if ____ appears as the first line of a loop, the loop is a top-controlled do loop that will execute as long as a condition remains true. a. do until b. do while c. loop while d. loop until

Answers

Answer 1

If option b. "do while" appears as the first line of a loop, the loop is a top-controlled do loop that will execute as long as a condition remains true.

The correct answer is b. "Do While".

In programming, a "Do While" loop is a top-controlled loop that executes as long as a condition remains true. It is used to repeat a block of code while a certain condition is met.

The syntax for a "Do While" loop is:

Do While condition

  ' Code block to be executed

Loop

The loop will continue to execute as long as the condition remains true. Once the condition becomes false, the loop will exit and control will move to the next statement after the loop.

For example, the following code uses a "Do While" loop to count from 1 to 10:

css

Dim i As Integer

i = 1

Do While i <= 10

  Debug.Print i

  i = i + 1

Loop

This code will output the numbers 1 through 10 to the debug console.

Learn more about Do While here:

https://brainly.com/question/30885778

#SPJ11

Answer 2

If "do while" appears as the first line of a loop, the loop is a top-controlled do loop that will execute as long as a condition remains true.

The loop will continue running while the specified condition is true, and it will stop running as soon as the condition becomes false.
A "do while" loop, the condition is evaluated at the beginning of each iteration of the loop.

The condition is true, the loop body is executed.

After the loop body is executed, the condition is evaluated again.

If the condition is still true, the loop body is executed again.

This process continues until the condition becomes false, at which point the loop exits.
One advantage of using a "do while" loop is that it guarantees that the loop body will be executed at least once.

This can be useful when you want to ensure that a certain piece of code is run at least once, regardless of whether the condition is true or false.
Another advantage of using a "do while" loop is that it provides a clear and readable way to express the looping logic. By starting the loop with the "do while" keyword, you are clearly indicating that the loop will continue while the specified condition is true.
If "do while" appears as the first line of a loop, you can be sure that you are dealing with a top-controlled do loop that will execute as long as a condition remains true.

This can be a powerful and useful construct for controlling the flow of your program.

For similar questions on Loop

https://brainly.com/question/19344465

#SPJ11


Related Questions

while there is no single way to troubleshoot a virtual private network (vpn) issue, what is the most appropriate first step?

Answers

The most appropriate first step to troubleshoot a virtual private network (VPN) issue is to check if the VPN connection is established and if the user has the correct login credentials.

Check VPN connection: Verify if the VPN connection is established. If the connection is not established, it could indicate a configuration issue or a problem with the VPN server. Check the VPN client or app for any error messages or indicators of connection status.

Verify login credentials: Make sure the user has the correct login credentials for the VPN. Incorrect credentials can prevent successful authentication and connection to the VPN server. Double-check the username and password entered by the user.

Update VPN software and operating system: Ensure that both the VPN software and the operating system are up to date. Outdated software can have compatibility issues or security vulnerabilities that may affect the VPN connection. Check for any available updates and install them.

Check for conflicting programs or settings: Identify any conflicting programs or settings that may interfere with the VPN connection. Some antivirus/firewall software or network settings can block or disrupt VPN connections. Temporarily disable or configure these programs/settings to allow VPN traffic.

Test network connectivity: Verify the general network connectivity of the device. Ensure that the internet connection is stable and functional. Try accessing websites or other online services without the VPN enabled to determine if the issue is specific to the VPN or the overall network connection.

Check firewall settings: Verify the firewall settings on the device. Firewalls can sometimes block VPN traffic, preventing a successful connection. Configure the firewall to allow VPN traffic or temporarily disable the firewall to test if it resolves the issue.

Learn more about virtual private network (VPN):

https://brainly.com/question/31608093

#SPJ11

Define the term Project brief? why is it important to do planning?

Answers

Answer: the project brief is a document that provides an overview of the project.

Explanation: It says exactly what the designer, architect, and contractor needs to do to exceed your expectations and to keep the project on track with your goals and your budget.

What's an operating system ~ ​

Answers

Answer:

Is it software that controls and manages hardware components and translates instructions so that the hardware can do what one instructs it to do

Explanation:

An operating system is a large collection of system software which manages the resources of computer system such as memory, storage, processor, input/output devices alongside acting as an interface between machine and user.

How does understanding how mobile marketing works help people use smartphones safely and responsibly?

Answers

Answer:

When done right, mobile marketing provides customers or potential customers using smartphones with personalized, time- and location-sensitive information so that they can get what they need exactly when they need it, even if they're on the go.

Explanation:

your welcome

the cost to ship a package is a flat fee of 75 cents plus 25 cents per pound. 1. declare a const named cents per pound and initialize with 25. 2. get the shipping weight from user input storing the weight into shipweightpounds. (remember %d is used to read in an integer from the user.) 3. using flat fee cents and cents per pound constants, assign shipcostcents with the cost of shipping a package weighing shipweightpounds. c programming

Answers

The price of shipping a package containing c programming that weighs shipweight pounds

const int CENTS_PER_POUND = 25;

int shipweight pounds;

printf ("Enter the shipping weight in pounds: ");

scanf ("%d", &shipweigh tpounds);

int shipcostcents = 75 + (shipweight pounds * CENTS_PER_POUND);

What is weight?

It is a measurement of the heaviness of an object, and is determined by the gravitational pull of the Earth or other celestial objects on the object. Weight is measured in Newtons, kilograms, and pounds, depending on the system of measurement used. Weight is affected by the mass of the object, its location in the universe, and the gravitational pull of the Earth or other celestial bodies on the object.

To learn more about weight
https://brainly.com/question/28800918
#SPJ4

A/an ________is a device used to protect computers against surges and spikes in power.
Sleep and Hibernate are examples of __________.
Regular maintenance on a computer is good for ________.
Bad sectors are sections of the _______ that are physically damaged.
To protect some devices such as flash drives and external hard drives from corruption, it is best to __________ the devices.

Surge Protector
Power-saving modes
Hardware And Software
Hard Disk
Eject

Answers

Answer:

1. Surge protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A surge protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both hardware and software.

4. Bad sectors are sections of the hard disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to eject the devices.

Answer:

1. Surge Protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A Surge Protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both Hardware and Software.

4. Bad sectors are sections of the Hard Disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to Eject the devices.

I hope this helps <3

How do you multiply using distributive property?

Answers

Answer:

Not sure if this is what you meant but I hope this helps :)

Explanation:

Depending on what you mean, there are two ways to multiply using the distributive property:

First way:

Using 5(4+2) as an example

5(4+2)

(5*4)+(5*2)

20+10

30

Second way:

Using 36*12 as an example

36*12

(30+6)*(10+2)

(30*10)+(30*2)+(6*10)+(6*2)

300+60+60+12

300+120+12

420+12

432

Did it surprise you that supply chain logistics could benefit so
much from Lean?

Answers

No, it doesn't surprise me that supply chain logistics can benefit greatly from Lean principles. Lean is a philosophy and methodology that focuses on eliminating waste, improving efficiency, and optimizing processes.

Supply chain logistics involves the movement of goods, information, and resources across various stages, and it is inherently complex with multiple interconnected activities.

Lean principles, such as just-in-time inventory management, continuous improvement, and value stream mapping, can help streamline supply chain logistics by identifying and eliminating non-value-added activities, reducing lead times, improving flow, and enhancing overall efficiency. By implementing Lean practices, organizations can minimize inventory holding costs, reduce transportation and storage waste, and enhance responsiveness to customer demands.

Furthermore, Lean principles promote collaboration, communication, and problem-solving within the supply chain, fostering better coordination and synchronization between different stakeholders and improving overall performance. Lean's focus on customer value and waste reduction aligns well with the goals of supply chain logistics, which aim to deliver products and services efficiently and effectively.

Overall, Lean provides a systematic approach to optimize supply chain logistics, enhance operational performance, and drive customer satisfaction. Its ability to reduce waste, increase efficiency, and improve overall flow makes it a natural fit for improving supply chain operations.

Learn more about philosophy here

https://brainly.com/question/21527655

#SPJ11

PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS

A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:

Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50

Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.

Answers

It's pretty hard but I think it is 1,350

A language which prevents a programmer from compiling or executing any statements or expressions that violate the definition of the language is said to be

Answers

A language which prevents a programmer from compiling or executing any statements or expressions that violate the definition of the language is said to be Type Safe. A type-safe language avoids these errors by restricting any data types, operations, and program structures that do not make sense.

The type of a variable is the type of value it can store. There are two main categories of types: primitive types and object types. In Java, the primitive types are byte, short, int, long, float, double, char, and boolean. A language that has built-in data types that are type-safe is C#. The C# programming language is a type-safe language that makes it impossible to pass a value of one type as if it were another type.

A language that does not guarantee type safety is said to be an untyped or weakly typed language, which means that the programmer is responsible for keeping track of the types of all values and ensuring that they are used correctly in the program.

To know more about programmer visit:-

https://brainly.com/question/31217497

#SPJ11

10 points] design an algorithm to search the number 42 in a binary tree. what is the time complexity of this algorithm (apply the analysis framework)?

Answers

When searching for a key (or a location to insert a new key) in a tree, they traverse the tree from root to leaf, comparing keys stored in the tree's nodes and deciding whether to continue searching in the left or right subtrees based on the comparison.

Binary Tree can be found using the following code:

// Binary Tree in Java

// Node creation

class Node {

 int key;

 Node left, right;

 public Node(int item) {

 key = item;

 left = right = null;

 }

}

class BinaryTree {

 Node root;

 BinaryTree(int key) {

 root = new Node(key);

 }

 BinaryTree() {

 root = null;

 }

 // Traverse Inorder

 public void traverseInOrder(Node node) {

 if (node != null) {

   traverseInOrder(node.left);

   System.out.print(" " + node.key);

   traverseInOrder(node.right);

 }

 }

 // Traverse Postorder

 public void traversePostOrder(Node node) {

 if (node != null) {

   traversePostOrder(node.left);

   traversePostOrder(node.right);

   System.out.print(" " + node.key);

 }

 }

 // Traverse Preorder

 public void traversePreOrder(Node node) {

 if (node != null) {

   System.out.print(" " + node.key);

   traversePreOrder(node.left);

   traversePreOrder(node.right);

 }

 }

 public static void main(String[] args) {

 BinaryTree tree = new BinaryTree();

 tree.root = new Node(1);

 tree.root.left = new Node(2);

 tree.root.right = new Node(3);

 tree.root.left.left = new Node(4);

 System.out.print("Pre order Traversal: ");

 tree.traversePreOrder(tree.root);

 System.out.print("\nIn order Traversal: ");

 tree.traverseInOrder(tree.root);

 System.out.print("\nPost order Traversal: ");

 tree.traversePostOrder(tree.root);

 }

}

To know more about Binary Tree, visit: https://brainly.com/question/16644287

#SPJ4

In OOP the focus is given to which of the following entities?

Answers

Answer:

In Object-Oriented Programming (OOP), the focus is given to objects. An object is an instance of a class, and a class is a blueprint or template for creating objects.

In OOP, programs are designed by creating classes that represent real-world entities or concepts, and then creating objects based on those classes. These objects can interact with each other through methods and attributes, which define the behavior and data associated with each object.

OOP also emphasizes encapsulation, which means that data and methods are grouped together in a class, and only the methods that are exposed to the outside world are accessible to other objects. This helps to ensure that data is protected and that the behavior of the object is consistent.

Overall, OOP focuses on creating modular and reusable code that can be easily maintained and extended over time. By focusing on objects, OOP allows programmers to create complex systems that are composed of smaller, more manageable parts.

The following code is logically correct. What is the semantically correct prototype for mystery()?
vector v{1, 2, 3};
mystery(v);

Answers

The function takes a reference to a constant vector of integers as its argument, which allows it to access the original vector without modifying it and without creating a copy.

What is the semantically correct prototype for the function mystery() that takes a vector as its argument and returns void?

Hi! Based on the given code snippet, the semantically correct prototype for mystery() should include the terms vector and mystery. Here's the answer:

The semantically correct prototype for mystery() is:
```cpp
void mystery(const std::vector& v);
```

Explanation:

void`: The function has no return value.
`mystery`: The function's name.
`const std::vector& v`: The function takes a reference to a constant vector of integers as its argument, which allows it to access the original vector without modifying it and without creating a copy.

Learn more about constant vector

brainly.com/question/30326405

#SPJ11

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

the internet impacts businesses by providing more information about their

Answers

The internet impacts businesses by providing more information about their Competitors and the industry, increasing the reach and potential customer base, and creating new opportunities for sales and marketing.

The internet has also made it easier for businesses to conduct research and gather data, which can be used to improve their products and services. Additionally, the internet has made it easier for businesses to connect with customers and suppliers, and to manage their operations more efficiently.

However, the internet also presents challenges for businesses, such as increased competition, the need to adapt to changing technology, and the potential for cyberattacks. Businesses must also navigate changing regulations and laws related to online activities.

Overall, the internet has greatly impacted the way businesses operate and has opened up a world of opportunities, but it also requires businesses to be agile, adapt to new technologies and stay aware of new risks.

Learn more about cyberattacks here:

https://brainly.com/question/30093347

#SPJ4

What are hits that search engines list on the first page.

Answers

Answer: most relevant results

Explanation:

they are hits because they provide what you need in the best way

Search engine optimization hits that search engine's list on the first page.

What is search engine optimization (SEO)?

Search engine optimization is a set of rules or algorithms that is done to enhance the occurrence and location on the web page.

If the occurrence is frequent, then it may be possible to have a position on the first page.

Search engine optimization hits that search engine's list on the first page.

More about the search engine optimization link is given below.

https://brainly.com/question/23286854

#SPJ2

I will mark you as brainlist

I will mark you as brainlist

Answers

Answer:

download it

Explanation:

because if u upload it will not save .

Answer:

If you would like to view a document that is now yours you would have to upload it. If someone wants to see your document you have to download it first and then send it to the person who is going to read it, and no you don't have to use word however you can if you want to.

the answer to the question would be download

Explanation:

Write an app that performs an addition. It has three labels and one button. The first two labels are filled with two randomly generated integers between 1 and 10. When the user clicks on the button, the two integers are added and the result is displayed in the third label. The three labels should be styled using the same style. The button should have a red background and a blue text. All four components should be centered vertically. Include a Model.

Answers

Create an app with two randomly generated integers, an addition function, and styled labels and button.

How can an app be designed to perform addition with random integers?

To create the desired app, start by generating two random integers between 1 and 10 and assigning them to the first two labels. Next, design a button with a red background and blue text. Add a click event listener to the button that triggers an addition function.

In the addition function, retrieve the values from the two labels, perform the addition operation, and display the result in the third label. Ensure that all three labels and the button are styled consistently, centered vertically for aesthetic appeal.

Building interactive apps with random number generation and event-driven programming. Understanding how to style components and implement functions enables you to create engaging user experiences with dynamic functionality.

Learn more about app

brainly.com/question/30077624

#SPJ11

(This has nothing to do with homework by the way) I'm graduating to the 9th grade this year... do the FSA/EOC scores determine my graduation or do my grades?

Answers

Answer:

I dont think so.

Explanation:

show how acls and c-lists are derived from an access control matrix. in particular, for the following access control matrix in a published research paper, list the acls and c-lists you can derive

Answers

An access control matrix (ACM) is a table that represents the access rights for different users to various objects in a system.

An ACL (Access Control List) is a list of access control entries that specify the access rights for a particular user or group of users to a specific object. A C-list (Capability List) is a list of access control entries that specify the access rights of a particular object to a specific user or group of users.

To derive the ACLs and C-lists from an access control matrix, we need to examine each row of the matrix and identify the access rights that correspond to each user or group of users for each object. The resulting ACLs and C-lists will list the specific access rights for each user or group of users to each object.

For the following access control matrix in a published research paper:

Object A Object B Object C

User 1 read read write

User 2 read write read

User 3 write read read

We can derive the following ACLs and C-lists:

ACL for User 1:

Object A: read

Object B: read

Object C: write

ACL for User 2:

Object A: read

Object B: write

Object C: read

ACL for User 3:

Object A: write

Object B: read

Object C: read

C-list for Object A:

User 1: read

User 2: read

User 3: write

C-list for Object B:

User 1: read

User 2: write

User 3: read

C-list for Object C:

User 1: write

User 2: read

User 3: read

Visit here to learn more about access control matrix:

brainly.com/question/31956684

#SPJ11

how many ones dose it take to get 9 tens

Answers

It takes 90 ones to get 9 tens
The answer would be 90:)

Explanation: there are 10 ones in one 10 so if you multiply 10 times 9 it’s 90

What would a client select in their Manage Users screen to give their worker access to create invoices, but not write checks in their QuickBooks Online company?

Answers

Answer:

select Custom radio button and check Invoicing box

Explanation:

Quick Books allows clients to give limited permissions to their worker. These limits include the access to the invoices and access to some part of the Customer section which includes sales receipts, refunds. You can follow the steps given below to add a worker and give limited access:

Click Gear Icon

Select Manage Users.

Click New button.

Choose user type page will appear

Choose Regular or custom user.

Choose Limited

Tick on the Customers and Sales check box.

Set the users admin rights and click on Next button.

Enter the First Name, Last Name and Email Address of worker.

Click on Next

Click on Finish.

ways you will use to reach all pupils who are living at a

disadvantaged area

Answers

Answer:

?

im confused

Explanation:

write a program that reads movie data from a csv (comma separated values) file and output the data in a formatted table.

Answers

To write a program that reads movie data from a CSV (comma-separated values) file and outputs the data in a formatted table, the following steps should be taken:

Step 1: Import the necessary libraries into your program. These include the CSV library for reading CSV files and the Pretty Table library for displaying data in a formatted table.

Step 2: Open the CSV file that contains the movie data using the open() function, specifying the 'r' mode for reading.

Step 3: Use the reader() method of the CSV library to read the data in the file.This method takes the opened file object as an argument and returns a list of lists, with each list representing a row of data in the CSV file

Step 4: Create a PrettyTable object and set the field names for the columns of the table. This is done using the field_names attribute of the PrettyTable class.

Step 5: Loop through each row of data in the CSV file, and add it to the PrettyTable object using the add_row() method. This method takes a list of values for each row in the table.

Step 6: Display the table using the print() function, passing the table object as an argument. Here is an example program that reads movie data from a CSV file and outputs it in a formatted table:import csvfrom prettytable import PrettyTablewith open('movies.csv', 'r') as file:reader = csv.reader(file)movies = PrettyTable()movies.field_names = ['Title', 'Director', 'Year']for row in reader:movies.add_row(row)print(movies)

for more such question on argument

https://brainly.com/question/3775579

#SPJ11

Select all the correct answers.
Which two tasks does a geologist perform?
prepares scaled drawings of construction sites for clients
operates large machinery to create clothing and rugs
investigates the formation process of rocks
measures earthquakes and tsunamis using seismographs
constructs skyscrapers with the assistance of various contractors
Reset Next

Answers

investigates the formation process of rocks
measures earthquakes and tsunamis

2.5 code practice I need answers please

Answers

Answer:

how am i supposed to help.

What is the keyboard shortcut to show formulas in a worksheet (as opposed to the value)? OCTRL+S OCTRL + Z CTRL- There is no shortcut for showing formulas

Answers

CTRL +  (tilde) is a keyboard shortcut to show formulas instead of values in Excel spreadsheets. It can be found in the upper-left corner of most keyboards, below the Escape key or just left of the 1 key.

The keyboard shortcut to show formulas in a worksheet (as opposed to the value) is `CTRL + ~` (tilde).When working with Excel spreadsheets, you might want to display the formulas instead of the values in your cells. This could be done by using the "Show Formulas" button. But, if you're doing this frequently, it's easier to use a keyboard shortcut. To do this, press `CTRL + ~` (tilde) and it will show all of the formulas in your spreadsheet instead of the values.

The tilde symbol, ~, can be found in the upper-left corner of most keyboards. It is usually located below the Escape key or just left of the 1 key. It's worth noting that pressing the `CTRL + ~` (tilde) keyboard shortcut again will switch back to displaying the values.

To know more about Excel spreadsheets Visit:

https://brainly.com/question/10541795

#SPJ11

Entertainment software enables you to purchase, collect, and experience entertainment media such as music and movies on a computer. What are some examples of entertainment software?

Answers

Entertainment software provides users with an engaging experience for various media types, such as music and movies, on a computer. Some examples of entertainment software include.


These software applications enhance the user's experience by offering convenient access to a wide range of entertainment content.

1. Video streaming platforms like Netflix and Hulu
2. Music streaming services such as Spotify and Apple Music
3. Video game platforms like Steam and Origin
4. Media players like VLC and Windows Media Player,

Programming code run on a computer processor is referred to as computer software.  It might be written operating system code or machine-level code. Software for Entertainment software It offers entertainment and chances for leisure activities. It aids in unwinding, enjoying, and getting out of various situations. Netflix, Amazon, and Kodi are all included.

Learn more about Entertainment software here

https://brainly.com/question/29353277

#SPJ11

When does a kernel panic occur?
when the incorrect serial number is entered during software installation
when Dynamic-Ling Library (DLL) files are missing or damaged
when there are too many applications running on a computer at the same time
when an operating system finds a fatal error that it cannot safely recover from

Answers

Answer: when an operating system finds a fatal error that it cannot safely recover from

Explanation: "A kernel panic (sometimes abbreviated as KP) is a safety measure taken by an operating system's kernel upon detecting an internal fatal error in which it either is unable to safely recover or cannot have the system continue to run without having a much higher risk of major data loss. The term is largely specific to Unix and Unix-like systems. For Microsoft Windows operating systems the equivalent term is "Stop error", resulting in a bug check screen that presents the bug check code on a blue background in early versions of Windows (colloquially known as a "Blue Screen of Death" or BSoD), or on a green background on the Xbox One platform as well as in Windows 10 preview builds." wikipedia article on kernel panics

Answer:

It's D

Explanation:

I got it right on Edge

Have a wonderful day and have a Happy New Year. Hopefully 2021 is better than 2020.

a file that serves as a starting point for a new document

Answers

Answer:

The appropriate response is "Template".

Explanation:

A template would be a document that might open new opportunities for such a new folder. Because once you launch a framework, that's already pre-formatted sometimes in a manner. This same template will indeed presumably have such identification and phone number environment throughout the upper left, a person receiving identify location somewhat below something on the opposite side, a response body location further below, as well as a signature, identify at either the lower part.
Other Questions
Which policy is least likely to increase the long-run aggregate supply curve? In Mr. Clayton's mathematics class, 7/12 of the students received A's and 1/4 received B's. What fraction of the students received either A's or B's? the secret to football betting Who established the first Spanish mission in Texas? A When Noah bought his house, it cost 300,000. Each year the house increased in value by 1.04%. What was the value of his house after 8 years? Give your answer to 4 s.f. Volume variance is computed by subtracting standard overheadapplied from budgeted overhead.TrueFalse rotation 90 degrees about the origin F(2,-2), E(3,0), D(5,-5) [PLEASE I NEED HELP FAST] How much did John D. Rockefeller charge per barrel of oil? discuss the use of 2nd person (""as you like it."" ""do you believe?"" ""do you accept?"") in omelas. how does the narrator invite the reader (""you"") to imagine the utopian city of omelas? why does the narrator want the reader to co-create this utopia? what purpose might it serve in the context of what happens later in the text? Evaluate the expression.|3.2| as the head prefect of your school write a speech you will deliver to the newly ad mitted students on any two notable achievements of yourschool A rock has a mass of 55 grams. If the specific heat of the rock is 1.2 (j/g/c) what is the heat capacity of the rock? Hannah has been researching sales of garden supplies. She wants to show the pattern that sales follow over the course of a year. Which type of graphic would be most effective A force of 6 N is applied to a ball for 2 s. What is the impulse? Some amount of billiard balls were arranged in an equilateral triangle. And three balls were extra. When the same set of billiard balls were arranged into triangle in which each side has one more ball than in the first arrangement there were four billiard balls shortage. How many balls were in the set? The square of a positive number is equal to its triple added to 28. What is this number? ASAP MULTIPLE CHOICE WILL MARK BRAINLIESTWhat became the new capital of Russia after Peter the Great moved it from Moscow?VolgogradStalingradSt. PetersburgParis 1. Why was Poulsen about nature " for a long time? Do you feel the same way? Why or why not ? ( eyyy i need some help please! a preterm infant has a yellow skin color and a rising bilirubin level. the nurse knows that this infant is at risk for what complication?