hey janta


What is rotation!? ​

Answers

Answer 1

Answer:

Rotation is the circular movement of an object around an axis of rotation. A three-dimensional object may have an infinite number of rotation axes.


Related Questions

Unit 9 Inheritance and Polymorphism FRQ (a) (b) (c) PENCIL AND PAPER ONLY. SHOW ALL YOUR WORK CLEARLY. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick Reference have been imported where appropriate. Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied. In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods will not receive full credit. The following Book class is used to represent books and print information about each book. Each Book object has attributes for the book title and for the name of the book's author. public class Book private String title; private String author; public Book (String t, String a) title = t; author = a; public void printBookInfo() System.out.print(title + ", written by " + author); (a) The PictureBook class is a subclass of the Book class that has one additional attribute: a String variable named illustrator that is used to represent the name of the illustrator of a picture book. The PictureBook class also contains a printBookInfo method to print the title, writer, and illustrator of a picture book. Consider the following code segment. PictureBook myBook = new PictureBook ("Peter and Wendy", "J.M. Barrie", "F.D. Bedford"); myBook.printBookInfo(); The code segment is intended to print the following output. Peter and Wendy, written by J.M. Barrie and illustrated by F.D. Bedford Complete the PictureBook class below. Your implementation should conform to the example above. public class PictureBook extends Book (write your class using pencil in a separate page) Unit 9 Inheritance and Polymorphism FRQ (a) (b) (c) Consider the following books. • A book titled Frankenstein, written by Mary Shelley A picture book titled The Wonderful Wizard of Oz, written by L. Frank Baum and illustrated by W.W. Denslow The following code segment is intended to represent the two books described above as objects bookl and book2, respectively, and add them to the ArrayList myLibrary. ArrayList myLibrary = new ArrayList(); /* missing code */ myLibrary.add(bookl); my Library.add(book2); (b) Write a code segment that can be used to replace /* missing code */ so that bookl and book 2 will be correctly created and added to my Library. Assume that class PictureBook works as intended, regardless of what you wrote in part (a). (write your code segment using pencil in a separate page) The BookListing class is used to generate a descriptive listing for a book. The BookListing constructor takes a Book object and a double value as parameters and uses them to print information about the book, along with its price. Assume that book1 and book2 were created as specified in part (b). The following table demonstrates the intended behavior of the BookListing class using objects book1 and book2. Code Segment Result Printed BookListing listing1 = new BookListing (book1, 10.99); Frankenstein, written by Mary Shelley, $10.99 listingl.printDescription(); BookListing listing2 = new BookListing (book2, 12.99); The Wonderful Wizard of Oz, written by L. Frank Baum and illustrated by W.W. Denslow, $12.99 listing2.print Description(); (c) Complete the BookListing class below. Your implementation should conform to the examples. Assume that class PictureBook works as intended, regardless of what you wrote in part (a). public class BookListing (write your class using pencil in a separate page)

Answers

(a) The implementation of the PictureBook class:

typescript

Copy code

public class PictureBook extends Book {

   private String illustrator;

   

   public PictureBook(String t, String a, String i) {

       super(t, a);

       illustrator = i;

   }

       public void printBookInfo() {

       System.out.print(title + ", written by " + author + " and illustrated by " + illustrator);

   }

}

(b) The code segment that creates book1 and book2 and adds them to myLibrary:

csharp

Copy code

Book book1 = new Book("Frankenstein", "Mary Shelley");

PictureBook book2 = new PictureBook("The Wonderful Wizard of Oz", "L. Frank Baum", "W.W. Denslow");

myLibrary.add(book1);

myLibrary.add(book2);

(c) The implementation of the BookListing class:

csharp

Copy code

public class BookListing {

   private Book book;

   private double price;

       public BookListing(Book b, double p) {

       book = b;

       price = p;

   }

      public void printDescription() {

       book.printBookInfo();

       System.out.println(", $" + price);

   }

}

For more questions like Polymorphism visit the link below:

https://brainly.com/question/16344360

#SPJ11

How does malware spread

Answers

Answer: Malware can use known software vulnerabilities to infect your PC. A vulnerability is like a hole in your software that can give malware access to your PC. When you go to a website, it can try to use vulnerabilities in your web browser to infect your PC with malware. Other than this malware can spread by four ways Clicking on links to malicious websites in emails, messaging apps or social network posts. Visiting compromised websites, aka drive-by downloads, viruses can be hidden in HTML, thus downloading when the webpage loads in your browser. Connecting your device to infected external hard drives or network drives

Answer: Malware is usually distributed through malicious websites, emails, and software. Malware can also be hidden in other files, such as image or document files, or even in seemingly innocuous files, such as.exe files

You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?

Answers

From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.

What techniques are used to raise search rankings?

If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.

        To learn more about search rankings. refer

        https://brainly.com/question/14024902  

         #SPJ1

If i paid $37.20 for 12 gallons of ice cream how many would 1 quart of ice cream cost

Answers

Answer:

$0.78

Explanation:

There are 4 quarts in a gallon, so you can use
12 gallons• 4 quarts= 48 quarts for 12 gallons

Now, you can divide 48 from $37.20 to find the price of 1 quart.

$37.20 / 48 quarts = 0.775, written as $0.76 per quart of ice cream.

Answer: $0.76 per quart of ice cream


What type of pointing device is often used by artists, and why is it ideal for artists?​

Answers

Answer:

A drawing/graphics tablet

Explanation:

It is ideal for artists, due to it being very similar to as if you were to draw on paper. The stylus replicates a pencil or pen.

Which of the following are advantages of a local area network, as opposed to a wide area network? Select 3 options. Responses higher speeds higher speeds provides access to more networks provides access to more networks lower cost lower cost greater geographic reach greater geographic reach more secure more secure

Answers

The advantages of a local area network (LAN) over a wide area network (WAN) include higher speeds, lower cost, and greater security.

Advantages of a local area network (LAN) over a wide area network (WAN) can be summarized as follows:

Higher speeds: LANs typically offer faster data transfer rates compared to WANs. Since LANs cover a smaller geographical area, they can utilize high-speed technologies like Ethernet, resulting in quicker communication between devices.Lower cost: LAN infrastructure is generally less expensive to set up and maintain compared to WANs. LANs require fewer networking devices and cables, and the equipment used is often more affordable. Additionally, WANs involve costs associated with long-distance communication lines and leased connections.More secure: LANs tend to provide a higher level of security compared to WANs. Since LANs are confined to a limited area, it is easier to implement security measures such as firewalls, access controls, and encryption protocols to protect the network from unauthorized access and external threats.

To summarize, the advantages of a LAN over a WAN are higher speeds, lower cost, and enhanced security.

For more such question on local area network

https://brainly.com/question/24260900

#SPJ8

How does the history of the internet explain the issues in cyberspace and cybersecurity now? Be sure to reference at least one specific issue that you read about in the timeline of the origins of the internet. this is a nearpod and i need help pls

Answers

Answer:

The history of the internet can explain the issues in cyberspace and cybersecurity today in a number of ways. One of the key factors is the rapid growth of the internet over the last few decades. This has led to a vastly expanded attack surface for hackers and cybercriminals, as well as a lack of security measures and best practices on many devices and systems that are connected to the internet.

One specific issue that can be highlighted is the lack of security built into the early internet. The early designers of the internet, such as Vint Cerf and Bob Kahn, focused on creating a functional network that could connect computers, with little consideration for security. As a result, the internet was initially built on a trust model where all users were assumed to be trustworthy, and this lack of security has carried over into today's internet. This lack of security in the early days is one of the main reason that made it easy for hackers to exploit and this is still a major problem in modern internet.

Another issue is the decentralized nature of the internet. This decentralization allows for great flexibility and innovation, but it also makes it difficult to impose security measures or regulations. Additionally, the rapid growth of the internet has made it hard for governments, companies, and individuals to keep pace with developments and adequately protect themselves from cyberthreats.

Finally, the expansion of the Internet of Things (IoT) and the increasing connectivity of everyday devices also create new vulnerabilities as these devices may not have the same level of security as traditional computing devices.

Overall, while the history of the internet has brought many benefits, it has also laid the groundwork for many of the cybersecurity challenges we face today.

Explanation:

Take one action in the next two days to build your network. You can join a club, talk to new people, or serve someone. Write about this action and submit this as your work for the lesson. icon Assignment

Answers

Making connections is crucial since it increases your versatility.You have a support system of people you can turn to when things get tough so they can help you find solutions or in any other way.

What are the advantages of joining a new club?

Support Network - Joining a club or organization can help you develop a support network in addition to helping you make new acquaintances and meet people.Your teammates and friends will be there for you not only during practice but also amid personal difficulties. Working collaboratively inside a group, between groups, between communities, or between villages is known as network building.One method of creating a network is by forming a group. Attending events and conferences and developing connections with other attendees and industry speakers is one of the finest methods to build a strong network.In fact, the framework of many networking events and conferences encourages networking and connection opportunities. Personal networking is the process of establishing connections with organizations or individuals that share our interests.Relationship growth often takes place at one of the three levels listed below:Networks for professionals.Neighborhood networks.Personal networks. Reaching out is part of an active communication process that will help you learn more about the other person's interests, needs, viewpoints, and contacts.It is a life skill that needs to be actively handled in order to preserve or, more importantly, to advance a prosperous profession. various network types.PAN (personal area network), LAN (local area network), MAN (metropolitan area network), and WAN (wide area network) are the different types of networks.

To learn more about network refer

https://brainly.com/question/28041042

#SPJ1    

Which of the following devices is NOT required to successfully implement teleconferencing?
Sensor
Modem
Speaker
Microphone

Answers

Answer: a. Sensor

Explanation: Modem= internet

Speaker= able to hear

microphone = to speak

Legacy mrp systems typically utilized multiple software packages and databases which caused:_____.

Answers

Legacy mrp systems typically utilized multiple software packages and databases which caused the same information to be save in multiple locations.

What is an MRP systems?

Material requirements planning (MRP) is known to be a kind of a system that is often used in the calculation of  some materials as well as the parts that is known to be needed to create or form a product.

It is one that is also known to be made up of three key steps such as taking inventory of the materials as well as the parts on hand, knowing which other ones are required and then keeping a schedule of their production or buying.

Therefore, Legacy mrp systems typically utilized multiple software packages and databases which caused the same information to be save in multiple locations.

Learn more about mrp systems from

https://brainly.com/question/13647161

#SPJ1

anybody wanna be friends?

Answers

i wouldn't mind......

yes Avacado?????????????????????

WILL GIVE BRAINLIEST!!!!!!!
A dentist's drill is an example of a hydraulic system.

True

False

Answers

Answer:

A drill is one of the most important tools a dentist can have. They run on pneumatic systems which gives the drill power and precision.

Explanation:

So, false

Answer:False

Explanation:Just saw the question and this was the answer. Hope this helps!

Differentiate leakage channels, voltage-gated channels,
ligand-gated channels, and mechanically gated
channels.

Answers

leakage channels are always open and contribute to the resting membrane potential, voltage-gated channels open or close in response to changes in membrane potential, ligand-gated channels open or close in response to the binding of specific chemical messengers, and mechanically gated channels open or close in response to mechanical stimuli.

Leakage Channels:

Leakage channels, also known as non-gated channels or passive channels, are ion channels that allow the passive movement of ions across the cell membrane. They are always open and are responsible for the resting membrane potential of a cell.

Voltage-Gated Channels:

Voltage-gated channels are ion channels that open or close in response to changes in the membrane potential. These channels are activated by changes in voltage across the cell membrane. When the membrane potential reaches a certain threshold, the channels undergo conformational changes, leading to their opening or closing.

Ligand-Gated Channels:

Ligand-gated channels, also known as chemically gated channels, are ion channels that open or close in response to the binding of specific chemical messengers or ligands. These ligands can be neurotransmitters, hormones, or other signaling molecules.

Mechanically Gated Channels:

Mechanically gated channels are ion channels that open or close in response to mechanical stimuli such as pressure, stretch, or vibration. These channels are found in cells or tissues that are sensitive to mechanical forces, such as sensory cells in the auditory system or touch receptors in the skin.

Learn more about leakage channels https://brainly.com/question/13287128

#SPJ11

Is computing gcse easy or hard

Answers

Answer:

my friend that took it said that there was a lot of complex theory involved- i was initially supposed to take it, but my blocks didn't align so i had to take geography instead

honestly, i would say it was one of the best decisions I've made, since i see lots of computing students completely confused by what they're doing.

To be honest i have never taken a GCSE but give your self time to study like any other  test and stress about it.

hope this helped

-scav

How many cubic millimeters are present in 0.0923 m3?​

Answers

92300000 is the answer.

when converting meter to millimeter we multiply 1000

when converting m³ to cm³ we multiply by 1000000000(1000 x 1000 x1000)

PLZZZ HELPPPP

Use an algorithm to help the Python Turtle get to the finish line in 10 steps by using only the 3 commands below:
- Turn Left
- Turn Right
- Move #












Answer:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.

PLZZZ HELPPPP Use an algorithm to help the Python Turtle get to the finish line in 10 steps by using

Answers

Answer:

move move turn left 2

Explanation:

differences between ancient means of communication and modern means of communication​

Answers

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging

Answer:

The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging.

The only real difference is the speed of it. Other than that, only the delivery methods have changed. Communication itself is the same, as far as I can see.

Explanation:

Games were first created as a way to just have fun; they had no real connection to life.
True
False

Answers

Answer:

true

Explanation:

define a function calcnum() that takes one integer parameter and returns 5 times the parameter. ex: if the input is 3, then the output is: 15

Answers

define a function calcnum() that takes one integer parameter and returns 5 times the parameter.

The code in C is:

#include <iostream>
#inlcude <stdio.h>

int calcnum(int number) {

 return (number*number*number*number*number);

int main()

{

  int input;

  int result;

cout << "Enter any no.: ";

  cin >> input;  

  result = calcnuml(input);  

  cout << result << endl;

  return 0;

}

What is the use of function?

A function is merely a "chunk" of code that may be used repeatedly rather than having to be written out repeatedly. With the use of functions, a programmer can divide a larger issue into smaller parts, each of which can carry out a specific function.

Once a function is defined, a programmer can call it whenever they need it by just using its name. In order for the function to work, it also likely needs some inputs or arguments, which are passed to the function each time it is called.

To learn more about a function, use the link given
https://brainly.com/question/20476366
#SPJ4

why do most operating systems let users make changes

Answers

By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.

Which of the following best describes a variable?

A. A named area in computer memory that holds value
B. A Python statement that has random effects
C. A place where you store a value that can never change
D. None of these

Answers

Answer:

A. A named area in computer memory that holds value

Explanation:

A variable is a way of assigning an area in a computer memory that can hold values like text, number and characters. When using variables, you must specify its type. Specifying its type determines the type of data the variable can hold, how it is handled and its location in the computer memory.

Variables hold information that is stored in the computer memory and is labeled by a name.

The statement among the options that best describes a variable is;

A: A named area in computer memory that holds value

Variables

The correct answer to this question is option A. This is because a variable is a method that we use to assign an area in a computer memory that is capable of holding inputs such as text, number and other characters.

Now, it is pertinent to note that you must specify the type of variable used. This is done to determine the type of data that the variable can hold, and where it is located in the computer memory.

In conclusion, the information that Variables hold in the computer memory are usually labeled by a name.

Read more about variables at; https://brainly.com/question/16397886

Can you find me 3 principles of art in my poster with explain

Can you find me 3 principles of art in my poster with explain

Answers

In the art above, the poster combines pencil lines and watercolors in two colors. It exhibits contrast, unity, and movement, through light and dark values.

What is the explanation for the above response?

From the description provided, three principles of art that may be present in the poster are:

Contrast: The use of dark pencil lines and watercolor creates a contrast between the sharp, defined lines and the soft, blended colors. This draws attention to specific elements in the composition.

Harmony: Even though two different media (pencil and watercolor) are used, they may have been applied in a way that creates a sense of unity or harmony in the overall artwork.

Balance: The placement of the different elements in the poster may create a sense of balance or equilibrium, either through symmetrical or asymmetrical composition. This can create a feeling of stability or tension in the artwork.

Learn more about art at:

https://brainly.com/question/19049629

#SPJ1

Place the steps in correct order:

1. Open the sent messages

2. Make additions/edits

3. Click actions

4. Choose resend the message

(correct order as listed here)

Answers

The correct order is:

1. Open the sent messages

2. Click actions

3. Make additions/edits

4. Choose resend the message

Unlike the harmonic numbers, the sum 1/12 + 1/22 + ... + 1/n? does converge to a constant as n grows to infinity. (Indeed, the constant is n/6, so this formula can be used to estimate the value of .) Which of the following for loops computes this sum? Assume that n is an int variable initialized to 1000000 and sum is a double variable initialized to 0.0.

Answers

Explanation:

None of the following for loops correctly computes the given sum:

for (int i = 1; i < n; i++) {

sum += 1/(i*i);

}

for (int i = 1; i <= n; i++) {

sum += 1/(i*i);

}

for (int i = 1; i <= n; i++) {

sum += 1.0/(i*i);

}

The correct for loop to compute the given sum is:

for (int i = 1; i <= n; i++) {

sum += 1.0/(i*i);

}

This loop correctly iterates from i=1 to i=n and uses the double data type to ensure that the division operation results in a decimal approximation.

3. What will be the output of the following Python code snippet? not(3>4) not(1 & 1) a) True True b) True False c) False True d) False False

Answers

Therefore, the output of the code snippet would be:

a) True True

The correct option is a) True True.

The output of the given Python code snippet can be determined as follows:

1. not(3 > 4):

  The condition "3 > 4" evaluates to False. The not operator negates the result, so not(3 > 4) evaluates to True.

2. not(1 & 1):

  The bitwise AND operation "1 & 1" evaluates to 1. The not operator negates the result, so not(1 & 1) evaluates to False.

Therefore, the output of the code snippet would be:

a) True True

The correct option is a) True True.

Learn more about Python:https://brainly.com/question/26497128

#SPJ11

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which is initially in the top left square facing downwards.
Create a solution that would enable the robot to be in the position found below. Make sure to use CAN_MOVE () to receive credit.

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which

Answers

Using knowledge in computational language in python it is possible to write a code that Create a solution that would enable the robot to be in the position found below.

Writting the code:

import random

lis=[]

for i in range(0,10):

 num=random.randint(1,12)

 lis.append(num)

tot=sum(lis)

avg=tot/10

print(avg)

See more about python at brainly.com/question/18502436

#SPJ1

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which

The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________. Group of answer choices using the letters of the alphabetic characters that are closest to access while typing taking the letters of the first six alphabetic characters found on the top row of keys using the alphabetic characters most frequently used on the keyboard representing the phonetics of the alphabets most closely associated with the keyboard

Answers

The setup of keys on a keyboard, QWERTY shows the keyboard layout by taking the letters of the first six alphabetic characters found on the top row of keys.

What is keyboard?

A keyboard is known to be a kind of peripheral device that helps a user to be able to input text into any computer or any any kind of electronic device.

Note that The setup of keys on a keyboard, QWERTY shows the keyboard layout by taking the letters of the first six alphabetic characters found on the top row of keys.

Learn more about keyboard from

https://brainly.com/question/13380788

#SPJ1

Read the scenario, and then answer the question below. Alex has accepted an IT position at a new company, and will be leaving her current job in the IT department of a large company. Which is the best example of ethical behavior for leaving her current job?
get her coworkers’ contact information so she can help them get new jobs
make copies of the software she uses regularly to keep for her next job
notify her current job of the accounts she no longer needs access to
delete all the files and accounts that she had access to at her old job

Answers

You are the newly hired networking administer and technician for the law firm Dewey, Cheatem and Howe, which is a large firm with over 100 attorneys and staff. DCH has just moved to a newly constructed building where it occupies three floors. At the previous location, each of the workstations on its network had Internet access, but there was relatively little resource and To this point in time, any networking of shared documents has largely been "sneakernet".


In its new offices, you are being asked to implement the networking with consideration for future growth or expansion. Your first task is to decide on the IP addressing scheme you will implement. Which IP address standard (IPv4 or IPv6) is your choice? Why did you make this choice?

Answers

It's recommended to use IPv6 as the IP addressing scheme because of its features and backward compatibility with IPv4.

In this case, the choice of the IP address standard depends on the number of hosts, scalability, and future expansion plans. Given that the law firm has just moved to a newly constructed building and there is consideration for future growth or expansion, it's recommended to use IPv6.

IPv6 was created to address the limitations of IPv4, which includes the depletion of IPv4 addresses because of the huge increase in the number of internet-connected devices. IPv6 uses a 128-bit addressing system compared to IPv4's 32-bit addressing system. This means that IPv6 can provide almost limitless IP addresses to the network.

IPv6 features include:

Support for multicast traffic. 128-bit source and destination IP addresses. Automatic address configuration. No need for DHCP in most environments. Better security and encryption features. Simplified header format.

IPv6 also provides backward compatibility with IPv4, allowing for easy migration to the new protocol while still maintaining backward compatibility with IPv4 networks.

As a result, it's recommended to use IPv6 as the IP addressing scheme because of its features and backward compatibility with IPv4.

Learn more about IP address: https://brainly.com/question/14219853

#SPJ11

Which of the commands below would be most helpful if you were trying to create a
face shape for your emoticon?

Answers

Answer:

draw_circle

Explanation:

This is the correct answer

Other Questions
the nurse discovers that the fhm is now recording late decelerations in a client who is in labor. the nurse predicts this is most likely related to which event? How did "Radical", or "Congressional," Reconstruction differ from Presidential Reconstruction? A. Congress distributed confiscated and abandoned Confederate lands to former slaves and held tribunals to prosecute Confederate political and military leadersB. Congress attempted to relocate the former slave population to the West in order to solve the race problemC. Congress stepped aside and let the states decide how to deal with the former slave population and the former Confederate leadersD. Congress took the lead and took measures to define and protect the citizenship rights of former slaves while prohibiting former Confederate leaders from voting and holding political office. Does knowing first aid increase the safety of those around you?. Try It!Evaluate.a. 27 What is the solution of the inequality shown below?a+2 Should the Electoral College be Abolished? Why or why not? You guys can choose any side I just want an answer why or why not. Angelica and Diego collect Pokmon cards. Angelica has four more cards than Diego does. Together, they have 18 in total. How many cards does Angelica have? Researchers working for a certain airline are investigating the weight of carry-on bags. The researchers will use the mean weight of a random sample of 1,300 carry-on bags to estimate the mean weight of all carry-on bags for the airline. Which of the following best describes the effect on the bias and the variance of the estimator if the researchers increase the sample size to 800?a. The bias will decrease and the variance will remain the same. b. The bias will increase and the variance will remain the same. c. The bias will remain the same and the variance will decrease. d. The bias will remain the same and the variance will increase. e. The bias will decrease and the variance will decrease. Padre, Inc., buys 80 percent of the outstanding common stock of Sierra Corporation on January 1, 2015, for $751,680 cash. At the acquisition date, Sierras total fair value, including the noncontrolling interest, was assessed at $939,600 although Sierras book value was only $683,000. Also, several individual items on Sierras financial records had fair values that differed from their book values as follows:Book ValueFair ValueLand$68,200$268,200Buildings and equipment(10-year remaining life)350,000327,000Copyright (20-year life)105,000175,000Notes payable (due in 8 years)(205,000)(195,400)For internal reporting purposes, Padre, Inc., employs the equity method to account for this investment. The following account balances are for the year ending December 31, 2015, for both companies.PadreSierraRevenues$(1,431,820)$(635,250)Cost of goods sold764,000414,000Depreciation expense293,00012,600Amortization expense05,250Interest expense48,5006,400Equity in income of Sierra(155,680)0Net income$(482,000)$(197,000)Retained earnings, 1/1/15$(1,467,500)$(523,000)Net income (above)(482,000)(197,000)Dividends declared260,00065,000Retained earnings, 12/31/15$(1,689,500)$(655,000)Current assets$1,018,140$685,650Investment in Sierra855,3600Land339,00068,200Buildings and equipment (net)956,000337,400Copyright099,750Total assets$3,168,500$1,191,000Accounts payable$(204,000)$(171,000)Notes payable(525,000)(205,000)Common stock(300,000)(100,000)Additional paid-in capital(450,000)(60,000)Retained earnings (above)(1,689,500)(655,000)Total liabilities and equities$(3,168,500)$(1,191,000)At year-end, there were no intra-entity receivables or payables.Using the acquisition method, prepare the worksheet to consolidate these two companies.rev: 09_30_2014_QC_54910eBook & ResourceseBook: Consolidated Financial StatementseBook: Consolidated Financial Statements and Outside OwnershipeBook: Partial Ownership Consolidations (Acquisition Method)Check my work FILL IN THE BLANK. ______________ is the tendency of the lungs to return to the resting state after inspiration. Why would Napoleon Bonaparte be a great leader for America? suppose you measured the volume of the metal plate using a device with 0.001 mm pre- cision for all dimensions. what precision in the volume would be achieved? Identify the Oracle database objects used by attackers for enumeration. mysql.user, mysql.db, mysql.tables_priv sysobjects, syscolumns, sysdatabases MsysObjects, MsysQueries, MsysRelationships SYS.USER_OBJECTS, SYS.USER_VIEWS, SYS.ALL_TABLES I'm 18 years old, and I got my driver's license 1 week ago, can I drive people under 18 to school? and can i take them out? or can who can i drive and can not drive use the data you collected in problem 1 to fill in the following chart. in other words, find the number of partitions of data set 1 has a mean of 54 and a mad of 4. data set 2 has a mean of 60 and a mad of 2. what can be concluded about the two distributions? select each correct answer. responses the means-to-mad ratio is 3. the means-to-mad ratio is 3. the distributions are somewhat similar. the distributions are somewhat similar. the means-to-mad ratio is 1.5. the means-to-mad ratio is 1.5. the distributions are similar. Definition: This is the name given to a region of dense vegetation, tree growth, and precipitation, usuallyfound in tropical regions of South America, Africa, and Asia.Example: DeforestationTerm: (what is the term?) Brainly for the right answer sadly, hansel's sister gretel has entered into a persistent vegetative state from which she is not expected to recover. the doctors are now consulting with hansel about whether to continue life support. hansel has in his possession a document, written and signed by gretel when she was mentally competent, that attests to her desire not to continue life support in situations identical to her current one. the doctors therefore remove life support from gretel, which results in her death.this is an instance ofgroup of answer choicespassive nonvoluntary euthanasia.active nonvoluntary euthanasia.passive voluntary euthanasia.active involuntary euthanasia. como se utilizaban los tanques de guerra el segunda guerra mundial?