what are the two major problems with the benchmark technique of measuring algorithm efficiency?

Answers

Answer 1

The two major problems with the benchmark technique of measuring algorithm efficiency are the dependency on specific hardware or software configurations and the lack of representation of real-world scenarios.

The benchmark technique for measuring algorithm efficiency can be problematic due to its reliance on specific hardware or software configurations. Different systems may have varying performance characteristics, making it challenging to compare algorithms accurately across different platforms. Additionally, the benchmark technique often fails to capture real-world scenarios and may not reflect the complexity and diversity of actual usage. This can lead to misleading results and inaccurate assessments of algorithm efficiency.

You can learn more about benchmark technique at

https://brainly.com/question/29589116

#SPJ11


Related Questions

Whats wrong with this code? in terms of indentation.

#Travies Robinson
#11/23/2020
#Coding Fundamentals : Coding Logic : 03.05 Python Project favorite video game response

def main():

answer = input("Would you like to take a one question survey? (yes or no)")


if(answer == "yes"):


favGame = input("What is your favorite video game?")


print("Your favorite video game is the " + favGame + " amazing i've never played that
before.")


answer = input("What your favorite part of " + favGame + "?")


print("Interesting mabye i should try " + favGame + "."")


Country = input("What country are you living in right now?")


print("You are currently living in " + Country + ".")


Age = input("How old are you?")


print("Your age is " + Age + ".")


print("Thank you for answering the survey and have a great day!")

else:

print("Good-bye")

main()

Answers

Answer:

(yes or no)") I do not really think this would work but I really didn't deal with this when i hack. That would need to be seperate from the question. Like for example Question = input("your question")

if Question == ("yes")

print ("well done")

elif Question == ("no")

print ("try again")

to add a report to a navigation form, change the report's display property to navigation. True or false

Answers

True. To add a report to a navigation form in Microsoft Access, create a subform that displays the report by adding a subform control to a new tab or category and selecting the report as the data source in the "Subform Wizard".

To add a report to a navigation form in Microsoft Access, you need to create a subform that displays the report. You cannot directly change the display property of a report to "navigation".

To create a subform for the report, first, open the navigation form in Design View. Then, add a new tab or category to the navigation form by right-clicking on the form and selecting "Add New Tab" or "Add New Category". After that, add a subform control to the new tab or category by selecting "Subform" from the "Controls" group in the "Design" tab of the ribbon. In the "Subform Wizard", select "Use existing Tables and Queries" and choose the report as the data source for the subform.

Once you've added the subform, you can set its properties, such as the layout and design, to display the report as desired.

learn more about Microsoft Access here:

https://brainly.com/question/31237339

#SPJ11

Which is a nonprofit organization with board members from both private and public sectors that maintains a large, searchable database of performance measures

Answers

The Balanced Scorecard Institute is a nonprofit organization that consists of board members from both the private and public sectors.

The organization is known for its work in performance management and maintains a comprehensive and searchable database of performance measures. This database serves as a valuable resource for organizations seeking to improve their performance measurement and management practices.

By providing access to a wide range of performance measures, the Balanced Scorecard Institute supports organizations in developing effective strategies, setting goals, and monitoring progress towards achieving desired outcomes. The institute's database facilitates evidence-based decision-making and helps organizations track their performance against key indicators.

You can learn more about Balanced Scorecard Institute at

https://brainly.com/question/19259487

#SPJ11

write a method named secondindexof that returns the index of the second occurrence of a particular value in an array of integers. if the value does not appear in the array at least twice, you should return -1. for example, if an array called list stores the following values: // index 0 1 2 3 4 5 6 7 8 9 10 int[] list

Answers

To write the method `secondindexof`, we need to iterate through the array and keep track of the occurrences of the target value.

Initialize a variable called `count` to keep track of the number of occurrences of the target value. Set it to 0.
Iterate through the array using a for loop.
Inside the loop, check if the current element is equal to the target value.
If it is, increment the `count` variable.
Check if the `count` variable is equal to 2.
If it is, return the current index as the second occurrence of the target value.
After the loop, if the `count` variable is less than 2, return -1 as the target value does not appear at least twice in the array.

Here's the code for the `secondindexof` method:

```
public static int secondindexof(int[] arr, int target) {
   int count = 0;
   for (int i = 0; i < arr.length; i++) {
       if (arr[i] == target) {
           count++;
           if (count == 2) {
               return i;
           }
       }
   }
   return -1;
}
```

In conclusion, the `secondindexof` method takes an array of integers and a target value as input. It returns the index of the second occurrence of the target value in the array. If the target value does not appear at least twice, it returns -1.

To learn more about array visit:

brainly.com/question/33609476

#SPJ11

When Britain forbade the sale of cotton to the Central Powers, how did it deal with U.S. cotton trading

Answers

Britain deal with U.S. cotton trading by  purchasing American cotton surplus.

Who were the Central Powers ?

The Central Powers can be referred to as the Central Empires, and they serves as the part of coalitions who fought World War I, they comprises German Empire, Austria-Hungary and others.

Britain Britain forbade the sale of cotton to the Central Powers, and that's why they do buy in surplus from United States.

Learn more about Central Powers,  at;

https://brainly.com/question/651584

model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

Answers

According to the social convoy theory of social relationships, people live their lives as part of a personal network of people to whom they provide support and from whom they receive it.

What is the meaning of social convoy?

The people that travel with us on the road of life are referred to as the social convoy. At every stage of development, this social grouping is a crucial component of successful adjustment and wellbeing.

As one matures and develops, they rely on these interactions and connections because all are social beings. Social convoy is a network of friends that travel through life with us and support us through both good and difficult times.

Learn more about social convoy from here:

https://brainly.com/question/7318152

#SPJ1

The complete question has been attached in text form:

In the social ______ model of social relations, individuals go through life embedded in a personal network of individuals to whom they give and from whom they receive social support.

Identify these devices based on whether they provide the user with input or output, or both.
Monitor
Projector
Touchscreen
Mouse
Keyboard

Answers

Answer:

Monitor - Output

Projector - Output

Touchscreen - Both

Mouse - Input

Keyboard - Input

Explanation:

How can I watch you-tube on my school computer without it being blocked on the computer when it uses Lightspeed Systems Relay or do you know any playback sites that aren't blocked ?

Answers

Answer:

if u use chrome u can probably look on chrome extensions and search you-tube unblocker and add it to ur chrome

What it takes to be a Graphic Designer and your interest
Do you plan to pursue or get certified?
150 words

Answers

Answer:

There are a few key steps to starting a career in graphic design: learn the principles of design, enroll in a graphic design course, practice graphic design tools, work on projects, and build your portfolio. … You will also need to master common graphic design tools, such as Photoshop, Illustrator and InDesign.

This portion of the question is up to you not me "Do you plan to pursue or get certified?"

Give two reasons why network security is the most important issue regarding data centers.

Answers

Answer:  To Ensure Client Data Security Why is network security important? ...

2. To Improve Network Performance Improve network performance is another reason why network safety is important. ...

Explanation:

In Java:

Assume the availability of an existing class, ICalculator, that models an integer arithmetic calculator and contains:

a private instance variable currentValue that stores the current int value of the calculator
a getter method for the above instance variable
methods add, sub, mul, and div
Each method in ICalculator receives an int argument and applies its operation to currentValueand returns the new value of currentValue. So, if currentValue has the value 8 and sub(6) is invoked then currentValue ends up with the value 2, and 2 is returned.

Write a public subclass, ICalculator1, based on ICalculator. The class ICalculator1 has one additional method, sign, that receives no arguments, and doesn't modify currentValue. Instead, it simply returns 1, 0 or -1 depending on whether currentValue is positive, zero, or negative respectively.

Answers

Answer:

A subclass?

Explanation:

A public subclass for ICalculator1 has one additional method, sign, that receives no arguments, and doesn't modify current Value. Instead, it simply returns 1, 0 or -1 depending on whether current Value is positive, zero, or negative respectively.

What is public subclass?

A member's access is declared to be public with the Java keyword public. All other classes can see members of the public class. This implies that a public field or method can be accessed by any other class. In addition, public fields can be changed by other public subclass or classes unless they are marked as final.

Further a subclass is defined as a class that is descended from another class (also a derived class, extended class, or child class). A superclass is the class from which a subclass is descended (also a base class or a parent class).

A public subclass for ICalculator1 has one additional method, sign, that receives no arguments, and doesn't modify current Value:

In Java,

public class ICalculator1 extends ICalculator {

public int sign() {

if (getCurrentValue() > 0)

return 1;

else if (getCurrentValue() == 0)

return 0;

else

return -1;

}

}

Therefore  the availability of an existing class, I-Calculator, that models an integer arithmetic calculator, above public subclass has been made.

Learn more about public subclass:

https://brainly.com/question/15992142

#SPJ12

Spend some time exploring the components inside of a computer by performing online research into the topic. You can begin with this link, What does the inside of a computer look like?, and then continue to explore other websites of your own finding to answer the questions below, if needed.
How do you think the computer components would change if you were looking at a tablet computer or a smartphone?
What is one major component that would not be found in a tablet or phone, and how has modern computing made that component less important?
What component is in a tablet or phone that wouldn’t have been in a desktop (remember, you can search online for ideas)?

Answers

Answer:

1.         Chassis (case)

Data cable: (IDE, SATA)

Disc drive: CD-ROM, CD-RW, DVD-ROM, or Blu-ray.

Expansion card (ISA, PCI, AGP, and PCI Express).

Fan (Heat sink)

Floppy drive

Hard drive: HDD, SSD

Memory (RAM)

Motherboard

Power cable (Molex)

Power supply (PSU)

Processor (CPU)

The expansion cards are often devices such as your video card, sound card, network card, etc.

It is common for a computer today to have these components built into the motherboard, also referred to as integrated components.

Network card

Sound card

Video card

What parts are needed for a computer to work?

CPU (processor)

Memory (RAM)

Motherboard

Storage device (e.g., hard drive)

2.         Smartphones and tablets have less storage capacity than a computer, and their components cannot be modified like a desktop computer's can. Desktop and laptop computers can run more powerful software than a smartphone or tablet due to their size, components, and less restrictive power requirements.

3. A hard drive

Since tablets and phones are compact, they are better off not having a big, giant, bulky storage device like hard drives. Modern computing made hard drives less important by developing Solid-State Drives (SSDs) and extremely dense (512 bit) storage that can provide the same if not more storage than a traditional hard drive at the fraction of the size.

4.  Since tablets and phones are mobile devices, they would be outfitted with a GPS (Global Positioning System) so that location services would work with them. Desktops do not usually have GPS components.

Explanation:                            / \

I already explained up above. |

The parts that are needed for a computer to work are:

CPU (processor)Memory (RAM)MotherboardStorage device (e.g., hard drive)

What is a computer?

A computer is an electronic device for storing and processing data according to instructions given to it in a variable program.

It is common for a computer today to have these components built into the motherboard, also referred to as integrated components.

Desktop and laptops can run more powerful software than a smartphone due to their size, components, and less restrictive power requirements.

Learn more about computer on:

https://brainly.com/question/24540334

#SPJ2

Java allows you to create objects of the ________ class in the same way you would create primitive variables.

Answers

Java allows you to create objects of the predefined classes, such as String, Integer, Boolean, etc., in the same way you would create primitive variables.

In Java, you can create objects of predefined classes using the same syntax as creating primitive variables. To create an object, follow these steps: Declare a variable of the class type using the class name as the data type.

Initialize the object by using the new keyword followed by the class name and parentheses. This invokes the constructor of the class to create a new object.

Optionally, you can pass arguments to the constructor to initialize the object with specific values.

By following these steps, you can create objects of predefined classes in Java, allowing you to work with more complex data types beyond primitive variables.

Learn more about Java here: brainly.com/question/31561197

#SPJ11

write the steps to open an existing file in MS Word.​

Answers

Explanation:

Choose Open from the File menu. The Open a File dialog box lists files and folders in your current folder. ...

Select the name of the document you want to open, or type the document name in the Enter file name field.

Press Return or click OK.

Answer:

Go to FILE, then OPEn and go through folders to find your file that you saved, then click on it and open it. I will add in images as well.

Please mark as brainliest, thank you!

Explanation:

write the steps to open an existing file in MS Word.
write the steps to open an existing file in MS Word.
write the steps to open an existing file in MS Word.
write the steps to open an existing file in MS Word.

the transmission protocol between a computer and its peripheral devices is handled by a

Answers

Answer:

Transmission Control Protocol (TCP)

Explanation:

The Transmission Control Protocol (TCP) is a transport protocol that is used on top of IP to ensure reliable transmission of packets. TCP includes mechanisms to solve many of the problems that arise from packet-based messaging, such as lost packets, out of order packets, duplicate packets, and corrupted packets.

In which disclosure paradigm will disclosure potentially provide little advantage to either the attacker or defender?

Answers

The military is a setting where the disclosure paradigm may offer minimal benefit to either the attacker or the defender.

According to the "disclosure paradigm," the more information a corporation provides about its operations, the better off we are.

The act of disclosure is the public disclosure of facts or information. What is meant by adequate disclosure for firms is making the relevant information public to customers, investors, and everyone else involved in the company's operation.

The public's crisis of confidence in the business sector is centered on disclosures. They ought to be seen as a crucial and educational component of doing business with or investing in a firm.

Learn more about disclosure paradigm https://brainly.com/question/28139061?

#SPJ4

Tim has several workbooks open in the Excel application. He would like to view them all at the same time, so he should use the ______ command.

Answers

Answer:

Arrange All

Explanation:

For him to to view them all at the same time, so he should use the Arrange All

command. To do this, you will need to

Open the workbooks that is needed to arrange, in this case at least two workbooks are to be opened, then make selection of the worksheet in each workbook that is needed to be displayed, then on the view tab, you can make selection of "Arrange All button" in the Window.

Mỗi tháng, con vịt nhà em đẻ được khoảng từ 30 trứng đến 50 trứng tùy phong độ. Giá bán mỗi trứng là 2000Đ/ 1 quả. Viết chương trình nhập vào số trứng mà vịt nhà em đẻ trong 1 tháng bất kỳ, tính và in ra màn hình số tiền thu được khi bán trứng

Answers

Answer:

có con cặc

Explanation:

Which statement about programming languages is true?

1) Lisp was designed for artificial intelligence research.
2) BASIC was the first high-level programming language.
3) FORTRAN was an early programming language designed for business use.
4) Pascal was the first programming language for personal computers.

Answers

Answer:

2

Explanation:

plz make me brainliest

Option A: Lisp was designed for artificial intelligence research.

The acronym Lisp stands for List Programming is a computer programming language developed about 1960 by John McCarthy.Lisp is the second-oldest high-level programming language which has a widespread use today.LISP has a very simple syntax in which a parenthesized list is used to give operations and their operands.This Language was designed for manipulating data strings with convenience.Lisp includes all the working as the function of any object.Lisp uses symbolic functions which are easy to use with AI applications.Originally Lisp was created as a practical mathematical notation used in computer programs.Lisp pioneered many revolutions in the field of computer science such as tree data structures, automatic storage management etc.

A(n) ____________________ is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.

Answers

Answer: "Scanner"

Explanation: brainliest please

What tool can administrators use to help identify the systems present on a network prior too conducting vulnerability scans?

Answers

One tool that administrators can use to help identify the systems present on a network prior to conducting vulnerability scans is a network mapping tool. This tool can be used to discover all the devices connected to the network and their respective IP addresses.

Network mapping tools use a variety of techniques, such as ping sweeps, port scans, and SNMP queries, to gather information about the devices on the network. Once the administrator has a complete picture of the devices on the network, they can then conduct vulnerability scans to identify any weaknesses or vulnerabilities that may exist.

Network mapping tools are particularly useful for large, complex networks where manual discovery of devices can be time-consuming and error prone. By using a network mapping tool, administrators can more efficiently and accurately identify all the systems present on the network, allowing for more effective vulnerability scanning and management.

To learn more about, vulnerability

https://brainly.com/question/30666139

#SPJ11

you have created a self-signed certificate and want it to be trusted by all devices in a domain. what should you do?

Answers

Since you have created a self-signed certificate and want it to be trusted by all devices in a domain, the thing that you should do is to Export the certificate to the place of domain controller.

How do I export a certificate for a domain controller?

Follow these procedures to export the root CA certificate for remote authentications from the Domain Controller:

Open certlm by choosing Start > Run.Go to Personal > Certificates under Certificates (Local Computer).Search for the SSL certificate.Click Open with the right mouse click of the SSL certificate.

Note that Authentication and security are the focus of the SSL/TLS protocol. Data communications across open networks can be encrypted with this technology, protecting against alteration and interception by malicious parties.

Additionally, the use of SSL certificates establishes trust by authenticating communicating parties. In the digital world, security and authentication are the cornerstones of prosperous businesses.

Learn more about domain controller from

https://brainly.com/question/25664001
#SPJ1

Which statement describes the word "iterative"?
a) Working in cycles where everyone
is involved in making new
versions of the application each
time, then picking the best one at
the end.
b)Working in cycles and building on
previous versions to build an
application through a process of
prototyping, testing, analyzing
and refining.
c)Working in a way to make sure
that the product is perfect the first
time.
d)Working as a team to correct
mistakes that have been made.

Answers

Answer:

a) Working in cycles where everyone

is involved in making new

versions of the application each

time, then picking the best one at

the end.

Explanation:

The statement that best describes the word "iterative" is as follows:

Working in cycles where everyone is involved in making new versions of the application each time, then picking the best one at the end.

Thus, the correct option for this question is A.

What is Iterative?

Iterative may be defined as a verb or verb form that significantly indicates that an action is frequently repeated. Also called frequentative, habitual verb, and iterative activity.

In literature, the poet repeats a word or a phrase at the same point within each stanza (meaning that the iteration is part of the verse form rather than incidental repetition), and this repetition of the same word or phrase produces a point of linkage within the stanza.

But in repetition, the sense is different. So, working in a cycle where everyone is involved in making new versions of the application each time, then picking the best one at the end is the statement that best describes the word iterative.

Therefore, the correct option for this question is A.

To learn more about Iterative, refer to the link:

https://brainly.com/question/26995556

#SPJ2

error statuslogger log4j2 could not find a logging implementation. please add log4j-core to the classpath. using simplelogger to log to the console...

Answers

To resolve the issue, log4j-core needs to be added to the classpath. Once the library has been added, Log4j2 will be able to find its logging implementation, and the logging will be configured properly.

What is Classpath ?

Log4j2 is an open source logging system for Java applications. It is a successor to Log4j 1.x and provides improved performance and reliability. In order to use Log4j2, it needs to be configured properly.

When Log4j2 is not configured properly, it will display the error message "error statuslogger log4j2 could not find a logging implementation. please add log4j-core to the classpath. using simplelogger to log to the console...". This error occurs when Log4j2 cannot find its logging implementation. This means that the necessary libraries, such as log4j-core, have not been added to the classpath.

To learn more about  Classpath

https://brainly.com/question/21842233

#SPJ1

The Fed: decreases the money supply when the economy contracts. performs banking services for commercial banks in districts where it operates. calculates the expected expenditure for the federal government every year. outlines expected revenue that is due from the collection of taxes and fees.

Answers

Answer:

performs banking services for commercial banks in districts where it operates.

Explanation:

The Federal Reserve System ( popularly referred to as the 'Fed') was created by the Federal Reserve Act, passed by the U.S Congress on the 23rd of December, 1913. The Fed began operations in 1914 and just like all central banks, the Federal Reserve is a United States government agency.

Generally, it comprises of twelve (12) Federal Reserve Bank regionally across the United States of America.

Hence, the Fed performs banking services for commercial banks in districts where it operates, as well as providing services to the general public.

In a function name, what should you use between words instead of whitespaces?
A. The asterisk symbol *
B. The octothorp symbol #
C. The underscore symbol
D. The quotation mark symbol"
Please select the best answer from the choices provided

Answers

Answer:

The underscore symbol

Explanation:

Because underscore symbol is allowed in naming rules

Fill in the blanks to complete the “divisible” function. This function should count the number of values from 0 to the “max” parameter that are evenly divisible (no remainder) by the “divisor” parameter. Complete the code so that a function call like “divisible(100,10)” will return the number “10”.



def divisible(max, divisor):
___ # Initialize an incremental variable
for ___ # Complete the for loop
if x % divisor == 0:
___ # Increment the appropriate variable
return count

print(divisible(100, 10)) # Should be 10
print(divisible(10, 3)) # Should be 4
print(divisible(144, 17)) # Should be 9

Answers

Here's the completed code for the "divisible" function:

def divisible(max, divisor):

   count = 0 # Initialize an incremental variable

   for x in range(max+1): # Complete the for loop

       if x % divisor == 0:

           count += 1 # Increment the appropriate variable

   return count

print(divisible(100, 10)) # Should be 10

print(divisible(10, 3)) # Should be 3

print(divisible(144, 17)) # Should be 9

In this code, we initialize a variable called count to 0, which will keep track of the number of values that are divisible by the divisor. We then use a for loop to iterate over all values from 0 to max. For each value, we check if it is divisible by divisor using the modulo operator (%). If it is, we increment the count variable by 1. Finally, we return the value of count.

If my answer helped you, please consider rating it 5 stars or marking me as Brainliest answer.

If you would like me to answer more questions, feel free to message me!

Best of luck in your studies going forward,

RobertOnBrainly.

Here's the completed code for the "divisible" function:

def divisible(max, divisor):

count = 0 # Initialize an incremental variable

for x in range(max+1): # Complete the for loop

if x % divisor == 0:

count += 1 # Increment the appropriate variable

return count

print(divisible(100, 10)) # Should be 10

print(divisible(10, 3)) # Should be 3

print(divisible(144, 17)) # Should be 9

In this code, we initialize a variable called count to 0, which will keep track of the number of values that are divisible by the divisor. We then use a for loop to iterate over all values from 0 to max. For each value, we check if it is divisible by print divisor using the modulo operator (%). If it is, we increment the count variable by 1. Finally, we return the value of count.

Learn more about variable on:

https://brainly.com/question/17344045

#SPJ2

You are one of the IT administrators for your company. Your coworker says that when she boots her computer it displays a message saying that one of her programs had an error while loading and is not working.

To fix this issue, you would like to see if Windows can provide a log file that may give you a hint to what is failing at boot time

What Microsoft tool/console would most likely give you the ability to create such a log file?

Answers

Answer:

MSConfig

Explanation:

It's meant to troubleshoot programs having issues when starting up.

MSConfig is the Microsoft tool/console would most likely give you the ability to create such a log file.

What is IT administrators?

An IT administrator, often known as a system administrator, is in responsible of setting up and ensuring the reliable operation of client computer systems, servers, and data security measures. The organization's internal IT structure is constantly kept up to date by the administrator.

The duties involved in managing or putting together a business or other organization: My top salesmen shouldn't be wasting their entire day on office work.

Given the amount of schooling required, systems administrators have a better earning potential than other IT fields. The demand for systems administration jobs is expected to rise by 36% over the next ten years.

Thus, it is MSConfig.

For more information about IT administrators, click here:

https://brainly.com/question/29230350

#SPJ2

In the report, you need to include the following section:
Introduction: You should start by discussing projectile motion in general by outlining the physics behind it. Moreover, you should discuss what momentum principle means and how does it relate to the iterative method.
Tracker part: You need to describe what you did in the tracker file. Detailing the steps that you did. Furthermore, you should put forth the results of the tracking. The results are interesting graphs such as time versus the displacement in the x-direction, time versus the displacement in the y-direction, and so on. The other type of results are interesting quantities such as the range, time of flight, and maximum height.
VPython part: You need to describe the code, and what it does. Moreover, you need to provide the results of the code such as the graphs and the errors.
Analysis: You need to explain the reasons behind the errors. Consider the many different types of errors that resulted in the findings you found in your code.
Conclusion: In this section, you will summarize all the report and discuss further directions.

Answers

In this section, the entire report should be summarized, and further directions should be discussed. In the analysis section, the reasons behind the errors should be explained. Consideration should be given to the many different types of errors that resulted in the findings.

The report on the projectile motion should include the following sections:

Introduction: The report should start by discussing projectile motion in general by outlining the physics behind it. Furthermore, the report should discuss what the momentum principle means and how it relates to the iterative method.

Tracker part: The tracker file should be described, detailing the steps that were taken. Additionally, the results of the tracking should be put forth, including interesting graphs such as time versus the displacement in the x-direction, time versus the displacement in the y-direction, and so on. The other type of results to be included are interesting quantities such as the range, time of flight, and maximum height.

VPython part: The code should be described, and what it does should be explained. Additionally, the report should provide the results of the code such as the graphs and the errors.

Analysis: In this section, the reasons behind the errors should be explained. Many different types of errors that resulted in the findings should be considered.

Conclusion: In this section, the entire report should be summarized, and further directions should be discussed. In the analysis section, the reasons behind the errors should be explained. Consideration should be given to the many different types of errors that resulted in the findings.

To know more about Consideration visit:

https://brainly.com/question/30759148

#SPJ11

how come when i go to get a answer and watch a video, it never shows me a video and it just sits there and it wont answer any question

Answers

What you mean? Explain.
Other Questions
Anotha one, irrelevant answers will be deleted! Thank you so much!! Listed below are the key features of the Indian Constitution. Write two sentences, in your ownwords, on why you think this feature is important:i. Federalismii. Separation of Powersiii. Parliamentary Form of Government How did increased wealth influence ancient civilizations?A.Wealth inspired artistic traditions of ancient civilizations.B.Wealth determined the religious beliefs of ancient civilizations.C.Wealth demonstrated the cultural values of ancient civilizations.D.Wealth changed the amount of power held by ancient civilizationsPlease help me timed test. Which of the following appear in the diagram below?Check all that apply.zA. YXB. ZXYZC. ZYXZD. YW There are different models that business organizations can select to organize their operations, and market their products or services.Question: discuss the existing debate about the best way to run a commercial business (family firms VS. corporations) The figure below shows two half-circles at the ends of a rectangle with the dimension shown.Which is closest to the area of the figure in square inches?A. 75B.95C.106D.154 Find the equation of an ellipse satisfying the given conditions. Foci: (-2,0) and (2, 0); length of major axis: 12 Write an equation for the hyperbola with center at (3. - 6), focus at (6-6), and vertex at (5.-6). An equation for the hyperbola is (Simplify your answer. Type your answer in standard form. Use integers or fractions for any numbers in the Please help!! ; Evaluate the expression.6 3A. -2B. -3C. 3D. 2 Which of the following foods is frequently a source of food-borne pathogens? A. Commercially-canned baked beans B. Dried apricots C. Peanut butter and jelly sandwich D. Egg salad NEED ANSWER ASAP!!!!! Find, to the nearest tenth, the area of the region that is inside the square and outside the circle. The circle has a diameter of 6 inches. Read this excerpt about the king's action from the deceleration of independence. I you have a friend and he/she is not talking to you anymore. Type here and I hope you luck to fix your friendship! smaller fraction between 6/13 9/13 A cab company charges $3.10 flat rate in addition to $0.85 per mile. Rex has no more than $15 to spend on a ride. Write an inequality that represents Rex's situation. How many miles can Rex travel without exceeding his limit? Round off your answer to nearest tenth. Mr. Edwards buys a 4 pound bag of fertilizer for his garden. Each week he uses pound to help his vegetables grow. How many weeks will the 4 pound bag last?A) 5 weeksB) 6 weeksQ8 weeksD) 10 weeks A student wrote three papers in mathematics examination marks for two papers we're 77and 72 respectively.to obtain grade A, an average of not less than 75marks is required for the three papers when recording a single journal entry, which of the following statements apply? (select all that apply) group of answer choices the sum of debits can differ from the sum of credits cash must always be a debit since it carries a normal debit balance typically credit lines are indented debits are recorded before credits A popular type of music radio program in the late 1920s wasA. The Nashville jubilee B. The honky-think singalongC. The opera showD. The barn dance show George Wilson owns a garage.O TrueO False Provide three common attacks for TCP and IP level? Among three, which one you believe is the most damaging? Include additional sources to support your answer.