Due Monday April 25th at 5:05 PM.
This assignment is a continuation of Assignment 12. You will want to begin with your Assignment 12 code, or the code posted on the course website.
The original functionality of the program should remain the same: read data from a file, insert it into a binary search tree, allow the user to search by a key string (e.g. the name) and get back data associated with the key.
In addition to the original functionality, we want to add three new functionalities:
A function that visits every node and applies a function (passed into the visit() function as an argument) to the data of every node in the tree.
A function that visits every node and applies a function (passed into the visit() function as an argument) to the data of only the node with a specified key (e.g. name) in the tree. For example you could say tree.visitnamed(foo,"Bob") and have the function foo() applied to only the node with the key Bob.
A function that visits every node and applies a function (passed into the visit() function as an argument) to the data of only the node with a data element in the tree. For example you could say tree.visitonly(foo,"Cat") and have the function foo() applied to all the nodes with the substring "Cat" in their data.
Testing: Make sure to test your visit functions with at least two different functions (e.g. two different versions of foo()). A good approach is to have them print the nodes they reach in different ways. For example, one version of foo() prints names in all lower case, and the other version (foo2() for example) prints them in all upper case.
Extra credit : Create a class whose type can be the type of the nodes in the tree. This will require overloading the operators that the binary node class uses: <, >, ==, etc.
Turn in:
Each of the files you created (most likely something like: record.h, bnode.h tree.h, treemain.cpp) and the script file showing that the functions work. Be careful to make sure that your output clearly shows that the functions are working.

Answers

Answer 1

The assignment extends an existing program by adding three new functionalities: visiting every node and applying a function to its data, visiting nodes with a specified key and applying a function to their data, and visiting nodes with a specific data element and applying a function to their data

1. The assignment requires adding three new functionalities to an existing program that utilizes a binary search tree. The original functionality involves reading data from a file, inserting it into the binary search tree, and allowing the user to search for data associated with a key string. The new functionalities include visiting every node in the tree and applying a function to the data of each node, visiting nodes with a specified key and applying a function to their data, and visiting nodes with a specific data element and applying a function to their data. Additionally, there is an extra credit option to create a class and overload operators for the binary node class.

2. The assignment builds upon an existing program that uses a binary search tree. The original functionality, which reads data from a file, inserts it into the binary search tree, and allows searching by key, remains unchanged. The new functionalities involve visiting every node in the tree and applying a function to the data of each node. This can be achieved by implementing a visit() function that takes a function as an argument and applies it to the data of each node. Additionally, there is a variation of the visit() function, visitnamed(), which applies a function only to the node with a specified key.

3. Furthermore, the assignment introduces another variation of the visit() function, visitonly(), which applies a function only to nodes with a specific data element. For example, if the data element is "Cat," the visitonly() function will apply the provided function to all nodes in the tree that contain the substring "Cat" in their data.

4. To test the implemented functionalities, it is recommended to create multiple functions, such as foo() and foo2(), with different behaviors. These functions can print the nodes they reach in various ways, for instance, printing names in lowercase or uppercase. By running the program and observing the output, it should be evident that the visit functions are working correctly.

5. For extra credit, it is suggested to create a class that represents the type of nodes in the binary search tree. This involves overloading operators such as less than (<), greater than (>), and equal to (==) to enable comparisons and manipulations with instances of the class. Overloading these operators allows for a more customized implementation of the binary search tree based on the specific requirements of the class.

6. There is an extra credit option to create a class and overload operators for the binary node class. Proper testing should be performed to ensure the correctness of the implemented functionalities.

Learn more about binary search tree here: brainly.com/question/30391092

#SPJ11


Related Questions

How can a user access the Mailbox Cleanup tools?

Start a new AutoArchive.

Enter the Backstage view.

Left-click the Inbox folder.

Open the Deleted Items folder.

Answers

Answer:

Sorry this isn’t an answer but does anyone know of a quizlet for the Microsoft Office course because I can’t find anything anywhere. Help a fellow student out. I need answers.

Explanation:

Answer: B: enter backstage view

Explanation:

I took the test. Plz mark me brainliest!

rolyr0905 avatar
rolyr0905
09/24/2020
Computers and Technology
College
answered
Which of the following is an example of software piracy?
A) copying software from work to use at home
B) buying software to use in your home office
C) taking corporate secrets from work to sell
D) working at two jobs that are both in the IT field

Answers

An example of software piracy is when a user copies software from work to use at home without permission. Therefore, the correct option is A) copying software from work to use at home.

Software piracy is defined as the illegal copying, distribution, or use of computer programs.

It is the act of using, copying or distributing computer software without permission from the software owner.

How is software piracy illegal?

Software piracy is illegal because it breaks copyright laws.

Copyright law provides the legal framework for the protection of intellectual property.

It grants copyright owners exclusive rights to their work, including the right to make copies and distribute them.

Copyright owners can take legal action against those who infringe their rights by engaging in software piracy.

Know more about software   here:

https://brainly.com/question/28224061

#SPJ11

which region of the country overall has the lowest connectivity to the internet?

Answers

According to a report by the Federal Communications Commission (FCC), the region with the lowest connectivity to the internet in the United States is rural areas.

This is mainly due to the lack of infrastructure and investment in broadband technology in these areas. Many rural communities have limited access to high-speed internet services, which makes it difficult for them to participate in online activities such as education, commerce, and telehealth.

Additionally, factors such as low population density and topographical barriers can further hinder the development of broadband infrastructure in rural areas. Therefore, efforts are being made by the government and private sector to bridge this digital divide and improve connectivity in rural America.
The region with the lowest connectivity to the internet may vary depending on the country in question. Generally, rural or remote areas tend to have lower connectivity rates compared to urban or metropolitan areas, regardless of the country.

Learn more about Federal Communications Commission here: https://brainly.com/question/27337881

#SPJ11

what clinical systems do you think would be the most difficult to perform an etl on and why?

Answers

Complex electronic health record (EHR) systems with diverse data types and interdependencies would be the most challenging for ETL processes.

What are the key challenges in performing ETL on complex electronic health record (EHR) systems?

The clinical systems that would be most difficult to perform an ETL (Extract, Transform, Load) on are those with complex data structures and interdependencies, such as electronic health record (EHR) systems.

This is because EHR systems typically contain a wide range of data types, including structured and unstructured data, and involve intricate relationships between patient records, diagnoses, medications, lab results, and other healthcare information.

Extracting, transforming, and loading such diverse and interconnected data while maintaining data integrity and preserving the context and meaning of the information can be challenging.

Additionally, EHR systems often have large volumes of data, requiring efficient processing and storage solutions.

Learn more about health record (EHR)

brainly.com/question/29430723

#SPJ11

"NOTE: write an algorithm, not a code" You are given a file called "std" and composed of "Number, Name, Address" fields. (You can define the type of fields by yourself) Write an algorithm that makes "insert, delete, update and retrieve", processes on the records in the file. "Number" field is the key of each record. Here is the template of report: Steps Actions 1 Name of the report and date 2 Author of report 3. Literature review 4. Your contribution 5 Explanation algorithm and sub algorithms 6 Summary 7. Future advice 8. References

Answers

Answer:

1. get the absolute path to the file

2. load the file as a table (dataframe in python)

3. to insert a row;

create a dataframe of the same field typeconcatenate the new dataframe horizontally with the same dataframe

4. to delete a row, select and drop the row where the 'Number' field matches a value.

5. to update the values in row, use the number field as a key to replace the existing values.

6. print of save to a variable the rows where the number field matches a given value.

Explanation:

Follow the report template to create a report for the algorithm.

The algorithm gets the absolute path to the file and loads the file as a tabular file from there the data can be queried without accessing the main file. The insert algorithm creates a new dataframe and appends it to the main dataframe.

The delete, update and retrieve all use the same subalgorithm, getting the rows with the number field as the key value.

what is the name of html command? ​

Answers

Here are some.

<html></html> This is the root element tag. ... <head></head> ... <title></title> ... <body></body> ... <h1></h1> ... <p></p> ... <a></a> ... <img></img>hope it helps.stay safe healthy and happy....

Explain the simliparities or difference between a workbook , worksheet and spread sheet​

Answers

Answer:

Spreadsheet vs Workbook. Summary: Difference Between Spreadsheet and Workbook is that Spreadsheet software allows users to organize data in rows and columns and perform calculations on the data. ... While Workbook is consider as whole file that can contain bundle of worksheets in it.

Explanation:

mark brainlyist

1. What do you think are the importance of 5S Principles?

2. Cite a situation in which you can apply the knowledge of understanding 5S Principles?​

Answers

1) The importance of the 5s Principles is to improve productivity in industries, hospitals, government and education. Additionally it helps to eliminate wasted time, space and inventory.

(2) I can use the knowledge acquired from the 5s Principles to make my everyday life easier.

Please have a great day <3

In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is an example of​ a(n) ______________.
A. group
B. record
C. file
D. field
E. attribute

Answers

In a student database, a row that describes the top student, including his or her LastName, FirstName, and StudentNumber, is an example of a "record".

A record is a collection of related data items that are treated as a single unit. In a database, a record typically corresponds to a row in a table and contains information about a particular entity or object. In this case, the record describes the top student and includes their last name, first name, and student number. Each record in the table would correspond to a different student in the database. Fields, on the other hand, correspond to the individual data elements within a record, such as last name, first name, and student number in this example. Attributes are similar to fields and refer to the characteristics of an entity or object in the database.

Learn more about Database here:

https://brainly.com/question/30634903

#SPJ11

2.3 pseudocode exercise on edhesive

Answers

Answer:

a=int(input("Enter a numerator: "))

b=int(input("Enter a divisor: "))

quotient=a/b

remainder=a%b

print("Quotient is: " + str(int(quotient)))

print("Remainder is: " + str(int(remainder)))

That's 2.3 question 1

a_ft = int(input("Enter the Feet: "))

a_inc = int(input("Enter the Inches: "))

b_ft = int(input("Enter the Feet: "))

b_inc = int(input("Enter the Inches: "))

sum_inc = a_inc + b_inc

# select the whole and the fractional part

inc_to_ft = sum_inc // 12

rem_from_div = sum_inc % 12

sum_ft = a_ft + b_ft + inc_to_ft

print("Feet: {} Inches: {}".format(sum_ft, rem_from_div))

That's 2.3 question 2

Explanation:

I wasn't sure which one you needed so I added both.

Select ALL the correct answers.
In attempts to improve their contribution to the environment a company decides to adapt green computing. Which of these techniques will contribute to green computing?
A.virtualization
B.grid computing
C.recycling
D.autonomic computing

Answers

Answer:

c. and a.

Explanation:

I think thought are right because you have to adapt the green

Answer:

A. Virtualization

C. Recycling

Write a question that prompts the user to input a sequence of numbers the algorithm should display the highest number entered. Data terminates when 000 is entered for. A number

Answers

Answer:

Explanation:

The following code is written in Java and asks the user to input a sequence of numbers separated by pressing the "ENTER" key and typing 000 to terminate the sequence. It saves all those numbers in an ArrayList and then goes through the Array to find and print the max number.

public static void MaxNumber () {

           Scanner in = new Scanner(System.in);

           System.out.println("Enter a as many numbers as you want seperated by the Enter Key... type 000 when done. ");

           ArrayList<Integer> numbers = new ArrayList<>();

           int exit = 1;

           while (exit != 000) {

               exit = in.nextInt();

               numbers.add(exit);

           }

           int max = 0;

           for (int x = 0; x < numbers.size(); x++) {

               if (numbers.get(x) > max) {

                   max = numbers.get(x);

               }

           }

           System.out.println(max);

       }

is monitor is a television​

Answers

Answer:

No, a monitor only shows what a different device tells them too however, a tv can be connected to nothing and show tv shows

If the algorithm does not have instructions for unanticipated results, the computer program will

Answers

ANSWER: The computer program will ✔ halt . A(n) ✔ recipe is an algorithm.

BRAINLIEST please and good luck!

what is the general term for programs used to operate a computer

Answers

Answer:

Software

Explanation:

ez

Answer: A Software System

For questions 1-3, consider the following code: x = int (input ("Enter a number: ")) if (x != 8): print ("A") if (x >= 10): print ("B") if (x < 10): print ("C") if (x % 2 == 1): print ("D") What is output if the user types in 13?

Answers

Answer:

ABD

Explanation:

13 not equal 8, greater than 10 and odd. Ifs will be executed step-by-step

The _____________ loop executes a process statement before a decision.

Answers

Answer:

The Iteration

Explanation:

Iteration is also known as repetition. It is used to execute a process (or statement) multiple times. Repetition statements are sometimes referred to as loops.

Hope this helped :) :3

Ned is trying to decide how he wants to connect the nodes on the network he created. What are the two options that he has?
Select one:
a through physical nearness or a central server
b. through hard cabling or wireless radio waves
c. through ethernet cables or Bluetooth
d. through software programs or osmosis

Answers

Since Ned is trying to decide how he wants to connect the nodes on the network he created, the  two options that he has are option b and C:

b. Through hard cabling or wireless radio waves.

c. Through ethernet cables or Bluetooth.

What kind of cable does a computer system typically use to connect to a network?

A twisted pair Ethernet cable called an Ethernet crossover is used to directly connect computing devices that would typically be connected through a network switch, Ethernet hub, or router, such as by connecting two personal computers together using their network adapters.

Note that a group of two or more interconnected nodes makes up a node network. Once a connection has been established between two or more nodes, all searches return lists of configured users and resources from both nearby and distant nodes. Every computer in the node network keeps track of this fundamental data.

Therefore, Through a link or communication channel, nodes are connected. A computer network may use cable, fiber, or both of these.

Learn more about ethernet from

https://brainly.com/question/28156384
#SPJ1

The value that excel displays for a cell is always the precise value you enter in the spreadsheet or the precise value resulting from a formula in that cell that is stored by the software.a. Trueb. False

Answers

This claim is untrue since Excel should always show the exact number that you enter into the column or the exact value that results from a calculation that is placed in that cell.

What are a few illustrations of spreadsheet applications?

A type of computer application called a technology program may be used to organise, store, and analyse data in a tabular format. The application can imitate digital versions of paper accounting spreadsheets. They could also have several connected sheets with content is shown text, statistics, or graphics.

Which spreadsheet programme is the most straightforward?

LibreOffice Arithmetic or Apache Avian influenza viruses Calc offline may indeed be adequate if you simply need a basic computer for straightforward administrative tasks, such as calculations. if you desire more complex features.

To know more about Spreadsheet visit:

https://brainly.com/question/8284022

#SPJ4

Write a function that accepts a string as an argument and then prints the string backwards.
Write in Python.



7

Answers

Sure, here's a Python function that accepts a string as an argument and prints it backwards:

def print_backwards(s):

print( s[: :-1] )

Here, the [::-1] slice notation is used to reverse the string. When s is a string, s[::-1] will produce a new string with the characters in reverse order. The print() function is then used to output this reversed string.

To use this function, simply call it with a string as an argument:

print_backwards("hello world")

This will output:

dlrow olleh

Answer:

Here's a Python function that takes a string as input and prints the reversed version of the string:

def print_backwards(string):

   reversed_string = string[::-1]

   print(reversed_string)

The [::-1] syntax in string[::-1] returns the reversed version of the input string. The function then assigns the reversed string to a variable reversed_string and prints it using the built-in print() function.

Here's an example usage of the function:

>>> print_backwards("Hello, World!")

!dlroW ,olleH

>>> print_backwards("123456789")

987654321

A piece of software that runs and manages virtual machines is known as a __________.

Answers

A piece of software that runs and manages virtual machines is known as a Hypervisor.

What is Hypervisor?

Software that builds and manages virtual machines is called a hypervisor, also referred to as a virtual machine monitor or VMM (VMs). By essentially sharing its resources, such as memory and computation, a hypervisor enables a single host computer to handle numerous guest virtual machines (VMs). The host operating system gains a new software layer from a hosted hypervisor, while the guest operating system moves up to a third software level above the hardware. Oracle VM VirtualBox is a well-known example of a hosted hypervisor.

Type 1 hypervisors run on the system hardware directly; this is known as a "bare metal" embedded hypervisor.

VMware ESX and ESXi.Microsoft Hyper-V.Citrix XenServer.Oracle VM.

Type 2 hypervisors run on a host operating system that offers virtualization features like memory management and I/O device support.

VMware Workstation/Fusion/Player.VMware Server.Microsoft Virtual PC.Oracle VM VirtualBox.

Learn more about hypervisor here:

https://brainly.com/question/14990049

Sans serif typeface is a good choice for
a. printed documents
b.document headings
c. document text
d. document content

Answers

Answer: A Sans-serif font is a good choice for headings and small text where clarity and readability are paramount. A Serif font is good to use on larger blocks of printed text like on a flyer.

Explanation:

the first day anna read a quarter of the book. on the second day she read a third of the remainder. noticed that after two days he had 80 pages left unread. how many pages did the book have?​

Answers

Answer:

160 pages

Explanation:

\(Day\ 1 = \frac{1}{4}\)

\(Day\ 2 = \frac{1}{3}Remainder\)

\(Left = 80\)

Required

The number of pages

Let the number of pages be x.

So, on day 1; we have:

\(Day\ 1 = \frac{1}{4}x\)

After day 1, there are:\(\frac{3}{4}x\) left ----------------- i.e x - 1/4x

On day 2, we have:

\(Day\ 2 = \frac{1}{3} * \frac{3}{4}x\)

\(Day\ 2 = \frac{1}{4}x\)

At this point, we have:

\(Day\ 1 = \frac{1}{4}x\)

\(Day\ 2 = \frac{1}{4}x\)

\(Left = 80\) ---- pages left

The summation of all must equal x, the book pages

\(Day\ 1 + Day\ 2 + Left = Total\\\)

\(\frac{1}{4}x + \frac{1}{4}x+ 80= x\)

Simplify the left-hand side

\(\frac{1}{2}x+ 80= x\)

Collect like terms

\(x - \frac{1}{2}x= 80\)

Simplify

\(\frac{2-1}{2}x= 80\)

\(\frac{1}{2}x= 80\)

Multiply by 2

\(2 * \frac{1}{2}x= 80*2\)

\(x = 160\)

Angelina has added page numbers to her report, but all of the pages are labeled "Page 1” at the bottom. What caused this issue?
She typed “Page 1” in the footer.
She added a header instead of a footer.
She did not create a numbered list in her footer.
She forgot to click the Continue Numbering option.

Answers

Answer:

She typed "Page 1" in the footer.

Explanation:

This occured because the footer only repeats the same message across the footers unless you enable page numbering.

Hope this helps!

help me i dont understand REAL ANSWERS PLS

help me i dont understand REAL ANSWERS PLS

Answers

Answer:

it's answer is B

hope it helps you

Which of the following statements are true regarding models? Select 3 options.

In a model, the general characteristics are separated from the details.

Models help predict how a specific solution will respond.

Models help you understand a complex situation by including all of the details.

Models represent the system or problem at a detailed implementation level.

Models help communicate a design.

Answers

Answer:

Answer:

Models help predict how a specific solution will respond

In a model, the general characteristics are separated from the details

Models help communicate a design

Explanation:

The statements that are true regarding models are:

B. Models help predict how a specific solution will respond.

A. In a model, the general characteristics are separated from the details.

E. Models help communicate a design.

What is a model?

A model is an artificial representation of an object or a process. Models are used to show the process or things that are very big and can not be understood by the actual thing.

By looking for patterns in a set of input data, predictive modeling uses mathematics to foretell future events or results.

Therefore, the correct options are A. In a model, the general characteristics are separated from the details, B. Models help predict how a specific solution will respond, and E. Models help communicate a design.

To learn more about the model, refer to the link:

https://brainly.com/question/14281845

#SPJ2

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
23 24
Computing
L2 - Review the sentences below and fill in the blanks using the
list of words provided.
To connect together different devices, you need cables. The cables carry the messages sent between machines
communicating with one another. The most common type are called 'Ethernet cables'. The cable is made up of a
number of copper wires and has the ability to send data in_both directions.
A
connects a number of computers together within the same room or building. This means that each computer
does not need to have its own dedicated connection to every other computer in a network, which reduces the
number of needed.
A is often described as a powerful computer that provides services. One example of a service that it can
provide is shared access to such as text, images, sound, or
List of words: cables, server, files, video, hub, both
11
Click to add speaker notes

Answers

Answer: 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40

Explanation: x1

What is a stepping function?
A. a function that allows users to select which portion of a software program they would like to use
B. a function that allows users to make helpful notes about error messages they encounter
C. a function in a compiler that enables programmers to indent code when creating subfunctions
D. a function in a compiler that enables programmers to run a program line by line and observe the
current values of program variables

Answers

Answer:

D.

Explanation:

a function in a compiler that enables programmers to run a program line by line and observe the current values of program variables

Answer:

Its D i got it right

Explanation:

Information stored on CD-ROM disc must be read and then erased.True or false?​

Answers

Answer:

False

Explanation:

assume you have two integer variables, num1 and num2. which of the following is the correct way to swap the values in these two variables?
a.int temp = num; 2
num2 = num1; num1 = temp; b.int temp = num1 num2 = num1; num1 = num2; c.num1 = num2; num2 = num1 ; d.int temp = num1; num2 = temp1; temp = num2; num1 = temp; e.None of these

Answers

(a) int temp = num1; num1 = num2; num2 = temp; .The correct way to swap the values in two integer variables is option (a) int temp = num1; num1 = num2; num2 = temp;

In option (a), we create a temporary variable "temp" and assign it the value of the first variable "num1". We then assign the value of the second variable "num2" to the first variable "num1", and finally assign the value of the temporary variable "temp" to the second variable "num2". This effectively swaps the values in the two variables. Option (b) is incorrect as it does not create a temporary variable to hold the value of either variable before the swap. Option (c) is also incorrect as it swaps the values of the variables incorrectly. Option (d) is incorrect as it assigns the value of "num1" to "num2" before swapping. Option (e) is incorrect as one of the given options is the correct way to swap the values in two integer variables.

Learn more about programming here:

https://brainly.com/question/14368396

#SPJ11

Other Questions
suppose a timing element is added to the game, and that jordan buys a ticket first. while lee did not see which ticket jordan bought, lee does know the values in the payoff matrix and that jordan has purchased first. assuming that jordan and lee are both self-interested, lee can infer select one: a. that jordan bought a ticket for the documentary. b. that jordan did not exploit the first-mover advantage. c. that jordan bought a ticket for the comedy. d. that jordan's threat to buy a ticket for the comedy is not credible. A county fair charges $9.50 to get in and $2.50 per ride ticket. Write an algebraic expression to represent the total cost for a visit to the fair. Let n represent the number of tickets purchased Which diagram correctly describes the changes that occur as a small piece of rock falls from space and hits the Earth?meteor meteoriod meteoritemeteoroid meteorite meteormeteoroid meteor meteoritemeteorite - meteor meteoroid From who's perspective is the story mostly told? the cone analyze the statements below and identify the statement that exemplifies the satisfaction step proposing a solution. a. every small choice people make makes a big difference in the health of our planet. b. the prevalence of plastic waste is cluttering waterways, endangering wildlife, and damaging scenery on our planet. c. help protect our natural wonders! d. i was canoeing down the blackwater river last week when i encountered a duck trapped in the plastic rings from a six-pack of beer. A ball is dropped from a height of 6 feet. Each time it bounces, it rebounds up to 0.88 times the height of the previous bounce. What is the total vertical distance traveled by the ball How will you determine whether you have achieved your course goals at the end of the semester? Which visible quality of smoke shows that it contains alot of gas influencing the other particles?O The shade of the color is different in different places.O Smoke usually has an unpleasant smell.O Smoke rises out of very hot substances.O The shape of the smoke changes very easily. Three 100 nC charged objects are equally spaced on a straight line. The separation of each object from its neighbor is 0.3 m. Find the force exerted on the center object if (a) all charges are positive, (b) all charges are negative, and (c) the rightmost charge is negative and the other two are positive. What is the equation of this line on the graph.Your answer should be either x=# or y=# Review the chart of root words and their meanings. Then, answer the question below.RootMeaningsophwise, wisdomlogtalk, knowledge, reasonsectcutgraphwriteplic, plyfolddoc, doctteachtact, tang, ting touchman, manuhandExample of roots used to make words: photograph, photosynthesis, photon: photoWhich root is used in each of the words below?indoctrinate:document A plane takes off and climbs steadily for 15 minutes until it reaches 30,000 feet. It travels at that altitude for 2 hours until it begins to descend to land, which it takes 15 minutes at a constant rate. Determine the domain and range. com Height (leet) HU Time doinutes) NEVO The domain is The range is ISHS PART A: Which statement describes the central ideaof the text?AThe Pax Romana was a period of growth, butpeople fell into poverty.The Pax Romana was a period of peace under therule of the Senate.The Pax Romana was a period of peace under therule of various emperors.The Pax Romana was the period of Octavian'srule, which ended with his death, Who join english setter for the first thanksgiving A painter work 7 3/4 hours per hour. How.many hours does this painter work in 5days a week Can I get some help please do invertebrates have limbs for locomotion? Open-end mutual funds guaranteeA. investors a minimum rate of return.B. investors a minimum NAV.C. to redeem investor's shares upon demand at current NAV.D. to earn the rate promised in the prospectus.E. none of the optionsAnswer: C the nurse is caring for a patient with parkinson disease. the patient informs the nurse that the patient has been angry with god because of the worsening illness, but after talking to the hospital chaplain, the patient is ready to return to the church choir and become active again in the group at the church. what is an appropriate nursing diagnosis for this patient? A Cap is discounted at 25% off. The original price is $60.What is the sales price?O $40O $50O $45O $30