Multiple jobs can run in parallel and finish faster than if they had run sequentially. Consider three jobs, each of which needs 10 minutes of CPU time. For sequential execution, the next one starts immediately on completion of the previous one. For parallel execution, they start to run simultaneously. In addition, "running in parallel" means that you can use the utilization formula that was discussed in the chapter 2 notes related to Figure 2-6.
For figuring completion time, consider the statements about "X% CPU utilization". Then if you're given 10 minutes of CPU time, that 10 minutes occupies that X percent, so you can use that to determine how long a job will spend, in the absence of competition (i.e. if it truly has the computer all to itself). The utilization formula is also useful for parallel jobs in the sense that once you figure the percentage CPU utilization and know the number of jobs, each job should get an equal fraction of that percent utilization...
What is the completion time of the last one if they run sequentially, with 50% CPU utilization (i.e. 50% I/O wait)?
What is the completion time of the last one if they run sequentially, with 30% CPU utilization (i.e. 70% I/O wait)?
What is the combined completion time if they run in parallel, with 50% CPU utilization (i.e. 50% I/O wait)?
What is the combined completion time if they run in parallel, with 20% CPU utilization (i.e. 80% I/O wait)?

Answers

Answer 1

Completion time of the last one if they run sequentially :If the last job runs sequentially at 50% CPU utilization, then the CPU will be idle for 50% of the time, which means it will be busy for only 50% of the time.

For this job to complete, it will need to have 100% CPU utilization because it can't get time-sharing with the other processes. So, in a total of 10 minutes, only 5 minutes will be used for the process 3 to complete. For process 2, after the completion of process 1, it will be able to utilize the full CPU resources. So, it will take another 10 minutes to complete its execution.

Similarly, Process 1 will also take 10 minutes to complete its execution as it needs 100% CPU utilization. Complete time of the last one if they run sequentially with 50% CPU utilization = 5+10+10 = 25 minutes. What is the completion time of the last one if they run sequentially, with 30% CPU utilization ?If the last job runs sequentially at 30% CPU utilization, then the CPU will be idle for 70% of the time, which means it will be busy for only 30% of the time.

To know more about cpu visit:

https://brainly.com/question/33636370

#SPJ11


Related Questions

On the cities worksheet, click cell f4 and enter a formula that will subtract the departure date (b1) form the return date (b2) and then multiply the result by car rental per day value (f3)

Answers

=(+B2-B1)*F3 is what you need to enter in cell F4

Excel functions usually begin with the equal to sign, "=", Hence, the excel formula which does the calculation stated above is =(B2 - B1)*F3

The operation in the bracket is performed first, which uses the subtraction operation to deduct the departure date from the return date.

The result of the bracketed operation is then multiplied by the number of car rentals per day, f3.

Hence, the required function is =(B2 - B1)*F3

Learn more : https://brainly.com/question/14459057

if involved in a boating accident causing serious bodily injury or death while boating under the influence, the operator has committed a _____.

Answers

Answer:

a felony.

Explanation:

Got u brother :)

Define data, information and the relation between the two?

Answers

Answer:

Program data is a type of information that a computer processes or retains. This data can be in the context of text records, photographs, etc.

Explanation:

In a particular context, information is a collected from different source, structured data provided which is beneficial to society. Data is a core objectives containing raw material which carries no special significance. Info is a collection of facts that bears a logical sense collectively.

a corporation establishes gateways gw1 and gw2 at different branches. they enable machines in different branches to communicate securely over the internet by implementing ipsec at the gateways only. that means that when a machine a inside the first network sends an ip packet to a machine b in the second network, the gateway gw1 intercepts the ip packet in transit and encapsulates it into an ipsec packet. at the other end, gw2 recovers the original ip packet to be routed in the second network to machine b. which of the two ipsec modes, tunnel or transport, and ah or esp, should be used in combination if it was desired that no internet eavesdroppers learn about the identities a and b of the communicating parties? why?

Answers

In order to ensure that no internet eavesdroppers learn about the identities of the communicating parties, the corporation should use the tunnel mode and the ESP protocol in combination.

The tunnel mode creates a new IP packet and encrypts the entire original packet, including the header, which hides the identities of the communicating parties. The ESP protocol provides confidentiality by encrypting the packet and also provides data integrity by adding a message authentication code (MAC) to the packet.  The AH protocol provides authentication and integrity but does not provide confidentiality. This means that even though the identities of the parties would be protected, the content of the communication would not be. Therefore, the ESP protocol should be used instead.  Here's why:
1. Tunnel mode: This mode is more suitable for gateway-to-gateway communication because it encapsulates the entire original IP packet, including the IP header, in a new IPsec packet. This way, the identities of the communicating parties (Machine A and Machine B) are hidden from internet eavesdroppers, as they can only see the gateway addresses (GW1 and GW2) in the new IPsec packet headers.
2. ESP (Encapsulating Security Payload): ESP provides both confidentiality (encryption) and data integrity (authentication) for the encapsulated IP packet. It is more appropriate in this case than AH (Authentication Header), which only provides data integrity without encryption. By using ESP, the corporation ensures that the contents of the communication between Machine A and Machine B are also protected from eavesdropping and tampering.

In summary, to prevent internet eavesdroppers from learning about the identities of the communicating parties (Machine A and Machine B) in the corporation's network, it is recommended to use Tunnel mode with ESP for implementing IPsec at the gateways GW1 and GW2.

Learn more about AH protocol here:

https://brainly.com/question/31926020

#SPJ11

A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmission to one address

Answers

Answer: Listerv

Explanation:

Difference between Hard copy and Soft copy?​

Answers

Answer: a hard copy is a printed or physical copy of a document, while a soft copy is a virtual or online copy of the document that is stored on your hard drive or computer.

Explanation:

For public int setData(int x, int y, String name) {} , identify a correct example of overloading the method.
Question options:
public float setData(int a, int b, String name) {}
public float setData(int x, float y, String name) {}
public int setData(int num1, int num2, String name) {}
public void setData(int x, int y, String name) {}

Answers

The correct example of overloading the method for public int setData(int x, int y, String name) {} is option C: public int setData(int num1, int num2, String name) {}.

This is because overloading a method means creating a new method with the same name but different parameters, in this case, changing the variable names from x and y to num1 and num2. The return type remains the same (int) and the third parameter (String name) is unchanged.

It is important to note that overloading a method allows for more flexibility and options in how the method can be used, but it is still important to ensure that each method has a distinct purpose and does not cause confusion for the user.

To know more about overloading visit:

https://brainly.com/question/3738775
#SPJ11

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

Answers

Hello, detailed code is available below. I will also add the source file in the attachment. Wish you success!

   

HELP ME PLS DUE TONIGHT WILL GIVE BRAINLIEST

scanner data where panel members are identified by an id card allowing each panel member's purchases to be stored with respect to the individual shopper are referred to as

Answers

Scanner data, where panel members are identified by an ID card and their purchases are tracked, is referred to as "Individual Shopper Data".

This type of data is collected by scanning the barcodes of the items purchased by a panel member, and linking this information to their individual ID card. This allows for a detailed analysis of each panel member's purchasing behavior, including the types of products they purchase, how often they purchase them, and the amount they spend. The data collected can be used by manufacturers, retailers, and market research firms to understand consumer behavior and make informed decisions about product development, marketing strategies, and inventory management. The data is also useful for monitoring the effectiveness of promotions, pricing strategies, and other marketing activities. The individual shopper data provides a rich and detailed understanding of consumer behavior and can help companies improve their offerings and increase sales.

To know more about data visit:

https://brainly.com/question/30409819

#SPJ4

Which are types of online resources that students can use for help? Select three options. Simulated labs web-based educational games educators classmates discussion forums.

Answers

Student can use discussion forums online for help.

Discussion forums

An online discussion forum are where users post messages to hold a discussion on specific topics. This are usually in the form of a learning management system.

These online discussion forums can be used by students for many purposes such as helping students prepare an assignment or exam, engaging them in specific topic discussion and many more.

Find out more on Discussion forums at: https://brainly.com/question/2290843

What is the index for “Ahmed” in the list [“James”, “Omar”, “Ahmed”, “Lee”, “Mia”]?
1
2
A
Ahmed
What is a method that deletes an item from a list using the item’s index?
Remove
Delete
Erase
Pop
What does HTML stand for?
Home Teachable Markup Language
Historical Text-Making Language
Hypertext Markup Language
Hyper Tutorial Maker Language
Using a while loop to iterate over a list requires an incrementing variable.
True
False
Katrina wants to get a random number and assign it to a variable called force. Which line of code should be used?
force = random.randint(1,10)
force = random(1,10)
force = randint(1,10)
force == random.randint(1,10)
You can add items to the end of a list using append.
True
False
Going through a list item by item is called “iterating over a list”.
True
False
Which keywords would be needed to convert this scenario into Python?

If the user picks up the rock, the program will respond by indicating that the user has disturbed the mummy. But if the user picks up the branch, he or she will get eaten by the monster. If the user scoops up leaves, he or she will discover a fairy.

if, if, if
if, elif, elif
if, else, else
if, then, last
A friend asks you to look over the code for an adventure game and help figure out why it won’t work. Which of these options is something that would cause a program to work improperly?
There is a user-defined function with two variables.
There is an infinite loop.
There are two lines of code beginning with elif in a row.
There is an if statement without an else statement.
Jorge is creating a program that will allow the user to enter race times to keep track of them. Which of the following will allow Jorge to manage the data that the user enters?
a Boolean variable
an elif statement
a list
a parameter
The time.sleep() method requires a number of seconds as a parameter.
True
False
What is the index of “tables” in the list [“table”, ”rug”, “chair”, “sofa”]?
0
1
2
3
The index of the first item on a list is 1.
True
False
If you create a function and you want it to pass a value back to the main program, what do you need to include in the function’s definition?
an iterating variable
a local variable
a return statement
a parameter
What kind of program has a looping branch of code?
sequence
selection
iteration
pseudocode
What is a number that refers to the position of an item on a list?
variable
parameter
operator
index
What would be the result of running these two lines of code?

devices = [“Laptop”, “Phone”, “Computer”]

print(devices[0])

0
Laptop
Phone
Computer
A block of CSS that is applied to a specific HTML element is called a:
segment.
chunk.
construction.
rule set.

What is the index for Ahmed in the list [James, Omar, Ahmed, Lee, Mia]?12AAhmedWhat is a method that
What is the index for Ahmed in the list [James, Omar, Ahmed, Lee, Mia]?12AAhmedWhat is a method that
What is the index for Ahmed in the list [James, Omar, Ahmed, Lee, Mia]?12AAhmedWhat is a method that
What is the index for Ahmed in the list [James, Omar, Ahmed, Lee, Mia]?12AAhmedWhat is a method that

Answers

Answer:

1. Pop

2. 2

3. Swim

4. add a / to the final h1 tag

(this is just the answers for the images)

Which of the following scenarios should be covered in a disaster recovery plan?

damage caused by lightning strikes
damage caused by flood
damage caused by a virus contamination
all of the above

Answers

A comprehensive disaster recovery plan should cover all of the mentioned scenarios, including damage caused by lightning strikes, flood, and virus contamination.

A disaster recovery plan is a crucial document that outlines procedures and strategies to minimize the impact of unforeseen events and restore business operations in the event of a disaster. Lightning strikes can cause power surges or electrical fires, leading to damage or destruction of critical infrastructure. Floods can result in water damage to equipment, facilities, and data storage systems. Virus contamination, such as malware or ransomware attacks, can disrupt operations, compromise data security, and potentially lead to data loss. By including all these scenarios in the disaster recovery plan, organizations can proactively prepare for and respond to these different types of disasters, ensuring continuity of operations and minimizing downtime and losses.

Learn more about Comprehensive disaster here; brainly.com/question/31545163
#SPJ11

Calculate the average high and low in python code for beginners pls

Answers

Answer:

There are two ways to find the average of a list of numbers in Python. You can divide the sum() by the len() of a list of numbers to find the average. Or, you can find the average of a list using the Python mean() function

Explanation:

Cs academy unit 4 creative task

Answers

could u elaborate on the question
Could you make the question more clear

exploit kits can be purchased by users to protect their computers from malware. true false

Answers

The statement is false. Exploit kits are not purchased by users to protect their computers from malware.

Exploit kits are tools used by attackers to take advantage of vulnerabilities in computer systems and to deliver malware. An exploit kit is a collection of pre-written software components that can be used to exploit vulnerabilities in popular software such as web browsers, plugins, and operating systems. When a user visits a compromised website, the exploit kit automatically detects the vulnerabilities in the user's system and delivers malware to the system. To protect against exploit kits and malware, users can take several steps, such as keeping their software up-to-date with the latest security patches, using anti-virus and anti-malware software, and exercising caution when clicking on links or downloading files from unknown sources. However, exploit kits themselves are not a tool that users can purchase to protect their computers from malware.

Learn more about computer systems here:

https://brainly.com/question/29468404

#SPJ11

The statement "exploit kits can be purchased by users to protect their computers from malware" is false.

Exploit kits are actually tools that are used by attackers to exploit vulnerabilities in computer systems and deliver malware. They are not designed to protect computers from malware, but rather to facilitate the delivery of malware onto vulnerable systems.

Exploit kits typically contain pre-written code that can be used to exploit known vulnerabilities in web browsers, plugins, and other software. When a user visits a website that has been compromised by an attacker, the exploit kit is used to deliver the malware to the user's system, usually without their knowledge or consent.

While it is not possible to purchase exploit kits to protect computers from malware, there are many other tools and strategies that can be used to protect systems from attacks. These include using anti-virus software, keeping software up to date with the latest security patches, using strong passwords, and being cautious when opening email attachments or clicking on links from unknown sources. Additionally, user education and awareness about cybersecurity best practices can go a long way in protecting against malware and other cyber threats.

Learn more about cybersecurity here:

https://brainly.com/question/31490837

#SPJ11


In an answer of at least two well-developed paragraphs, explain how the government
is involved in the circular flow of money and the circular flow of products.

Answers

The government plays a significant role in the circular flow of money and the circular flow of products. In the circular flow of money, the government acts as a regulator and stabilizer of the economy. The government regulates the economy by setting monetary and fiscal policies that influence interest rates, inflation, and economic growth. For instance, the government can use its monetary policy tools to increase or decrease the money supply, which affects the spending power of consumers, businesses, and financial institutions. This, in turn, affects the circular flow of money in the economy.

The government is also involved in the circular flow of products by creating policies and regulations that affect the production, distribution, and consumption of goods and services. For example, the government can set standards for the quality and safety of products, which affects the production and distribution processes. The government can also provide subsidies and tax incentives to promote the production and consumption of certain products. Additionally, the government can impose tariffs and trade barriers to protect domestic industries and regulate imports and exports, which affects the flow of products in the economy. Overall, the government's involvement in the circular flow of money and the circular flow of products is crucial in promoting economic stability, growth, and development.

Write a method that takes two circles, and returns the sum of the areas of the circles.

This method must be named areaSum() and it must have two Circle parameters. This method must return a double.

For example suppose two Circle objects were initialized as shown:

Circle circ1 = new Circle(6.0);
Circle circ2 = new Circle(8.0);
The method call areaSum(circ1, circ2) should then return the value 314.1592653589793.

You can call your method in the program's main method so you can test whether it works, but you must remove or comment out the main method before checking your code for a score.

Answers

Answer:

public static double areaSum(Circle c1, Circle c2){

 double c1Radius = c1.getRadius();

 double c2Radius = c2.getRadius();

 return Math.PI * (Math.pow(c1Radius, 2) + Math.pow(c2Radius, 2));

public static void main(String[] args){

 Circle c1 = new Circle(6.0);

 Circle c2 = new Circle(8.0);

  areaSum(c1,c2);

 }

Explanation:

The function calculates the sum of the area of two circles with their radius given. The program written in python 3 goes thus :

import math

#import the math module

def areaSum(c1, c2):

#initialize the areaSum function which takes in two parameters

c1 = math.pi * (c1**2)

# calculate the area of the first circle

c2 = math.pi * (c2**2)

#Calculate the area of the second circle

return c1+c2

#return the sum of the areas

print(areaSum(6.0, 8.0))

A sample run of the program is attached

Learn more : https://brainly.com/question/19973164

Write a method that takes two circles, and returns the sum of the areas of the circles.This method must

A system forensics specialist has three basic tasks related to handling evidence: find evidence, preserve evidence, and __________ evidence.

Answers

A system forensics specialist has three basic tasks related to handling evidence: find evidence, preserve evidence, and prepare evidence.

What is an example of real evidence?

Real evidence, often called physical evidence, consists of material items involved in a case, objects and things the jury can physically hold and inspect. Examples of real evidence include fingerprints, blood samples, DNA, a knife, a gun, and other physical objects.

What are the two main types of evidence?

There are two types of evidence; namely, direct evidence and circumstantial evidence. In this case, the People contend that there is circumstantial evidence of the defendant's guilt.

To learn more about Real evidence, refer

https://brainly.com/question/25881788

#SPJ4

what is an example of an absolute cell reference​

Answers

Answer:

Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.

Explanation:

Bob is interested in examining the relationship between the number of bedrooms in a home and its selling price. After downloading a valid data set from the internet, he calculates the correlation. The correlation value he calculates is only 0.05. What does Bob conclude? Bob gives up on his research because r=.05 means there is no relationship of any kind between bedrooms and selling price. Bob continues his research because even though there is no linear relationship here, there could be a different relationship.

Answers

Bob continues his research because even though there is no linear equation relationship between the number of bedrooms and selling price, there could be another type of relationship.

Bob continues his research because even though the correlation value he calculated between the number of bedrooms and the selling price was only 0.05, this does not necessarily mean that there is no relationship of any kind between these two variables. It simply means that there is no linear relationship between the two. There could still be other types of relationships between the two variables, such as an exponential or quadratic relationship. It is possible that further analysis and exploration of the data set would reveal such a relationship and allow Bob to uncover the relationship between the two variables. Additionally, even if the correlation value is low, it does not necessarily mean that there is no relationship between the two variables. It simply means that the relationship is weak. Therefore, Bob should continue his research in order to uncover any potential relationships between the number of bedrooms and selling price.

Here you can learn more about linear equation

brainly.com/question/11897796

#SPJ4

Information on development of. GUI in past 10 years

Answers

Answer: GUI applications will focus more on assuring customers that the software is trustworthy and that private data is handled securely, while still offering a level of convenience. There have been a few significant breakthroughs in terms of use, but the same organizational metaphors and interaction idioms are still in use. Desktop computers are often controlled by computer mice &/or keyboards, while laptops often have a touchpad & smartphones and tablets have touchscreens.

Explanation:

For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False

Answers

False, sas is hold more then sata disks do

The given statement is false that, SAS disks are preferable over SATA disks for business systems or servers accessed continuously.

What is the SATA disks?

The majority of desktop and laptop hard drives use the SATA (or Serial Advanced Technology Attachment) interface, which was first introduced in 2003. Despite being rotary hard drives with spinning platters and a moving needle that writes data to successive sectors on each platter, they are known as SATA hard drives.

Serial ATA (Serial Advanced Technology Attachment, or SATA) is a command and transport protocol that outlines how data is transferred between a computer's motherboard and these types of mass storage devices (SSDs).

Therefore, it is false.

Learn more about the SAS disks, refer to:

https://brainly.com/question/28310028

#SPJ2

I’m making a form app in Construct 3. The way it accesses forms is using a url like “forms.Mnazz.com#{form-id}” and when it gets to the page it detects it has a form ID then it connects to multiplayer using the multiplayer object and my server gives the client the HTML code of the form. The form includes meta data for rich link previews. I was wondering if rich link previews stay long enough to receive the HTML meta data code?

Answers

Rich link previews are typically generated by social media platforms, messaging apps, or other services that extract metadata from a URL and display it as a preview in the user interface.

What is the explanation for the above response?

Rich link previews are typically generated by social media platforms, messaging apps, or other services that extract metadata from a URL and display it as a preview in the user interface. The metadata includes information such as the page title, description, image, and other relevant data.

The duration that rich link previews stay visible depends on the specific platform or application that displays them. Some may only show the preview briefly, while others may keep it visible for a longer period.

In your case, if the app or platform that displays the link preview stays active and visible long enough for the HTML meta data code to be received, then the preview should display the relevant metadata. However, if the preview disappears before the metadata is received, the user may not see the complete preview.

Learn more about meta data  at:

https://brainly.com/question/14960489

#SPJ1

difference between data bus and address bus and control bus​

Answers

Answer: The address bus carries the information about the device with which the CPU is communicating and the data bus carries the actual data being processed, the control bus carries commands from the CPU and returns status signals from the devices.

Please please help ASAP it’s timed

Please please help ASAP its timed

Answers

Answer:By pressing the Control key and the “C” key

Explanation:

Hopefully it could help you

Where is the first port of call made once the oracle database server has been traced?

Answers

The first port of call made once the Oracle database server has been traced is the listener. The listener is a separate process that runs on the database server and listens for incoming client connection requests.

It acts as a communication gateway between the clients and the database server. Here is a step-by-step explanation of how the process works. When a client initiates a connection request to the database server, the listener intercepts this request. The listener verifies the client's credentials and checks if the requested service is available on the server.

To better understand this concept, let's consider an example. Suppose you have an application running on your computer that needs to retrieve data from an Oracle database. When you run the application and it tries to connect to the database, the first point of contact is the listener.  

To know more about database visit:

https://brainly.com/question/30163202

#SPJ11

What are computer skills?​

Answers

Answer:

Explanation:

like programming or hacking ,  or game design,   maybe telecommunication controls ( think cell phone )

Yeah programming and hacking

which component of the data hierarchy is ranked just below the database and represents a collection of similar entities?

Answers

Files component of the data hierarchy is ranked just below the database and represents a collection of similar entities

What is a data hierarchy ?

A database's data is organized and structured using a data hierarchy. A data hierarchy is a set of ranked groups within a system, arranged from the smallest to the largest unit.

Hence, Files component of the data hierarchy is ranked just below the database and represents a collection of similar entities

You can learn more about hierarchy for finding information from the given link:

https://brainly.com/question/7351245

#SPJ4

Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her

Answers

Explanation:

A lot of people with dyslexia can relate to Stephanie.

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHz Bandwidth per channel: 40 MHz Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do

Answers

Answer:restart your internet box

Explanation:

Other Questions
how many resistors are found in the circuit? Take a look at the picture! Which statement below best describes an advantage of obtaining alicense? * Find the slope (4,-1) (-2,6) 2. Public cloud computing offers three key benefits to organizations including a. reduced costs, increased data privacy and security, and vendor lock-in b. flexible computing capacity, freedom from performance issues, and increased redundancy in the event of disaster c. freedom from performance issues, reduced costs, and vendor lock-in d. increased redundancy in the event of disaster, reduced costs, and flexible computing capacity Mi libro favorito es El Seor de los Anillos. Answer Prompts: libro/favorito In a tryst with destiny who is the speakers audience in this passage A train leaves the station at time t0. Traveling at a constant speed, the train travels 360 kilometers in 3 hours. Write a function that relates the distance traveled d to the time t The area of a pool floor is 476.625 square feet. The length of the pool floor is 15.5 feet. What is the width of the pool floor? I am giving 15 points for this or 10 thanks for the help I will also heart your work! define corruption free society!!* For what value of is csc undefined? 0 90 270 315 the algebraic expression that represents "The product of 12 and a number, n. What is similar about how floodplains and alluvial fans form? What is different? The writings of Harriet Tubman and Frederick Douglass are primary sources about slavery because these writerscome well known US political leadershad the worst CME W PLEASE HELP :))Select the correct answer from each drop-down menu consider the given trianglesThe length of side PR in PQR is____ and the measure of J in JKL is___ Lara uses the standard mileage method for determining auto expenses. During 2020, she used her car as follows: 21,800 miles for business, 4,360 miles for personal use, 6,540 miles for a move to a new job, 2,180 miles for charitable purposes, and 1,090 miles for medical visits. Presuming that all the mileage expenses are allowable (i.e., not subject to percentage limitations), what is Lara's deduction for: why do you think it has been difficult to conduct research onthe effectiveness of community policing? Ramauri is thinking of a mystery number. He cuts it in half then takes away 9. The result is -5. What is the mystery number After reading about tectonics explain how plate movements may haveeffected you. Explain how this movement is beneficial to the worldand how it is harmful at the same time.150words which method of thermal energy transfer would be fastest through a vacuum, which would be fastest through a gas, and which would be fastest through a solid? Rewrite the equation below so that it does not have fractions.