a program that thomas has written is complete. now he is trying to determine ways to test the program for accuracy and fix errors when he finds them. what is this procedure called?codingdevelopmenterror checkdebugging

Answers

Answer 1

The process of testing a program for accuracy and fixing errors when they are found is called debugging.

What is debugging ?Debugging is an essential part of the software development process and involves identifying and correcting defects or bugs in a program. Debugging can involve testing a program to see if it produces the expected results, examining the program's code to identify problems or errors, and making changes to the code to fix those problems.Debugging can be a time-consuming and challenging process, but it is an important step in ensuring that a program is reliable and performs as intended. There are many different tools and techniques that can be used to help with debugging, including debugging tools built into programming languages, print statements and other debugging techniques, and debugging libraries and frameworks.

To learn more about debugging refer :

https://brainly.com/question/28159811

#SPJ4


Related Questions

See if you can put these inventions in the correct order, from most recent to oldest!

Answers

In order from most recent to oldest, here are the inventions:

1. Smartphones
2. Personal computers
3. Microwave ovens
4. Television
5. Automobiles

Smartphones are the most recent invention on this list, having become popular in the early 2000s. Personal computers were invented in the 1970s, followed by microwave ovens in the 1960s. Television has been around since the 1920s, and automobiles are the oldest invention on this list, dating back to the late 1800s. It's interesting to see how these inventions have evolved over time and how they continue to shape our lives today.

learn more about inventions here:

https://brainly.com/question/29553564

#SPJ11

PLEASE HELP WITH EASY JAVA CODING

Also if possible please type in your answer instead of adding a picture of the answer!

THANK YOU


read from a file, "some method" to determine IF it is a pangram, reprint with the labels as shown


The actual question is included in the picture and the text file that needs to be used will be added as 2 separate comments

PLEASE HELP WITH EASY JAVA CODINGAlso if possible please type in your answer instead of adding a picture

Answers

The Java program that speaks to the above prompt is attached accordingly.

How does this work?

Note that the Java code that can tell you whether a statement is a pangram or a perfect pangram.

Input

Each input line is a sentence that concludes with a period. Other punctuation may be used as well. The input is terminated by a single period.

Output

The software  prints the key word for each phrase. PERFECT if the statement is a perfect pangram, PANGRAM if it is not, and NEITHER if it is neither. The software must additionally print a colon, a space, and the original phrase after the key word.

Learn more about java;
https://brainly.com/question/29897053
#SPJ1

Which image file format is an uncompressed raster file which may contain different depths of color depths per pixel, or may be saved in grayscale?.

Answers

Answer:

BMP

Explanation:

The BMP file format, also known as bitmap image file, device independent bitmap (DIB) file format and bitmap, is a raster graphics image file format used to store bitmap digital images, independently of the display device (such as a graphics adapter), especially on Microsoft Windows[2] and OS/2[3] operating system

The technical information section of Carmine's GDD is fairly brief because his team has included a separate document that explains all the technical information in far greater detail. What is this separate document referred to as?

tech addendum
technical debriefing
amendment to the technical
technical bible​

Answers

Answer: tech addendum

Explanation:

The separate document that explains all the technical information in far greater detail is referred to as the technical addendum.

An addendum simply refers to an attachment that modifies the conditions of a contract or gives more information about the contract.

In this scenario, since the technical information section of Carmine's GDD is fairly brief, the tech addendum will explain all the technical information in far greater detail.

Which of the following statements is NOT true about Python?
a) Python is a high-level language.
b) Python can be used for web development
c) Python variables are dynamic type
d) Python is a compiled language

Answers

D

Python is an interpreted language and NOT( a compiled one, )although compilation is a step.

Answer:

D

Explanation:

D, Python is an interpreted one and not a compiled one. While the compiler scans the entire code, interpreters go line-by-line to scan it. For example, if you get a syntax, indentation or any error, you will only get one and not multiple.

Feel free to mark this as brainliest :D

in most cases, letters of recommendation are required for admission to

Answers

A university or college.

what is a computer?write any four features of computer​

Answers

Answer:

A computer is defined as an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Four features of a computer would be CPU, GPU, Memory, and Motherboard.

Explanation:

Computer is an electronic machine which accepts raw data from the user , process the data according to the predefined set of instructions, gives and stores the result or instructions....

Or

A computer is an electronic device that can perform several task according to the given instructions...

The four features of computer are :

Speed

Accuracy

Versatility

Diligence

Storage etc....

\(...\)


Treating others with respect, even when they're impolite, is considered
A. good netiquette
B. being a bystander
C. advocating
D. empathy

Answers

The answer for this question is A

Treating others with respect, even when they're impolite, is considered good netiquette. The correct option is A.

What is netiquette?

Netiquette refers to the standards of behavior for polite and appropriate online conversation. Etiquette for the internet is another name for netiquette. These are suggested politeness guidelines rather than laws.

A set of guidelines known as netiquette promotes polite and appropriate online conduct.

These guidelines are crucial because they encourage effective communication, guard against misunderstandings, and show you what is appropriate in social situations when working and cooperating online.

Online communication can be made more productive with the use of netiquette, which also helps people stay clear of confusion and potential confrontation. It is considered acceptable to treat people with respect, even when they are being rude.

Thus, the correct option is A.

For more details regarding good netiquette, visit:

https://brainly.com/question/29444693

#SPJ2

What symbol goes at the end of every if/else statement in python?

Answers

A colon goes after every if/else statement in python. For instance:

if 1 < 5:

   # do something.

As we can see, a colon is placed after the 5.

Define a void function named drawDonut to draw a donut that can be called with this syntax: drawDonut( x, y, diameter, color ); The function should draw a circle for the donut at the given position, diameter, and color, then put a white hole in the center at 1/4 of the specified diameter. Make 3 calls to drawDonut in start to make 3 different donuts at different locations, and sizes. Make one donut yellow, another orange, and the last one brown.

Answers

The void function is depicted as given below. See the definition of a void function.

What is a void function?

Void functions are constructed and used in the same way as value-returning functions, except that they do not return a value once the function executes. In place of a data type, void functions utilize the term "void."

A void function executes a task and then returns control to the caller, but it does not return a value.

See the attached for the full solution.

Learn more about void functions at;
https://brainly.com/question/19539019
#SPJ1

cual es la importancia de la red WAN

Answers

Explanation:

Las WAN se utilizan para conectar redes LAN y otros tipos de redes. Así los usuarios se pueden comunicar con los usuarios y equipos de otros lugares. Muchas WAN son construidas por una organización en particular y son privadas.

education leads to higher wages lower unemployment.* True or false

Answers

Answer:

True

Explanation:

I would say True but I don't really know a Explanation. but if they have education then they must know more so they get paid more.

What story is told with each match of Chaturanga?


A.

merchants crossing a great desert


B.

families growing old and having children


C.

warring leaders and their armies


D.

children crossing a river

Answers

The story that is told with each match of Chaturanga is warring leaders and their armies. The correct option is C.

What is the match of Chaturanga?

In Chaturanga, the goal is to checkmate the opposing king, however unlike chess, the stalemated king wins.

Making captures in chess is identical to other board games: the moved piece is placed in the square previously occupied by an opponent piece, and this latter piece is removed from the board.

The book is divided into four chapters, each of which is titled after one of the protagonists.

Therefore, the correct option is C. warring leaders and their armies.

To learn more about match of Chaturanga, refer to the link:

https://brainly.com/question/3406191

#SPJ1

How do you move a slide to another location in you your
presentation?

Answers

Answer: Literally click on it and hold, then just drag it to wherever you want it

Explanation: Hope this helped you

Introduction to Project Based Learning (PBL)
Webquest Assignment
1 What does it mean to "fail forward?"
2 What two skills are employees in today's workplace expected to have?
3 How are Project Based Learning courses taught according to the course content?
4 Give two PBL examples.
5 (True or False) Every project will follow the same format.
6 What is the entry event and what is its purpose?
7 Give two examples of roles a student could play in a PBL project.
8 Why is the entry event an important part of the PBL process?
9 In exploring the Marketing Project Example Project entry event, answer any two of the following questions:
What role did you play in this project?
Who are you working for in this scenario?
What challenge are you assigned in this role?
What will you produce for this project to show what you’ve learned?
10 What types of questions does a student need to ask himself/herself when starting the PBL project?
11 What are need-to-know-questions?
12 Looking at the example Marketing Project Entry Event, answer one of the following two questions.
What’s one thing that you already know about GMS from the entry event document that will help you complete this project?
Can you think of something you will need to know (learn) to complete this project?
13 What is the driving question and where are the two places it can be found?
14 What are benchmarks and what are they used for in the PBL project?
15 In the example Marketing Project, what is the third benchmark?
16 Give two examples of final PBL projects.
17 How are PBL projects graded?
18 What are the three parts of the PBL Project Rubric?
19 Identify two success skills.
20 Why is sharing what you've learned such an important piece of the PBL process?
21 Why is the ability to analyze your work such an important piece of the PBL process?
22 What is Tallo and what are two things you can do with Tallo?
23 (True or False) There is a place for your parents/LC's to learn about PBL in the course content.

Answers

The answers to the Introduction to Project Based Learning (PBL) is given below

To "fail forward" means to learn from mistakes and use those lessons to move forward and improve in the future. It means to see failure as an opportunity to grow and improve, rather than as a roadblock.

What is the Project Based Learning about?

2. Employees in today's workplace are expected to have the skills of problem-solving and collaboration.

3. Project Based Learning (PBL) courses are typically taught by having students work on real-world projects that require them to apply their knowledge and skills to solve a problem or complete a task. The course content typically provides guidance and resources to help students complete the projects, but the students are responsible for managing their own learning and completing the projects independently.

4. Two examples of PBL projects might be designing a new app to help people track their fitness goals, or creating a marketing plan for a new product.

Question 5 is False. Every project will not follow the same format. PBL projects are flexible and allow students to design their own approaches to completing the project.

6. The entry event is the beginning of the PBL project, and it is designed to introduce the project challenge or problem that students will be working on. The purpose of the entry event is to engage students' curiosity and motivation, and to provide context and background information about the project.

7. In a PBL project, a student could play the role of a researcher, designer, developer, or project manager, among others.

8. The entry event is an important part of the PBL process because it sets the stage for the rest of the project and helps students understand what they will be working on and why it is important. It also helps students identify the knowledge and skills they will need to complete the project successfully.

11. Need-to-know-questions are questions that students need to answer in order to complete the PBL project successfully. These questions should be related to the project challenge or problem, and should be specific and focused.

13. The driving question is a central question that guides the PBL project and helps students focus their learning and problem-solving efforts. The driving question can be found in the entry event and in the project's final product or presentation.

14. Benchmarks are specific, measurable goals that students should aim to achieve as they work on the PBL project. They are used to track progress and ensure that students are on track to complete the project successfully.

16.. Examples of final PBL projects might include a prototype of a new product, a business plan, or a marketing campaign.

17.  PBL projects are typically graded based on the quality and completeness of the final product or presentation, as well as the student's effort and progress throughout the project.

18. The three parts of the PBL Project Rubric are content, process, and product. The content refers to the knowledge and skills that students demonstrate in the project, the process refers to the steps they took to complete the project, and the product refers to the final product or presentation.

19. Two success skills might be problem-solving and collaboration.

20. Sharing what you've learned is an important piece of the PBL process because it allows you to reflect on your learning and demonstrate your understanding to others. It also provides an opportunity for feedback and further learning.

21. The ability to analyze your work is an important piece of the PBL process because it helps you to reflect on your learning and understand what you have accomplished and what you still need to work on. By analyzing your work, you can identify your strengths and weaknesses, and make adjustments as needed to improve the quality of your final product or presentation.

22. Tallo is a career and educational platform that connects students with opportunities and resources related to their interests and goals. With Tallo, students can explore different career paths, find internships and job openings, connect with mentors, and access resources to help them plan for their future. Some examples of things that students can do with Tallo include creating a professional profile, applying for scholarships, and connecting with potential employers.

23. True. There may be a place in the course content for parents/LC's to learn about PBL, as they may be interested in supporting their child's learning and understanding the overall goals and approach of the course

Learn more about Project Based Learning from

https://brainly.com/question/19842887

#SPJ1

Flowcharts uses a LOOP symbol to repeat instructions.


A. True

B. False

Answers

The statement "Flowcharts use a LOOP symbol to repeat instructions" is true. Because a flowchart can use a loop symbol to indicate that a set of instructions needs to be repeated multiple times.
Correct option  is A, true.

A flowchart can use a loop symbol to indicate that a set of instructions needs to be repeated multiple times. This can be helpful for illustrating processes that involve iterations or loops, such as calculations or decision-making. The loop symbol typically includes a number indicating how many times the loop should repeat, or a condition that must be met before the loop can exit.

Flowcharts use a LOOP symbol, often represented by a rectangle or diamond shape, to indicate that a set of instructions should be repeated. The LOOP symbol helps visualize the flow of control in a program or process, making it easier to understand and analyze the logic involved.

To know more about Flowcharts visit:

https://brainly.com/question/29317974

#SPJ11

Cybersecurity breaches in the workplace generally happen because _____. Select 3 options.


people make unintentional mistakes


people do not know about cybersecurity protocols


workplaces tend to have too strict cybersecurity protocols


cybersecurity specialists do not really help


people deliberately try to hack into the network

Answers

Answer:

people make unintentional mistakes

people do not know about cybersecurity protocols

people deliberately try to hack into the network

Explanation:

Cyber security breaches are the compromise to the data integrity of a computer system or network. There are several reasons why this can happen in the network f an organization. Some of them include;

1. People make unintentional mistakes: Human error has been attributed to be the leading cause of cybersecurity breaches. When people unknowingly expose passwords and sensitive data to those who should not have access to them, they commit a breach of security.

2. People do not know about cybersecurity protocols: When people are not educated on the right security measures to adhere to, they are prone to unknowingly engage in acts that will lead to a security breach.

3. People deliberately try to hack into the network: People within and outside the organization can decide to compromise the network especially if they believe that they will have some financial benefits.

in data encryption, the https indicates a safe http connection over _____.

Answers

In data encryption, HTTPS indicates a safe HTTP connection over SSL/TLS (Secure Sockets Layer/Transport Layer Security). HTTPS is a protocol for secure communication over the internet and it encrypts the data being transmitted between a web browser and a web server.

SSL/TLS is a protocol that provides authentication, confidentiality, and integrity for data being transmitted over the internet. It uses a combination of symmetric and asymmetric encryption algorithms to encrypt and decrypt data, and it verifies the identity of the web server using a digital certificate issued by a trusted Certificate Authority (CA).

When a user connects to a website using HTTPS, their web browser initiates a secure SSL/TLS connection with the web server. Once the connection is established, all data transmitted between the user's browser and the server is encrypted and cannot be intercepted or read by third parties.

In summary, HTTPS indicates a safe HTTP connection over SSL/TLS, which provides encryption and authentication to ensure secure communication over the internet.

Learn more about HTTPS here:

https://brainly.com/question/10663873

#SPJ11

write any two features of computer?​

Answers

Answer:

its fast and has great accuracy

Explanation:

Any two features of computer are:

1.It make our work more easier.

2. It can work for hours without creating any errors

at the command prompt, type ls -l myscript and press enter. whatpermissions does the myscript file have? next, type bash myscript at the commandprompt and press enter. did the shell script execute? what do the \t and \a escapesequences do?5. next, type ./myscript at the command prompt and press enter. what error messagedid you receive and why?6. at the command prompt, type chmod u x myscript and press enter. next, type./myscript at the command prompt and press enter. did the script execute? why?7. type exit and press enter to log out of your shell.

Answers

I can explain what each of the steps you mentioned would do:ls -l myscript: This command lists the details of the file named myscript, including its permissions.bash myscript: This command attempts to execute the shell script named myscript using the bash shell.

If the script is properly formatted and has execute permissions, it should execute without errorThe \t escape sequence inserts a tab character, and the \a escape sequence produces an audible bell sound. These escape sequences are used to format text or provide audible cues in shell scripts or other programming languages./myscript: This command attempts to execute the script named myscript in the current directory. However, if the file does not have execute permissions, the user will receive an error message indicating that the script cannot be executedchmod u+x myscript: This command adds execute permissions to the file named myscript for the user who owns the file. This allows the user to execute the script by typing ./myscript at the command prompt./myscript: This command attempts to execute the script named myscript in the current directory. If the script has execute permissions, it should execute without error.

To learn more about mentioned click on the link below:

brainly.com/question/30026927

#SPJ11

Miguel ate 34
3
4
of hi andwich, and Annie ate 58
5
8
of her andwich. Who ate more?

Answers

Miguel ate more of his sandwich than Annie ate of hers, we arrived on this answer after comparing both fractions which are mentioned in the question.

Step-by-step Explanation:

To determine who ate more of their sandwich, you will need to compare the fractions of the sandwiches that Miguel and Annie each ate.

Miguel ate 3/4 of his sandwich, which means he ate 3 out of 4 equal parts, or 3/4, of the sandwich.

Annie ate 5/8 of her sandwich, which means she ate 5 out of 8 equal parts, or 5/8, of the sandwich.

To compare these fractions, you will need to convert them to a common denominator. One way to do this is to find the least common multiple (LCM) of the two denominators, which in this case is 8.

To convert 3/4 to 8/x, you can multiply the numerator and denominator by 2: 3/4 * 2/2 = 6/8 = 3/4.

To convert 5/8 to 8/y, you can multiply the numerator and denominator by 1: 5/8 * 1/1 = 5/8.

Now that both fractions have a denominator of 8, you can compare them directly. 6/8 is greater than 5/8, so Miguel ate more of his sandwich than Annie ate of hers.

To know more about fractions, visit: https://brainly.com/question/17582172

#SPJ4

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

A model for a computer that splits the processing between clients and servers on a network, assigning functions to the machine most able to perform the function is called __________.

Answers

A model for a computer that splits the processing between clients and servers on a network, assigning functions to the machine most able to perform the function is called client/server computing.

What is Server?

A server in computing is a piece of hardware or software that offers functionality to other applications or gadgets, also referred to as "clients." The client-server model is the name of this architecture.

What is Computer?

A computer is a digital electrical device that may be configured to automatically perform a series of logical or mathematical operations. Programs are generic sets of operations that can be carried out by modern computers. These programs give computers the ability to carry out a variety of tasks.

Client: The term "client" refers to a person or an organization that uses a specific service. The same is true in the digital world, where a client is a computer (host) that can request information from service providers or use a certain service (Servers).

Similar to that, the term "servers" refers to a person or medium that provides a service. In the same way, a server in the digital world is a remote computer that offers information (data) or access to specific services.

In essence, the Client requests something, and the Server fulfills it if it is in the database.

Learn more about client-server computing click here:

https://brainly.com/question/24137718

#SPJ4

Jonathan is a network security specialist. He has developed several policies for his employer. One describes restrictions on transmitting clients' protected health information (PHI). Another policy addresses working with a third-party to securely process a blood sample. What act or law is he complying with

Answers

HIPAA law is applicable on Jonathan as restrictions on transmitting clients' protected health information (PHI). Another policy addresses working with a third-party to securely process a blood sample.

What is HIPAA law?

The "government agencies" health plans, clearinghouses, and other healthcare providers and their business relationships who transport health information digitally in accordance with a transfer for which the Secretary of HHS has set HIPAA standards are subject to the Security Rule.

Thus, it is HIPAA law

For further details about HIPAA law, click here:

https://brainly.com/question/17226741

#SPJ1

Creating the model of a character is one of the first things a 3D artist will do.

True or false

Answers

Answer:

false

Explanation:

the character must first be drawn and designed

Answer:

True

Explanation:

I had this same question in my work, and after submitting it, I saw that the answer was true.  I hope this was of good use to someone who had this question. Bye bye now :)))

Jack is using a document that has multiple references to his company as Company ABC, LLC. He would like to change these values to CompanyABC, LLC. What is the easiest way to do this?

Answers

Answer:

C. Press CTRL to access the Find and Replace dialog box.

Explanation:

yuh yuhuhu edge 2020 gang gang

Privacy principles need to be balanced against the
private information. Select 2 options.
O financial
ethical
O corporate
D societal
political
benefit that comes from the automated collection of

Privacy principles need to be balanced against theprivate information. Select 2 options.O financialethicalO

Answers

In the case above about Privacy principles, the balanced needs to be

Societal.

What does privacy mean?

The presence of informational privacy rights implies that people are said to be  under a duty or not to make known information or to hinder unauthorized use of their information by others.

Note that when Privacy principles is balanced against Societal benefit that comes from the automated collection of private information. , the world will be at peace.

Learn more about Privacy principles from

https://brainly.com/question/10524592

#SPJ1

5.1.5 access for employee class

Answers

This code declares a class called "Employee" and defines two string variables called "first name" and "last name," as well as a double variable called "monthly salary."

What does a class's instance variable mean?

A variable that is declared in a class but not within constructors, methods, or blocks is referred to as an instance variable. The instance variable can thus be given access modifiers. After the double variable called "monthly salary" in this code, the next step is to design a parameterized constructor that puts the value into the variable and checks the value of "monthly salary" using an if block. Additionally, it holds and returns its value via the getter and setter methods.

The code to the given question is stated below:

public class Employee //defining a class Employee

{

String first_name,last_name;

Double monthly_salary;

Employee(String first_name,String last_name,Double monthly_salary)

{

  this first_name=f_name// initialize value in first_name

  this last_name = l_name; // initialize value in the last_name

   this monthly_salary = m_salary; // initialize value in the monthly_salary

if (monthly_salary < 0.0)//use if to check monthly_salary is positive

          monthly_salary = 0.0;//set value 0

}

void setfirst_name (String f_name)//defining set method to store first_name

{

first_name = f_name; //holding the value of first_name

}  

public String getfirst_name ()//defining get method to return first_name

{

return first_name;//return first_name

}  

public void setlast_name (String l_name)//defining set method to store last_name

{

last_name = l_name; // holding the value of the last_name

}

public String getlast_name ()//defining get method to return last_name

{

return last_name;//return last_name

}  

public void setmonthly_salary(double m_salary)//defining set method to store monthly_salary

{

monthly_salary = m_salary; // holding the value of the monthly_salary

}

public double getmonthly_salary ()//defining get method to return monthly_salary

{

return monthly_salary;//return monthly_salary  

}

}

To learn more about instance variable, visit:

https://brainly.com/question/15182397

#SPJ1

The complete question is:

In this exercise, you are going to create the instance variables for an Employee class. The class needs to store the employee's name, their 4 digit id number, and hourly salary. You will need to give the instance variable an appropriate name, type, and privacy settings.

After defining the instance variables, create the structure for the constructor, similar to the previous exercise. Make sure you set the privacy settings on the constructor correctly.

Status: Not Submitted 5.1.5: Access for Employee Class Save Submit + Continue RUN CODE TEST CASES ASSIGNMENT DOCS GRADE | MORE public class Employee

what is the usage of sustainable energy?​

Answers

its the practice of using energy in a way that "meets the needs of the present without compromising the ability of future generations to meet their own need

3.5 code practice
grade = str(input("What year of high school are you in?: "))

if ("grade ==Freshman"):

print("You are in grade: 9")

elif ("grade == Sophomore"):

print("You are in grade: 10")

elif ("grade == Junior"):

print("You are in grade: 11")

elif ("grade == Senior"):

print("You are in grade: 12")

else:

print("Not in High School")

It keeps printing your are in grade 9. Why?

Answers

The fixed code is shown below. input() function already returns string that's why you don't have to convert string again. Also the syntax in if-else scope is wrong.

grade = input("What year of high school are you in?: ")

if(grade.lower()=="freshman"):

print("You are in Grade 9.")

elif(grade.lower()=="sophomore"):

print("You are in Grade 10.")

elif(grade.lower()=="junior"):

print("You are in Grade 11.")

elif(grade.lower()=="senior"):

print("You are in Grade 12.")

else:

print("Wrong input!")

Other Questions
Can someone find the surface area for this? :) Please answer this asap! And i would give brainliest to the person who does this right 1. Annette scored 85. 73. and 94 on her first three quizzes. How high does she need toscore on her fourth quiz to keep her quiz average at at least a B (8046) ? a baseball leaves the bat at 76m/s, 57 degrees above the horizontal. how long is it in the air Drawing Length: 8 feetActual Length: 624 feet The longest side of a triangle is twice the length of the shortest side. The remaining side is 20 cm longer than the shortest side. The perimeter of the triangle is 132 cm. What is the length of each side? You calculate -16 Joules as the work done by a force on an object. This means Group of answer choices the work vector points in the negative direction the force vector pointed in the negative direction. the object moved in the negative direction. the object's displacement and the force did not point in the same direction. Why do you need to know how to make an inferences Plot the following three points on the coordinate plane below. Which of the following stages of the new-product development process is the first filter, which serves to eliminate new product ideas that are inconsistent with the organizations new product strategy or are obviously inappropriate for some other reason?Introductory diffusionBusiness analysisTest marketingIdea screening is aluminum ductile malleable or brittle? What does campaign mean in politics? The HCF of three numbers is 8 and the sum of these numbers is 80. List the possible set of such three numbers. What social change did the liberals of the revolutionary era of the late eighteenth century encourage Which expression is equivalent to 24+56 how is constrained discretion different from discretion in monetary policy There was nothing left for us to do but to take them all, and to educate the Filipinos, and uplift and civilize and Christianize them, and by Gods grace do the very best we could by them.Based on the quote, McKinley is arguingin favor of annexing new territories.against annexing new territories.in favor of helping domestic countries.against helping foreign countries. 1. Describe the formation of hotspots and how the age of the volcanoes changes along the plate motion direction. 2. What is a fault give an example of Consent of the Governed 21. the ramachandran plot describes the peptide conformation by illustrating the position of the dihedral angles that can rotate. disallowed dihedral angles arise due which of the following? b. c. main-chain clashes from the bulky carbonyl oxygen or amide nitrogen with other main-chain atoms or side-chains d. all of the above e. none of the above