Answers

Answer 1

Answer:

a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols

Explanation:

Answer 2

Explanation:

Hey there!

The internet is the largest computer networks which connects billions of computers around the world.

Hope it helps...


Related Questions

A man is charged a fee by the city for having numerous broken cars and auto parts in his front yard. Which of the following correctly describes why the city punishes him? He has committed a crime. He is in violation of a city statute. He has violated an amendment of the U.S. Constitution. A judge has decided that he is in violation of civil law.

Answers

Answer:

Violation of city Statute

         

Answer:

B

Explanation:

Pennies for Pay Design and write a python program to pass Lab 4-7 with the following modifications: 1.use an outer loop to keep the program running until zero (0) day for the payroll calculation be entered 2.use an inner loop to calculate and print the daily and total payroll

Pennies for Pay Design and write a python program to pass Lab 4-7 with the following modifications: 1.use

Answers

Answer:

Here you go, change it however you'd like :)

Explanation:

(A nested loop was not needed to fulfill this task)

usr = int(input("How many days would you like to calculate: "))

pen = 0.01

for n in range(1, usr + 1):

   print(f"Day: {n} | Amount: ${pen}")

   pen += pen

which of the following reduces time and energy if equipment is needed in an upper level of a building? group of answer choices firefighters hoisting equipment by crane firefighters carrying equipment by hand firefighters delivering equipment by aerial device firefighters delivering equipment by ground ladders

Answers

Firefighters delivering equipment by aerial device reduces time and energy if equipment is needed in an upper level of a building.

Aerial devices, such as aerial ladders or aerial platforms, are used by firefighters to reach upper levels of a building. These devices have the ability to extend to a high level and have a platform for the firefighters to stand on, which eliminates the need for them to carry equipment up multiple flights of stairs.

Firefighters hoisting equipment by crane is also a good option, but it depends on the availability of cranes and the accessibility to the building.

Firefighters carrying equipment by hand is not an efficient option as it requires a lot of energy and time, especially if the equipment is heavy and if the building is very tall.

Firefighters delivering equipment by ground ladders is also not an efficient option because it only allows to reach a limited height and it's not as safe as using an aerial device.

Using an aerial device to deliver equipment to an upper level of a building is the most efficient and safe option as it reduces time and energy required for the firefighters.

Learn more about Firefighters here:

https://brainly.com/question/28283820

#SPJ4

whats your favourite dramas , suggest me some ...........​

Answers

Grownish, vampire diaries, inventing Anna

It specifies the amount of memory needed to store data.

Answers

magbigay ng limang magandang lugar na tinatawag na tourist spot sa iyo sa inyong lugar o probinsya

Answer: Is it RAM? Random Access Memory

Explanation: Ram is used to reading/writing data. It might control the amount of memory that is stored.

Yazmin is reading a book that has 74 pages. She has read 38 pages. How many more pages does she need to read to finish the book​

Answers

Answer:

36 book

im sure it is correct

Answer:

36 boy

Explanation:

74-38

Huy is in need of buying a laptop in the form of installment payment. An employee of XXX company told Huy that he only needed to pay N VND in advance, and M VND every month for the next T months to be able to buy a machine at a low interest rate.

For example, the store gives, Laptop costs 20 million, Huy can pay 5 million in advance, and choose to pay 2 million monthly for the next 8 months. The total amount Huy has to pay is 21 million. The store clerk claims that such an interest rate is only 5% for 8 months.

Huy learned how to calculate the real interest rate on this form of installment payment in Mr. Vu's class. Huy knows that if the nth month, the remaining debt is X, then the (n+1) month of the debt will be X * r – G. Where r is the monthly interest rate, and G is the monthly payment.

Please help Huy write a program to calculate the real interest rate of this form of purchase.

Input

The first line contains the number V, the actual value of the product, and T is the number of months in installments.

The second line contains N and M.

(1 V, N, M 109, 1 T ≤ 60)

Output

Output the interest rate to 10-6 . accuracy

Sample

Input Output

2000000 8 0.0145690

5000000 2000000

Answers

A program to help Huy calculate the real interest rate of the installment payment can be done using Python. The Python code to be used to implement the program is given below.

To help Huy calculate the real interest rate of the installment payment, we need to first understand the formula provided by Mr. Vu.

The formula states that the remaining debt in the (n+1) month will be X*r - G, where X is the remaining debt in the nth month, r is the monthly interest rate, and G is the monthly payment.

Using this formula, we can create a program in Python to calculate the real interest rate of the installment payment.

First, we need to take in the input values of the actual value of the product (V), the number of months in installments (T), the initial payment (N), and the monthly payment (M). We can then calculate the remaining debt for each month using the formula provided.

Next, we need to find the monthly interest rate (r) that makes the remaining debt equal to zero in the final month. We can use a loop to iterate through different values of r until we find one that satisfies this condition.

Once we have found the correct value of r, we can calculate the annual interest rate by multiplying r by 12.

Here is the Python code to implement this program:
V, T = map(int, input().split())
N, M = map(int, input().split())

remaining_debt = [V - N]
for i in range(T-1):
   X = remaining_debt[-1]
   G = M
   remaining_debt.append(X * r - G)

low, high = 0, 1
while abs(high-low) > 1e-7:
   mid = (low + high) / 2
   r = mid / 12
   X = remaining_debt[-1]
   for i in range(T-1):
       G = M
       X = X * r - G
   if X < 0:
       high = mid
   else:
       low = mid

print("{:.6f}".format(r * 12))

In this code, we first calculate the remaining debt for each month using a list called remaining_debt. We then use a binary search algorithm to find the correct value of r that makes the remaining debt equal to zero in the final month. The final answer is then printed out with a precision of 6 decimal places.

In conclusion, the program provided above can help Huy calculate the real interest rate of the installment payment with the given input values.

This program can be used for any similar situation where a loan or payment is made in installments with a fixed interest rate.

For more question on "Python Code" :

https://brainly.com/question/29994366

#SPJ11

Which statement is true about computer security?

1.Computer security is the job of specialized security engineers.

2. Computer security is only necessary for governments and big businesses.

3.Computer security is everyone's responsibility.

4.Computer security does not affect the gaming industry.

Answers

Answer:

Computer security is everyone's responsibility.

Hope this helps! ^-^

-Isa

4 types of system software

Answers

Operating systems.
Device drivers.
Middleware.
Utility software.

4 types of system software: Operating Systems (OS), Device Drivers, Utilities, and Language Translators.

1. Operating Systems (OS): Operating systems are the core system software that manages computer hardware and software resources.

They provide an interface for users to interact with the computer and facilitate the execution of applications.

2. Device Drivers: Device drivers are software components that enable communication between the operating system and hardware devices like printers, graphics cards, and network adapters.

3. Utilities: System utilities perform various maintenance tasks, such as disk defragmentation, file management, backup, and system optimization.

4. Language Translators: These tools, including compilers and interpreters, translate high-level programming languages into machine code that the computer can execute.

Know more about system software:

https://brainly.com/question/30166062

#SPJ5

Explain with examples:
What are the reasons of a successful and unsuccessful software project?

Answers

Answer:

A good starting point is by addressing some of the key reasons software projects fail.

Explanation:

Not Enough Time. ...

Insufficient Budget. ...

Poor Communication. ...

Never Reviewing Project Progress. ...

Inadequate Testing. ...

Testing in the Production Environment. ...

Lack of Quality Assurance. ...

Not Conforming to Industry Standards.

User involvement, management support, reasonable requirements, and accurate projections are some of the most frequent aspects that contribute to software project success.

What is a software project?

A software project is the entire process of developing software, from gathering requirements to testing and maintenance, carried out in accordance with execution techniques over a predetermined amount of time to produce the desired software output.

Some of the most frequent factors that influence the success of software projects are user interaction, management support, fair needs, and realistic estimates.

Application bug or error, environmental conditions, infrastructure or software failure, virus, hacker, network/hardware failure, and operator error are the main causes of software project failure.

According to the study, project success and failure are most heavily influenced by the degree of customer/user interaction, software process management, and estimation and timeline.

Thus, these are the reasons of a successful and unsuccessful software project.

For more details regarding software project, visit:

https://brainly.com/question/3818302

#SPJ2

.True or false pivot chart can be moved to another sheet.

Answers

Answer:

true

Explanation:

because it can go in another sheet if you print it or draw it make me brainliest

What are some examples of what can be changed through options available on the mini toolbar

Answers

Answer:

Italic, underline, indent size, font, font size, format paint, text highlight colors, and font color.

Explanation:

The Mini Toolbar refers a stripped down version of the Font group that is on the Home tab in Microsoft Office.

The Mini Toolbar assist in easily formatting text while a different section of the ribbon is being used without the need to go back to the home tab.

Some examples of what can be changed through options available on the mini toolbar the italic, underline, indent size, font, font size, format paint, text highlight colors, and font color.


Help Menu is available at which button in the keyboard?

Answers

Answer: It should be F1.

what are business rules​

Answers

Answer:

defines or constrains some aspect of business and always resolves to either true or false. It specifically involves terms, facts and rules

Explanation:

Question 3 3.1 Describe the TWO main elements of a CPU 3.2 Describe the fetch/execute cycle 3.3 Convert the binary number 00000011 to a decimal ​

Answers

Answer:

Here are the answers to the questions:

3.1 The two main elements of a CPU are:

The Control Unit (CU): The CU controls and coordinates the operations of the CPU. It is responsible for interpreting instructions and sequencing them for execution.

The Arithmetic Logic Unit (ALU): The ALU executes arithmetic and logical operations like addition, subtraction, AND, OR, etc. It contains registers that hold operands and results.

3.2 The fetch/execute cycle refers to the cycle of events where the CPU fetches instructions from memory, decodes them, and then executes them. The steps in the cycle are:

Fetch: The next instruction is fetched from memory.

Decode: The instruction is decoded to determine what it is asking the CPU to do.

Execute: The CPU executes the instruction. This could involve accessing data, performing calculations, storing results, etc.

Go back to Fetch: The cycle continues as the next instruction is fetched.

3.3 The binary number 00000011 is equal to the decimal number 3.

Binary: 00000011

Decimal: 1 + 2 = 3

So the conversion of the binary number 00000011 to decimal is 3.

Explanation:

In JAVA with comments: Consider an array of integers. Write the pseudocode for either the selection sort, insertion sort, or bubble sort algorithm. Include loop invariants in your pseudocode.

Answers

Here's a Java pseudocode implementation of the selection sort algorithm with comments and loop invariants:

```java

// Selection Sort Algorithm

public void selectionSort(int[] arr) {

   int n = arr.length;

   for (int i = 0; i < n - 1; i++) {

       int minIndex = i;

       // Loop invariant: arr[minIndex] is the minimum element in arr[i..n-1]

       for (int j = i + 1; j < n; j++) {

           if (arr[j] < arr[minIndex]) {

               minIndex = j;

           }

       }

       // Swap the minimum element with the first element

       int temp = arr[minIndex];

       arr[minIndex] = arr[i];

       arr[i] = temp;

   }

}

```The selection sort algorithm repeatedly selects the minimum element from the unsorted part of the array and swaps it with the first element of the unsorted part.

The outer loop (line 6) iterates from the first element to the second-to-last element, while the inner loop (line 9) searches for the minimum element.

The loop invariant in line 10 states that `arr[minIndex]` is always the minimum element in the unsorted part of the array. After each iteration of the outer loop, the invariant is maintained.

The swap operation in lines 14-16 exchanges the minimum element with the first element of the unsorted part, effectively expanding the sorted portion of the array.

This process continues until the entire array is sorted.

Remember, this pseudocode can be directly translated into Java code, replacing the comments with the appropriate syntax.

For more such questions on pseudocode,click on

https://brainly.com/question/24953880

#SPJ8

i need help with python

Answers

Answer:

I will help You

Explanation:

What styles can the calendar be printed in? Check all that apply.

Quick
Daily style
Weekly Agenda style
Weekly Calendar style
Monthly Agenda style
Monthly style
Bifold style
Trifold style

Answers

Please Help! Unit 6: Lesson 1 - Coding Activity 2
Instructions: Hemachandra numbers (more commonly known as Fibonacci numbers) are found by starting with two numbers then finding the next number by adding the previous two numbers together. The most common starting numbers are 0 and 1 giving the numbers 0, 1, 1, 2, 3, 5...
The main method from this class contains code which is intended to fill an array of length 10 with these Hemachandra numbers, then print the value of the number in the array at the index entered by the user. For example if the user inputs 3 then the program should output 2, while if the user inputs 6 then the program should output 8. Debug this code so it works as intended.

The Code Given:

import java.util.Scanner;

public class U6_L1_Activity_Two{
public static void main(String[] args){
int[h] = new int[10];
0 = h[0];
1 = h[1];
h[2] = h[0] + h[1];
h[3] = h[1] + h[2];
h[4] = h[2] + h[3];
h[5] = h[3] + h[4];
h[6] = h[4] + h[5];
h[7] = h[5] + h[6];
h[8] = h[6] + h[7]
h[9] = h[7] + h[8];
h[10] = h[8] + h[9];
Scanner scan = new Scanner(System.in);
int i = scan.nextInt();
if (i >= 0 && i < 10)
System.out.println(h(i));
}
}

Answer:

Daily style

Weekly Agenda style

Weekly Calendar style

Monthly style

Trifold style

or

B, C, D, F, H

You have just received a frantic call from a customer. She informs you that after turning her computer on, she received the following error: The SMART hard disk check has detected an imminent failure.Which of the following is the best first step to take?- Back up all important data and files- Run a reliable defragmentation tool- Run a hard drive test to verify the condition of the hard disk. It may be a false error- Correct the bad areas on the drive using chkdsk

Answers

The best first step to take is to back up all important data and files. This should be done immediately, as it may be the only way to protect the customer’s data from being lost if the hard disk fails.

What is data?

Data is an umbrella term used to describe information that has been collected and stored, either electronically or physically. Data can take many forms, such as numbers, words, images, video, and audio recordings. Data can come from many sources, both digital and physical, including sensors, surveys, interviews, photos, and more.

After the data is backed up, the customer should then run a reliable defragmentation tool to make sure the data is properly organized on the hard drive. Once this is done, the customer should then run a hard drive test to verify the condition of the hard disk and to see if the error is indeed legitimate. If the error is legitimate, then the customer can use chkdsk to correct any bad areas on the drive.

To learn more about data
https://brainly.com/question/28140546
#SPJ4

3.
State and explain any Three elements of control unit​

Answers

Answer:

There are two types of control units: Hardwired control unit and Microprogrammable control unit.

Explanation:

The components of this unit are instruction registers, control signals within the CPU, control signals to/from the bus, control bus, input flags, and clock signals.

Answer:

The control unit (CU) is a component of a computer's central processing unit (CPU) that directs the operation of the processor. It tells the computer's memory, arithmetic and logic unit and input and output devices how to respond to the instructions that have been sent to the processor.

The three elements of a control unit are :

Memory or Storage Unit.a control unit.ALU(Arithmetic Logic Unit)

Explanation:

Mark brainliest.

Consider a DMA module that is transferring characters (as bytes), one at a time, to main memory from some I/O device connected directly to the DMA device. Suppose that I/O device transfers bit-by-bit at a rate of 19200 bits per second. Suppose the CPU can fetch 1 million instructions per second (with constant use of the system bus and main memory). How much will the processor be slowed down due to the DMA activity

Answers

We have that the Processor speed reducing  will be  is mathematically given as

S=0.24 %.

From the question we are told

Consider a DMA module that is transferring characters (as bytes), one at a time, to main memory from some I/O device connected directly to the DMA device. Suppose that I/O device transfers bit-by-bit at a rate of 19200 bits per second. Suppose the CPU can fetch 1 million instructions per second (with constant use of the system bus and main memory). How much will the processor be slowed down due to the DMA activityProcessor

Generally we have that the processor fetches directions at a charge of 1m guidelines per 2d or 1 MIPS.

The  I/O machine switch records at a pace of 19200 bits per seconds.

\(\frac{19200}{8} = 2400\)

Therefore

2400 bytes per sec

Since that CPU is fetching and executing guidelines at an common charge of one million directions per 2nd sluggish down or cycle wasted p.c in DMA switch = ( 2400 / 1000000) * 100

= 0.24%

Hence

The Processor speed reducing  down will be

S=0.24 %.

For more information on Processor visit

https://brainly.com/question/16517842

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least

Answers

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least  65 percent transfer efficiency.

What is the transfer efficiency

EPA lacks transfer efficiency requirement for auto refinishing spray guns. The EPA regulates auto refinishing emissions and impact with rules. NESHAP regulates paint stripping and coating operations for air pollutants.

This rule limits VOCs and HAPs emissions in automotive refinishing. When it comes to reducing overspray and minimizing wasted paint or coating material, transfer efficiency is crucial. "More efficiency, less waste with higher transfer rate."

Learn more about transfer efficiency  from

https://brainly.com/question/29355652

#SPJ1

Florian and Tobias would like to begin communicating using a symmetric cryptosystem, but they have no prearranged secret and are not able to meet in person to exchange keys. What algorithm can they use to securely exchange the secret key?

a. IDEA
b. Diffie-Hellman
c. RSA
d. MD5

Answers

The answer is MD5

Hope this helps you have a great thanksgiving

Because of inability to manage those risk. How does this explain the team vulnerability with 5 points and each references ​

Answers

The team is vulnerable due to a lack of risk assessment. Without risk understanding, they could be caught off guard by events. (PMI, 2020) Ineffective risk strategies leave teams vulnerable to potential impacts.

What is the inability?

Inadequate contingency planning can hinder response and recovery from materialized risks. Vulnerability due to lack of contingency planning.

Poor Communication and Collaboration: Ineffective communication and collaboration within the team can make it difficult to address risks collectively.

Learn more about inability  from

https://brainly.com/question/30845825

#SPJ1

People convicted of cyberbullying in most states
face no punishment for their actions.
face varying degrees of punishment.
are taught how to use technology positively.
are forced to do community service.

Answers

Answer: The Answer is B. face varying degrees of punishment.

Hope this helps! ^^ (also i know this is the right answer because i got it correct)

Answer:

b

Explanation: the punishment depends on the severeness , so we dont know the exact punishment

In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.

Ex: If the input is 100, the output is:

After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.

Answers

To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:

Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))

Here's the Coral Code to calculate the caffeine level:

function calculateCaffeineLevel(initialCaffeineAmount) {

 const halfLife = 6; // Half-life of caffeine in hours

 const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);

 const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);

 const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);

 return {

   'After 6 hours': levelAfter6Hours.toFixed(1),

   'After 12 hours': levelAfter12Hours.toFixed(1),

   'After 18 hours': levelAfter18Hours.toFixed(1)

 };

}

// Example usage:

const initialCaffeineAmount = 100;

const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);

console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');

console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');

console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');

When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:

After 6 hours: 50.0 mg

After 12 hours: 25.0 mg

After 18 hours: 12.5 mg

You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.

for similar questions on Coral Code Language.

https://brainly.com/question/31161819

#SPJ8

terms that represents the achual speed used by device to transfer data​

Answers

Answer:Mb/s

Explanation:

megabytes per second

Which of the following is a programming language that is interpreted? (5 points)

Assembly
Java
Machine
Python

Answers

Answer: python


i just did a test on this

What is the term for unsolicited Email​

Answers

Spam - unnecessary or unprecedented emails

Need help with the code

Need help with the code
Need help with the code
Need help with the code

Answers

The Python program that implements the described functionality. In this program, we define two functions: read_synonyms and main.

How to explain the information

def read_synonyms(filename):

   with open(filename, 'r') as file:

       lines = file.readlines()

       synonyms = [line.strip().split() for line in lines]

   return synonyms

def main():

   word = input("Enter a word: ")

   letter = input("Enter a letter: ")

   filename = f"{word}.txt"

   synonyms = read_synonyms(filename)

   ascii_offset = ord('a')

   row_index = ord(letter) - ascii_offset

   found_synonyms = []

   for synonym in synonyms[row_index]:

       if synonym.startswith(letter):

           found_synonyms.append(synonym)

   if found_synonyms:

       for synonym in found_synonyms:

           print(synonym)

   else:

       print(f"No synonyms starting with '{letter}' found for '{word}'.")

if __name__ == "__main__":

   main()

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

Other Questions
Can anyone help meee? What does the leopard seal do to Paul to show a threat? Han-6208 company manufactures 29,000 units of part T-25 each year. The company'scost per unit for part T-25 is:8 01:28:38$Direct materials3.70Direct labor12.00Variable manufacturing2.30overheadFixed manufacturing9.00overheadTotal cost per partS27.00 An outside supplier has offered to sell 29,000 units of part T-25 each year to Han-6208 for $23 per unit. If Han-6208 accepts this offer, it can rent out the facilities now beingused to manufacture part T-25 to another company at an annual rental of $79,000. However, Han-6208 has calculated that two-thirds of the fixed manufacturing overhead being applied to part T-25 will continue even if the part is bought from the outsidesupplier.What is the financial advantage of accepting the outside supplier's offer? What effects of body shaming An infectious disease researcher isolates the pathogen responsible for an emerging disease. The microbe is grown in the lab. A preparation of the laboratory-grown microbe is treated with a lethal dose of ionizing radiation and then tested for its potential as a vaccine. What type of vaccine is this What does new ground refer to in the Declaration of Independence? which stateent correctly explains why these species are still restricted to growing in moist environments true or false: developed countries generally rely more on the government for investment than do developing countries. Edwin drake drill was created to drill for oil deep in the ground eventually people discovered that they could also drill for water what powered these drills The proper way to determine how far you are behind another vehicle is to A timbre beam 100mm wide and 200mm deep is to be reinforced by bolting on two steel flitches each 150mm by 12.5mm in section. Calculate the moment of resistance in the following cases: (a) flitches attached symmetrically at the top and bottom (b) flitches attached symmetrically at the sides. Allowable stress in timbre is 6N/mm2. What is the maximum stress in the steel in each case? Take Es=200000N/mm2 and Et=10000N/mm2. in the median plane of an electric dipole is the electric field parallel or antiparallel to the electric dipole moment.explain......... Suppose you are the secretary of the National Innovation Centre (NIC), Nepal and an innovator from a foreign country had a talk with its chairperson, Mahabir Pun about bilateral cooperation. Write a press release statement State three ways in wich unemployement could ,minise emotional stress a) Find the center-radius form of the equation of the circle with center (2,2) and radius 2 . b) Graph the circle. a) The cenler-radius form of the equation of the circle is (Type an equation.) b) Use the graphing tool to graph the circle. Look at the following financial ledger: A 2-column table with 5 rows. Column 1 is labeled transaction with entries gift, credit bill, online auction, insurance payment, craft fair. Column 2 is labeled amount with entries 45 dollars, negative 33 dollars and 69 cents, 16 dollars and 75 cents, negative 66 dollars and 41 cents, negative 24 dollars and 25 cents. Which items listed on the ledger represent credits? a. Credit bill and craft fair b. Gift and online auction c. Gift and insurance payment d. Online auction and craft fair Please select the best answer from the choices provided A B C D. explain what safety measures you might take to avoid damaging the microscope, microscope slide, or a living specimen on your microscope stage what statement most accurately describes a texas state-mandated policy relating to students who are limited english proficient (lep)? How much is 300 mcg in mg? What is the y-coordinate in the solution for the system of linear equations below?3x2y=2 5x+6y=5