computer a has an overall cpi of 2 and can be run at a clock rate of 600mhz. computer b has a cpi of 2.5 and can be run at a clock rate of 750 mhz. we have a particular program we wish to run. when compiled for computer a, this program has exactly 100,000 instructions. how many instructions would the program need to have when compiled for computer b, in order for the two computers to have exactly the same execution time for this program.

Answers

Answer 1

The program would require 65000 instructions when it was compiled for Computer B.

When will it be executed?

The formula for the execution time is;

Execution time is equal to (CPI Instruction Count)/Clock Time.

Given to us are

For machine A, CPI is 1.3.

Instructions: 100000

Clock frequency equals 600 MHz, or 600 106 Hz.

Thus;

Execution time is equal to (1.3 * 100000) / (600 106)

Execution time (CPU time): 216.67 x 106 second

for CPU B;

CPU Time = (2.5*100000)/(750106)

CPU Time: 333.33 x 106 seconds

The following instructions are given to computer B to ensure that the execution times of the two computers are equal:

216.67 * 10⁻⁶ = (2.5 * I)/(750 × 10⁶)

I = (216.67 * 10⁻⁶ * 750 × 10⁶)/2.5

I equals 65000 instructions.

To learn more about programming instructions refer to:

Brainly.com/question/15683939

#SPJ4


Related Questions

Ayy so in your opinion what is they best XXL freestyle no wrong answers except for Coi Leray and YK Osiris, my personally favorite is Denzel Curry's.

Answers

I’m not shure ……………..

Where can I learn how to make my own video game for free?

Answers

game’s top rack not top pop

Answer:

I dont really think you can make a video game for "free" but i found this website:Ads

www.buildbox.com/

The power to create 2d & 3d mobile games without coding.

Suppose you have four 1500 MB hard drives plus one 2.5 GB flash drive. How much GB of capacity is this overall?

Answers

1500mb = 1.5 gb

so four 1500mb hard drives are 1.5 x 4 = 6gb

so the total capacity is 6 + 2.5 = 8.5 gb

Which statement best describes a computer program?
A. A program can only perform one simple task.
B. A program is a sequence of instructions and decisions that the computer carries out.
C. A program can decide what task it is to perform.
D. A program is a sequence of comments.

Answers

Answer:

B is the best answer.

Explanation:

All other options listed are related to a program but B beast answers the question.

construct an appropriate chart to show the relative value of funds in each investment category in the excel file retirement portfolio.

Answers

To construct an appropriate chart to show the relative value of funds in each investment category in the Excel file "Retirement Portfolio"

Follow these steps:
1. Open the Excel file named "Retirement Portfolio."
2. Ensure that your data is properly organized in columns with headers, such as "Investment Category" and "Value of Funds."
3. Click on any cell within the data range.
4. Go to the "Insert" tab in the Excel ribbon.
5. In the "Charts" group, click on the "Recommended Charts" button. This will open the "Recommended Charts" dialog box.
6. Browse through the available chart options and select a chart that best represents the relative value of funds in each investment category. A pie chart or a column chart is usually suitable for this purpose. For instance, select a pie chart to display the percentage distribution of each investment category or a column chart to show a comparison of the value of funds in each category.
7. Click on "OK" to insert the selected chart into your worksheet.
8. If necessary, customize the chart by adjusting the chart title, legend, and data labels. You can do this by clicking on the chart and using the options available in the "Chart Tools" tabs that appear in the Excel ribbon.


Now, you have successfully constructed an appropriate chart to show the relative value of funds in each investment category in the Excel file "Retirement Portfolio."

Learn more about pie-chart here:

https://brainly.com/question/29148468

#SPJ11

When you install drives what type of connection can be used to connect SSD’s, HDD’s and Optical drive?

Answers

Answer:

Two drives: one being an SSD and one being an HDD

Explanation:

SSHD is a hybrid of the SSD and HDD. It has the capacity of a HHD and the speed close to that of a SSD. Frequently used software are stored in the SSD part for quick access and everything else is stored in the HDD.

Explanation:

SSD’s usually connect straight to the motherboard via a slot that you screw down onto the motherboard. Some manufacturers may have a heat sync over the slot which allows your SSD to be cooled. HDD are connected via SATA cables, the end is like a long L and that as well connects to a header on your motherboard.

what is different types of secondary memory of computer system​?

Answers

Secondary memory refers to the non-volatile memory devices in a computer system that are used for long-term storage of data and programs. Here are some of the different types of secondary memory:

Hard disk drives (HDD): These are mechanical devices that store data on spinning disks using magnetic fields. They are commonly used in desktop and laptop computers as the primary storage device.

Solid-state drives (SSD): These are non-mechanical devices that use flash memory to store data. They are faster and more reliable than HDDs and are commonly used as the primary storage device in laptops, tablets, and smartphones.

Optical storage devices: These include CD, DVD, and Blu-ray discs, which are used to store data and programs. They are read by lasers and can be used for backup and archival purposes.

USB flash drives: These are small portable storage devices that use flash memory to store data. They are commonly used to transfer files between computers and as a backup storage device.

Memory cards: These are small storage devices commonly used in cameras, smartphones, and other portable devices to store data and media files.

Magnetic tape: This is a sequential access storage medium commonly used for backup and archival purposes.

Each of these secondary memory types has its own advantages and disadvantages, and is used in different ways depending on the specific needs of the user or organization.

Secondary memory refers to the non-volatile memory devices in a computer system that are used for long-term storage of data and programs. Here are some of the different types of secondary memory:

Hard disk drives (HDD): These are mechanical devices that store data on spinning disks using magnetic fields. They are commonly used in desktop and laptop computers as the primary storage device.

Solid-state drives (SSD): These are non-mechanical devices that use flash memory to store data. They are faster and more reliable than HDDs and are commonly used as the primary storage device in laptops, tablets, and smartphones.

Optical storage devices: These include CD, DVD, and Blu-ray discs, which are used to store data and programs. They are read by lasers and can be used for backup and archival purposes.

USB flash drives: These are small portable storage devices that use flash memory to store data. They are commonly used to transfer files between computers and as a backup storage device.

Memory cards: These are small storage devices commonly used in cameras, smartphones, and other portable devices to store data and media files.

Magnetic tape: This is a sequential access storage medium commonly used for backup and archival purposes.

Each of these secondary memory types has its own advantages and disadvantages, and is used in different ways depending on the specific needs of the user or organization.

10. execute means to use smooth and well-timed actions, and includes the three action steps of: adjust speed, adjust position, and:

Answers

To execute means to use smooth and well-timed actions, and includes the three action steps of: adjust speed, adjust position, and: Communicate Intentions. Note that this is in reference to Motorcycle Safety.

What does Execute mean in Motorcycle Safety?

Searching entails scanning for and identifying characteristics that may pose a significant risk. To evaluate means to analyze potential difficulties associated with such risks. The physical motor abilities required to prevent or avoid an accident are referred to as execution.

Motorcycles have a low profile and may easily be hidden in a car's blind area or covered by background items such as shadows, shrubs, or fences.

Motorcycle riders frequently slow down by downshifting or releasing the throttle, which does not activate the brake light.

Motorcyclists frequently modify their location inside a lane to be more visible and to reduce the impacts of road debris, passing cars, and wind.

Learn more about Motorcycle:
https://brainly.com/question/29333261
#SPJ1

hello friend!

make it a great day!

  • smile
  • laugh
  • celebrate

Answers

Hello friend! Smile, laugh AND celebrate

hello friend! make it a great day! smile laugh celebrate..................

The unix operating system associates a protection domain with the ____. the unix operating system associates a protection domain with the ____. task tread process user

Answers

The unix operating system associates a protection domain with the user.

In the Unix operating system, each user is assigned a protection domain. This domain defines the user's permissions and access rights. Protection domains are used to prevent unauthorized access to system resources and to ensure that users can only access the resources that they are authorized to access.

This domain is used to protect the user's files and data from being accessed by unauthorized users. The domain is also used to limit the user's ability to modify system files.

The security domain of a user is the set of all objects to which the user has access. A user's security domain is determined by the user's security clearance and the security policies of the domain.

clearance: the user's security clearance

domain: the set of all objects to which the user has access.

Learn more about Unix operating system here:

https://brainly.com/question/4837956

#SPJ4

illl give brainliest plzzzzzzzzzz

illl give brainliest plzzzzzzzzzz

Answers

The one paste symbol name is : paste settings

it consist of 'paste special' and 'set default paste if im not wrong'

unix is a __ and ___​

Answers

Answer:

UNIX IS A MULTIUSER COMPUTER AND OPREATING SYSTEM.

Which situations make use of interactive multimedia and which do not? Amelia is exploring a shopping website looking for clothes or accessories she could give to her sister. Roy is going through a tutorial on his laptop that explains a do-it-yourself project. Jaden is listening to a presentation on early music in his class. Fred is answering an online quiz that requires him to select correct answers. Linear Multimedia Kristen is watching an educational film on her tablet. Non-linear Multimedia​

Answers

The situation that make use of interactive multimedia is Roy is going through a tutorial on his laptop that explains a do-it-yourself project, and that do not is Amelia is exploring a shopping website looking for clothes or accessories she could give to her sister.

What is an interactive multimedia?

Interactive multimedia is a type of interaction in which the user can operate, control, and change the text, image, and picture, and function in a  phone or computer.

Thus, the correct options are A and B.

Learn more about interactive multimedia

https://brainly.com/question/26090715

#SPJ1

__________ returns a built-in HTML5 object, with many properties and methods for drawing paths, boxes, circles, text, and images on the canvas.
Group of answer choices
getContext()
getPaint()
getContest()
loadContext()

Answers

  The correct answer is getContext(). The getContext() method returns a built-in HTML5 object with many properties and methods for drawing paths, boxes, circles, text, and images on the canvas.

  The getContext() method is a fundamental part of the HTML5 canvas element. It is used to obtain the rendering context of the canvas, which provides access to various drawing functions and features. By calling getContext() on a canvas element, developers can retrieve the associated drawing context object, which is then used to manipulate and render graphics on the canvas.

  The returned context object has properties and methods that allow for drawing shapes, applying styles, handling transformations, and managing text and images. It provides a powerful interface for creating dynamic and interactive graphics within web applications.

  Thus, the getContext() method in HTML5 returns a built-in object that serves as the rendering context for the canvas element. This context object exposes numerous properties and methods, enabling developers to draw and manipulate various graphical elements on the canvas.

Learn more about canvas here: brainly.in/question/44191759

#SPJ11

I always give positive feedback.
Language is C++, please make sure you add clear explanations in the code of what each part does, and paste the code in your answer.
This program will read data about employees from a text file, and will use this data to determine how much to pay each employee.
The format of the data in the file, along with the guidelines used to calculate payment, are in the images below.
FORMAT OF THE DATA:
Example Row: x135.5 14.56 999999999 John Richard Doe
On each line, the first character is not used (so read it into a junk variable). In the example, the first character is x
The second character indicates which type of employee the individual is:
1. part-time hourly,
2. part-time salary,
3. full-time hourly without overtime,
4. full-time-hourly with double pay overtime,
5. full-time salary

Answers

Here's an example of a C++ program that reads data about employees from a text file and calculates their payment based on the given guidelines:

```cpp

#include <iostream>

#include <fstream>

#include <string>

using namespace std;

// Function to calculate payment based on employee type and hours worked

double calculatePayment(char employeeType, double rate, double hoursWorked) {

   double payment = 0.0;

   switch (employeeType) {

       case '1':  // Part-time hourly

           payment = rate * hoursWorked;

           break;

       case '2':  // Part-time salary

           payment = rate;

           break;

       case '3':  // Full-time hourly without overtime

           payment = rate * hoursWorked;

           break;

       case '4':  // Full-time hourly with double pay overtime

           if (hoursWorked > 40) {

               double overtimeHours = hoursWorked - 40;

               payment = (rate * 40) + (rate * 2 * overtimeHours);

           } else {

               payment = rate * hoursWorked;

           }

           break;

       case '5':  // Full-time salary

           payment = rate;

           break;

       default:

           cout << "Invalid employee type." << endl;

   }

   return payment;

}

int main() {

   ifstream inputFile("employee_data.txt");

   string line;

   if (inputFile.is_open()) {

       while (getline(inputFile, line)) {

           char junk;

           char employeeType;

           double rate;

           double hoursWorked;

           string firstName;

           string lastName;

           istringstream iss(line);

           iss >> junk >> employeeType >> rate >> hoursWorked >> firstName >> lastName;

           double payment = calculatePayment(employeeType, rate, hoursWorked);

           cout << "Employee: " << firstName << " " << lastName << endl;

           cout << "Payment: $" << payment << endl;

           cout << endl;

       }

       inputFile.close();

   } else {

       cout << "Failed to open the input file." << endl;

   }

   return 0;

}

```

1. The program starts by including the necessary header files (`iostream`, `fstream`, `string`) for input/output and file handling operations.

2. The `calculatePayment` function takes the employee type (`employeeType`), hourly rate (`rate`), and hours worked (`hoursWorked`) as input and returns the calculated payment based on the employee type.

3. Inside the `calculatePayment` function, a switch statement is used to determine the appropriate payment calculation based on the employee type. The corresponding calculations are performed and the result is stored in the `payment` variable.

4. In the `main` function, the program opens the input file ("employee_data.txt") using an `ifstream` object named `inputFile`.

5. The program then reads each line from the input file using the `getline` function and stores it in the `line` variable.

6. Each line is then processed using an `istringstream` object named `iss` to extract the individual data components (employee type, rate, hours worked, first name, last name) using the extraction operator (`>>`).

7. The extracted data is passed to the `calculatePayment` function to calculate the payment for the employee.

8. The employee's name and payment amount are displayed on the console.

9. Steps 5-8 are repeated for each line in the input file until the end of the file is reached.

10. Finally, the input file is closed.

Make sure to replace "employee_data.txt" with the actual filename/path of your input file containing the employee data.

Learn more about file input/output in C++ here: brainly.com/question/32896128

#SPJ11

What do macOS and Windows use to prevent us from accidentally deleting files?

Answers

macOS and Windows use a Trash can—or Recycle Bin—to prevent you from accidentally deleting files. When you delete a file, it is moved to the Trash can.

Wired Equivalent Privacy (WEP) is An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure.
True or False

Answers

The given statement, "Wired Equivalent Privacy (WEP) is An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure" is true because wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol that was initially designed to provide security for wireless networks by encrypting data transmitted between devices.

However, over time, significant vulnerabilities were discovered in WEP, making it easily exploitable by attackers. These vulnerabilities allowed unauthorized parties to decrypt the encrypted data and gain access to the wireless network.

Due to its weaknesses and vulnerabilities, WEP is no longer considered a secure wireless security protocol. It has been widely replaced by more robust and secure protocols, such as Wi-Fi Protected Access (WPA) and WPA2, which provide stronger encryption algorithms and enhanced security features to protect wireless communications.

It is recommended to use WPA2 or the latest security standards available for securing wireless networks to ensure the confidentiality and integrity of transmitted data.

Learn more about Security protocol: https://brainly.com/question/30086911

#SPJ11

Modify the binary search algorithm to take the upper of the two
middle array elements in case the input array has even length. In
other words, in the binary search algorithm, replace
Trace the action

Answers

The binary search algorithm can be modified to handle arrays with even lengths by considering the upper of the two middle elements as the pivot. This modification ensures that the algorithm works correctly and efficiently for arrays of any length.

In the traditional binary search algorithm, the pivot is chosen as the middle element of the array. This works well for arrays with odd lengths, but poses a challenge when the array length is even. In such cases, there is no exact middle element. To address this, we can modify the algorithm to consider the upper of the two middle elements as the pivot.

When dividing the array in half during each iteration, we can calculate the middle index as (low + high) // 2. However, for arrays with even lengths, we can modify this calculation to (low + high + 1) // 2 in order to choose the upper middle element as the pivot. By making this modification, the binary search algorithm can handle arrays of any length correctly. This ensures that the search process efficiently narrows down the search space and accurately finds the target element, regardless of the array's length.

Learn more about array here-

https://brainly.com/question/30757831

#SPJ11

What is the best server to play on Zombs Royale

Answers

Answer:

East

Explanation:

Answer:

If you are a competitive player play in the Us east server they are really competitive If you arent that competitive play in Us West server

Skyler needs to print mailing labels for a fundraising campaign her company is hosting. which type of software should she use?

Answers

Since Skyler needs to print mailing labels for a fundraising campaign her company is hosting, the type of software that she need to use is Word Processing software.

What is word processing software and examples?

The term Word Processing is known to be a term that connote the act or process why which on make use of the computer to make , edit, save as well as print documents.

Note that In order to carry out word processing, one need to make use of a specialized software (called the  Word Processor).

Therefore, based on the above, Since Skyler needs to print mailing labels for a fundraising campaign her company is hosting, the type of software that she need to use is Word Processing software.

Learn more about Word Processing software from

https://brainly.com/question/985406
#SPJ1

Question 20
Which of the following is NOT a setting that will change a camera's color profiles?

Answers

In the absence of options, note that the factors that will NOT change the setting of a camera's color profiles are given as follows:

Exposure timeISO sensitivityAperture (f-stop)

On the other hand, the settings that may change a camera's color profiles include:

White balancePicture profile or style (such as Standard, Vivid, Portrait, etc.)Color space (such as sRGB or Adobe RGB)

Why is a camera's color profiles important?

Camera color profiles are important because they determine the way colors are captured and rendered in your photos.

Different profiles produce different results, and choosing the right profile can enhance the look and feel of your photos. A proper color profile ensures accurate and consistent color representation, which is crucial for professional photographers and videographers.

Learn more about Camera Color Profiles:
https://brainly.com/question/14317632?
#SPJ1

Post-production is the phase where all the film, audio, and other visuals come together to create the completed Input Answer .

Answers

Post-production is the conclusive procedure of film and video production whereby all the uncooked footage, audio recordings, as well as other visible components are amassed and altered together to construct the concluding product.

What is found in this process?

Included in this process comes activities such as color grading, jingling combinations, unique effects, adding tunes and other sonic touches.

The aim of post-production is to improve and accentuate the shots that were seized during production, attaining an exquisite, uniformity final item which holds the creative conception of the director and producers.

This point is crucial to the prosperity of the closing project, since it can unmistakably sway the viewers' full viewing knowledge.

Read more about Post-production here:

https://brainly.com/question/26528849

#SPJ1

12. mr. taylor, the curator of the children's museum, recently made two purchases of clay
and wood for a visiting artist to sculpt. the first purchase was for 5 kg, of clay and 4 kg,
of wood and it cost $35,50. the second purchase was for 3.5 kg, of clay and 6 kg, of
wood and it cost $50.45, what was the cost of each product per kilogram?

Answers

The cost per kilogram for wood in the first purchase is $8.88/kg, and in the second purchase is $8.41/kg.

What are the costs per kilogram for clay and wood based on the given purchases?

To find the cost per kilogram for clay and wood, we can divide the total cost of each purchase by the respective weights of clay and wood.

First Purchase:

Cost of clay = $35.50Weight of clay = 5 kgCost per kilogram of clay = $35.50 / 5 kg = $7.10/kgCost of wood = $35.50Weight of wood = 4 kgCost per kilogram of wood = $35.50 / 4 kg = $8.875/kg (rounded to two decimal places)

Second Purchase:

Cost of clay = $50.45Weight of clay = 3.5 kgCost per kilogram of clay = $50.45 / 3.5 kg = $14.414/kg (rounded to two decimal places)Cost of wood = $50.45Weight of wood = 6 kgCost per kilogram of wood = $50.45 / 6 kg = $8.4083/kg (rounded to two decimal places)

Therefore, the cost per kilogram for clay in the first purchase is $7.10/kg, and in the second purchase is $14.41/kg.

Learn more about per kilogram

brainly.com/question/20369174

#SPJ11

A radio station broadcasting a program is an example of ______. group of answer choices interpersonal communication mass communication media-centric communication broad communication

Answers

A radio station broadcasting a program is an example of option B. mass communication.

What is Mass communication?

Mass communication is known to be a term that connote the act or process of influencing or giving and exchanging of information via the use of mass media to a given large area of the population.

Note that it is one that is said to be understood for sharing   various forms of media and for the dissemination of information.

Therefore, A radio station broadcasting a program is an example of option B. mass communication.

Learn more about mass communication from

https://brainly.com/question/20696487

#SPJ1

Quick!
who can solve this?

:}
:}
:}
:}
:}​

Quick!who can solve this?:}:}:}:}:}

Answers

Answer:

1.server

2.container

3.empty

4.lead

5.body

6.conttribute

i just know this much

sry

Write an expression whose value is true if and only if c is a newline character.

Answers

To check if a character c is a newline character, you can use the following expression is_newline = c == '\n'

In this expression, the equality operator (==) compares the character c with the newline character ('\n'). If c is equal to '\n', the expression evaluates to True, indicating that c is a newline character. Otherwise, it evaluates to False.

The newline character ('\n') represents a line break or a new line in various programming languages and text files. It is commonly used to separate lines of text. You can use this expression in conditional statements or assignments to perform specific actions based on whether c is a newline character or not. For example

if is_newline:

   print("The character is a newline.")

else:

   print("The character is not a newline.")

This allows you to handle newline characters differently in your program logic based on the evaluation of the expression.

Learn more about expression here

https://brainly.com/question/7788080

#SPJ

what do you understand by the term slide show?

Answers

A slide presentation is a tool used to display a sequence of images, graphics and text on a screen in order to communicate information visually.

Slideshows can be used for a wide variety of purposes, from sales presentations and business training to educational and entertainment presentations. In addition, slide presentations are an effective tool for visualizing complex ideas and simplifying information for better understanding.

In conclusion, a slide presentation is a visual tool used to communicate information in an effective and organized manner. It is an essential tool for business and educational presentations, and is an effective way to visualize complex information and simplify it for better understanding.

Lear More About Presentation of Devices

https://brainly.com/question/16317319

#SPJ11

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

If students follow the directions for trying to add a waitlisted class and later become eligible to register for the class, they will be notified via email that they have a time window of _____ hours to register for the class.

Answers

The students have 24 hours of window time to register for the class after they become eligible to register for the class.

What is waitlisted?

The waitlist is a part of the normal decision-making process. This signifies that the college is still interested in you, but there isn't a spot for you right now.

You might get admission if enough other students don't want to go. It's not an outright rejection, as a deferral, but it does mean you'll have to wait to find out if you'll be admitted.

If students follow the directions for trying to add a waitlisted class and later become eligible to register for the class, they will be notified via email that they have a time window of 24 hours to register for the class.

Thus, the students have 24 hours of window time to register for the class after they become eligible to register for the class.

Learn more about the waitlisted here;

https://brainly.com/question/15526156

#SPJ1

​​​​​​​
A rounded-down integer solution can result in a less than optimal solution to an integer programming problem. True False

Answers

Answer:

True, this is because rounding down an integer can cause the solution to be farther away from the optimal solution.

Other Questions
Which of the following happens during a lunar eclipse? A: The moon appears red.B: The moon casts a shadow on Earth.C: Earth, the moon and the sun form a triangle.D: The moon comes between the sun and Earth. How many points did the packers score in their highest-scoring game?. a certain species of dinosaur laid a large number of eggs, but the hatchlings had a high mortality rate. those that survived grew at a rapid pace and dispersed quickly. which survivorship curve best represents this species of dinosaur? the species was an r-strategist with a type iii survivorship curve the species was a k-strategist with a type ii survivorship curve the species waas a km-strategist with a type i survivorship curve the species was an r-strategist with a type i survivorship curve How does Curtis's business succeed even when he cannot read? According to the domain name system (DNS), which of the following is a subdomain of the domain example.com?about.example.comexample.com/about.htmlexample.com.aboutexample.org Pls help grades close today Ill brainlest Which constitution has a Supremacy Clause? Alaska United States Florida New York beto y karina fueron al cine y estaban las entradas al 2x1 y fueron a comprar palomitas que costaban 48 pesos cada una y compraron 2 refresco para cada uno que costaban 50 cada uno cuanto gastaron en total What is the significance of understanding differences within the species? 3-5 sentence 4/ 2016 = ____________ plsss help fast plsss really need help fast Which are physical properties? (Select all that apply.)appearancemelting pointvolumeformation of bubbles The _________________ channel flow involves two-way communication between producer and consumer?Select one:a. Orderingb. Negotiationc. Ownershipd. Promotione. Risking 6 Anton is buying supplies for a charity event.A pack of 50 paper cups costs 1.89.A pack of 10 paper plates costs 49p.Anton has 15 to spend.Anton buys 250 paper cups and spends the rest on paper plates.How many paper plates can he buy? uegvgktggjyftsedr56975efuedfuytgbv PLEASE HELP ME OUT!\ thank you its Geomtry 9th grade Which choices are equivalent to the expression below check all that apply How do you find the angle XYZ of a triangle? Methane (CH) is burned with dry air. The volumetric analysis of the products on a dry basis is 5.2% CO2, 0.33% CO, 11.24% O2 and 83.23% N2. Determinem the air-fuel ratio on a mass basis, FILL IN THE BLANK. epsps are associated with ________, whereas ipsps are associated with ______. A wide area network is:a. a large central network that connects other networks in a distance spanning exactly 5 miles.b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles).d. a network spanning a large geographical area (up to 1000s of miles).e. a network spanning exactly 10 miles with common carrier circuits.