Question 3 of 25
What does the number of hertz measure in a CPU?
A. How quickly the data in RAM can be read, changed, and
overwritten
B. How fast a CPU can process data, indicating performance
O c. How many bits are fed into a CPU in a certain amount of time
D. How much data is stored magnetically and is used for long-term

Answers

Answer 1
B as clock speed measures the amount of fetch-decode-excute cycles per second, or the amount of data processed per second measure in GHz.
Answer 2

How fast a CPU can process data, indicating performance does the number of hertz measure in a CPU. Hence, option B is correct.

What is process data?

Process data is information about a business process that builds up in an XML document during the course of the process, in accordance with configured instructions in the BPML.

a stock trading program that creates a straightforward graph from millions of stock data points. Customers' search histories are used by an online retailer to suggest related products. A digital marketing company develops location-specific ads using demographic information about consumers.

Batch processing, real-time processing, and online processing are the models. Data processing that is done in batches is known as batch processing. This indicates that each item of data is processed separately.

Thus, option B is correct.

For more information about process data, click here:

https://brainly.com/question/30094947

#SPJ2


Related Questions

Using the PDF handout provide you will identify the seven functions of marketing and provide
examples of each function of marketing.
Explain how each core function works together to help us carry out the
marketing concept. You will be evaluated on your ability to accurately identify all seven functions, explain each function and provide examples (at least two) of each.

Using the PDF handout provide you will identify the seven functions of marketing and provideexamples

Answers

The Explanation of  how each core function works together to help us carry out the marketing concept is given below.

How do marketing functions work together?

The marketing function is known to be used in regards to selling and it is one that helps businesses to achieve a lot.

The six marketing functions are:

Product/service management, Marketing-information management, Pricing, Distribution, Promotion, selling.

The functions are known to often work together to be able to obtain products from producers down to the consumers.

Hence, each of the marketing functions is known to be one that need to  be done on its own, but they are said to be very effective, if the said functions work together as a team.

Learn more about marketing functions from

https://brainly.com/question/26803047

#SPJ1

program a macro on excel with the values: c=0 is equivalent to A=0 but if b is different from C , A takes these values

Answers

The followng program is capable or configuring a macro in excel

Sub MacroExample()

   Dim A As Integer

   Dim B As Integer

   Dim C As Integer

   

   ' Set initial values

   C = 0

   A = 0

   

   ' Check if B is different from C

   If B <> C Then

       ' Assign values to A

       A = B

   End If

   

   ' Display the values of A and C in the immediate window

   Debug.Print "A = " & A

   Debug.Print "C = " & C

End Sub

How does this work  ?

In this macro, we declare three integer   variables: A, B, and C. We set the initial value of C to 0 and A to 0.Then, we check if B is different from C using the <> operator.

If B is indeed different from C, we assign the value of B to A. Finally, the values of A and C are displayed   in the immediate window using the Debug.Print statements.

Learn more about Excel:
https://brainly.com/question/24749457
#SPJ1

e. Define the following terms: i. BIT ii. Nibble iii. Byte​

Answers

i. A bit is the smallest unit of digital information that can be processed by a computer. It has a value of either 0 or 1.

ii. A nibble is a group of four bits or half a byte. It can represent 16 possible values, ranging from 0000 to 1111 in binary.

iii. A byte is a unit of digital information that consists of eight bits. It can represent 256 possible values, ranging from 00000000 to 11111111 in binary. Bytes are used to represent characters, numbers, and other types of data in computer systems.

___ is one of the primary languages used to compose and retrieve web pages and support the presentation of pictures with marked areas.
a. XML b. HTTP
c. SGML d. CSS

Answers

d. CSS is one of the primary languages used to compose and retrieve web pages and support the presentation of pictures with marked areas.

The Power of CSS: How CSS Supports Web Presentations

The internet has revolutionized the way we access and share information, and the development of CSS has been vital in making this possible. CSS stands for Cascading Style Sheets and is a language used to create and retrieve web pages and support the presentation of photos and other visual elements. By using CSS, web developers have the power to customize the look and feel of a page, making it easier for the user to understand the information presented.

CSS is made up of a series of rules and declarations, which are used to define the style of elements that make up a website. This includes things like fonts, colors, and layout. By utilizing these rules and declarations, developers can create a visual hierarchy on the page, allowing users to quickly understand the most important information. Additionally, CSS helps support the presentation of pictures with marked areas, allowing developers to highlight specific areas on an image or use it to create an interactive experience.

Learn more about CSS:

https://brainly.com/question/27333413

#SPJ4

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.

Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.

Ex: If the input is:

apples 5
shoes 2
quit 0
the output is:

Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy

Answers

Answer:

Explanation:

import java.util.Scanner;

public class MadLibs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String word;

       int number;

       do {

           System.out.print("Enter a word: ");

           word = input.next();

           if (word.equals("quit")) {

               break;

           }

           System.out.print("Enter a number: ");

           number = input.nextInt();

           System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");

       } while (true);

       System.out.println("Goodbye!");

   }

}

In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.

Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.

difference between liner land nonlinear presentation​

Answers

Answer: The linear multimedia will go from the start all the way through to the finish without variation. Non-linear media is the opposite; it doesn't follow that one-way structure and instead allows free movement around all aspects of the multimedia in any order.

Ray is recording his voice for a presentation and can adjust the bit depth. Increasing the bit depth will mean that sound is sampled more​

Answers

Answer:

this is true because of the depth interference

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

list the field in the tcp header that are missing from udp header

Answers

Answer:

Sequence number, acknowledgement number, data offset, res, flags, window size, checksum, urgent pointer, options.

Explanation:

Check out the picture for details. "Missing" is not really the right term, since UDP has a different purpose than TCP. TCP needs these headers to form a connection oriented protocol, whereas UDP is a fire-and-forget type of packet transfer.

list the field in the tcp header that are missing from udp header

A choropleth map is used to
Group of answer choices

do a scatter plot.

show live satellite images.

present geographical regions in 3D.

present geographical regions coloured, shaded, or graded according to some variable.

Answers

4- present geographical regions colored, shaded, or graded according to some variable :)

Examine the information in the URL below.

http://www.example/home/index.html

In the URL, what is the subdomain and what is the domain name?

A The subdomain is http:// and the domain name is .html.
B The subdomain is /home/ and the domain name is http://.
C The subdomain is www and the domain name is example.com.
D The subdomain is example.com and the domain name is www.

Answers

Answer:

B The subdomain is /home/ and the domain name is http://.

Explanation:

Answer:

The subdomain is /home/ and the domain name is http://.

Explanation:

You wrote a list of steps the user will take to perform a task. Which statement is true about this step?
You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each
screen.
O Your app is functioning and ready to test.
O You have defined a use case.
O In this step, you defined your target audience and main goal.

Answers

The statements that are true about this step are:

In this step, you defined your target audience and main goal.You have drawn pictures of what your screens will look like and identified the input-process-output that occurs on each screen.Your app is functioning and ready to test.

What is a an app?

A mobile application, sometimes known as an app, is a computer program or software application that is meant to operate on a mobile device, such as a phone, tablet, or watch.

An app is a software program that allows users to do certain functions on their mobile or desktop device. Apps are either pre-installed on your device or downloaded through a specialized app store, such as the Apple App Store. Apps are usually created in a variety of programming languages.

Learn more about Apps:
https://brainly.com/question/11070666
#SPJ1

Perform an “average case” time complexity analysis for Insertion-Sort, using the given proposition
and definition. I have broken this task into parts, to make it easier.
Definition 1. Given an array A of length n, we define an inversion of A to be an ordered pair (i, j) such
that 1 ≤ i < j ≤ n but A[i] > A[j].
Example: The array [3, 1, 2, 5, 4] has three inversions, (1, 2), (1, 3), and (4, 5). Note that we refer to an
inversion by its indices, not by its values!
Proposition 2. Insertion-Sort runs in O(n + X) time, where X is the number of inversions.
(a) Explain why Proposition 2 is true by referring to the pseudocode given in the lecture/textbook.
(b) Show that E[X] = 1
4n(n − 1). Hint: for each pair (i, j) with 1 ≤ i < j ≤ n, define a random indicator
variable that is equal to 1 if (i, j) is an inversion, and 0 otherwise.
(c) Use Proposition 2 and (b) to determine how long Insertion-Sort takes in the average case.

Answers

a. Proposition 2 states that Insertion-Sort runs in O(n + X) time, where X is the number of inversions.

b. The expected number of inversions, E[X],  E[X] = 1/4n(n-1).

c. In the average case, Insertion-Sort has a time complexity of approximately O(1/4n²).

How to calculate the information

(a) Proposition 2 states that Insertion-Sort runs in O(n + X) time, where X is the number of inversions. To understand why this is true, let's refer to the pseudocode for Insertion-Sort:

InsertionSort(A):

  for i from 1 to length[A] do

     key = A[i]

     j = i - 1

     while j >= 0 and A[j] > key do

        A[j + 1] = A[j]

        j = j - 1

     A[j + 1] = key

b. The expected number of inversions, E[X], can be calculated as follows:

E[X] = Σ(i,j) E[I(i, j)]

= Σ(i,j) Pr((i, j) is an inversion)

= Σ(i,j) 1/2

= (n(n-1)/2) * 1/2

= n(n-1)/4

Hence, E[X] = 1/4n(n-1).

(c) Using Proposition 2 and the result from part (b), we can determine the average case time complexity of Insertion-Sort. The average case time complexity is given by O(n + E[X]).

Substituting the value of E[X] from part (b):

Average case time complexity = O(n + 1/4n(n-1))

Simplifying further:

Average case time complexity = O(n + 1/4n^2 - 1/4n)

Since 1/4n² dominates the other term, we can approximate the average case time complexity as:

Average case time complexity ≈ O(1/4n²)

Therefore, in the average case, Insertion-Sort has a time complexity of approximately O(1/4n²).

Learn more about proposition on

https://brainly.com/question/30389551

PLEASE HURRY 30 POINTS
Which of the following statements describes the way networks are set up?

LANs are made up of LANs.

WANs are made up of WANs.

LANs are made up of WANs.

WANs are made up of LANs.

Answers

Wans are made up of lans

Answer:

WANs are made you of LANs

Explanation:

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

HACK ATTACK (MyPltw) MIT app inventor (1.2.2) - I need help on doing the actual hacking algorithm. If someone has done it before please show me how. These blocks are the ones that need to be edited.

HACK ATTACK (MyPltw) MIT app inventor (1.2.2) - I need help on doing the actual hacking algorithm. If

Answers

Answer: 1.4.3.6.2  Is the order they should be in from there!!!

Explanation:

Write the function which takes an arbitrary real number p , and returns true if the numeber is equals to some power of 2, i.e. p=2n for some n . Your task is to implement a recursive function power_of_2 withount using loops and library functions.

Answers

def power_of_2(p):

   if p == 2:

       return True

   elif p < 2:

       return False

   return power_of_2(p/2)

print(power_of_2(32))

The function keeps dividing the number by 2 until it is equal to 2 or the number ends up being less than 2. If at some point the number is equal to 2, it is a power of 2 otherwise it's not a power of 2.

Make the cardnumber field required and add the regular expression pattern indicated in the comment section of the HTML file to help ensure that a valid card number is used.

Answers

The HTML code for your required program-

<!DOCTYPE html>

<html lang="en">

<head>

 <meta charset="UTF-8" />

 <meta name="viewport" content="width=device-width, initial-scale=1.0" />

 <link rel="stylesheet" href="style.css" />

 <title>Browser</title>

</head>

<body>

 <form id="paymentform">

 <label for="cardtype">Credit Card Type:</label>

 <select id="cardtype" name="cardtype" required>

   <option value="">Credit Card Type</option>

   <option value="amex">American Express</option>

   <option value="disc">Discover</option>

   <option value="master">MasterCard</option>

   <option value="visa">Visa</option>

How to explain the program

Each form field is labeled with a <label> element and is either an <input> element or a <select> element.

The id and name attributes are used to give each element a unique identifier that can be used in CSS and JavaScript to style and manipulate the element.

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

_____ is responsible for packet forwarding. Group of answer choices Internet Protocol Transmission Control Protocol User Datagram Protocol Extensible Authentication Protocol

Answers

Answer:

Networklayer is the correct answer

Internet Protocol is responsible for packet forwarding. Hence, option A is correct.

What is packet forwarding?

The fundamental technique for distributing data among systems on a network is packet forwarding. Typically on two distinct systems, packets are transmitted between a source interface and a destination interface.

In the data plane, forwarding is the process of deciding the path packets will take from source to destination. In the control plane, routing is the process of transporting packets from a router's input to the correct router output.

When uIP gets a packet with a destination IP address that does not match any of the node's IP addresses, packet forwarding is carried out. A node often has several addresses, including at least one broadcast or multicast address and one or more unicast addresses.

Thus, option A is correct.

For more information about packet forwarding, click here:

https://brainly.com/question/20813972

#SPJ6

There must be security policies in place to set core standards and requirements when it comes to encrypted data.

a. True
b. False

Answers

You’re best answer has to be A

Complete the sentence.
For self-driving cars, both the programmers of the software and governments who regulate them must adhere to
intellectual property laws
ethical principles
noncompete agreements
- to safeguard that the software that controls the car is capable of making life-or-death

Answers

Answer:

[ C ]  governments who regulate the car industry

[ D ]  the programmers who create the software that control the car

Proof:

Complete the sentence.For self-driving cars, both the programmers of the software and governments who

Governments who regulate the car industry, the programmers who create the software that control the car are the complete sentence.

What is car industry?

Car industry is the place where the manufacturing of the cars and automobile parts are placed. Car industry  do manufacturing work for the selling purpose. The company may be directly or indirectly engage in the selling industry.

Thus, sentences are completed.

For more details about car industry, click here:

https://brainly.com/question/1139792

#SPJ2

This program needs to be written in Java. Along with NO For/while loops, and no methods.

Binary to decimal

Write a program that prompts the user to enter a four binary numbers as a string and displays its corresponding decimal value. Here are sample runs:



Enter a four-digit binary string: 1111

The decimal number for 1111 is 15

Answers

The only way without a while loop and no method I can think of is use switch with every possible variation of the four digit binary which is 15.

Here is the starter code:

import java.util.Scanner;
public class MyClass {
public static void main(String args[]) {
Scanner sc = new Scanner(System.in);
int digit = sc.nextInt();
switch(digit) {
case 0000:
System.out.println("0");
break;
case 0001:
System.out.println("1");
break;
case 0010:
System.out.println("2");
break;
case 0011:
System.out.println("3");
break;
case 0100:
System.out.println("4");
break;

… (fill in other cases)


}
}
}

Use this link: https://www.electronics-tutorials.ws/binary/bin_3.html

There might be a better way, but without loops or methods this is all I got.

For a quick analysis of the individual amenities, you will add Sparklines.

In cell range H5:H11, add Column Sparklines that chart the advertising expense by amenity type over the months January to June.
Apply the style Dark Blue Sparkline Style Accent 5, Darker 50%.

Answers

To add Column Sparklines in Excel and apply the style Dark Blue Sparkline Style Accent 5, Darker 50%, you can follow these steps below.

What is the Sparklines?

The steps are:

Select the cell range H5:H11 where you want to add the Column Sparklines.Go to the "Insert" tab in the Excel ribbon.Click on the "Column Sparklines" button in the "Sparklines" group.In the "Create Sparklines" dialog box, select the range of data that corresponds to the advertising expense by amenity type over the months January to June.Choose "Column" as the Sparkline type and click "OK".The Column Sparklines will be added to each cell in the selected range.To apply the Dark Blue Sparkline Style Accent 5, Darker 50% to the Column Sparklines, select all the sparklines.Go to the "Design" tab in the Excel ribbon.

Lastly, In the "Sparkline Styles" group, select the style "Dark Blue, Sparkline Style Accent 5, Darker 50%". The style will be applied to all the sparklines in the selected range.

Learn more about Sparklines from

https://brainly.com/question/29832130

#SPJ1

Here is the header for a function named computeValue:
void computeValue(int value)
Which of the following is a valid call to the function?
A) computeValue(10)
B) computeValue(10);
C) void computeValue(10);
D) void computeValue(int x);

Answers

Answer:

B) computeValue(10);

Explanation:

Given

Header: void computeValue(int value)

Required

Determine the valid call

To call a function from another function or from the main, the following syntax has to be used.

function-name(parameter-1, parameter-2, parameter-3,.....,parameter-n);

In the function header given:, the following can be observed:

The function name is computeValueIt has only one parameter and it is of type integer

So, to call the function; we make use of computeValue(10);

Where 10 represents the value of the parameter (i.e. argument)

(Geometry: area of a triangle)
Write a C++ program that prompts the user to enter three points (x1, y1), (x2, y2), (x3, y3) of a triangle and displays its area.
The formula for computing the area of a triangle is:
s = (side1 + side2 + side3) / 2
area = square root of s(s - side1)(s - side2)(s - side3)

Sample Run:
Enter three points for a triangle: 1.5 -3.4 4.6 5 9.5 -3.4
The area of the triangle is 33.6

Answers

A C++ program that prompts the user to enter three points (x1, y1), (x2, y2), (x3, y3) of a triangle and displays its area is given below:

The C++ Code

//include headers

#include <bits/stdc++.h>

using namespace std;

//main function

int main() {

//variables to store coordinates

float x1,x2,y1,y2,x3,y3;

cout<<"Please Enter the coordinate of first point (x1,y1): ";

// reading coordinate of first point

cin>>x1>>y1;

cout<<"Please Enter the coordinate of second point (x2,y2): ";

// reading coordinate of second point

cin>>x2>>y2;

cout<<"Please Enter the coordinate of third point (x3,y3): ";

// reading coordinate of third point

cin>>x3>>y3;

//calculating area of the triangle

float area=abs((x1*(y2-y3)+x2*(y3-y1)+x3*(y1-y2))/2);

cout<<"area of the triangle:"<<area<<endl;

return 0;

}

Read more about C++ program here:

https://brainly.com/question/20339175
#SPJ1

Create a program that allows the user to pick and enter a low and a high number. Your program should generate 10 random numbers between the low and high numbers picked by the user. Store these 10 random numbers in a 10 element array and output to the screen.
In java code please.

Answers

Answer:

import java.util.Scanner;

import java.util.Arrays;

import java.util.Random;

public class Main {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   System.out.print("Enter low: ");

   int low = scan.nextInt();

   System.out.print("Enter high: ");

   int high  = scan.nextInt();

   scan.close();

   int rndnumbers[] = new int[10];

   Random r = new Random();

   for(int i=0; i<rndnumbers.length; i++) {

     rndnumbers[i] = r.nextInt(high-low+1) + low;

   }

   for(int i=0; i<rndnumbers.length; i++) {

     System.out.printf("%d: %d\n", i, rndnumbers[i]);

   }

 }

}

What is the latency of a system?

The amount of data (in bits) that can be transmitted at any given time

The distance that data needs to travel in a network
thing

The time it takes for a bit to travel from sender to receiver

The strength of the network connection

Answers

Answer:

Latency meaning in networking is best thought of as the amount of time it takes for a packet of data to be captured, transmitted, processed through multiple devices, then received at its destination and decoded. Latency is measured in milliseconds, or during speed tests, it's referred to as a ping rate.

Explanation:

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

a really excellent way of getting you started on setting up a workbook to perform a useful function.

Answers

Templates a really excellent way of getting you started on setting up a workbook to perform a useful function.

What is the workbook  about?

One excellent way to get started on setting up a workbook to perform a useful function is to begin by defining the problem you are trying to solve or the goal you want to achieve. This will help you determine the necessary inputs, outputs, and calculations required to accomplish your objective.

Once you have a clear understanding of your goal, you can start designing your workbook by creating a plan and organizing your data into logical categories.

Next, you can start building the necessary formulas and functions to perform the required calculations and operations. This might involve using built-in functions such as SUM, AVERAGE, or IF, or creating custom formulas to perform more complex calculations.

Read more about workbook here:

https://brainly.com/question/27960083

#SPJ1

Other Questions
The nurse is assisting a client with limited mobility to turn in bed. After successfully turning the client to the side, where would the nurse place an additional pillow?. Which of the following distinctions does Russia enjoy?It has had more kinds of governments in its history than any other country.It is the northernmost country in the world.It is the only country in the world with large areas of tundra inside its borders.It is by far the largest country in the world. The standard curve was made by spectrophotographic analysis of equilibrated iron(III) thiocyanate solutions of known concentration. You are asked to analyze a Fe(SCN)2+ solution with an unknown concentration and an absorbance value of 0.410 . The slope-intercept form of the equation of the line is y=4541.6x+0.0461 . The unknown was analyzed on the same instrument as the standard curve solutions at the same temperature. What is the Fe3+ concentration of the unknown solution? 8 - (7/10)t = 6 - (1/5)t MY TEETH ARE BURNING AHHHH AND MY HEAD HURTS BECAUSE I ATE MY ICE CREAM TOO FAST how much energy is needed to ionize a hydrogen atom that is in the n = 5 state? Re-write the sentences below by correcting the faults in them1. The cowboy was thrown by the bull in a leather vest.2. Left alone in the house, the thunderstorm terrified the two small children.3. They gave prizes to the top contestants in gift-wrapped boxes.4. Abena walked carefully, in a slow way, and halted a lot.5. Examples of aerobic exercises are running, take a swim, cycling and long walks. A 75 inch pipe is cut into two peices. One peice is two times the length of the other find the length of the shorter pipe I need help with number 3the equation is 4Al+3O2=2Al2O3 N almot all cae, touching power line or coming into contact with energized ource will reult in what? How did stresemann ensure the Weimar Republics recovery? When you sit on a chair, the force that you sit on thechair with is exerted in all direction.Fact or cap Ella is reading a book. on monday she reads some pages. On tuesday she reads a quarter of the pages remaining. Ella has now read three fifths of the book. She has read 69 pages more than she still has left to read. How many pages did she read on monday? Find the distance from M to N on the coordinate plane if M(-5,8) and N(9,-2). V MALIGTranh tranhain vou colution A rectangular prism is being designed to have a volume of 36 cubic units. Find the minimum surface area in square units for the prism if the edge lengths are positive integers. (a) does your bathroom mirror show you older or younger than your actual age? (b) compute an orderof-magnitude estimate for the age difference, based on data you specify. What of the following is NOT a formula for circumference?a) C=2r b) C=r c) C=d 28- The yield to maturity on a bond is I. above the coupon rate when the bond sells at a discount, and below the coupon rate when the bond sells at a premium II. the discount rate that will set the present value of the payments equal to the bond price fil. equal to the true compound return on investment only if all interest payments received are reinvested at the current yield A. I only B. II only C. I and II only D. I, II and III control center of the endocrine system that secretes many hormones. Find the original price given the total amount and tip rate. Total price 307.32 tip rate 20%