Can any one make her/his own 5 E-learning questions related to any subject. Plss don't copy from any website.​

Answers

Answer 1

Answer:

Your pupils will be totally engaged in learning if you use the 5E Approach while creating lesson plans. Your children will be inspired to share their learning with others and study ideas, concepts, and tactics together if you follow the 5 stages of engage, explore, explain, elaborate, and assess.

Explanation:

in my own words


Related Questions

PLEASE HELP!!!
I have no clue how to find my recently viewed images on the web on my windows 10. Please help, if you could also give a step-by-step image example or if that's too much I will and might give you brainly.

Answers

Answer:

To find your recently viewed images on the web on a Windows 10 computer, you can try the following steps:

Open the Start menu and type "history" into the search bar.

Click on "History" in the search results. This will open the history menu in your web browser.

In the history menu, click on the "Images" tab. This will show a list of all the images you have recently viewed on the web.

If you want to see more details about a specific image, you can click on it in the list to view its URL and the date it was viewed.

If you want to delete any images from your history, you can click on the checkbox next to the image and then click on the "Remove selected items" button.

Alternatively, you can use the search feature in your web browser to search for specific images that you have recently viewed. To do this, you can type the name or description of the image into the search bar and press Enter. This will show a list of search results, including any images that match your search criteria.

I hope this helps! Let me know if you have any questions or need further assistance.

Explanation:

The government now requires physicians to store patient information in databases that are accessible in multiple locations by multiple people if they want to qualify for certain reimbursements. The rationale is that this will enable healthcare providers the ability to better serve their patients, as all will have access to the patients’ medical history. Many patients worry about compromised privacy and security, especially since these databases are accessible via the Internet. Should patients be allowed to opt-out of these data collection systems or should it remain a government mandate? Provide justification for your answer.

Answers

Answer:

.

Explanation:

The government now requires physicians to store patient information in databases that are accessible

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

Who manages the team’s work during a sprint?
a) Scrum master manages the people so they can complete the work
b) The team manages the work by self organization
c) Product owner manages the work
d) Delivery manger manages the work

Answers

Answer:

d) delivery manger manages the work

Explanation:

sana po makatulong ako daghay salamat sayo emo

System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio

Answers

System testing is a crucial stage where the software design is implemented as a collection of program units.

What is Unit testing?

Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.

It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.

Read more about System testing here:

https://brainly.com/question/29511803

#SPJ1

Amanda a recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family?nd her family recently moved into a new home. Everyone has their own tablet, and wants to connect to the same network, no matter where they are in the house. Which type of network is best for Amanda and her family?

Answers

Answer:

wifi is the best network for all, As it gets in all corners of the house.

Pet information (derived classes)

The base class Pet has private data members petName, and petAge. The derived class Dog extends the Pet class and includes a private data member for dogBreed. Complete main() to:

create a generic pet and print information using PrintInfo().
create a Dog pet, use PrintInfo() to print information, and add a statement to print the dog's breed using the GetBreed() function.
Ex. If the input is:

Dobby
2
Kreacher
3
German Schnauzer
the output is:

Pet Information:
Name: Dobby
Age: 2
Pet Information:
Name: Kreacher
Age: 3
Breed: German Schnauzer
________________________________________________

the given code:

Main.cpp:

#include
#include
#include "Dog.h"

using namespace std;

int main() {

string petName, dogName, dogBreed;
int petAge, dogAge;

Pet myPet;
Dog myDog;

getline(cin, petName);
cin >> petAge;
cin.ignore();
getline(cin, dogName);
cin >> dogAge;
cin.ignore();
getline(cin, dogBreed);

// TODO: Create generic pet (using petName, petAge) and then call PrintInfo


// TODO: Create dog pet (using dogName, dogAge, dogBreed) and then call PrintInfo


// TODO: Use GetBreed(), to output the breed of the dog


}

___________________________________________________________________________________________

Pet.h

#ifndef PETH
#define PETH

#include
using namespace std;

class Pet {
protected:
string petName;
int petAge;

public:
void SetName(string userName);

string GetName();

void SetAge(int userAge);

int GetAge();

void PrintInfo();
};

#endif
_________________________________________________________________________--

Dog.h

#ifndef DOGH
#define DOGH

#include
#include "Pet.h"

class Dog : public Pet {
private:
string dogBreed;

public:
void SetBreed(string userBreed);

string GetBreed();
};

#endif

____________________________________________________________

Pet.cpp

#include "Pet.h"
#include
#include
using namespace std;

void Pet::SetName(string userName) {
petName = userName;
}

string Pet::GetName() {
return petName;
}

void Pet::SetAge(int userAge) {
petAge = userAge;
}

int Pet::GetAge() {
return petAge;
}

void Pet::PrintInfo() {
cout << "Pet Information: " << endl;
cout << " Name: " << petName << endl;
cout << " Age: " << petAge << endl;
}

__________________________________________________________________

Dog.cpp

#include "Dog.h"
#include
#include
using namespace std;

void Dog::SetBreed(string userBreed) {
dogBreed = userBreed;
}

string Dog::GetBreed() {
return dogBreed;
}

Answers

Answer:

I think the answer is Breed: German Schnauzer don't listen too mee

________________________________________________

the given code:

Main.cpp:

#include

#include

#include "Dog.h"

don't listen

Explanation:

Question 9 of 25
A computer programmer will often use a
by other programmers.
which includes code written
A. website
B. library
C. copyright
O D. license

Answers

I’m not entirely sure if this is correct but I think it’s A. Website
The answer can possibly be a Website!!

Bro how the hell do u do full screen on windows
(LAPTOP. NOT PC.)
f11 does not work, does anyone have a solution?

Answers

Answer:

You'll need to hold down/click f11 and fn at the same time.

If not that, try ctrl + shift + f5.

I can guarantee the first works; not too sure about the second.

Explanation:

Well, it's hotkeys, so...

EDIT: The f5 command does nothing related to full screen, my bad.

Answer:

f11 should work just hold it down or restart your computer and try it again

Explanation:

What characteristics are common among operating systems

Answers

The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.

Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.

1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).

2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.

3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.

4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.

5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.

6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.

This includes user authentication, access control mechanisms, and encryption.

7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.

These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.

For more such questions characteristics,click on

https://brainly.com/question/30995425

#SPJ8

A is used to analyze and summarize your data without graphical support.
O A. Sparkline
O B. Chart
O C. PivotChart
O D. Pivot Table

Answers

Answer:

D. Pivot Table

Pivot Table is used to analyse and summarize your data without graphics support.

what is the runtime of this function if the input list is of type java.util.arraylist and has length n?

Answers

Runtime Type Identification in Java can be described as finding the type of an object at runtime. It is critical to identify the type of a function that takes a parameter of type java.

In Java, how do you verify the class of an object at runtime?

Java offers three methods for determining the class of an object at runtime: the instance of keyword, get Class(), and is Instance() methods. Class. The contains() function can be used to determine whether or not a Java Array List includes a particular item. This method takes a single parameter, which is the object in the Array List whose existence is being checked. It also gives true if the object is present in the Array List and false if it is not.

A variable is a container for data that can be modified at runtime. Variables enable the retrieval and manipulation of saved data.

In Golang, there are three methods to determine the class of variable:

Making use of reflect. The type of function.

Making use of reflect. Function Value Of. Kind().

%T is used in conjunction with Print f.

Learn more about Java  from here;

https://brainly.com/question/29897053

#SPJ4

Write the Python code for a program called MarathonTrain that asks a runner to enter their name, and the maximum running distance (in km) they were able to achieve per year, for 4 years of training. Display the average distance in the end. 4​

Answers

Your question has not been processed through Brainly. Please try again

what is 488 to the nearest estimate

Answers

Answer:

10s

Explanation:

it's rounded to tens and the result will be 490

In cell B12, add the ROUNDUP function to display the total sales for Quarter 1

rounded up to 0 decimal places.

Answers

To carryout the above prompt in Microsoft Excel, you must use the following formula.: =ROUNDUP(B2+B6+B10,0)

What is the rationale for the above response?

This assumes that the total sales for Quarter 1 are in cells B2, B6, and B10, and the result should be rounded up to 0 decimal places. The ROUNDUP function rounds up a number to a specified number of digits, with 0 meaning to round to the nearest integer.

Microsoft Excel is a spreadsheet program developed by Microsoft that is available for Windows, macOS, Android, and iOS. It includes calculating or computation skills, graphing tools, pivot tables, and Visual Basic for Applications, a macro programming language. Excel is part of the Microsoft Office software suite.

Learn more about  Microsoft Excel:

https://brainly.com/question/24202382

#SPJ1

The breastbone or ________________ extends down the chest.

Answers

Answer:

The sternum or breastbone is a long flat bone located in the central part of the chest.

The sternum or breastbone is a long flat bone located in the central part of the chest.

In the middle of the chest, there is a long, flat bone known as the sternum or breastbone. It forms the front of the rib cage and is joined to the ribs by cartilage, assisting in the protection of the heart, lungs, and major blood arteries from harm. It is one of the longest and largest flat bones in the body, somewhat resembling a necktie. The manubrium, body, and xiphoid process are its three regions.

Therefore, the sternum or breastbone is a long flat bone located in the central part of the chest.

Learn more about the breastbone here:

https://brainly.com/question/32917871.

#SPJ2

Hundreds of endpoints were not updated with the latest OS and patches. Identify an administrative control to remediate outdated operating systems and patches.

Answers

Implementing a regular patch management policy, with a schedule for updating all endpoints and enforcing compliance through configuration management or other tools.

What is patch management policy?

Patch management rules are a set of standards that guarantee patching is managed, efficient, and secure. These instructions outline the actions and procedures to be followed when fixing bugs and vulnerabilities. There are several sorts of patches, such as security patches, hotfixes, and service packs.

Patch management is the process of updating software, drivers, and firmware to prevent vulnerabilities. Effective patch management also ensures that systems run at peak performance, increasing productivity.

Learn more about Path Management:
https://brainly.com/question/29744046
#SPJ1

you want to ensure that a query recordset is read-only and cannot modify the underlying data tables it references. How can you do that?

Answers

To guarantee that a query's recordset cannot make any changes to the original data tables, the "read-only" attribute can be assigned to the query.

What is the effective method?

An effective method to accomplish this is to utilize the "SELECT" statement along with the "FOR READ ONLY" condition. The instruction signifies to the database engine that the query's sole purpose is to retrieve data and not alter it.

The SQL Code

SELECT column1, column2, ...

FROM table1

WHERE condition

FOR READ ONLY;

Read more about SQL here:

https://brainly.com/question/25694408

#SPJ1

Three friends decide to rent an apartment and split the cost evenly. They each paid $640 towards the total move in cost of first and last month's rent and a security deposit. If rent is $650 per month, how much was the security deposit?
a.
$10
b.
$207
c.
$620
d.
$1,270



Please select the best answer from the choices provided

Answers

Answer:

c. $620

Explanation:

To find the cost of the security deposit, we need to subtract the amount paid towards the first and last month's rent from the total move-in cost.

Each friend paid $640 towards the total move-in cost, which includes the first and last month's rent and the security deposit. Since they split the cost evenly, the total move-in cost is 3 times $640, which is $1920.

The monthly rent is $650 per month, so the first and last month's rent combined is 2 times $650, which is $1300.

To find the security deposit, we subtract the first and last month's rent from the total move-in cost:

Security deposit = Total move-in cost - First and last month's rent

Security deposit = $1920 - $1300

Security deposit = $620

Therefore, the security deposit was $620.

Option c. $620 is the correct answer.

what is a network computer that processes requests from a client server​

Answers

Answer:

computer processing unit

computer processing unit is a network computer that processes requests from a client server​.

What is a computer processing unit?

The main element and "control center" of a computer is the Central Processing Unit (CPU). The CPU, sometimes known as the "central" or "main" processor, is a sophisticated collection of electronic circuitry that manages the device's software and operating system.

A central processing unit, sometimes known as a CPU, is a piece of electronic equipment that executes commands from software, enabling a computer or other device to carry out its functions.

Computers use a brain to process information, much like people do. The brain is the central processing unit for a computer (CPU). The CPU is the component that carries out all of the computer's instructions. It connects with all the other hardware parts of the computer while being on the motherboard.

Thus, computer processing unit.

For more information about computer processing unit, click here:

https://brainly.com/question/29775379

#SPJ6

I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AM

Questions for chapter 8: EX8.1, EX8.4, EX8.6, EX8.7, EX8.8

I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AMQuestions for

Answers

The response to the following prompts on programming in relation to array objects and codes are given below.

What is the solution to the above prompts?

A)

Valid declarations that instantiate an array object are:

boolean completed[J] = {true, true, false, false};

This declaration creates a boolean array named "completed" of length 4 with initial values {true, true, false, false}.

int powersOfTwo[] = {1, 2, 4, 8, 16, 32, 64, 128};

This declaration creates an integer array named "powersOfTwo" of length 8 with initial values {1, 2, 4, 8, 16, 32, 64, 128}.

char[] vowels = new char[5];

This declaration creates a character array named "vowels" of length 5 with default initial values (null for char).

float[] tLength = new float[100];

This declaration creates a float array named "tLength" of length 100 with default initial values (0.0f for float).

String[] names = new String[]{"Sam", "Frodo", "Merry"};

This declaration creates a String array named "names" of length 3 with initial values {"Sam", "Frodo", "Merry"}.

char[] vowels = {'a', 'e', 'i', 'o', 'u'};

This declaration creates a character array named "vowels" of length 5 with initial values {'a', 'e', 'i', 'o', 'u'}.

double[] standardDeviation = new double[1];

This declaration creates a double array named "standardDeviation" of length 1 with default initial value (0.0 for double).

In summary, arrays are objects in Java that store a fixed-size sequential collection of elements of the same type. The syntax for creating an array includes the type of the elements, the name of the array, and the number of elements to be stored in the array. An array can be initialized using curly braces ({}) to specify the initial values of the elements.


B) The problem with the code is that the loop condition in the for loop is incorrect. The index should start from 0 instead of 1, and the loop should run until index < masses.length instead of masses.length + 1. Also, the totalMass should be incremented by masses[index], not assigned to it.

Corrected code:
double[] masses = {123.6, 34.2, 765.87, 987.43, 90, 321, 5};

double totalMass = 0;

for (int index = 0; index < masses.length; index++) {

   totalMass += masses[index];

}


The modifications made here are to correct the starting index of the loop, fix the loop condition, and increment the totalMass variable correctly.


C)

1)
Code to set each element of an array called nums to the value of the constant INITIAL:

const int INITIAL = 10; // or any other desired initial value

int nums[5]; // assuming nums is an array of size 5

for (int i = 0; i < 5; i++) {

   nums[i] = INITIAL;

}


2) Code to print the values stored in an array called names backwards:
string names[4] = {"John", "Jane", "Bob", "Alice"}; // assuming names is an array of size 4

for (int i = 3; i >= 0; i--) {

   cout << names[i] << " ".

}



3) Code to set each element of a boolean array called flags to alternating values (true at index 0, false at index 1, true at index 2, etc.):

bool flags[6]; // assuming flags is an array of size 6

for (int i = 0; i < 6; i++) {

   flags[i] = (i % 2 == 0);

}


Learn more about array objects at:

https://brainly.com/question/16968729

#SPJ1

You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative

Answers

Answer:

The answer is:

A) Absolute cell reference

Explanation:

An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.

Hope this helped you!! Have a good day/night!!

Answer:

A is the right option absolute

The Boolean operators include which of the following?

A. and, or, not
B. to, for, from
C. a, an, the
D. is, are, not

Answers

Answer:

The answer is A. and, or, not

Explanation:

Using a Boolean search can help narrow your results. A Boolean search is a query that uses the Boolean operators AND, OR, and NOT, along with quotation marks, to limit the number of results. For example, searching the terms Alexander the Great AND conquests will provide results about Alexander, great, and their conquests.

Pat is asked to automate critical security functions like responding to detected threat patterns in an enterprise network. Which of the following should be done by Pat?

a. Use virtual desktop infrastructure
b. Use software-device visibility
c. Implement subnetting
d. Use a software-device network

Answers

The option to be done by Pat is to Use a software-device network.

What is Software-device networking?

Software device networking is known to be a kind of technology approach to a network management.

It is one that helps to have a dynamic, programmatically efficient type of network configuration  so that one can have a better network performance and monitoring.

Learn more about  software-device network from

https://brainly.com/question/4171513

25 Points !! HELP ASAP . DUE TOMORROW MORNING .

Imagine you are scrolling through your social media and you see these two links, which one would you click on? Why? Explain answer 2-3 sentences long .

25 Points !! HELP ASAP . DUE TOMORROW MORNING . Imagine you are scrolling through your social media and

Answers

Answer:

The Associated Press

Explanation:

Out of the two options presented, The Associated Press caught my attention more due to its compelling content. The content displayed is visually appealing and likely to pique one's curiosity, motivating one to seek further information.

Match each term to its definition.

parameter
return value
function

a value that can be passed from a function back to the calling part of a program.

a value that can be passed to a function

a group of instructions that can be used to organize a program or perform a repeated task

Answers

Answer:

Parameter - A value that can be passed to a function

Return Value - A value that can be passed form a function back to the calling part of a program

Function - A group of instructions that can be used to organize a program or perform a reapeated task.

What is the difference between Information Technology and Communication Technology?​

Answers

Answer:

Explanation:

information tech is technology that teaches you information, and communication tech is tech that lets you talk to family and friends and meet new people.

Answer:

The main difference between information technology and communication technology is that Information technology is a subject that is use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise whereas a Communication technology is the use of computers to communicate with family and friends.

At north wind headquarters, where were penguins first reported missing on the giant TV screen? And what did the penguins react?

Answers

Answer:

Berlin zoo

The penguins reacted that they must respond with action ASAP

Answer:

Berlin zoo, the penguins reacted that "It's time to go".

This means that the penguins care about each other and must rescue each other.

How would you spend your days if you had unlimited resources?

Answers

The ways that I spend my days if you had unlimited resources by helping the needy around me and living my life in a Godly way.

Are all human resources unlimited?

Human wants are said to be consistently changing and infinite, but the resources are said to be always there to satisfy them as they are finite.

Note that The resources cannot be more than the amount of human and natural resources that is available and thus The ways that I spend my days if you had unlimited resources by helping the needy around me and living my life in a Godly way.

Learn more about unlimited resources from

https://brainly.com/question/22964679

#SPJ1  

Subjective Questions
1. Why are professional roles important in ethics?
2. What is a strongly differentiated profession? Give examples.
3. Why some professions are not strongly differentiated? Give examples.
4. "The role of computer professional is not strongly differentiated.' Why?
Please need help in my question ​

Answers

Answer:

3 I'm hope I'm right sorry if I'm not

Other Questions
stroke volumes(SV) is equal to __ minus ___ Which equations are true for x = 2 and x = 2? Select two optionsx2 4 = 0x2 = 4 3x2 + 12 = 04x2 = 162(x 2)2 = 0 70.4 divided by 11 with work shown The owners of the Burger Emporium are looking for new supplier of onions for their famous hamburgers. It is important that the onion slice be roughly the same diameter as the hamburger patty. After careful analysis, they determine that they can only use onions with diameters between 9 and 10 cm. Company A provides onions with diameters that are approximately normally distributed with mean 10.3 cm and standard deviation of 1.2 cm. Company B provides onions with diameters that are approximately normally distributed with mean 10.6 cm and standard deviation of 0.9 cm. Which company provides the higher proportion of usable onions? Justify your choice with an appropriate statistical argument using proportions. what phenotypic ratios would be expected for the following genetic crosses? testcross between a homozygous recessive and a heterozygote, alleles exhibit complete dominance [ select ] dihybrid cross, alleles exhibit complete dominance [ select ] dihybrid cross, alleles exhibit complete dominance and epistasis Gavin saved $30,000 in a savings account. He received a 2.5% interest rate and saved for 8 years. How much interest did he earn HURRY PLEASE 20 PTSSSS Select all the correct answers.Which of the following are advantages of using a word processor?makes revision easierO helps in analyzing data tablessupports versioningenables sharingsimplifies video editing a useful scientific name must have two characteristics: Seth uses 20 nails to make a birdhouse. He wants to make 60 birdhouses to sell at the county fair. There are 30 nails in a box. How many boxes will he need?..Could someone tell me what type of operation I have to use? Q1 (a) (10 points) A genealogical firm called Q-L produces its output using the following production function: f(x1, x2) = Vx1 1+ 2x2 where x denotes the amount of factor 1 and x2 denotes the amount of factor 2. The market price of factor 1 is $2 and the market price of factor 2 is $10. = (a) To produce y = 5 units of output with the lowest cost, how much factor 1 and factor 2 should the firm use? Find this optimal bundle of inputs and calculate the minimal cost. Q1 (b) (10 points) (b) Suppose the price of factor 2 has increased to $20. And the price of factor 1 is still $2. To produce = 2 units of output with the lowest cost, how much of factor 1 and factor 2 should the firm use? Find this optimal bundle of inputs and calculate the minimal cost. What the answer pls help The distance from the tip of a slice of pizza to the crust is 6 inches. Help please I dont understand it What is the sum of these questions? 1.X - 10=-92.X + 10 = -33.x- 3 = 44. x / 5 =25.22= -11k6.-13m = -3777.b - 7= -18.-8 = p - 139.-40 = -5p10.-2 = m / 16 2. (Free-fall problem) A ball is thrown up in the air. 10 seconds later it reaches the top of its trajectory. What was the original velocity it was thrown upward with? Some body throwing stones at the dog into passive voice is Which topic did you choose? Why did you select this topic Add a spoonful of sugar to onecup of water. Add a spoonful ofoil to a second cup of water. Stireach cup. Record yourobservations below. A conducting sphere of radius 15.0 cm has a positive charge of4.0Cdeposited on its surface. Calculate the magnitude of the electric field produced by the charge at distances from the centre of the sphere of: a. 0.0 cm b. 5.0 cm c. 15.0 cm d. 20.0 cm. Why the titration is important? Help meeeeeeeeeeeeedsddsss9