Tell the truth value for each of the following proposition. - February has 30 days ⊕ 5 is a prime number. - If February has 30 days, then 7 is an even number.
- February has 30 days iff 7 is an even number. - 4.2 +2 = 4 or 7 is an even number. - 5.2 + 2 = 4 ⊕ 7 is an even number.
- 6.2 + 2 = 4 and 7 is an even number.
- If February has 30 days then 5 is a prime number. - February has 30 days or 7 is an even number

Answers

Answer 1

The truth value for each of the following propositions is as follows:

February has 30 days ⊕ 5 is a prime number. (Exclusive OR)mTruth value: True (since only one of the statements is true)

How to determine the truth value

If February has 30 days, then 7 is an even number. (Implication)

Truth value: True (since the antecedent is false, the implication is true)

February has 30 days iff 7 is an even number. (Biconditional)

Truth value: False (since the statements are not equivalent)

4.2 + 2 = 4 or 7 is an even number. (Disjunction)

Truth value: True (since at least one of the statements is true)

5.2 + 2 = 4 ⊕ 7 is an even number. (Exclusive OR)

Truth value: False (since both statements are false)

6.2 + 2 = 4 and 7 is an even number. (Conjunction)

Truth value: False (since one of the statements is false)

If February has 30 days, then 5 is a prime number. (Implication)

Truth value: True (since the antecedent is false, the implication is true)

February has 30 days or 7 is an even number. (Disjunction)

Truth value: True (since at least one of the statements is true)

Read more on truth value here https://brainly.com/question/28562089

#SPJ4


Related Questions

suppose that you have a message consisting of 1024 bits. design a method that will extend a key that is 64 bits long into a string of 1024 bits, so that the resulting 1024 bits can be xored with the message, just like a one-time pad. is the resulting cipher as secure as a one-time pad? is it possible for any such cipher to be as secure as a one-time pad?

Answers

The method to extend a 64-bit key into a 1024-bit string is to use a key-derivation function (KDF).

What is key-derivation function?

A key-derivation function (KDF) is a cryptographic algorithm used to derive a cryptographic key from a set of inputs such as a password, a random number or some other form of input. KDFs are used to transform user-chosen passwords into cryptographic keys that can be used to encrypt and protect data.

A KDF is a cryptographic algorithm that takes an input (in this case a 64-bit key) and produces an output with a longer length (in this case 1024 bits). The KDF will take the 64-bit key and generate a 1024-bit string by stretching it out with random numbers, algorithms, and/or calculations.

The resulting cipher may not be as secure as a one-time pad, as it is not truly random. Depending on the KDF used, it is possible for an attacker to figure out the KDF used and then reverse the process to determine the key.

It is not possible for any such cipher to be as secure as a one-time pad, as one-time pad encryption relies on a truly random key (which is impossible to reverse engineer).

To learn more about key-derivation function
https://brainly.com/question/13086223
#SPJ4

the term 'beta version' software generally refers to: group of answer choices software that has not yet been tested in its entirety by the developers software that still requires further integration and unit testing software that is feature complete but still requires end-user testing with real data a completely finished system ready for production

Answers

Beta Version: This is the software that has been made available to the general public but still has many unfinished features.

What is a software beta version?

An incomplete early version of a computer software or application that has the majority of the key elements. For testing and feedback, these versions are occasionally exclusively made available to a small group of people or to the broader public.

A web browser application is what?

A web browser is a piece of software that enables access to the World Wide Web. It is also known as an internet browser or just a browser. With only one click, you have access to all of human knowledge and can look up any question you have.

To know more about 'beta version' software visit:-

https://brainly.com/question/23465069

#SPJ4

How would you describe the relationship between blocks of code and commands?

Answers

Code and Commands have similar programs coding has only one thing to do or done but commands can be told anytime by an input device.

Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag

Answers

Answer: Document Scanner

Explanation: Cos then he can easily add the paper notes to his computer and email the client.

the advantages and disadvantages of internet​

Answers

Advantages : a lot of useful information from all around the world
Disadvantage:, cyberbullying, stalking, hacking

There is a huge demand for cyber security professionals. True or false

Answers

True.
Thank You!
Please mark Brainliest

Answer: True. The demand for cyber security professionals has raised significantly as data breaches increase each year.


Question 1
A worksheet is an electronic grid in which you can perform numeric
calculations.
True
O False

Answers

the answer is: true

Explanation:

because it is true

Which of the following is not an acceptable inventory costing method? a. Specific identification b. Last-In, First-Out (LIFO) c. First-In, First-Out (FIFO) d. Average cost e. Next-In, First-Out (NIFO)

Answers

e. Next-In, First-Out (NIFO) is not an acceptable inventory costing method.

The acceptable inventory costing methods commonly used in accounting are specific identification, Last-In, First-Out (LIFO), First-In, First-Out (FIFO), and average cost.

methods help determine the value of inventory and the cost of goods sold. However, "Next-In, First-Out" (NIFO) is not a recognized or commonly used inventory costing method. It is not considered an acceptable method in accounting practices. NIFO is not based on any standard accounting principles or widely accepted conventions. It is important to adhere to recognized and generally accepted inventory costing methods to ensure consistency, accuracy, and comparability in financial reporting.

Learn more about accounting  here:

https://brainly.com/question/32789402

#SPJ11

The exact output produced after executing the following C++ code is ... intr10; void checklinta, float b) Staticfloat k 5.0 k+sa+b: - b intra 2: cout<<<<"HI"<

Answers

The code you provided has some syntax errors. However, I will assume that the correct code is:

#include<iostream>

using namespace std;

void check(int a, float b){

   static float k = 5.0;

   k = k + a + b;

   cout<<"k = "<<k<<endl;

}

int main(){

   check(2,3.5);

   return 0;

}

This C++ code defines a function named check that takes an integer argument a and a floating point argument b. The function has a static variable k that is initialized to 5.0. The function then updates the value of k by adding a and b, and prints the updated value of k to the console.

When the check function is called with arguments 2 and 3.5, it adds these values to k and prints k = 10.5 to the console. The program then terminates and returns 0. So, the exact output produced after executing this C++ code is:

k = 10.5

Learn more about code  here:

https://brainly.com/question/31228987

#SPJ11

3
Type the correct answer in the box. Spell all words correctly.
Which program can damage your computer?
can cause damage to my computer.
Reset
Net

Answers

Answer: Look in /Library/LaunchDaemons for a plist file that is out of place. It may actually have ActivityInputd in the name.

If there is, move it to the Trash.

Open Network System Preferences, select the service you use to connect to the Internet, and click the Advanced button.

Click on the Proxies tab and uncheck any of the proxies listed in the “proxies to configure” list.

Restart.

Explanation:

Mrs. Smith is trying to figure out if the grades on her tests correlated with her students’ GPA. She wants to look at those who have a test grade below 70% and a GPA below 2.5. How many rows would be left after she filters her query with the OR functions?
a. five
b. six
c. eight
d. eleven

Answers

Eleven rows would be left after she filters her query with the OR functions.

What is query language?

Query languages, also known as data query languages or database query languages (DQLs), are computer languages that are used to create queries in databases and information systems. The Structured Query Language is a well-known example (SQL). Query languages are broadly classed as either database query languages as well as information retrieval query languages. The distinction is that a database query language seeks factual answers to factual questions, but an information retrieval query language seeks documents holding information relevant to a field of investigation.

To learn more about query language
https://brainly.com/question/13440965

#SPJ13

what type of activities are performed with the help of the software used in hospitals?

Answers

Answer:

Xrays, Ultrasounds, managing patient records, communicating with colleagues, etc.

xrays ultrasounds lasers

wimax, lte, hspa are examples of what technology? select one: a. 3g b. 4g c. 1g d. cellular technology

Answers

WiMAX, LTE, and HSPA are examples of 4G technology. So, the correct answer is option B. 4G. These technologies provide faster and more efficient mobile broadband connections compared to their predecessors.

4G is a term used to describe the fourth generation of cellular wireless standards. WiMAX, LTE, and HSPA are all examples of 4G technology. These technologies are designed to provide faster data transfer rates, improved network capacity, and better coverage than previous generations of cellular technology. 4G is a high-speed wireless internet access technology that is designed to deliver high-speed data services to mobile devices.

You can learn more about technology at: brainly.com/question/15059972

#SPJ11

pls, help it's urgent... 44 points plsssssssssssssssss

Write an algorithm and Flowchart for reversing a Number eg. N=9486.

Answers

The steps to reverse a number is given below:

The Algorithm

Step 1 Start

step 2 Read a number n

Step 3 a=n/1000

step 4 calculate b=(n%1000)/100

step 5 calculate c= (n%100)/10

step 6 calculate d = n%10

step 7 calculate reverse = a+(b*10)+(c*100)+(d*1000)

step 8 display reverse

step 9 stop

Read more about algorithms here:

https://brainly.com/question/24953880

#SPJ1

Select the three careers in the creative side of digital media.

broadcasting
web designer
animators
filmmaker
project management

Answers

Answer:

I would pick A B and D to be my answer

Answer:

web designer, animators, and filmmaker.

a security analyst is concerned about flaws in the operating system being used within their company. what should their first step be to remedy this?

Answers

A security analyst, the first step to remedy flaws in the operating system being used within a company is to perform a thorough assessment of the system. This assessment should include identifying any vulnerabilities, weaknesses, and potential threats that the system may be exposed to. It is also important to determine the extent to which the flaws could impact the security of the company's information.

1) Once the assessment is complete, the security analyst should prioritize the identified risks based on their potential impact and the likelihood of their occurrence. This will help the analyst to develop a plan of action to address the vulnerabilities and protect the company's information.

2) The security analyst should then work closely with the IT team to implement necessary patches and updates to the operating system, as well as any additional security measures that may be required. It is also important to establish policies and procedures to ensure that the system is properly maintained and updated on an ongoing basis.

3) In addition to addressing the immediate vulnerabilities, the security analyst should also take a proactive approach to prevent future flaws from occurring. This may include conducting regular security audits, providing employee training on best practices for maintaining system security, and implementing robust monitoring and alert systems to quickly identify and respond to potential threats.

4) The first step for a security analyst to remedy flaws in the operating system being used within their company is to conduct a thorough assessment, prioritize risks, and develop a plan of action to address vulnerabilities and protect the company's information. Ongoing monitoring and proactive measures should also be taken to prevent future flaws from occurring.

For such more questions on security analyst

https://brainly.com/question/13179611

#SPJ11

Plot the graph of absorbance versus dilutions of *Saccharomyces
cerevisiae on Microsoft Excel
a) Only plot trend line for linear range of data; show the R^2
value for each dataset
b) You may chose to
Dilutions Blank 1:16 1:8 1:4 1:2 550 0.000 0.098 0.206 0.418 0.810 1.418 Wavelength (nm) 620 0.000 0.075 10.169 0.368 0.714 1.162 690 0.000 0.053 0.134 10.308 0.604 1.044 1:1 Plot the graph of absorba

Answers

I can guide you on how to create the graph you described. Here are the steps: By following these steps, you should be able to create a graph of absorbance versus dilutions in Microsoft Excel, including the trendline and R-squared value for each dataset.

1. Open Microsoft Excel and enter the dilutions in one column and the corresponding absorbance values in another column.

2. Select the data range and click on the "Insert" tab in the Excel menu.

3. Choose the chart type that represents the relationship between dilutions and absorbance. In this case, a scatter plot with markers connected by a smooth line (XY scatter with smooth lines) would be suitable.

4. Right-click on any data point on the graph and select "Add Trendline" from the context menu.

5. In the "Format Trendline" options, select the "Linear" trendline type.

6. Enable the option to display the equation and R-squared value on the chart.

7. Adjust the axis labels, title, and other formatting options to enhance the clarity of the graph.

To know more about Microsoft Excel visit-

https://brainly.com/question/32584761

#SPJ11

You saved a file on drive C go your computer. You want to find and open the file. Which of the following programs will you use to find the saved file?

Answers

Group of answer choices.

A. Spreadsheet program

B. Microsoft Windows Explorer

C. Word-processing program

D. Notepad

Answer:

B. Microsoft Windows Explorer

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

In this scenario, you saved a file on drive "C" of your computer. The software program or application which you would use to find and open the file is Microsoft Windows Explorer.

The Microsoft Windows Explorer is an inbuilt resources that avails the end users the ability to perform various operations on a file and it provides the folder paths used for the storage of user files. It is the default program for file and folder documents on a computer system.

What are the different elements of a window?​

Answers

Answer: title bar, menu bar, the workspace

Explanation:

Which range function creates the following list of numbers?
76 74 72 70 68 66 64 62

Answers

Answer:

they look like even number

Explanation:

2 4 6 8 10 12 -------seeeeee but not hundred percent sure but plz put me in brainlist

En la época de la edad de piedra que uso se le daba al silex?
a)Realizar Herramientas y amas
B)Para fabricar platos
C)Para incendio fuego
D)Para poder cultivar ​

Answers

C is the correct answer hope it helped

Write a subclass called Dog that inherits from Pet.

Write a Dog constructor that has one argument, the name, and calls the super constructor passing it the name and the animal type “dog”.

Override the method speak() in the Dog class to print out a barking sound like “Woof!”. (Do not override the get method. This superclass method should work for all subclasses).

Uncomment the Dog object in the main method to test it out.

Write a similar Cat class that inherits from Pet and has a similar constructor and overrides the method speak() with a “Meow!”. Test it out.
JAVA

Answers

This implementation has a function speak() that displays a general message, a superclass Pet with a name and an animalType, and a superclass Pet. Moreover, it defines two Pet-derived subclasses.

How do I call a Java instance variable in the main method?

By calling the variable name inside the class, one can directly access instance variables. Nonetheless, they should be called with the fully qualified name within static methods (where instance variables are provided accessibility). VariableName. ObjectReference.

name and animalType are private strings in the public class "Pet."

this.name = name; this.animalType = animalType; public Pet(String name, String animalType);

getName() for public strings returns name;

return animalType from public String getAnimalType();

Pets don't yet know how to speak, System.out.println("Pets don't know how to speak,"); public void speak();

Public class Dog extends Pet; super(name, "dog"); public Dog(String name);

To know more about function visit:-

https://brainly.com/question/28939774

#SPJ1

A search expression entered in one search engine will yield the same results when entered in a different search engine.
A. True
B. False

Answers

Answer:

false

Explanation:

In the second model, an interaction term between age and blood pressure level (Ase'Pressure) and the Smoker dummy were related to Risk. The followiry table shows the Excel output for this model (refer to this output as model 2). At the 95% confidence level, test to see whether the interaction term and the Smoker dummy variable are significant (model 2), Are they significant? Why or why not?

Answers

In model 2, an interaction term between age and blood pressure level (Ase'Pressure) and the Smoker dummy variable are included. The question asks whether these two variables are significant at the 95% confidence level. We need to determine if the p-values associated with these variables in the Excel output are less than the significance level of 0.05.

To test the significance of the interaction term and the Smoker dummy variable in model 2, we examine the p-values provided in the Excel output. If a p-value is less than the significance level (0.05 in this case), we can conclude that the variable is statistically significant.

If the p-value for the interaction term and the Smoker dummy variable is less than 0.05, it indicates that there is strong evidence to suggest that these variables have a significant impact on the outcome variable (Risk) in the model. This means that both the interaction between age and blood pressure level and the Smoker dummy variable are important factors in explaining the variation in the risk.

On the other hand, if the p-value is greater than 0.05, it implies that the variables are not statistically significant at the 95% confidence level. This means that there is insufficient evidence to conclude that these variables have a significant relationship with the outcome variable.

To determine whether the interaction term and the Smoker dummy variable are significant in model 2, compare their respective p-values to the significance level of 0.05. If the p-values are less than 0.05, they are significant; otherwise, they are not significant.

Learn more about outcome here:

https://brainly.com/question/32511612

#SPJ11

PHOTOGRAPHY: In 200 words or more explain the difference between deep and shallow depth field and when would you use either technique when taking a photograph?

Answers

The differences are:

A shallow depth of field is said to be a small area in view and its background is always blurred but a A deep depth of field is known to be one that captures a bigger area in view and its image are said to be sharp and clear.

What is the difference between deep and shallow focus?

The Images gotten in shallow focus is one that needs little or shallow depths of field, and its lenses also needs long focal lengths, and big apertures. But Deep focus images needs small focal lengths and long  depths of field.

In the case above i recommend deep depth field and therefore, The differences are:

A shallow depth of field is said to be a small area in view and its background is always blurred but a A deep depth of field is known to be one that captures a bigger area in view and its image are said to be sharp and clear.

Learn more about photograph from

https://brainly.com/question/13600227

#SPJ1

Write a complete java program that uses a for loop to compute the sum of the even numbers and the sum of the odd numbers between 1 and 25 g

Answers

To compute the sum of the even numbers and the sum of the odd numbers between 1 and 25 using a Java program, we can use a for loop to iterate over the numbers and check if they are even or odd using the modulo operator.

Here's a Java code that uses a for loop to compute the sum of the even numbers and the sum of the odd numbers between 1 and 25:

public class SumOfEvenAndOddNumbers {
   public static void main(String[] args) {
       int sumOfEven = 0;
       int sumOfOdd = 0;
       
       for (int i = 1; i <= 25; i++) {
           if (i % 2 == 0) {
               sumOfEven += i;
           } else {
               sumOfOdd += i;
           }
       }
       System.out.println("Sum of even numbers between 1 and 25: " + sumOfEven);
       System.out.println("Sum of odd numbers between 1 and 25: " + sumOfOdd);
   }
}

In this program, we initialize two variables to hold the sum of even numbers and the sum of odd numbers, respectively. We then use a for loop to iterate over the numbers between 1 and 25. For each number, we check if it is even or odd by using the modulo operator (%). If the number is even, we add it to the sumOfEven variable; otherwise, we add it to the sumOfOdd variable.

After the loop finishes, we print the values of sumOfEven and sumOfOdd to the console. The output of this program will be:

The sum of even numbers between 1 and 25: 156
The sum of odd numbers between 1 and 25: 169

This indicates that the sum of even numbers between 1 and 25 is 156, while the sum of odd numbers is 169.

To learn more about Java programming, visit:

https://brainly.com/question/25458754

#SPJ11

a network administrator for a large oil company has discovered that a host on the company network has been compromised by an attacker spoofing digital certificates. recommend an immediate response to prevent further spoofing of the host.

Answers

My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

What does revoke certificate mean?

Certificate revocation is the process by which one can  invalidate a TLS/SSL and this is one that is often done before its scheduled expiration date.

Note that A certificate need to be revoked immediately  and as such, based on the case above, My recommendation as an immediate response to prevent further spoofing of the host is to Revoke the host's certificate.

Learn more about network administrator from

https://brainly.com/question/4264949

#SPJ1

Read this passage from The Phantom Tollbooth. There was once a boy named Milo who didn't know what to do with himself--not just sometimes, but always. When he was in school he longed to be out, and when he was out he longed to be in. On the way he thought about coming home, and coming home he thought about going. Wherever he was he wished he were somewhere else, and when he got there he wondered why he'd bothered. Nothing really interested him--least of all the things that should have. The most likely reason the author begins this fantasy with a realistic element is to make the text more amusing. exciting. believable. interesting.

Answers

Answer:

I think its believable

Explanation:

^^

I think its believable

I need to know the cooling methods for geil RAM, ASRock Motherboard, Plextor M8Pe SSD, Zalman Fanless Cooler, Deep Cool Gamer Storm, Cryorig H7, MSI GeForce GTX 1060 and CPU fan.

Answers

To maintain the modules running in a desirable thermal range, two cooling fans are placed in the upper right and left corners of the heatshield.

How does a computer's cooling system work?

Computer cooling systems are passive or active systems that are made to control and dissipate the heat produced by a computer in order to preserve optimal performance and safeguard the computer from harm that will result from overheating.

Is a cooling system necessary for a PC?

Cooling is crucial when your PC is being used to the fullest. Your components can get very hot when you play games at their highest settings or produce 4K video. By choosing the appropriate temperature management options, you can keep your components cool and avoid overheating.

To know more about modules visit :-

https://brainly.com/question/21852411

#SPJ4

execute the program and observe the output. click and drag the instructions to change the order of the instructions, and execute the program again. can you make the program output a value greater than 500? how about greater than 1,000?

Answers

The program below is designed to calculate the area of a circle, given the radius of the circle.

What is program ?

Programming is the process of creating instructions for computers to follow. It involves the development and implementation of algorithms, or logical instructions, to perform various tasks. Programming languages are used to write code to create software, applications, and websites. A program is a set of instructions that tells the computer what to do and how to do it. Programs can be written in a variety of languages, such as C++, Java, or Python. Programming can be used to solve problems, automate tasks, and create complex systems. Programming is an essential skill in today's digital world, and is used in a variety of industries, including finance, healthcare, and entertainment.

radius = 10

area = 3.14 * (radius ** 2)

print(area)

When the program is initially executed, the output is 314.0.By changing the order of the instructions, such as assigning the area variable before changing the radius variable, it is not possible to make the program output a value greater than 500. However, by changing the value of the radius variable (e.g. radius = 20) it is possible to make the program output a value greater than 1000. For example, the output would be 1256.0 with a radius value of 20.

To learn more about program
https://brainly.com/question/23275071
#SPJ4

Other Questions
Suppose you calculated a paired-samples t test, with 30 pairs of scores. Mean mean difference is 6 and the standard error is 2.1. What is the .95 confidence interval I need help (reading plus) A portrait of an artist wearing a cloak and a beard who painted the Parma Cathedral. Who is pictured above?The answer is Correggio a 7-year-old boy has experienced repeated urinary tract infections (utis). his older sister also experienced repeated utis and was diagnosed with vesicoureteral reflux, a condition that tends to appear in families. therefore, the nurse suspects this same condition in this client. which diagnostic tests would confirm this suspicion? Evaporation of water off of the surface of leaves aChemical Change bPhysical Change 1. What emblematic functions can a bicycle serve? Be specific. 2. How can a bicycle be part of a social status transition? 3. Do scraper bikes derive their product meaning from the culture or the individual? Explain your answer. 4. What sacred meaning(s) might a bicycle hold for a consumer? What are the implications for marketers? A certain electric stove has a 16 heating element. The current going through the element is 15 A. Calculate the voltage across the element. A rifle can shoot a 4. 20-g bullet at a speed of 965 m/s. A)Find the KE of the bullet at this speed. B) What work is done on the bullet if it starts from rest?c) If thework is done over a distance of 0. 75 m, what is the average force on the bullet?d) If the bullet comes to rest by pushing 1. 5 cm into metal, what is the magnitude and direction of the average force the metal exerts? Locate the Michigan Basin and the Nashville Dome, the ages of the rocks have different patterns. Explain the difference in each feature. (Do the rocks go from older-younger or younger to older?) can someone please help me with this geometry question I will mark brainliest. Malcolm Little was born in 1925 in Omaha, Nebraska, to a very poor family of eight children. His father was a preacher and a vocal black nationalist, advocating equality well before the start of the Civil Rights movement. Malcolm faced frequent racism and harassment from white supremacists because of his fathers affiliations, witnessing his house burn to the ground when he was only four and, two years later, losing his father, who had received repeated death threats and was found dead under suspicious circumstances. When Malcolm was only 12, his mother had a nervous breakdown and was institutionalized. What do you think this quote means? What idea or information do you think Malcolm X wanted us to know/understand? 5 sentences minimum One of the first steps property marketers take when preparing a marketing plan for a property development is a PESTEL analysis of the macro-environment and a SWOT analysis of the site/building. a) Explain what the acronyms PESTEL and SWOT stand for, with examples of the type of information that would be included; and b) Discuss how a PESTEL and SWOT can be used to guide a marketers' decision-making when writing a marketing plan. (5 marks) The following list of events happens during meiosis:Prophase I: Crossing over between homologous chromosomes occurs.Metaphase I: Tetrads line up at the metaphase plate.Anaphase I: Tetrads are separated.Telophase I: Nuclear envelopes reform around the separated chromosomes.Prophase II: Chromosomes condense.Metaphase II: Chromosomes line up at metaphase plate.Anaphase II: Sister chromatids separate into daughter chromosomes.Telophase II: Nuclear envelopes reform around the daughter chromosomes.Identify the answer choice that correctly lists the events from above that lead to new genetic combinations in the gametes.(1 point)1 and 21, 2, and 55 and 65, 6, and 7 Select the correct answer.How many times a week is strength training recommended?A. 0B. 1C. 2-4D. 4-7 HELP ASAPMove symbols to the boxes to create three correct inequality statement What is the molar mass ofCH4?(C = 12.011 amu, H = 1.008 amu) Using the whole numbers 1 through 9, fill in the boxes so that 2 of the lines are parallel and the third line is a transversal is perpendicular to the parallel lines what position did the u.s. government take on the events of world war ii prior to the event shown in the photograph? Why is evidence-based management important? (5%) Students should : Explain the problems with making decisions based on common sense Comment on what is meant by evidence-based management Indicate why management decisions should be based on evidence Factor -22d^3+33d^2+ 33