When using the __________ logical operator, one or both of the subexpressions must be true for the compound expression to be true.

a. or

b. and

c. not

d. maybe

Answers

Answer 1

The correct logical operator is option a. "or." The "or" logical operator requires at least one of the subexpressions to be true for the compound expression to be true.

The "or" logical operator is used when one or both of the subexpressions must be true for the compound expression to be true. In other words, if either one of the subexpressions evaluates to true, then the whole compound expression is considered true. This means that if both subexpressions are false, the compound expression would also be false.

For example, let's consider the following compound expression: (A or B). If A is true and B is false, the compound expression would be true because at least one of the subexpressions (A) is true. Similarly, if A is false and B is true, the compound expression would also be true. Only when both A and B are false would the compound expression evaluate to false.

The "or" logical operator is particularly useful when dealing with conditions where multiple possibilities need to be considered, and it provides flexibility in decision-making by allowing for more than one true condition.

Therefore, the option a is correct.

Learn more about  Logical operator

brainly.com/question/13382082

#SPJ11


Related Questions

Im boing exam help please In a category-based course grading system, teachers weigh a student's performance in all courses. all categories equally. some categories more heavily than others. extra credit as a bonus.

Answers

Answer:

some categories more heavily than others.

Explanation:

A category-based course grading system is a form of a grading system that involves an examiner to set up different categories of the overall assessment and at the same time placed different weight or marks over each category.

Therefore, the examiners weigh a student's performance in " some categories more heavily than others." For example, an examiner placed different weight over different categories in the overall assessment

1. Homework category: 30%

2. Classwork category: 20%

3. Quiz category: 20%

4. Final exam category: 30%

Answer:

B

Explanation:

______defines type of value a data can contain.
in python

Answers

Answer:

Data type

Explanation:

I remember learning this in computer class. The data type is a classification that specifies which type of value a variable has and what type of mathematical, relational, or logical operations can be applied to it without causing an error. I may be wrong, if I am wrong, I am sorry it has been a long time since I learned this.

an attack that forges the sender's ip address is called:

Answers

An attack that forges the sender's IP address is called IP Spoofing.

IP spoofing is a hacking technique where an attacker creates or modifies the packet headers in such a way that they appear to come from a reliable source.

IP spoofing is commonly used in Distributed Denial of Service (DDoS) attacks and Man-in-the-Middle (MitM) attacks.

IP spoofing conceals the source of an attack and makes it challenging to locate the attacker.

To implement an IP spoofing attack, the attacker must first obtain the IP address of the target system.

When the attacker has the target's IP address, they can forge a packet that seems to come from that IP address, allowing the attacker to appear to be someone else to the target system.

IP spoofing is possible because the Internet Protocol (IP) does not provide a way for the recipient of a packet to verify that the sender's IP address is genuine.

Therefore, it is relatively simple for an attacker to craft a packet that appears to come from a reliable source.

Know more about IP Spoofing here:

https://brainly.com/question/31449709

#SPJ11

what is VLSI stand for​

Answers

very large scale interrogation

which type of attack is wep extremely vulnerable to?

Answers

WEP is extremely vulnerable to a variety of attack types, including cracking, brute-force, IV (Initialization Vector) attack, and replay attack.

What is Initialization Vector?

An Initialization Vector (IV) is a random number used in cryptography that helps to ensure the uniqueness and randomness of data used in an encryption process. The IV is typically used as part of an encryption algorithm, where it is combined with a secret key to encrypt a message. The IV is unique for each encryption session, and must be unpredictable and non-repeating. A good IV should not be reused across multiple encryption sessions, and it should be kept secret from anyone who does not have access to the decryption key. Without a good IV, a cryptographic system can be vulnerable to attacks such as replay attacks, where an attacker can gain access to the system by repeating an encrypted message.

To learn more about Initialization Vector
https://brainly.com/question/27737295
#SPJ4

Think of a binary communication channel. It carries two types of signals denoted as 0 and 1. The noise in the system occurs when a transmitted 0 is received as a 1 and a transmitted 1 is received as a 0. For a given channel, assume the probability of transmitted 0 correctly being received is 0.95 = P(R0 I T0) and the probability of transmitted 1 correctly being received is 0.90 = P(R1 I T1). Also, the probability of transmitting a 0 is 0.45= P(T0). If a signal is sent, determine the
a. Probability that a 1 is received, P(R1)
b. Probability that a 0 is received, P(R0)
c. Probability that a 1 was transmitted given that a 1 was received
d. Probability that a 0 was transmitted given that a 0 was received
e. Probability of an error

Answers

The probability that a 1 is received, P(R1), is 0.1.The probability that a 0 is received, P(R0), is 0.55.The probability that a 1 was transmitted given that a 1 was received is 0.8182 (approximately).The probability that a 0 was transmitted given that a 0 was received is 0.8936 (approximately).The probability of an error is 0.1564 (approximately).

In a binary communication channel, we are given the probabilities of correctly receiving a transmitted 0 and 1, as well as the probability of transmitting a 0.

a. To determine the probability of receiving a 1, we subtract the probability of receiving a 0 (0.45) from 1, resulting in P(R1) = 1 - P(R0) = 1 - 0.45 = 0.55.

b. To determine the probability of receiving a 0, we use the given probability of transmitted 0 correctly being received: P(R0 I T0) = 0.95. Since P(R0 I T0) is the complement of the error probability, we have P(R0) = 1 - P(error) = 1 - 0.05 = 0.55.

c. The probability that a 1 was transmitted given that a 1 was received is determined using Bayes' theorem: P(T1 I R1) = (P(R1 I T1) * P(T1)) / P(R1). Substituting the given values, we have P(T1 I R1) = (0.9 * 0.55) / 0.55 = 0.9.

d. Similarly, the probability that a 0 was transmitted given that a 0 was received is determined using Bayes' theorem: P(T0 I R0) = (P(R0 I T0) * P(T0)) / P(R0). Substituting the given values, we have P(T0 I R0) = (0.95 * 0.45) / 0.55 = 0.8936 (approximately).

e. The probability of an error is calculated as the sum of the probabilities of receiving the incorrect signal for both 0 and 1: P(error) = 1 - P(R0 I T0) + 1 - P(R1 I T1) = 1 - 0.95 + 1 - 0.9 = 0.05 + 0.1 = 0.1564 (approximately).

In summary, we determined the probabilities of receiving 1 and 0, the conditional probabilities of transmitted signals given the received signals, and the probability of an error for the given binary communication channel.

Learn more about Probability

brainly.com/question/31828911

#SPJ11

What is the classification of the Gartner Group?
consultant
search engine
multimedia
cloud software company

Answers

The Gartner Group is a technology research and advisory firm that provides insights, analysis, and consulting services to help businesses make strategic decisions in the areas of information technology, digital transformation, and business strategy.

What is the classification?

The Gartner Group is a global research and advisory firm that provides analysis, advice, and insights to help businesses make strategic decisions related to technology and business strategy.

Therefore, Gartner Group does not fit into any of the classifications mentioned in the question. It is not a consultant search engine, multimedia cloud, software company or any of the above. Instead, it is a research and advisory firm that focuses on providing expert analysis and recommendations on technology and business trends to help organizations make informed decisions.

Read more about classification here:

https://brainly.com/question/385616

#SPJ1

Which technology typically provides security isolation in infrastructure as a service?

Answers

The technology that typically provides security isolation in Infrastructure as a Service (IaaS) is virtualization. Virtualization allows for the creation of virtual machines (VMs) that are isolated from each other and from the underlying physical hardware.

This helps ensure that the resources and data of one VM are protected from other VMs and any potential security threats. Additionally, IaaS providers often implement other security measures such as firewalls, access controls, and encryption to further enhance security isolation. Overall, virtualization is a key technology in providing security isolation in IaaS environments.

To know more about hardware visit:

brainly.com/question/29514884

#SPJ11

PLEASE HELP, Answer Correctly..Will give a bunch of brainlist points ​

PLEASE HELP, Answer Correctly..Will give a bunch of brainlist points

Answers

Answer:

se ve muy dificil amiga

Explanation:

Which is linux operating system?
1. Private OS
2. Open source OS
3. Windows operating System
4. None of these above​

Answers

Answer: None of these above

hope its help you

have a great day keep smiling be happy stay safe .

1- Identify the face expressions is considered....

A) Classification problem
B) Clustering Problem
C) Regression Problem

Answers

Answer:

C) Regression Problem

Hope this helped you!

is contiguous or indexed allocation worse if single block is corrupted

Answers

In terms of data loss, if a single block is corrupted, both contiguous and indexed allocation can result in the loss of data. However, the impact of data loss may differ depending on the specific circumstances.

In contiguous allocation, where files are stored as contiguous blocks on the storage medium, if a single block becomes corrupted, it can potentially affect the entire file. This means that the entire file may be lost or become inaccessible.

In indexed allocation, each file has an index or allocation table that stores the addresses of its blocks. If a single block is corrupted, only the specific block associated with that index entry may be affected. Other blocks of the file can still be accessed, and the file may still be recoverable.

Therefore, in the case of a single block corruption, indexed allocation may be considered less severe as it potentially limits the impact to the specific block, whereas contiguous allocation may lead to the loss of the entire file.

However, it's important to note that both allocation methods have their own advantages and disadvantages, and the choice between them depends on various factors such as system requirements, file sizes, and access patterns.

More on contiguous: https://brainly.com/question/15126496

#SPJ11

Suppose there is a credit store in your city that allows you to go for up to three purchases on credit. but at the time of third purchase, you have to pay for the highest bill out of the three purchases. write a program using stack class in java to demonstrate the following activities:
1. create an empty stack named "bills".
2. push the bill amounts of three purchases into the stack.
3. pop the three bills out of the stack and put them in different variables.
4. display the highest bill for payment.
5. push the remaining two bills back into the stack.
6. display the stack before and after the payment.

Answers

Java program that uses the stack class for the management of bills in a credit store. Code image and display is attached.

Java code

import java.io.*;

import java.util.*;

public class Main {

public static void main(String args[]) throws IOException {

 BufferedReader bufEntrada = new BufferedReader(new InputStreamReader(System.in));

 // Define variables

 double b_amount, y[],highest_bill;

 int x;

 y = new double[3];

 highest_bill = 0;

//Create an empty stack named "bills"

 Stack<Double> bills = new Stack<Double>();

 // Data entry

 System.out.println("**credit store**");

 for (x=1;x<=3;x++) {

  System.out.println("Purchase "+x);

  System.out.print("Bill amount: ");

  b_amount = Double.parseDouble(bufEntrada.readLine());

// push the bill amounts of three purchases into the stack

  bills.push(b_amount);

// Identify the highest bill

  if (b_amount>highest_bill) {

   highest_bill = b_amount;}}

// Display the stack before payment

 System.out.println("Stack before payment: " + bills);

// pop the three bills out of the stack and put them in different variables

 for(int i = 0; i <= 2; i++){

     y[i] = bills.pop();}

// Display the highest bill for payment

 System.out.println("You have to pay for the highest bill out of the three purchases: "+highest_bill);

//push the remaining two bills back into the stack

 for(int i = 0; i <= 2; i++){

     if (y[i]!=highest_bill) {

   bills.push(y[i]);}}

// Display the stack after payment

 System.out.println("Stack after payment: " + bills);

}}

To learn more about stack class in java see: https://brainly.com/question/14913725

#SPJ4

Suppose there is a credit store in your city that allows you to go for up to three purchases on credit.

I need help with this :(( In java
Write a program that has a user guess a secret number between 1 and 10.

Store the secret number in a variable called secretNumber and allow the user to continually input numbers until they correctly guess what secretNumber is.

For example, if secretNumber was 6, an example run of the program may look like this:

I'm thinking of a number between 1 and 10.
See if you can guess the number!
Enter your guess: 4
Try again!
Enter your guess: 3
Try again!
Enter your guess: 1
Try again!
Enter your guess: 10
Try again!
Enter your guess: 6
Correct!
Note:
Make sure that the the secretNumber is 6 when you submit your assignment! It will only pass the autograder if the value is 6.

Answers

Java is an object-oriented coding software used to develop software for a variety of platforms.

What does programmer do in Java?

When a programmer creates a Java application, the compiled code is compatible with the majority of operating systems (OS), including Windows, Linux, and Mac OS.

For writing a program that has a user guess a secret number between 1 and 10 it can be done as follows:

import random

secretNum = random.randint(1,10)

userNum = int(input("Take a guess: "))

while(userNum != secretNum):

   print("Incorrect Guess")

   userNum = int(input("Take a guess: "))

print("You guessed right")

Thus, by using this program, one can execute the given condition.

For more details regarding Java, visit:

https://brainly.com/question/12978370

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS

A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:

Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50

Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.

Answers

It's pretty hard but I think it is 1,350

Which symbol is at the beginning and end of a multiline comment block? &&& """ %%% ###

Answers

Answer:

#

Explanation:

I have notes on it we learned it in 8th

###

the other guy was correct.

Navigate to your music folder and open the indexhtml, lessons.html, contact html, and template.html files and not the following meta viewport element within the head element
<meta name="Viewport" content="width=device-width, initial-scale=1.0">

Does anyone know the full code for the assignment C5 in the lab 1: Styling the Strike a Chord Website for a Mobile Viewport​

Answers

In assignment C5 of Lab 1: Styling the Strike a Chord Website for a Mobile Viewport, you need to apply responsive design techniques to make the website mobile-friendly. The key is to use the provided meta viewport element in each of the mentioned HTML files (index.html, lessons.html, contact.html, and template.html).

To complete this assignment, follow these steps:

1. Open each of the HTML files (index.html, lessons.html, contact.html, and template.html) in a text editor.

2. Locate the `` element in each file.

3. Add the following meta viewport element within the `` element:

```

```

4. Save the changes to each file.

5. Apply any additional CSS or design changes, as required by the assignment, to create a responsive layout for mobile devices.

Remember to test the website on various devices and screen sizes to ensure it adapts correctly to different viewports.

Learn more about the website: https://brainly.com/question/19459381

#SPJ11

Design a program that uses the following parallel arrays:empId: An array of seven Integers to hold employee identification numbers. The array should be initialized with the following numbers:56588 45201 78951 87775 84512 13028 75804hours: An array of seven Integers to hold the number of hours worked by each employee.payRate: An array of seven Reals to hold each employee's hourly pay rate.wages: An array of seven Reals to hold each employee's gross wages.The program should relate the data in each array through the subscripts. For example, the number of element 0 of hours array should be the number of hours worked by the employee whose identification number is stored in element 0 of the empId array. That same employee's pay rate should be stored in element 0 of the payRate array.The program should display each employee number and ask the user to enter that employee's hours and pay rate. It should then calculate the gross wages for that employee (hours times pay rate), which should be stored in the wages array. After the data has been entered for all the employees, the program should display each employee's identification number and gross wages.

Answers

To design a program using parallel arrays to store employee data, we can start by initializing the arrays with the given data. We can create four arrays: empId, hours, payRate, and wages.

Next, we can prompt the user to enter the hours and pay rate for each employee. We can use a for loop to iterate through the empId array and ask the user to input the data for each employee. For example, for empId[0], we would ask the user to enter the hours and pay rate for employee with ID 56588. Once the user has input all the data, we can use another for loop to calculate the gross wages for each employee and store the result in the wages array. We can multiply the hours and pay rate for each employee to get their gross wages. For example, wages[0] would be equal to hours[0] times payRate[0]. Finally, we can display the results for each employee. We can use a for loop to iterate through the empId and wages arrays and print the ID and gross wages for each employee. For example, we could print "Employee ID: 56588, Gross Wages: $X.XX". Overall, using parallel arrays to store employee data allows us to relate the data between the arrays using the subscripts, making it easier to organize and manipulate the data in our program.

Learn more about initializing here:

https://brainly.com/question/29766536

#SPJ11

anyone else parents take your phone and you ask for it nicely and they say no and you ask why and they ignore you

Answers

Answer:

that's the same situation with me but with other objects cuz me no have ph0nE

Explanation:

when i was a smol chiLd i would get beat if i didnt  know my multiplication table l0l

anyone else parents take your phone and you ask for it nicely and they say no and you ask why and they
yes, hate it so much

What behavior do elements in a stack follow?

Answers

A stack operates on the LIFO (Last In First Out) principle, which states that the element inserted last is the first element to be removed. Inserting an element into the stack is known as a push operation, and removing an element from the stack is known as a pop operation.

Answer:

last in, first out, or LIFO behavior

Explanation:

B

Which of the following is an example of an application ?

Which of the following is an example of an application ?

Answers

The third one I think
The 3rd one cause all the others are brands pretty much

How is the search engine different from web directory and pls within 5 mins

Answers

Answer:

The search engine is different from a web directory because a web directory is a written list of websites to aid in exploring the Web, whilst a search engine finds the best and closest matched websites to what you typed in the search bar to help you with what you searched up.

How do you predict technology will continue to change the marketing and promotions industry?

Answers

Answer:

The in person marketing industry won't completely die down, but now with the pandemic hitting forcing a lot of people to do deals, sell, and promote things online. Advertising is only going to grow online as time goes on, and marketing will follow close behind.

Explanation:

Which of the keyword is used to display a customized error message to the user in python?

Answers

Answer:

By using try: & except: method.

Explanation:

Which of the keyword is used to display a customized error message to the user in python?

PLEASE ASAP!!

Today, most film editors manually cut and splice the actual film footage once it arrives.


O True
O False

Answers

The correct answer should be true, as their job is to *edit* the footage.

Answer:

True

Explanation:

edg2021

The film editor is such an important person on a film that he is often hired before the cast and other crew. This editor is responsible for revising the filmed footage until it becomes the finished film. The editor begins by reading the script to get familiar with the story. It is important for the editor to know the script because film scenes are generally shot and edited out of sequence. When footage begins to come in, the editor reviews the footage and production notes provided by the director and production team. These notes contain details about the footage and the director’s comments about the footage. The editor then uploads or transfers the footage to computers in the editing bay and begins editing the footage into finished scenes. The editing bay is the control room with editing equipment, computers, monitors, and sound system where film editors manipulate plot, sound, graphics, and score to produce a well-constructed scene. This is a painstakingly detailed and time-consuming task

which is the only set operator which eliminates duplicate values? quizzlet

Answers

Only the "UNION" operator in a set may get rid of duplicate values. By combining the output of two or more SELECT statements, the UNION operator creates a single result set that contains all the unique rows from all the combined queries.

In other words, if two or more queries return rows with the same values, the UNION operator will only include one copy of those rows in the final result set. It's crucial to remember that the UNION operator only gets rid of redundant rows contained inside the same SELECT expression. Each SQL statement will be handled separately if numerous SELECT statements are used with UNION, and duplicates may still show up amongst the various SELECT statements. The "UNION ALL" operator can be used to remove duplicate rows from numerous SELECT statements, although doing so will include all rows from each SQL statement, including duplicate rows.

learn more about UNION here:

brainly.com/question/15126489

#SPJ4

11.6% complete question an attacker escalated privileges to a local administrator and used code refactoring to evade antivirus detection. the attacker then allowed one process to attach to another and forced the operating system to load a malicious binary package. what did the attacker successfully perform?

Answers

The attacker successfully performed a privilege escalation attack, code refactoring to evade antivirus detection, process attachment, and binary package exploitation, which resulted in the execution of a malicious payload on the target system.

What does detection mean?

Detection refers to the process of discovering or identifying something that is hidden or difficult to find, often through the use of specialized tools or techniques. In the context of cybersecurity, detection refers to identifying and analyzing potential security threats, such as malware or unauthorized access attempts, before they can cause significant harm to a computer system or network.


The attacker successfully performed privilege escalation, code refactoring, antivirus evasion, process injection, and binary planting. By escalating privileges to a local administrator, the attacker gained higher-level access to the system. Using code refactoring, the attacker altered the code to avoid detection by antivirus software. Then, by allowing one process to attach to another, the attacker performed process injection, which is the act of injecting malicious code into a running process. Finally, the attacker forced the operating system to load a malicious binary package, which is known as binary planting or DLL hijacking.


To know more about cybersecurity visit:
https://brainly.com/question/30162937
#SPJ1

How to use multiple monitors in windows 10

Answers

Answer:

To choose how you want to use your display on Windows 10, press Windows + P keys on your keyboard. Choose a new display mode from the available options: ...

You should choose the Extend option when you use three monitors.

Then, configure your displays on Windows 10.

Explanation:

this is probably not a clear explanation so u should just watch microsoft's video on it

Set up dual monitors on Windows 10:

1) Select Start > Settings > System > Display. Your PC should automatically detect your monitors and show your desktop.

2) In the Multiple displays section, select an option from the list to determine how your desktop will display across your screens.

3) Once you've selected what you see on your displays, select Keep changes.

Figuring out where your money is going can feel frustrating, however, if reviewing your monthly statements seems overwhelming, start by doing it____________________

instead monthly.

Answers

Figuring out where your money is going can feel frustrating, however, if reviewing your monthly statements seems overwhelming, start by doing it weekly.

What is the budget?

A budget is a written plan you create to determine how much money you will spend each month. You may ensure that you have adequate money each month by using a budget.

Keeping your weekly budget of expenses and money can give you clarity on where your money is going.

Therefore, finding out where your money is going might be difficult, but if combing through your monthly statements seems like too much work, start by doing it once a week.

To learn more about budget, visit here:

https://brainly.com/question/13719740

#SPJ1

Other Questions
An owner of a grocery store wants to determine the brands of soda that customers purchase at the store. When summarizing the data about soda brand purchases, the meaningful measure of central location is the ______. Answer for this picture please! which one of the following income statement and balance sheet items is least likely to spontaneously vary with the level of sales? I say what needs to be said in work meetings even if it is unpopular Help asappppppp please -5(4b+ 7) = distributive property What are some examples of withdrawal symptoms (select all that apply)1.headache2.feeling relaxed3.muscle tension4.mood swings5.cravings what would be the result of running these two lines of code SkiSurfJogHike Match the following with the descriptions below1. Type 1 diabetes2. Polysaccharides3. Disaccharide4. Reactive hypoglycemia5. Hypoglycemia6. Sugar7. Type 2 diabetes8. Monosaccharide9. Hyperglycemia10. Viscous (soluble) fibers11. Nonfermentable (insoluble) fibers12. Fasting hypoglycemia13. Glycemic IndexA. A simple carbohydrate with the chemical composition (CH2O)nB. A simple sugarC. Class of sugars formed by chemically linking two monosaccharidesD. Known as complex carbohydratesE. Fibers that mostly do not dissolve in water and are not fermented by intestinal bacteriaF. Fibers that either dissolve or swell in water and are fermented by bacteria in the large intestineG. The blood glucose response of a given food compared to a standardH. High blood glucose; above 125 mg/100 ml bloodI. Low blood glucose; below 40-50 mg/100 ml bloodJ. A form of diabetes prone to ketosisK. A form of diabetes in which ketosis is not commonly seenL. Low blood glucose that follows a meal high in simple sugarsM. Low blood glucose that follows a day or so of fasting How did the use of spanish missions affect the spread of disease in the americas? thousands of indigenous people were exposed to diseases at spanish missions. indigenous people found cures to diseases at spanish missions. thousands of europeans were exposed to diseases at spanish missions. europeans would isolate themselves at spanish missions during outbreaks of disease. CAN SOMEONE JUST ANSWER THIS QUESTIONA board game has 25 cards. Each card is printed with a number from 1 through 25. Sameer shuffled the cards, and then selected 1 card.What is the probability that Sameer selected a card with a number less than 4 or a multiple of 9?Enter your answer as a fraction, in simplified form, in the box.[ ]I AM GOING TO GO CRAZY IF NO ONE ANSWERS AND IT NEEDS TO BE RIGHT! Write an equation in slope-intercept formof the line that passes through the point(-12,6) and is perpendicular to the lineX= - 3/4y -5 ( What would be my first step to put that equation into slope intercept form?) Solve using substitution.y = 6x + 2y = 6x 10 naomi has earned $54 mowing lawns the past two days. she worked 2 1/2 hours yesterday and 4 1/4 hours today. if naomi is pains the same amount for every hour she works, how much does she earn per hour to mow lawns The triangle shown has a perimeter of 3x + 6. What is the length of each side of the triangle?x + 2x + 33 (x + 2)3x + 2 how could president roosevelt use the monroe doctrine and roosevelt corollary to justify buildiung of panama canal The SI unit for measuring mass is the Emily convinced her mom to buy a giant box of her favorite cereal. Her mom doesn't think the box will fit on their shelf. The volume of the box is japan is the ... developed country in the world a. most second b. second in most c. second most d. two most IS NEEDED ASPAThe MedianTo calculate the median, in this example, you will need the same set of numbers as above. Only this time, you are going to order the numbers from the least to the greatest. If you do this, this is what you get:1, 1, 2, 2, 2, 3, 3, 3, 4, 4, 4, 4, 5, 5, 6, 6, 7, 7, 8, 8, 9We know from the example above that there are 21 numbers in this data set. So, we will look for the middle number, which is 11. There are 10 numbers to the left and 10 numbers to the right. So, the median for this data set is the number 4.What is the median of the following numbers?10, 22, 27, 33, 34, 38, 41, 44, 49, 55, 61, 67, 71384144