Invent a code that would allow us to store letter grades with plus or minus. That is, the grades A, A-, B+, B, B-,…, D, D-, F. How many bits are required for your code?

Answers

Answer 1

To store letter grades with plus or minus, you can use a simple code where each grade is represented by a combination of letters and symbols.

Here's an example of a code that can be used:

For this code, 4 bits are required to store the letter grades with plus or minus.

A+ -> 1

A  -> 2

A- -> 3

B+ -> 4

B  -> 5

B- -> 6

C+ -> 7

C  -> 8

C- -> 9

D+ -> 10

D  -> 11

D- -> 12

F  -> 13

In this code, each letter grade is assigned a unique number. The plus and minus signs are not explicitly represented in the code but can be inferred by the number's position relative to the base grade. For example, A+ is represented by the number 1, A is represented by 2, and A- is represented by 3.

To determine the number of bits required for this code, we need to find the minimum number of bits needed to represent the highest number in the code. In this case, the highest number is 13, which can be represented using 4 bits (2^4 = 16).

Therefore, for this code, 4 bits are required to store the letter grades with plus or minus.

To know more about code, visit:

https://brainly.com/question/29590561

#SPJ11


Related Questions

Take one action in the next two days to build your network. You can join a club, talk to new people, or serve someone. Write about this action and submit this as your work for the lesson. icon Assignment

Answers

Making connections is crucial since it increases your versatility.You have a support system of people you can turn to when things get tough so they can help you find solutions or in any other way.

What are the advantages of joining a new club?

Support Network - Joining a club or organization can help you develop a support network in addition to helping you make new acquaintances and meet people.Your teammates and friends will be there for you not only during practice but also amid personal difficulties. Working collaboratively inside a group, between groups, between communities, or between villages is known as network building.One method of creating a network is by forming a group. Attending events and conferences and developing connections with other attendees and industry speakers is one of the finest methods to build a strong network.In fact, the framework of many networking events and conferences encourages networking and connection opportunities. Personal networking is the process of establishing connections with organizations or individuals that share our interests.Relationship growth often takes place at one of the three levels listed below:Networks for professionals.Neighborhood networks.Personal networks. Reaching out is part of an active communication process that will help you learn more about the other person's interests, needs, viewpoints, and contacts.It is a life skill that needs to be actively handled in order to preserve or, more importantly, to advance a prosperous profession. various network types.PAN (personal area network), LAN (local area network), MAN (metropolitan area network), and WAN (wide area network) are the different types of networks.

To learn more about network refer

https://brainly.com/question/28041042

#SPJ1    

HI IM DORAS SISTER AND IM ASKING IF YOU GUYS COULD HELP ME FIND MY SISTER PLS AND THANK YOU.

Answers

?????????????????????????????????????????

Answer:

BRO SHES IN SWIPERS CRIB

Explanation:

I JUS SAW YOUR GIRLLLL

What are three metrics used to define consistent network application availability?

Answers

Answer:

Required Bandwidth, Measuring Availability, Real-Time Performance Monitoring, Configuring Real-Time Performance Monitoring.

Explanation:

at what layer of the osi model does a network switch normally operate? a. layer 5 b. layer 3 c. layer 4 d. layer 2

Answers

Answer:

D. Layer 2

Explanation:

It is layer 2.

To learn more:

https://brainly.com/question/26299918?referrer=searchResults

Hope this helps!

The driver ____.

sits beside the person programming
makes suggestions as the code is written
reviews the code as it is written
sits at the computer

Answers

The navigator plans the operation after reviewing the code that the driver has written.

What do you name those who write computer programs?

Programmer A person who creates computer software or programs is referred to as a programmer. You can also identify as a programmer if you create software for mobile devices. Computer programmers create the code (or instructions) that enable computers to carry out the tasks that their users teach them to.

Which method of software development involves two developers working together while coding?

Pair programming is an Agile software development technique where two developers work together on a single computer in conjunction with Extreme Programming (XP). Together, the two work on user story creation, programming, and testing.

To know more about programming visit:-

https://brainly.com/question/11023419

#SPJ1

Produce a function with the following specifications:
NAME: cheby PolyAppx_########
INPUT: f, N, TOL, intTOL, depth
OUTPUT: A
DESCRIPTION: The vector A contains the N + 1 Chebyshev coefficients for f, found using the your adaptSimpsonInt numerical integration algorithm with tolerance intTOL and adaptive depth 'depth' to approximate the coefficients on the interval (-1+TOL.1-TOL).

Answers

The main answer to the given question is to produce a function named "chebyPolyAppx_########" that takes inputs f, N, TOL, intTOL, and depth and returns a vector A containing the N + 1 Chebyshev coefficients for f. The function utilizes the adaptSimpsonInt numerical integration algorithm with tolerance intTOL and adaptive depth 'depth' to approximate the coefficients on the interval (-1+TOL, 1-TOL).

What is the role of the adaptSimpsonInt algorithm in approximating the coefficients, and how does the tolerance intTOL and adaptive depth 'depth' affect the accuracy of the approximation?

The given question requires the implementation of a function that calculates the Chebyshev coefficients for a given function f. The function takes inputs such as the number of coefficients N, tolerances TOL and intTOL, and the adaptive depth 'depth'. The adaptSimpsonInt algorithm is utilized to numerically integrate the function and approximate the coefficients. The tolerance intTOL controls the accuracy of the integration, while the adaptive depth 'depth' determines the number of recursive subdivisions performed by the algorithm. The resulting Chebyshev coefficients are stored in the vector A. Understanding the implementation details, the role of the algorithm, and the impact of the input parameters on the approximation accuracy is crucial for effectively using the function.

Learn more about adapt

brainly.com/question/30584720

#SPJ11

Match the item on the left to the process or technique on the right to which it is most closely related. 1) baseline 2) traceable 3) librarian 4) revision A. chief programmer team B. user stories C. version control D. unit test E. requirements F. software configuration management G. agile development H. refactoring

Answers

The items on the left with the corresponding processes or techniques on the right are

1) Baseline - F. Software configuration management

2) Traceable - E. Requirements

3) Librarian - G. Agile development

4) Revision - C. Version control

Match the items on the left with the corresponding processes or techniques on the right: 1) baseline, 2) traceable, 3) librarian, 4) revision.

In the given matching exercise, the items on the left are related to different processes or techniques commonly used in software development. Here is the mapping of the items:

1) Baseline - C. Version control: Baseline refers to a specific version or snapshot of a software project that is considered stable and serves as a reference point for future changes.

2) Traceable - F. Software configuration management: Traceability is the ability to track and link software artifacts, such as requirements, design documents, and test cases, throughout the development lifecycle.

3) Librarian - F. Software configuration management: A librarian refers to a person or tool responsible for managing and organizing software artifacts and ensuring their proper storage, retrieval, and version control.

4) Revision - C. Version control: A revision represents a specific alteration or update made to a software artifact, typically tracked and managed through version control systems.

The provided options B, D, E, G, and H do not directly correspond to the given items.

The mapping for the given items is: 1) C, 2) F, 3) F, 4) C.

Learn more about items

brainly.com/question/31383285

#SPJ11

when was discord made

Answers

Discord now refers to May 13, 2015, as its official debut date because that was the day that actual use of the service by strangers began.

Although the initial Discord user's precise name is unknown, Vind was one of the very first users. The user and his pals decided to switch from TeamSpeak to Discord because they wanted something that provided a community in addition to a gaming platform. Thus, in 2015, Jason and Stan began to develop Discord. It was adored by people from all over the world. Discord made it simple to have actual conversations with friends that went beyond idle chatter. Friends were maintaining contact with the communities in which they lived.

Learn more about discord here-

https://brainly.com/question/21963991

#SPJ4

The first commercially available digital camera was which of the following?

Answers

Kodak Professional Digital Camera System

hope it helps

pls mark me as brainliest

Answer:

D

Explanation:

None of the above

When performing forensics on an Apple computer, what operating system are you the most likely to encounter QUIZLET

Answers

When performing forensics on an Apple computer, the operating system are you the most likely to encounter is iOS.

What is operating system forensics?

A Operating System Forensics is known to be a method used for the retrieving of any useful information from the Operating System (OS) of the computer or any kind of mobile device.

Note that the reasons for collecting this information is so as to get all the empirical evidence against any kind of perpetrator.

Learn more about operating system from

https://brainly.com/question/1763761

MaryAnn keeps running out of heirloom apples for her apple crepes, her most popular product. Which sustainable competitive advantage strategy does this problem impact?
a) customer excellence b) locational excellence c) product excellence d) operational excellence e) competitive excellence

Answers

The sustainable competitive advantage strategy that this problem impact is competitive excellence The correct option is e).

What is sustainable strategy competitive advantage?

When a corporation continuously beats its rivals in the same industry or field, it has a sustainable competitive advantage.

Walmart is a well-known illustration of a business with a long-lasting competitive edge.

Walmart is able to keep its competitive edge in part due to its organization-specific tactics, which are renowned for separating Walmart's performance from that of its rivals.

Therefore, the correct option is e) competitive excellence.

To learn more about sustainable strategy, refer to the link:

https://brainly.com/question/28336044

#SPJ1

you just moved into a rural office space that has telephone service but no cable. which wan service could you use without needing to install new wiring to your location?

Answers

The WAN service that a person could use without needing to install new wiring to your location is Fiber broadband.

What is Fiber broadband?

The term fiber Broadband is known to be a superior technology.

It function by delivering Internet and other network services to your house and offices through the use of optical fiber that helps to carries a communications signal which is taken from an operator’s machine or tools to their home, business or offices.

This technology is one that is known to be very robust as well as very reliable than other forms of older technologies.

It is known to be relatively new as it entails running fiber to homes has a greater form of bandwidth and speeds to consumers as well as businesses.

Therefore, The WAN service that a person could use without needing to install new wiring to your location is Fiber broadband.

Learn more about Fiber broadband from

https://brainly.com/question/19538224

#SPJ1

the siri personal assistant application on apple's iphone 5s is an example of a ________.

Answers

The Siri personal assistant application on apple's iPhone 5s is an example of a natural language processing (NPL) system.

What is a natural language processing system?

Scaling other language-related jobs is accomplished through the use of natural language processing, which enables computers to speak with people in their own language. As an illustration, NPL enables computers to read text, hear the voice, understand it, gauge sentiment, and identify the key points.

While the science of natural language processing(NPL) is not new, the technology is growing quickly as a result of a rise in interest in human-to-machine communication, as well as the availability of massive data, powerful computation, and improved algorithms.

To learn more about natural language processing system, use the link given
https://brainly.com/question/14222695
#SPJ1

a binary number is an integer made up of only 0s and 1s. for example, 110111101 is a binary number. what is the smallest binary number divisible by 225?

Answers

The smallest binary number that is divisible by 225 is 1110001000.

A binary number is an integer that is made up of only 0s and 1s. It is a numeral system based on the binary system. The decimal system, which is based on 10, is what we use every day. The binary system, on the other hand, is based on 2. Any integer in the decimal system can be converted to the binary system with ease. Decimal numbers are translated to binary numbers by converting the decimal number to a binary number system by representing it in the powers of 2. The method of repeated division by 2 is used to convert decimal numbers to binary numbers. Given 225 is a 5 × 3 × 5 × 3. So, for any number to be divisible by 225, it must be divisible by 5 × 5 × 3 × 3. For the number to be divisible by 5, the last digit of the binary number must be 0.

Learn more about binary: https://brainly.com/question/29365412

#SPJ11

Lisa is looking at a photograph of her parents, and it appears as if the image was covered with granules of sand. What is responsible for this effect?
O A high brightness
OB. bad lighting
O C. low exposure
O D. too much noise

Answers

Answer:

B, bad lighting.

Explanation:

The granules of sand are caused by image noise. Image noise can be defined as appearance of undesired traces and variations in the brightness or color of your image.

Image noise is caused by lighting variation.

There for, the correct answer would be: B, bad lighting.

If you came across an article that discussed the benefits of studying the night before a test rather than the morning of, what could you do to form your own opinion about such information? A. Do your own research including reading articles related to the same topic. B. Ask a trusted family member their opinion after they read the article. C. Check different social media accounts for articles on sleep studies. D. Read another article on this topic written by the same journalist.

Answers

Answer:

A. Do your own research including reading articles related to the same topic.

Explanation:

To confirm online information that is not made by reputable experts, professionals, journals, or websites, it is always recommended to cross-check such information carefully. To do that is to make research on the same topic and confirm if the actual information is the same.

Hence, in this case, the correct answer is "Do your own research including reading articles related to the same topic."

What is the difference between apple store and play store

Answers

one is for apple and the other is for android. apple you have to pay for more stuff but get better things but mostly their literally just the exact same with different names

Chaîne d’énergie télévision

Answers

energy television channel

Select three of the five best practices for designing media for the web that are outlined in the lesson. experiment with color experiment with color make sure to format properly make sure to format properly keep it simple keep it simple be careful with fonts be careful with fonts design with one specific browser in mind design with one specific browser in mind

Answers

The best practices for designing media for the web that are outlined in the lesson.

Format properly, design with a particular browser in mind, Be cautious with fonts.What impact does font have on a website's design?

In both print and digital text, many font types are utilized. Although typographic font styles have unique spacing and designs, once chosen, this style will be used for punctuation as well as lowercase and uppercase characters.

Therefore, your visitors' reactions may be significantly affected by the font combination you select. Your website's typography has a big impact on how visitors see it. It can assist in creating a visual hierarchy on the webpage that will direct users' attention to the key elements in the order you want them to look.

Learn more about designing media  from

https://brainly.com/question/26338970
#SPJ1

What is a conflict?
Contentment
Disagreement
Harmony
Peace-keeping

Answers

Answer:

conflict is a Disagreement

PLS ANSWER ASAP!!!!

In three to five sentences, explain the function of utilities.

Answers

Answer:

In economics, utility function is an important concept that measures preferences over a set of goods and services. Utility represents the satisfaction that consumers receive for choosing and consuming a product or service.  Utility function is widely used in the rational choice theory to analyze human behavior.

Explanation:

An Emergency Action Plan (EAP) does which of the following?

the answers are
A assigns responsibility to thise affected and outlines evacuation routes
C Identifies emergencies that might reasonably occur and provides procedures for alerting people about the emergency
D identifies medical responses options and designate an assembly area
E labels the types of equipment present at the worksite​

Answers

Answer:

A

Explanation:

I think u should try A because EAP does it

Tell me 2-6 computer parts that are inside a computer.

Spam answers will not be accepted.

Answers

Answer:

Memory: enables a computer to store, at least temporarily, data and programs.

Mass storage device: allows a computer to permanently retain large amounts of data. Common mass storage devices include solid state drives (SSDs) or disk drives and tape drives.

Input device: usually a keyboard and mouse, the input device is the conduit through which data and instructions enter a computer.

Output device: a display screen, printer, or other device that lets you see what the computer has accomplished.

Central processing unit (CPU): the heart of the computer, this is the component that actually executes instructions.

Explanation:

The symmetric difference of two sets S_1 and S_2 is defined as: S_1 Theta S_2 = {x: x S_1 or x E S_2, but x is not in both S_1 and S_2} Show that the family of regular languages is closed under symmetric difference.

Answers

The symmetric difference of two regular languages is also a regular language, and the family of regular languages is closed under symmetric difference.

The family of regular languages is closed under symmetric difference because the symmetric difference of two regular languages is also a regular language. This can be shown using the following steps:

1. Let S_1 and S_2 be two regular languages.

2. Since S_1 and S_2 are regular languages, there exist finite automata A_1 and A_2 that accept S_1 and S_2, respectively.

3. Construct a new finite automaton A_3 by taking the union of the states and transitions of A_1 and A_2, and adding new transitions to switch between the two automata.

4. The language accepted by A_3 is the symmetric difference of S_1 and S_2, because it accepts strings that are in either S_1 or S_2 but not both.

5. Since A_3 is a finite automaton, the language it accepts is a regular language.

Therefore, the symmetric difference of two regular languages is also a regular language, and the family of regular languages is closed under symmetric difference.

Learn more about the family of regular languages:

https://brainly.com/question/30695377

#SPJ11

Which of the following is one of the tools in REPL.it that helps prevent syntax errors?
It adds closing quotes and parentheses if you type the opening ones.
It changes your binary input to the decimal system.
It allows you to see the interpreter’s algorithm.
It limits the pixel resolution.

Answers

Answer:

A. It adds closing quotes and parentheses if you type the opening ones.

Explanation:

Answer:

Yes the answer is A got a 100% hope you get a 100% too have a good day:)

Explanation:

What benefits will you receive by attending the high school you are applying to? (in complete sentences)​

Answers

The benefits you will receive by attending the high school you are applying to is that you can get credits by the attendance.

ASP code is a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on webpages displayed in browsers. True or False?

Answers

The given statement "ASP code is a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on webpages displayed in browsers" is false because ASP (Active Server Pages) is a server-side scripting technology rather than a system for tagging text files.

It is a legacy technology developed by Microsoft to build dynamic and interactive web applications. ASP allows developers to embed server-side code, typically written in languages such as VBScript or JScript, directly within HTML files.

The purpose of ASP is to generate dynamic web content by executing server-side code and generating HTML output that is sent to the client's web browser. This server-side code can interact with databases, handle form submissions, perform calculations, and more.

It enables developers to create interactive and data-driven web applications.

On the other hand, achieving font, color, graphic, and hyperlink effects on webpages displayed in browsers is typically accomplished using HTML and CSS (Cascading Style Sheets). HTML provides the structure and content of the webpage, while CSS controls the presentation and styling.

With HTML and CSS, you can define the fonts, colors, graphics, and hyperlinks used in a webpage.

While ASP can be used in conjunction with HTML and CSS to generate dynamic content and apply effects, it is not the standardized system for tagging text files to achieve these effects.

HTML and CSS are the primary technologies used for creating and styling webpages, while ASP focuses on server-side processing and generating dynamic content.

So, the given statement is false.

Learn more about browsers:

https://brainly.com/question/22650550

#SPJ11

Convert (154.25) 10 to hexadecimal F2.4 22.4 9 A. 4 9A. 2 question 7 Convert (643.3)8 to hexadecimal 2 F2.6 1 A3.6 663.7 78A.2 Convert (154.25)10 to binary (10011010.01)2 (10011010.11)2 (10011110.01)2 (10111010.01)2 upload pdf file showing your calculations Attach File A Moving to another question will save this response. Represent the signed numbers (+75) and (−52) in 8-bit binary, then add the two numbers and give the result in binary 10010111 00010111 00110100 none of the above

Answers

To convert decimal number to hexadecimal, divide the number by 16 repeatedly until the quotient becomes zero or less than zero. The remainder of each division gives the hexadecimal equivalent of the number.

The first question is to convert decimal number 154.25 to hexadecimal.

Following is the solution:(154) 10 = (9A) 16(0.25) 10 = (4) 16Therefore, the decimal number (154.25)10 is equivalent to the hexadecimal number (9A.4)16.The second question is to convert octal number 643.3 to hexadecimal.

Following is the solution:(643) 8 = (332) 10(0.3) 8 = (0.1875) 10.

Therefore, the octal number (643.3)8 is equivalent to the hexadecimal number (2F2.6)16.

The third question is to convert decimal number 154.25 to binary.

Following is the solution: 15410 ÷ 2 = 7710 r0142 ÷ 2 = 710 r0131 ÷ 2 = 5510 r1110 ÷ 2 = 510 r0111 ÷ 2 = 3510 r11.

The quotient of the last division is 1. Therefore, the decimal number (154.25)10 is equivalent to the binary number (10011010.01)2.

There are many ways to represent signed numbers in binary. One of the most popular ways is to use two's complement.

To represent a positive number in two's complement, we simply represent the number in binary. To represent a negative number, we first represent the absolute value of the number in binary, then we flip all the bits, and finally we add 1 to the result.

To represent (+75)10 in binary:(75) 10 = (01001011) 2.

The most significant bit is 0, which means the number is positive.

To represent (−52)10 in binary:(52) 10 = (00110100) 2Flip all the bits: (11001011) 2Add 1: (11001100) 2.

Therefore, the sum of (+75)10 and (−52)10 in binary is:(01001011) 2+ (11001100) 2= (00011011) 2 = (27) 10.

Therefore, the result of the addition is (27)10 or (00011011)2.

To know more about hexadecimal visit:

https://brainly.com/question/28875438

#SPJ11

9
10
1
2
3
4
5
Which is a valid velocity reading for an object?
45 m/s
45 m/s north
O m/s south
0 m/s

Answers

Answer:

Maybe 45 m/s north I think I'm wrong

Answer:45 ms north

Explanation:

Enabling encryption of all data on a desktop or laptop computer is generally considered:______.

Answers

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

What is information security?

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

The types of security control.

In Cybersecurity, there are three (3) different types of security control and these include the following:

Management security.Physical security.Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

Other Questions
FILL IN THE BLANK stephen is a young adult with autism who is a very talented artist. he can glance at a building for five minutes and then draw the structure with intimate details. however, stephen needs help with basic self-care skills and has very limited communication skills. stephen has _______ List three strategies for building resilience in negative, traumatic, or stressful situations. A(n)___________ market includes the aspects of a customs union and allows factors of production to move freely among members. *****HELP******Most Favored Nation (MFN) status and national treatment are also included in the Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). True or False The rules or principles of phrase and sentence-making in a language are called the? Why is a high credit score not an indication that youre winning with money? What is the depth of water in a tank with 300,000 gallons of water at 70F when the pressure gauge at the bottom of the tank reads 23 psig? The number of mosquitoes in Anchorage, Alaska (in millions of mosquitoes) as a function of rainfall (in centimeters) is modeled by: m(x)=-x^2+14xm(x)=x 2 +14xm, left parenthesis, x, right parenthesis, equals, minus, x, squared, plus, 14, x What is the maximum possible number of mosquitoes? You expect to receive $10,000 at graduation in two years. You plan on investing it at 8percent until you have $95,000. How long will you wait from now?Multiple Choice 1. The class Shapes includes two void methods: calcTriangleArea()and calcTrianglePerimeter(). The calcTriangleArea()method takes two int parameters (base and height), calculates thearea of a triangle, and assigns the value to a private instance variable (area). ThecalcTrianglePerimeter()method takes three int parameters (lengthSide1, lengthSide2, andlengthSide3), calculates the perimeter of a triangle, and assigns the value to a private instancevariable (perimeter). The Shapes class also includes two getter methods, which return thecalculated values. The Shapes class implements the Calculatable interface.Write the Shapes class and the Calculatable interface.2. Write an abstract method convertMinutes() that takes minutes as an int parameter and returns a double value.3. Write an abstract method convertInches() that takes inches as an int parameter and returns a double value.Thank you! how do i find my ip address subnet mask gateway and dns server factorise 9x^2 +4y^2+Z^2-12xy+4yz-6xz fast pls A bag of garden soil weighs 38 pounds and holds 4 cubic feet. Find the weight of 15 bags in kilograms and the volume of 15 bags in cubic yards. Determine the complex rms equivalents of the following time harmonic electric and magnetic field vectors: (a) E=10e 0.02xcos(310 10t250x+30 ) y^V/m (b) H=[cos(10 8tz) x^+sin(10 8tz) y^]A/m, and (c) E=0.5sin0.01ysin(310 6t) z^V/m ( t in s;x,y,z in m). If 52 bacterial colonies grow on a nutrient agar plate inoculated with 1 ml of a 1:1000 dilution of hamburger, how many bacteria are in the original hamburger sample A cart of mass 0.5 kg sits at rest on a table on which it can roll without friction. It is attached to an unstretched spring. You give the mass a push with a constant force over a distance of 5 cm in the direction that compresses the spring, after which the mass starts undergoing simple harmonic motion with a frequency of 0.5 complete oscillations per second and an amplitude of 15 cm.A) What is the spring constant of the spring?B) How fast was the cart moving at the instant when you finished pushing it?C) What force did you exert on the cart? Please help me with this homework Less strict regulation results in many more companies obtaining the right to mine coal in Mpumalanga. At the same time, alternative energy solutions result in a decrease in the demand for coal-generated electricity. Explain how the market for coal will be affected by these changes. Clearly indicate how the equilibrium price and equilibrium quantity of coal will be affected by these changes. Make use of a combination of diagrams and verbal explanations to explain your answer. i need help part 3Tonyas class planted sunflowers and the students are tracking the growth of their individual plants. The table shows the height of Tonyas plant t days after she planted her sunflower seed.If the growth of the sunflower continues at the same rate, what is the expected height, in inches, on day 55? Show your work or explain your thinking. 36.8 is the sum of r and 13.8 x=