suppose you run the following code: public static void main(string[] args) { try { statement1; m(); statement2; } catch (exception2 ex { statement3; } } public static void m() { try { statement4; statement5; statement6; } catch (exception1 ex1) { statement7; } finally { statement8; } statement9; } answer the questions: 1. if no exception occurs, which statements are executed? 2. if statement5 throws an exception of type exception1, which statements are executed? 3. if statement5 throws an exception of type exception2, which statements are executed? 4. if statement5 throws an exception that is neither exception1 nor exception 2, which statements are executed?

Answers

Answer 1

The main() method is a particular Java programming method that acts as a Java program's publicly accessible entry point.

What is public static void main ?

All other Java methods call the main method, which is public static void. Learn what each of the keywords in the "public static void main" declaration does and why each one is just as important as its neighbor in this fundamental task. You don't actually require a main() function in your Java application for it to compile. However, the JVM (Java Virtual Machine) looks for the main() function while it is running and begins to execute from it.

1. statement1, statement2, statement3, statement5, statement6, statement7.

2. statement1, statement2, statement4, statement5, statement6, statement7.

3. statement1, statement2, statement5.

4. statement1, statement2, statement5.

To know more about public static void main , visit

https://brainly.com/question/8659179

#SPJ4


Related Questions

9.4 Code Practice: Your task is to determine whether each item in the array above is divisible

by 3 or not. If an item is divisible by 3, then leave that value as-is in the

array, but if it is not divisible by 3, then replace that value in the array with a

o. Remember that you will need to use modular division from Unit 2 to

determine if a value is divisible by 3. Finally, print out the array in the

format as seen in the sample run below.

(Can someone please help me?)

Answers

Answer:

Explanation:

The following Python code is a function that takes in an array as a parameter, it then loops through the array determining if the element is divisible by 3. If it is it leaves it alone, otherwise it changes it to a 0. Then ouputs the array. A test case is shown in the attached image below using a sample array.

def divisible_by_three(array):

   for x in array:

       if x % 3 == 0:

           pass

       else:

           array[array.index(x)] = 0

   return array

9.4 Code Practice: Your task is to determine whether each item in the array above is divisibleby 3 or

In this exercise we have to use the knowledge of computational language in python to describe the code, like this:

We can find the code in the attached image.

What is an array for?

After wondering what an array is, you might wonder what it's for. The main purpose is to store information in an orderly way, that is, for each line, one piece of information. An example of an array is when storing names of people present in a classroom.

The code can be written more simply as:

def divisible_by_three(array):

  for x in array:

      if x % 3 == 0:

          pass

      else:

          array[array.index(x)] = 0

  return array

See more about python at brainly.com/question/26104476

9.4 Code Practice: Your task is to determine whether each item in the array above is divisibleby 3 or

how and why Steve Jobs left Apple Computer.

Answers

Answer:

Jobs was forced out of Apple in 1985 after a long power struggle with the company's board and its then-CEO John Sculley. ... He was largely responsible for helping revive Apple, which had been on the verge of bankruptcy.

Explanation:

) An organization has a class C network 192.168.10 and wants to form subnets for seven departments, which host as follows: A. 58 hosts B. 44 hosts C. 10 hosts D. 22 hosts E. 29 hosts F. 12 hosts G. 25 hosts

Answers

To form subnets for the seven departments, you should use the subnet masks listed above, which provide the necessary number of host addresses for each department while ensuring efficient utilization of the available IP address space in the Class C network 192.168.10.0.


To accommodate the required number of hosts for each department, you will need to create subnets with the following subnet masks:

A. 58 hosts - Subnet mask: 255.255.255.192 (/26)
B. 44 hosts - Subnet mask: 255.255.255.192 (/26)
C. 10 hosts - Subnet mask: 255.255.255.240 (/28)
D. 22 hosts - Subnet mask: 255.255.255.224 (/27)
E. 29 hosts - Subnet mask: 255.255.255.224 (/27)
F. 12 hosts - Subnet mask: 255.255.255.240 (/28)
G. 25 hosts - Subnet mask: 255.255.255.224 (/27)


Each subnet mask is determined by the minimum number of hosts needed for each department. We need to consider the additional two IP addresses used for network and broadcast addresses. The CIDR notation (e.g., /26) represents the number of bits used for the network portion of the address.

To know more about host addresses visit:

https://brainly.com/question/30778608

#SPJ11

______________ is the process of translating a message into understandable symbols or language.
A. Mediation
B. Transformation
C. Encoding
D. Decoding

Answers

Encoding is the process of converting a message or information into understandable symbols or language that can be transmitted to a recipient.

It involves the transformation of thoughts, ideas, or concepts into a format that can be effectively communicated. During encoding, a sender uses specific codes, words, gestures, or other means to represent their intended message. This process allows the sender to convey their thoughts and meaning in a manner that the recipient can comprehend. Encoding is a vital step in the communication process, as it enables the sender to package their message in a way that can be understood by the receiver during the decoding process.

Decoding is the process of translating a message into understandable symbols or language.

The process of encoding and decoding is essential in communication. The encoding is the process of transforming messages and information into codes, while decoding is the process of translating the coded message back to the original form, thus making it possible for people to communicate.In communication, symbols are essential in encoding and decoding messages. In encoding, symbols are used to transform messages into codes, while in decoding, symbols are used to translate the coded message back into its original form. Decoding requires knowledge of the language, symbol, and message context in order to correctly interpret the message.A good example of symbols that are used in decoding is the use of facial expressions and body language in non-verbal communication. In decoding non-verbal communication, one has to pay attention to the facial expressions and body language of the person communicating to understand their message and mood. For instance, if someone is smiling, they might be happy or friendly, while if they are frowning, they might be sad or angry.In conclusion, decoding is the process of translating a message into understandable symbols or language. It is an essential process in communication that requires knowledge of the language, symbol, and message context in order to correctly interpret the message. Symbols are used in both encoding and decoding to transform messages into codes and translate them back into their original form.

To learn more about decoding:

https://brainly.com/question/31064511

#SPJ11

Your knowledge of algorithms helps you obtain an exciting job with the Acme Computer Company, along with a $10,000 signing bonus. You decide to invest this money with the goal of maximizing your return at the end of 10 years. You decide to use the Amalgamated Investment Company to manage your investments. Amalgamated Investments requires you to observe the following rules. It offers n different investments, numbered 1 through n. In each year j , investment i provides a return rate of rij . In other words, if you invest d dollars in investment i in year j , then at the end of year j, you have drij dollars. The return rates are guaranteed, that is, you are given all the return rates for the next 10 years for each investment. You make investment decisions only once per year. At the end of each year, you can leave the money made in the previous year in the same investments, or you can shift money to other investments, by either shifting money between existing investments or moving money to a new investement. If you do not move your money between two consecutive years, you pay a fee of f1 dollars, whereas if you switch your money, you pay a fee of f2 dollars, where f2 > f1.

a) The problem, as stated, allows you to invest your money in multiple investments in each year. Prove that there exists an optimal investment strategy that, in each year, puts all the money into a single investment. (Recall that an optimal investment strategy maximizes the amount of money after 10 years and is not concerned with any other objectives, such as minimizing risk.)

b) Prove that the problem of planning your optimal investment strategy exhibits optimal substructure.

c) Design an algorithm that plans your optimal investment strategy. What is the running time of your algorithm?

d) Suppose that Amalgamated Investments imposed the additional restriction that, at any point, you can have no more than $15,000 in any one investment. Show that the problem of maximizing your income at the end of 10 years no longer exhibits optimal substructure.

Answers

Answer:

C

Explanation:

what kind of tag will give additional info about your webpage​

Answers

Answer:

The LINK tag

Explanation:

Answer:

The LINK tag

Instead of producing a clickable link, the <link> tag tells the browser that there is some additional information about this page located in a different file.

Which technology will a business use to figure out who accessed confidential files on a company's computer system

Answers

Answer:

insaj cdsjl ljhwbalfhb

Explanation:

What is/are the correct increasing order of downlink of satellite bands? Select one or more: □ a. L < Ku ​

What is/are the correct increasing order of downlink of satellite bands? Select one or more: a. L &lt;

Answers

The correct increasing order of downlink satellite bands is -  L < S < C < Ku < Ka (Option B).

How is this so?

It is to be noted that the   order of downlink satellite bands is based on their frequencies,with lower frequencies being assigned to longer wavelengths.

In this case,   L-band has lower frequency thanS -band, C-band has lower frequency than both L-band and S-band, and so on, resulting in the order L < S < C < Ku < Ka.

The   downlink satellite bands,in increasing order of frequency are:

L-bandS-bandC-bandKu-band and Ka-band.

Learn more about Satellite bands:
https://brainly.com/question/31384183
#SPJ1


What did Home Depot do well to mitigate impact during the data
breach. Where could they improve?
100 words or more.

Answers

Home Depot demonstrated effective crisis management during their data breach, promptly notifying affected customers and offering free identity protection and credit monitoring services. However, they could have improved on their preventive measures and initial detection.

Home Depot's response to the data breach showcased their commitment to their customers. They quickly confirmed the breach, maintained transparency, and offered assistance to affected customers, which included free identity protection and credit monitoring services. These actions mitigated immediate harm and helped maintain customer trust. However, the breach also revealed areas of improvement. Home Depot could have had stronger cybersecurity measures in place to prevent the breach. Their detection systems should also have been more robust as the breach was initially detected by banking partners and not their internal systems. Better preventive measures and faster detection mechanisms would reduce the risk and impact of such incidents in the future.

Learn more about data breach here:

https://brainly.com/question/33419561

#SPJ11

Databases are of little use to forensic scientists. True False

Answers

Answer:

false

Explanation:

I copied my friend's homework... give me some excuses to get out of it!! ​

Answers

Answer:

Tell the teacher that you will pee in her coffee cup if they don't forget about what you did

Explanation:

Answer:

Explanation:

Depends on the homework, but

"We worked together on it and came to similar conclusions."

"We checked answers with each other when we finished to make sure we got the problems correct and did the problems correctly."

Can someone please give me Python test 3 it would help me tremendously

Answers

Question 1:  To tell what will happen when an if-statement is false.

Question 2: The = should be ==

                    elseif should be elif

                    The else should have a :

Question 3: All algorithms can only do number calculations.  

Question 4: and

Question 5: To make a follow-up True/ False decision

Question 6: if (text1 > 15):

Question 7: if (text1 == 78):

Question 8: if (num1 != num2):

Question 9: >=

Question 10: 4

Question 11: 3

Question 18: a < b and a != b  

Question 19: !=

Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.

What is the binary RGB triplet for the color indigo?
O (00100101, 00000000, 01000001)
O (01001011, 00000000, 01000001)
O (00100101, 00000000, 10000010)
O (01001011, 00000000, 10000010)

Answers

01001011 00000000 10000010

The binary code is "\((01001011, 00000000, 01000001)_2\)" which represents the indigo color from the RGB triplet.

What is RGB?

RGB (red, green, and blue) would be a color representation scheme for computer monitors.Every hue in the visible light spectrum could be created by mixing rgb in different proportions.Indigo is made up of red and blue primary colors. If used in equal quantities, red and blue can also be combined to form violet. Blue has to be the most prominent color in the equation to create indigo. To make indigo, one-third red and two-thirds blue should be combined inside a mathematical calculation.The RGB representation for the Indigo is \(RGB (75,0,130)\) which binary conversion match with the "Option B" that is "\((01001011, 00000000, 01000001)_2\)".

Find out more about the RGB here:

brainly.com/question/19262252

Select the best answer for the question.
1. A main part of digital ethics focuses on
O A. issues with copyright violations.
O B. options for online shopping.
OC frequency of social media use.
O D. ideas for education websites.

Answers

The majority of digital ethics is concerned with issues of copyright violations

What is copyright violation?

The use or production of copyright-protected material without the permission of the copyright holder constitutes copyright infringement. Copyright infringement occurs when a third party violates the rights granted to the copyright holder, such as the exclusive use of a work for a set period of time. Music and movies are two of the most well-known forms of entertainment that face significant copyright infringement. Infringement cases may result in contingent liabilities, which are funds set aside in the event of a lawsuit.

The use or production of copyright-protected material without the permission of the copyright holder constitutes copyright infringement.Individuals and businesses who create new works must register for copyright protection in order to profit from their efforts.Other parties may be granted permission to use those works through licensing agreements, or the works may be purchased from the copyright holder.

To learn more about copyright violation refer to :https://brainly.com/question/17357239

#SPJ1

The majority of digital ethics is concerned with issues of copyright violations.

What is copyright violation?The use or production of copyright-protected material without the permission of the copyright holder constitutes copyright infringement. Copyright infringement occurs when a third party violates the rights granted to the copyright holder, such as the exclusive use of a work for a set period of time. Music and movies are two of the most well-known forms of entertainment that face significant copyright infringement. Infringement cases may result in contingent liabilities, which are funds set aside in the event of a lawsuit.The use or production of copyright-protected material without the permission of the copyright holder constitutes copyright infringement.Individuals and businesses who create new works must register for copyright protection in order to profit from their efforts.Other parties may be granted permission to use those works through licensing agreements, or the works may be purchased from the copyright holder.

To learn more about copyright violation refer to:

https://brainly.com/question/14855154

#SPJ1

que es la felicidad??​

Answers

Se feliz el amor es nada

50 Point reward!!!!! TECH EXPERT HELP, PLEASE!!!!! So, I've had this problem for a while now, but that doesn't matter rn- But please help me ill give you 50 points! So, I tried installing a modded version of a game, But every time I do something pops up and says: "unsupported pickle protocol: 5" and its been making me very stressed trying to fix it, I don't know what it is, but I want to play that game and It would be very much appreciated if you helped Theres a screenshot attached to show you what I'm talking abt.

50 Point reward!!!!! TECH EXPERT HELP, PLEASE!!!!! So, I've had this problem for a while now, but that

Answers

Answer:  unsupported pickle protocol: 5 The ValueError: unsupported pickle protocol:5 error is raised by Python when a version of the pickle you are using is incompatible with the version used to serialize the data. The error message says “protocol 5”, which explicitly means that which pickle protocol version was used.

Explanation:

you can fix this by using a different brand for your mod menu, Or even a newer version of this mod you are trying to download so just delete the file and try a newer one:)

The error "unsupported pickle protocol: 5" often denotes a conflict between the Python version you're currently using and the Python version used to produce the pickle file. Python's Pickle module is used to serialise objects.

You can attempt the next actions to fix the problem:

Make that the Python version you have installed meets the needs of the modified game.Check to see if your current Python version is compatible with the game's altered version.Check to see if the modified game has any updates or patches that fix compatibility problems.

Thus, if the problem continues, you might need to see the mod creator or the community forums for particular troubleshooting for the game's modded version.

For more details regarding python, visit:

https://brainly.com/question/30391554

#SPJ6

An installation is:
please help asap

Answers

Answer:  an installation is the act of putting something in, a device that stays in one place, a military base, or an art piece that often involves building and different types of materials.

Explanation:

Getting your new air conditioner put in is an example of an installation.

in a uniprocessor system, multiprogramming increases processor efficiency by: group of answer choices d) increasing processor speed a) taking advantage of time wasted by long wait interrupt handling c) eliminating all idle processor cycles b) disabling all interrupts except those of highest priority

Answers

In a uniprocessor system, multiprogramming is a technique where the CPU executes multiple programs simultaneously by switching between them. This increases processor efficiency as it takes advantage of the time wasted by long wait interrupt handling.

This means that while one program is waiting for input/output operations or other resources, the CPU can switch to another program that is ready to execute. This allows for the efficient use of the CPU's resources, thereby increasing its throughput.

However, multiprogramming does not increase processor speed or eliminate all idle processor cycles. Instead, it optimizes the CPU utilization by keeping it busy with tasks and switching between them. Also, disabling all interrupts except those of highest priority is not a valid approach as some interrupts are essential for the proper functioning of the system.

Therefore, multiprogramming is a useful technique to improve the overall performance of a uniprocessor system.

To know more about uniprocessor system visit:

https://brainly.com/question/31558769

#SPJ11

What list of numbers is created by the following code:

range(9)

Group of answer choices

0 1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8 9

1 2 3 4 5 6 7 8

0 1 2 3 4 5 6 7 8 9

Answers

Answer:

0 1 2 3 4 5 6 7 8

Which graphic file format would you choose if you needed to make an animated graphic for a website?

Answers

Answer:

GIF – Graphics Interchange Format

Explanation:

FILL IN THE BLANK. When writing functions that accept multi-dimensional arrays as arguments, ________ must be explicitly stated in the parameter list.

Answers

Answer:

the size of each dimension of the array(s) must be explicitly stated in the parameter list. This allows the function to correctly access and manipulate the elements of the array(s) without causing any errors due to incorrect indexing or out-of-bounds memory access. It is important to ensure that the dimensions of the arrays passed to the function match the expected dimensions specified in the parameter list in order to avoid unexpected behavior or crashes in the program.

Which parameter can be used with the ping command to send a constant stream of packets when using a Windows device?
a. -f
b. -p
c. /all
d. -g
e. -t

Answers

The correct response is (e) i.e. -t. When using a Windows device, the ping command can be used with the -t argument to deliver a continuous stream of packets.

The Packet InterNet Groper is the full name of PING. It is software used to evaluate the network communication between two devices, either as a network management system or as a utility. The main TCP/IP command used to assess connectivity, reachability, and name resolution is ping. This command shows Help information when used without any parameters. This command can be used to check the computer's IP address as well as its name. The reaction time of your connection, or how quickly your device receives a response after you send out a request, is known as latency.

Learn more about PING here:

https://brainly.com/question/29974328

#SPJ4

a hard disk is a _ storage device

Answers

electro-mechanical data storage device

Electro-mechanical data storage device

The process where the programmer steps through each of the program's statements one by one is called

Answers

The process where the programmer steps through each of the program's statements one by one is called \(\sf\purple{hand \:tracing}\).

\(\bold{ \green{ \star{ \orange{Mystique35}}}}⋆\)

what is a flowchart and write it's work​

Answers

Answer: A flowchart is a type of diagram that represents an algorithm, workflow or process. The flowchart shows the steps as boxes of various kinds, and their order by connecting the boxes with arrows. ... Flowcharts are used in analyzing, designing, documenting or managing a process or program in various fields.

Explanation: brainliest plz!

To use the Expression Builder to create a calculated field, select the column in the Field row, right-click to display the shortcut menu, and then click ____.

Answers

Answer:

square brackets [ ]

Explanation:

Hope I could help. Good luck with your studies .

Draw a circuit with a 12-volt battery, a 100 ohms resistor in series, and two resistors (each of value 200 ohms) in parallel. What is the total resistance of the circuit?

Answers

Answer:

200 Ω

Explanation:

Hi there!

Please see below for the circuit diagram.

1) Find the total resistance of the resistors in parallel

Total resistance in parallel equation: \(\frac{1}{R_T} = \frac{1}{R_1} +\frac{1}{R_2}\)

Both the resistors measure 200 Ω. Plug these into the equation as R₁ and R₂:

\(\frac{1}{R_T} = \frac{1}{200} +\frac{1}{200}\\\frac{1}{R_T} = \frac{1}{100}\\R_T=100\)

Therefore, the total resistance of the resistors in parallel is 100 Ω.

2) Find the total resistance of the circuit

Now, to find the total resistance of the circuit, we must add the 100 Ω we just solved for and the 100 Ω for the other resistor placed in series:

100 Ω + 100 Ω = 200 Ω

Therefore, the total resistance of the circuit is 200 Ω.

I hope this helps!

Draw a circuit with a 12-volt battery, a 100 ohms resistor in series, and two resistors (each of value

_______ creates a ______, a unidirectional data channel that can be used for interprocess communication.

Answers

pipe() function creates a pipe, a unidirectional data channel that can be used for interprocess communication.

The pipe() function is a system call available in many operating systems that creates a unidirectional interprocess communication (IPC) channel, also known as an anonymous pipe. It provides a simple way to establish a communication channel between two related processes, typically a parent process and its child process.

The pipe() function creates a pipe and returns two file descriptors: one for the read end of the pipe and another for the write end. The parent process can write data to the write end of the pipe, and the child process can read the data from the read end. The data written by the parent process is received by the child process in the order it was written, similar to a queue.

Anonymous pipes are limited to communication between related processes, specifically those created by forking a parent process. They are often used when a parent process needs to pass data to its child process or receive data from it. The pipe mechanism is typically unidirectional, meaning that data flows in only one direction.

Named pipes, also known as FIFOs, are a different concept from anonymous pipes. Named pipes provide a way to establish interprocess communication between unrelated processes using a named file-like interface. Named pipes have a name associated with them in the file system and can be accessed by multiple processes, even across a network.

Learn more about interprocess communication: https://brainly.com/question/31256423

#SPJ11

use the management studio to create a new database named mywebdb using the default settings. (if the database already exists, use the management studio to delete it and then recreate it.)

Answers

To create a new database named "myweb " using the default settings in Management Studio, follow the steps mentioned above. If the database already exists, you can delete it using Management Studio and then recreate it.

If the database already exists and you need to delete and recreate it, follow these steps:
1. In the Object Explorer, right-click on the database you want to delete and select "Delete".
2. In the confirmation dialog box, click the "OK" button to delete the database.
3. Follow the steps mentioned above to create a new database named "mywebdb" using the default settings.

 Management Studio provides a user-friendly interface for managing SQL Server databases. By following the steps mentioned above, you can create a new database named "mywebdb" using the default settings. If the database already exists, you can delete it and then recreate it using the same steps. It is important to note that deleting a database will permanently remove all its data, so make sure to back up any important data before performing this action.

To know more about web visit:

https://brainly.com/question/33947084

#SPJ11

Please answer the question no. 3 in the photo. I have exams. It's related to HTML.

Please answer the question no. 3 in the photo. I have exams. It's related to HTML.

Answers

Answer:

<p style="font-size: x-large; color: blue;">SILK FAB</p>

<p style="font-size: normal; color: red;">SILK FAB</p>

<p style="text-decoration: underline;">SILK FAB</p>

<p>Come to the silk fab organised by Govt. of India and get all the following text - "Come to weavers of all the states. <span style="color: green;">Encourage handloom</span> and give your support to hardworking weavers". The words "Encourage handloom" should be in green colour.</p>

Explanation:

Here is a code snippet in HTML that should accomplish what you described:

This code will print "SILK FAB" in the largest size in blue, followed by "SILK FAB" in normal size and red, and then "SILK FAB" in normal size and underlined. The final paragraph will contain the rest of the text, with the words "Encourage handloom" in green.

Other Questions
Here is an equation: 2x+3y+4=10.a) Show that this is the equation of a straight line with a gradient of -2/3.b) Work out the y-intercept Why is it important to offer leadership opportunities to next generation in a family business? Please 200-250 words This cartoon is reflective of what situation in the 1920s?Corporations and industries were the weakest parts of the economy. Investment companies were cautious about preventing overspeculation in the stock market. The majority of Americans were able to invest money in stocks and bonds. Stock market growth was not an accurate reflection of the health of the American economy. NEED HELP ASAP, WILL GIVE BRAINLIESTPresident Roslin of Country XYZ knows that a new policy is needed to help solve the problem of rising unemployment in her nation. Her next step is todevelop a plan.implement a plan.identify the problem.solve the problem. If you could replace all of the grass in the world with something else, what would it be and why? What are the coordinates of point A of the pre-image?O (-1, 1)O (-1,2)O (-9,6)O (-9, 18) Given the function g(x)=x^2+3 ,evaluate (-2,y) Describe the difference between a antecedent and subsequent boundary? The total estimated student loan debt outstanding (unpaid) is over:a) $1 trillionb) $10 thousandc) $7 trilliond) $1 billion Choose the scenarios that correctly identify a representative democracy. Calculate the molar mass of CC14 What name is given to the number of protons in a particular atom? The Navajo name Dine and Apache name Nide both mean, ____________.a.the peoplec.the corn growersb.the enemyd.the huntersPlease select the best answer from the choices provided Write an equation in slope-intercept form of the line that passes through the given point and is parallel to the graph of the given equation.(12,-5) 7x-3y=-5 create a classification chart (tree diagram, venn diagram, etc.) that shows the relationships among rhombuses, rectangles, squares, parallelograms, quadrilaterals, triangles, right triangles, equilateral triangles, isosceles triangles. 3 minutes 4 seconds 1 minute 16 seconds = minutes seconds A spring with a force constant of 3.5 x 10^4 N/m is initially at its equilibrium length. (a) How much work must you do to stretch the spring 0.050 m? (b) How much work must you do to compress it 0.050 m? Instruction Excel Your topic this week is to find a video on developing a trading journal. Outline a trading journal that you feel meets your standards. Explain how the journal works and meets your needs. Paper Much of trading involves what some refer to as the psychology of the market. Your task this week is to write a concise one page paper on what psychological pitfalls traders encounter, some of the reasons why they occur, and how they can be rectified. Be certain to include your references Suppose you drive through an entrance ramp at a modest speed and your acceleration is 3.0 m/s2. what will be the acceleration if you double your speed? a balloon outside in the winter seems to deflate but inside it re-inflates, however the number of gas molecules stays constant. how does that happen? explain in terms of volume and temperature.