step will give us the hexadecimal digits. For the fractional part, we multiply it by 16 repeatedly until we get the desired precision.

The conversion of 456 to hexadecimal is 1C8, and the conversion of 0.89 to hexadecimal is E3.

To convert the hexadecimal number to binary, we convert each hexadecimal digit to its corresponding 4-bit binary representation. Therefore, 1C8 in hexadecimal becomes 0001 1100 1000 in binary, and E3 becomes 1110 0011.

Thus, the decimal number 456.89 in a 16-bit binary format is 0001 1100 1000 . 1110 0011.

Learn more about hexadecimal number here: brainly.com/question/13605427

#SPJ11


Related Questions

explain why a left-most derivation of any string in the language defined by g is also a right-most derivation.

Answers

A left-most derivation of any string in the language defined by grammar G is also a right-most derivation because both derivations ultimately generate the same parse tree.

Here's a step-by-step explanation:
1. Both left-most and right-most derivations begin with the start symbol of the grammar G.
2. In a left-most derivation, we repeatedly replace the left-most non-terminal in the current string with one of its production rules until we obtain a string containing only terminal symbols.
3. In a right-most derivation, we follow a similar process, but we replace the right-most non-terminal instead.
4. Even though the order of applying production rules may be different, the same parse tree is formed for a given string in the language.
5. This is because the parse tree represents the hierarchical structure of the string according to the grammar G, which is independent of the order in which the production rules are applied.
6. Since both left-most and right-most derivations generate the same parse tree for any string in the language defined by G, we can conclude that a left-most derivation of any string is also a right-most derivation.

Learn more about parse tree visit:

https://brainly.com/question/30908313

#SPJ11

An example of documentary evidence that might be presented at trial for a cyber crime is:


A. None of these choices.

B. data retrieved from slack space on a hard drive.

C. a cellular telephone.

D. a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses.

Answers

It’s d cause it has valuable info that the person was using to commit the crime

An example of documentary evidence that might be presented at trial for cybercrime is a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses. Thus, option D is correct.

 

What is the evidence?

Evidence is really the data used to attempt to support anything in a court of justice. Evidence is gathered from people, artifacts, and records. The only means through which the court may draw conclusions and reach a ruling is via the use of evidence.

According to the definition of information, it is the demonstration of any claim to be true. A hard copy of a hacker's worksheet with contact information and e-mail accounts is an illustration of documented evidence that might be used in court to prove a cybercrime. Therefore, option D is the correct option.

Learn more about evidence, here:

https://brainly.com/question/14370298

#SPJ2

1. Provide two examples of opportunities or problems that are likely to trigger the need for an information system project.
2. Thoroughly discuss the pros and cons of buying versus building software

Answers

The two examples of opportunities or problems that are likely to trigger the need for an information system project are Increase in demand and Cost-cutting measures. The pros of buying software is quick implementation and cons is Expensive. Pros of building software is Customized solution and cons is High initial investment.

1.

There are a number of problems or opportunities that can lead to the need for an information system project. Two of these examples are listed below:

Increase in demand: If a company is experiencing a sudden increase in demand for its products or services, it may need to invest in a new information system to handle the added workload.Cost-cutting measures: An information system project may be initiated by a company looking to reduce costs by streamlining operations. For example, if a company is still relying on paper-based records, it may switch to an electronic system to save time and money.

2.

Discussing the pros and cons of buying versus building softwareSoftware is an essential component of most information systems. There are a few ways to acquire software, including buying it from a vendor or building it from scratch.

Here are some of the pros and cons of each option:

Buying Software

Pros:

Quick implementation: Purchasing software from a vendor can be a faster way to get a new system up and running than building it from scratch.Off-the-shelf solutions: Many software vendors offer pre-built solutions that can be customized to fit the specific needs of a business, saving time and resources.

Cons:

Expensive: Buying software can be costly, especially if the company requires customization and licensing for multiple users.Dependency on vendors: Companies that purchase software from vendors can become reliant on them for technical support, upgrades, and maintenance.

Building Software

Pros:

Customized solution: Building software from scratch allows a company to tailor the system to its exact specifications and requirements.Control over the code: When a company builds its own software, it has complete control over the source code, which can be valuable for troubleshooting and customization.

Cons:

High initial investment: Building software from scratch can be expensive, requiring a large investment in time and resources.Limited expertise: Companies that are not experienced in software development may face challenges in building and maintaining their own systems.

To learn more about information system: https://brainly.com/question/14688347

#SPJ11

Web are websites that allow people to congregate online and exchange views on topics of common interest.

a. True

b. False

Answers

Answer:

B

Explanation:

B. False a web is not a Website

Main function of Ubuntu

Answers

Answer:

Ubuntu includes thousands of pieces of software, starting with the Linux kernel version 5.4 and GNOME 3.28, and covering every standard desktop application from word processing and spreadsheet applications to internet access applications, web server software, email software, programming languages and tools

Explanation:

Answer:

Explanation:

It is a free OS

you have transferred an encrypted file across a network using the server message block (smb) protocol. what happens to the file's encryption?

Answers

Answer:

The encryption of the file should not be affected by transferring it across a network using the Server Message Block (SMB) protocol.

Explanation:

SMB is a network protocol that allows clients to access shared resources on a server. It is primarily used for file and printer sharing, and it does not modify the content of the files being transferred. Therefore, transferring an encrypted file using SMB should not change the encryption of the file.

However, it is important to ensure that the file is transferred securely to prevent unauthorized access to the file during the transfer. This can be done by using a secure version of the SMB protocol, such as SMB 3.0 with encryption enabled, or by using a secure transport layer such as Transport Layer Security (TLS) or Secure Sockets Layer (SSL).

I hope this helps! Let me know if you have any questions.

Could someone plz help me I’m stuck?

Could someone plz help me Im stuck?

Answers

Answer:

Answer is take time to plan and organize

Explanation:

When computer code encounters the word “if,” what does it do?

Answers

Answer:

It looks at the condition of the if() statement and determine whether the code inside its block should be run or not.

If the condition is true, run the code,

otherwise, skip that part of the code and continue.

Your _______ can help block inappropriate content online.
1. web browser
2. Password

Answers

Answer:

web browser.

Explanation:

yea let me go post my password to block content (sarcasm)

State whether the given statement is True/False. Arguments are the input values to functions upon which calculations are performed.

Answers

false i think just saying

Testing a website includes visiting every web page on the site and selecting every link, tab, and button available.

a. True
b. False

Answers

Answer:

Wouldn't it be false?

Explanation:

because what if the website doesn't allow some kinds of people on certain pages?

(If its wrong then sorry.)

Testing a website includes visiting every web page on the site and selecting every link, tab, and button available. The statement is true.

What do you mean by Link?

A link is a connection that joins pages on one website to pages on other websites. We wouldn't have any webpages without links.

A website is a collection of web pages and related content that is published on at least one web server and given a common domain name.

The World Wide Web is the collective name for all publicly accessible websites. A company's internal website for its employees is an example of a private website that can only be accessed via a private network.

Most websites focus on a single subject or objective, such as news, education, business, entertainment, or social networking. The navigation of the website, which frequently begins with a home page, is aided by hyperlinks between web pages.

Therefore, The statement "Testing a website includes visiting every web page on the site and selecting every link, tab, and button available." is true.

Learn more about Link, here;

https://brainly.com/question/28938650

#SPJ5

how do i get virus off my pc

Answers

Answer:

1. dont get a virus in the first place

2. call a computer company, dont try to get it off by yourself, itll make it SIGNIFICANTLY worse

Answer:

go to the page where you can uninstall programs on task manager and look for the file name (the file and virus should have the same name) than right click on it and press uninstall than do the uninstallation process and restart you device

Explanation:

Write a pseudocode algorithm that uses the For Each loop to display all of the
values in the following array:
Constant Integer SIZE = 10
Declare Integer values[SIZE] = 1, 2, 3, 4, 5, 6, 7, 8, 9, 10

Answers

so i’m not sure it’s making me answer a question

Here is a pseudocode algorithm that uses the For Each loop to display all of the values in the given array:

```

declare a constant integer named SIZE and set its value to 10

declare an integer array named values with SIZE elements and initialize it with the values 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10

for each integer value in values do

display the value

end for

```

This algorithm first declares a constant integer `SIZE` and an integer array `values` with `SIZE` elements, initialized with the given values. It then uses a For Each loop to iterate through each value in the `values` array and display it. The loop will execute 10 times, once for each element in the `values` array.

how are storage devices typically assigned to only a single cluster on the network?

Answers

Storage devices are typically assigned to a single cluster on the network by using a unique identifier called the World Wide Name (WWN).

What is the unique identifier used to assign storage devices to a single cluster on the network?

Storage devices are often used in clustered environments to provide high availability and fault tolerance. In such environments, it is important that each storage device is assigned to only one cluster to avoid conflicts and ensure proper resource allocation. This is achieved by using a unique identifier called the World Wide Name (WWN), which is assigned to each storage device by the manufacturer.

The WWN is a 64-bit address that is guaranteed to be globally unique and is used to identify the storage device on the network. When a storage device is connected to a cluster, the WWN is used to ensure that the device is assigned to the correct cluster and is not accessible to any other cluster on the network.

Learn more about Storage devices

brainly.com/question/14456295

#SPJ11

Which design element involves the act of lining up objects vertically or horizontally to give a sense of order?

Answers

Answer:

The answer is "Alignment".

Explanation:

The Alignment was its positioning of visual elements, such that they're coordinate together with such a structure. This is a layout concept that refers to words or pictures lining up with one page. They use coordination in the layout to coordinate entities, a system similar, equilibrium, framework formation, the connection among aspects, and clear and clear result.

Choose the option that best matches the description given. The older term, social service, referred to advancing human welfare. The new term, meaning to provide for the needs of various people and groups, is ____.
A. social assistance
B.social welfare
C.social media
For everyone that doesn't wanna watch the ads, The answer is A, social assistance.

Answers

Answer:

Social Assistance

Explanation:

Provision and disbursement of intervention in other to palliate the suffering and want of an individual, group or community can be described as rendering social assistance. Assistance which also means helping people fulfill their needs could be offered by the government, non-governmental organizations or individuals personnels. Rendering social assistance could be in the form of cash or gift offerings, provision of food for the hungry, shelter for the homeless, medical interventions for the sick and catering for other touch points of the needy.

Answer:

Social Assistance

Explanation:

An eighteen square feet of paper will be used to create a poster with top and bottom margins of 9 inches each, and the margins at the sides are 6 inches each. What should be the dimensions of the paper to maximize the printed area.

Answers

The  dimensions of the paper to maximize the printed area is 18 square feet.

What is the dimensions  about?

To maximize the printed area on the paper, A person should use the full width of the paper and minimize the top and bottom margins. This will allow you to use the maximum available height of the paper for the printed area.

The dimensions of the paper should be such that the width is equal to the sum of the left and right margins, and the height is equal to the sum of the top and bottom margins.

Since the top and bottom margins are each 9 inches, and the left and right margins are each 6 inches, the dimensions of the paper should be 12 inches in width and 18 inches in height. This will allow for a total printed area of 18 square feet, which is the maximum possible given the constraints of the top and bottom margins.

Learn more about dimensions  from

https://brainly.com/question/27404871

#SPJ1

"
Assume you are creating a database. Four entities are
identified: buyer, seller, agent, and house. Suppose each buyer can
make an appointment with a seller to see a house at a certain
time

Answers

In the database, four entities are identified: buyer, seller, agent, and house. The system allows buyers to schedule appointments with sellers to view houses at specific times.

To create a database for managing interactions between buyers, sellers, agents, and houses, we can design a system that facilitates the scheduling of appointments for house viewings. The entities in the database include the buyer, seller, agent, and house, each with their respective attributes and relationships.

The buyer entity would have information such as name, contact details, and preferences for the type of house they are interested in. The seller entity would contain details about the property being sold, including its address, price, and any additional information. The agent entity would represent the intermediary facilitating the transactions, with attributes like their name, contact information, and agency affiliation.

The house entity would store information specific to each property, such as its address, size, number of bedrooms, and any other relevant details. Additionally, the house entity would include a field to indicate its availability for viewings.

To enable buyers to schedule appointments with sellers, the database could have a relationship between the buyer and seller entities, allowing the buyer to request a viewing for a particular house. This relationship could include attributes like the requested time and date for the viewing.

With this structure in place, the database could provide functionality for buyers to browse available houses, select a property of interest, and request an appointment at a convenient time. The system would then manage the scheduling process, ensuring that there are no conflicts in appointment times for a given house and notifying the relevant parties about the confirmed viewing arrangements.

Overall, the database would support the coordination of appointments between buyers and sellers, streamlining the process of house viewings and facilitating efficient communication between the involved entities.

Learn more about database here:

https://brainly.com/question/31214850

#SPJ11

6. Python indexes lists beginning with the number 1.
True

False

Answers

Answer:

True

Explanation:

Python is like coding

plzzz help i need this today :(

plzzz help i need this today :(

Answers

Answer:

C

Explanation:

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

TRUE/FALSE. in an idps, a sensor is a piece of software that resides on a system and reports back to a management server.

Answers

True. In an Intrusion Detection and Prevention System (IDPS), a sensor is a component that can be either hardware or software.

In the context of your question, a sensor refers to a software component that resides on a system and is responsible for monitoring and collecting security-related events and activities. It then reports the gathered information back to a management server for analysis and further actions. The sensor plays a crucial role in detecting and alerting potential intrusions or suspicious activities within a network or system The sensor detects and captures security-related events and sends them to a central management server for analysis and response.

learn more about :-management server here:

https://brainly.com/question/30608960

#SPJ11

help me and i'll mark brainliest

help me and i'll mark brainliest

Answers

Answer: Help you with what

Explanation: This is so random lol but i guess im getting brain points or sum like that

5. Thinking Critically The relationship between science and technology is often
called a "chicken and egg argument" (Which one came first, the chicken or the
eg97). Explain how science and technology are like the chicken and the egg.​

Answers

Answer:

it's a code arguement or its a lie

Explanation:

If your talking then code Then That means it's a code arugument

If your talking about science then The chicken and the egg argument is a lie or speccificalley the egg, well First, let's get the scientific answer out of the way. That answer is also true—the egg comes first—when you narrow it down to chickens and the specific it was weren't too convinced, with one of them calling the question “fun but pointless.

When computers sort data, they always use ____ values when making comparisons between values. group of answer choices numeric alphanumeric alphabetic ascending flag question: question 5

Answers

When computers sort data, they always use numeric values when making comparisons between values.

What is data sorting?

Data sorting is a process of data cleaning and it is done to have a good data. It involves arranging data in order of preference to give meaning. This is to understand the data and to help in good analysis.

It also help data scientist to deign a goods model of analysis for the data. Data can be sorted based on attached values or number or percentages.

Therefore, When computers sort data, they always use numeric values when making comparisons between values.

Learn more on data sorting below

https://brainly.com/question/584814

#SPJ1

what is the function to retrieve the letter grade stored in the second column of the gradescale table using a lookup value of 83 in a approximate match lookup?

Answers

Spreadsheets employ logical functions to determine if a given circumstance is true or false. You can then choose to take one action or another based on the outcome of that test.

What is the role letter grade stored in the second column?

For fields with numeric values that you add to your pivot table, the Sum function is utilized by default.

However, here's how to select a different summary function: Right-click the value field in the pivot table that needs to be changed, and then select Summarize Values By. To use the summary feature, click it.

Therefore, These selections may be used to show data, carry out more calculations, or run additional tests.

Learn more about letter grade here:

https://brainly.com/question/18544964

#SPJ1

Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security

Answers

it’s exercise tax $5 tax on a cable television line

hope this helped

~ mo

Capital gains tax - 10% profits from sale of the house

Consumption tax - 6% tax on all sales

Excise tax - 5$ tax on cable tv line

Payroll tax - 15% tax to pay for social security

A for statement usually contains three expressions: initialization, test, and __________________. Group of answer choices relational expression summation declaration update answer

Answers

A for statement usually contains three expressions: initialization, test, and update. The three expressions in a for statement, namely initialization, test, and update, work together to define the loop's behavior and control its execution.

In the syntax of a for statement, there are typically three expressions separated by semicolons. These expressions serve different purposes in controlling the execution of the loop:

Initialization: This expression is executed before the loop starts and is used to initialize any variables or set up the initial conditions required for the loop.

Test: Also known as the condition or relational expression, this expression is evaluated at the beginning of each iteration of the loop. If the test evaluates to true, the loop continues executing. If it evaluates to false, the loop terminates, and control passes to the next statement after the loop.

Update: This expression is executed at the end of each iteration of the loop. It is typically used to update the loop control variable or perform any necessary changes to the loop state for the next iteration.

Together, these three expressions control the flow and behavior of the for loop, ensuring that the loop executes for a specified number of times or until a certain condition is met.

Understanding and properly configuring these expressions is essential for designing effective loops in programming.

To learn more about loop, visit

brainly.com/question/26568485

#SPJ11

how do I write a python function that takes a list and returns a new list with unique elements from the first list?

Answers

Answer:

Explanation:

The following Python program is a function that takes in a list as a parameter. It then uses the built-in dict class in Python to turn the input list into a dictionary and we call the fromkeys() method to remove all duplicate values. Then we turn the dictionary back into a list and save it into the variable called uniqueList. Finally, we return uniqueList back to the user. A test case has been created and the output can be seen in the attached image below.

def removeDuplicates(inputList):

   uniqueList = list(dict.fromkeys(inputList))

   return uniqueList

how do I write a python function that takes a list and returns a new list with unique elements from the

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

Other Questions
Aerobic exercise uses enough oxygen for oxidative phosphorylation in the mitochondria of our muscles.Explain how the products of cellular respiration change as we push our bodies harder. How does this affect our ability to continue exercising? What are some examples of withdrawal symptoms (select all that apply)1.headache2.feeling relaxed3.muscle tension4.mood swings5.cravings Why might it be adaptive for stomata to occur mostly (if not entirely) on the underside of leaves ? What plants show the reverse pattern for which stomata are only on the upper leaf surface? Which factorization could represent the number of water bottles and weight of each water bottle? 1. The table below shows the distance of the cat and the mouse from the cat's starting point at given times. After 1 second how far is the mouset0.40.50.60.70.80.9Dmouse10.211.512.814.115.416.71819.3Dcat6.88.510.211.913.615.317118.71.11.21.31.4O A 17 feetO B. 18 feetO c 2 feetOD 3 feet Food and waste must enter and leave the body of the Cnidarian from the same opening. Explain why it would be disadvantageous, then, for a cnidarian to have a particularly long body WILL MARK BRAINLIEST a quadratic function is represented by the graphwhat is the equation of the axis of symmetry of the function?what are the coordinates of the vertex of the function what are the coordinates of the x-intercepts of the functionwhat are the coordinates of the y intercept of the function Choose the correct demonstrative word or phrase. _____ es la suya. aqulla esta esto aqul the price of a widget was $704. over eight years, the price dropped to $336. assume a linear trend. (a) find a linear model p a ______ refers to the portion of a webpage that a user sees at any one time, regardless of device, browser, screen size, screen resolution, window size, or orientation. Need 3 and 4 for those who are up to the task Suppose a balloon is filled with 5000 {cm}^{3}cm 3 of helium. It then loses one fourth of its helium each day. How much helium will be left in the balloon at the start of the tenth day how to use the writeusingnio method john walke supports government regulation as the most effective approach for reducing air pollution. which of the following statements expresses one of his reasons? the histogram shows the result of survey asking students how many windows are in their homes how mnay studengs have less than 10 windows. I will mark Brainly help as the price of computers fall the duqantity of computers demand increase. This is an application of At 6:00 a.m., the temperature was -3. Five hours later the temperature was 20 warmer. What was the temperature a11:00 a.m?17B23C-23D -17 Which of the following conditions must be met in order to make a statistical inference about a population based on a sample if the sample does not come from a normally distributed population?Mu greater-than-or-equal-to 30x Overbar greater-than-or-equal-to 30n greater-than-or-equal-to 30Upper N greater-than-or-equal-to 30 Background Information: Energy can not be created or destroyed. Stored energy is calledpotential energy, and the energy of motion is called kinetic energy. Due to gravity, potentialenergy changes as the height of an object changes, this is called gravitational potential energy.Objective: to determine the relationship between height and gravitational potential energy.Problem: How does the drop height (gravitational potential energy) of a ball affect the bounceheight (kinetic energy) of the ball?Hypothesis: If the gravitational potential energy (drop height) of a ball is increased, then thekinetic energy (bounce height) will (increase/decrease/remain the same) becauseVariables: Independent variable (known information) is Dependent variable (unknown information) is Constants (variables kept the same for accuracy) areMaterials: List all the materials used in this experiment.Procedure: Follow the steps below to conduct your experiment. Be sure to record all data andany observations during the experiment. Follow all safety rules.1. Tape the meter stick to the side of the lab table with the 0-cm end at the bottom and the 100-cm end at thetop. Be sure that the meter stick is resting flat on the floor and is standing straight up.2. Choose a ball type and record the ball type in the data table.3. Use the triple beam balance to determine the mass of the ball and record the balls mass in the data table.4. Calculate the gravitational potential energy (GPE) for the ball at each drop height. Record GPE in data table.a. GPE = ball mass x drop height5. For Trial 1, hold the ball at a height of 40 cm, drop the ball carefully and observe the bounce height. Recordthe bounce height in the data table.6. Drop the ball 4 more times from 40 cm, recording the bounce height each time, for a total of 5 drops.7. For Trial 2, repeat steps 5 and 6 but drop the ball from a height of 50 cm. Record the 5 bounce heights inthe data table.8. For Trial 3, drop the ball five times from 60 cm and record the 5 bounce heights in the data table.9. For Trial 4, drop the ball five times from 70 cm and record the 5 bounce heights in the data table.10. For Trial 5, drop the ball five times from 80 cm and record the 5 bounce heights in the data table.11. For Trial 6, drop the ball five times from 90 cm and record the 5 bounce heights in the data table.12. For Trial 7, drop the ball five times from 100 cm and record the 5 bounce heights in the data table.13. Repeat steps 2 through 12 for a different type of ball.14. Calculate the average bounce height of the 5 drops for each drop height. Record the average bounce heightin the data table. Calculate the average bounce height for all Trials.a. To calculate average: Add the 5 bounce heights for a trial then divide the total by 5 drops. Examplefor Trial 1: drop1 + drop2 + drop3 + drop4 +drop5 = total; total divided by 5 = average bounce height.i. Sample: Trial 1: 5+6+5+5+7 = 28 28/5 = 5.6 average bounce height.15. Plot the average bounce heights on a line graph. Place the independent variable of drop height on the x-axisand place the dependent variable of bounce height on the y-axis. Label the line with the ball type.16. CHALLENGE: Repeat all necessary steps for a third ball type and include this data on the graph.17. Answer discussion questions and write your lab summary. Data:Ball Type: Ball Mass (g) = .GravitationalPotential Energy(GPE)Bounce Height (cm)DropHeight (cm)GPE = mass x height Drop 1 Drop 2 Drop 3 Drop 4 Drop 5 AverageBounceHeight405060708090100Ball Type: Ball Mass (g) = .GravitationalPotential Energy(GPE)Bounce Height (cm)DropHeight (cm)GPE = mass x height Drop 1 Drop 2 Drop 3 Drop 4 Drop 5 AverageBounceHeight405060708090100Discussion Questions: Answer using complete sentences.1. Describe the relationship between drop height and the bounce height.Was the relationship the same for both ball types that you tested?2. Compare your gravitational potential energy to your bounce height for each trial. Describethe relationship between GPE and bounce height.3. Look at the results of both ball types you tested.a. Which ball type had the most gravitational potential energy?b. Which ball type has the most mass?c. Describe the relationship between mass and GPE.4. What are the variables that affect gravitational potential energy of an object?Conclusion: Write a conclusion, using complete sentences, that states the following: if yourhypothesis was supported or negated; and what the real answer to the problem is.Summary: Write a three paragraph summary using our standard format (1. what you were doingand why you were doing it, 2. what you learned while doing this experiment, and 3. how what youlearned relates to your life). a person carries a plank of wood 1.9 m long with one hand pushing down on it at one end with a force f1 and the other hand holding it up at 58 cm from the end of the plank with force f2. if the plank has a mass of 18 kg and its center of gravity is at the middle of the plank, what are the magnitudes of the forces f1 and f2? (the distance of 58 cm is measured from the location of f1.) f1