What is the value of the variable result after these lines of code are executed?
>>> a = 3
>>> b= 2
>>> c=0
>>> result = a* b-c* b
The value of result is
PLEASE HELP

Answers

Answer 1

the value of result is 6

a * b = 6

c * b = 0

6 - 0 = 6

Answer 2

The value of the variable result after these lines of code are executed. The value of the result is 6.

What are the values in codes?

A value is a representation of any item that may be manipulated by a program in computer science and software programming. The values of a type are represented by its members.

The "value of a variable" is determined by the environment's associated mapping. Values coding is a coding technique that explores the subjective aspect of human experience.

Value coding, in particular, is concerned with classifying the values, attitudes, and belief systems presented by participants. A value, like a letter or a number, is one of the fundamental objects that a program works with. Python allows you to print values.

Given that a = 3, b= 2, and  c=0

a x  b - c x b

3 x 2 - 0 x 2

6 - 0 = 6

Therefore, the value of the result is 6.

To learn more about variables, refer to the link:

https://brainly.com/question/18968869

#SPJ5


Related Questions

"What is the longest time (with extensions) a developer can have to file a final map after receiving tentative map approval?"

Answers

Answer:

The answer is "Five years (Two years)".

Explanation:

It supplies with proactive maps of approved modifications beyond the limits of plan may be expanded by the submission of final maps, reflecting the stages of the initial proactive plan, up to ten years with both the chief administrator.

Its provisional submission of a map, that will include the request forms or other resources provided at the request of the city administrator and the office.  It also allows the phasing for the current map, that has been accepted.

Consider a B+ tree being used as a secondary index into a relation. Assume that at most 2 keys and 3 pointers can fit on a page. (a) Construct a B+ tree after the following sequence of key values are inserted into the tree. 10, 7, 3, 9, 14, 5, 11, 8,17, 50, 62 (b) Consider the the B+ tree constructed in part (1). For each of the following search queries, write the sequence of pages of the tree that are accessed in answering the query. Your answer must not only specify the pages accessed but the order of access as well. Assume that in a B+ tree the leaf level pages are linked to each other using a doubly linked list. (0) (i)Find the record with the key value 17. (ii) Find records with the key values in the range from 14 to 19inclusive. (c) For the B+ tree in part 1, show the structure of the tree after the following sequence of deletions. 10, 7, 3, 9,14, 5, 11

Answers

The B+ tree structure after the sequence of deletions (10, 7, 3, 9, 14, 5, 11) results in a modification of the tree's structure.

(a) Constructing a B+ tree after the given sequence of key values:

The B+ tree construction process for the given sequence of key values is as follows:

Initially, the tree is empty. We start by inserting the first key value, which becomes the root of the tree:

```

                   [10]

```

Next, we insert 7 as the second key value. Since it is less than 10, it goes to the left of 10:

```

               [10, 7]

```

We continue inserting the remaining key values following the B+ tree insertion rules:

```

               [7, 10]

              /     \

         [3, 5]   [9, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14]

```

```

               [7, 10]

              /     \

         [3, 5]   [8, 9, 11, 14, 17]

```

```

               [7, 10, 14]

              /     |     \

         [3, 5]  [8, 9] [11] [17]

                            \

                            [50, 62]

```

The final B+ tree after inserting all the key values is shown above.

(b) Sequence of pages accessed for the search queries:

(i) To find the record with the key value 17:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is: Page 1 (root), Page 2 (child of root), Page 3 (child of Page 2), Page 4 (leaf containing 17).

(ii) To find records with key values in the range from 14 to 19 inclusive:

The search path would be: [7, 10, 14, 17]. So the sequence of pages accessed is the same as in (i).

(c) Structure of the tree after the given sequence of deletions:

To show the structure of the tree after the deletion sequence, we remove the specified key values one by one while maintaining the B+ tree properties.

After deleting 10:

```

               [7, 14]

              /     |     \

         [3, 5]  [8, 9] [11, 17]

                            \

                            [50, 62]

```

After deleting 7:

```

               [8, 14]

              /     |     \

         [3, 5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 3:

```

               [8, 14]

              /     |     \

         [5]  [9] [11, 17]

                            \

                            [50, 62]

```

After deleting 9:

```

               [8, 14]

              /     |     \

         [5]  [11, 17]

                            \

                            [50, 62]

```

After deleting 14:

```

               [8, 11]

              /         \

         [5]          [17]

                            \

                            [50, 62]

```

After deleting 5:

```

               [11]

              /         \

         [8]          [17]

                            \

                            [50, 62]

```

After deleting 11:

```

               [17]

              /         \

         [8]           [50, 62]

```

The final structure of the tree after the deletion sequence is shown above.

Learn more about B+ tree here

https://brainly.com/question/30710838

#SPJ11

A credit given to an author for his or her work is called a(an)

Answers

Citation.

Any other related questions you want answered?

Answer:

citation

Explanation:

Just did it in my online class, and my mom said so to

what are three ways to foster accountability on an agile release train

Answers

The three crucial program events of inspect, adapt, and test maintain the Agile Release Train on track. This activity comes after each PI planning activity.

All the individuals expertise required for the implementation, testing, deployment, and release of software, hardware, firmware, or other products are included in the Agile Release Train. Each ART is a virtual organization that plans, commits, develops, and deploys work collaboratively. It typically consists of 50–125 individuals. The main duties of the RTE are to help the teams deliver value and to facilitate ART events and processes. RTEs interact with stakeholders, deal with obstacles, assist with risk management, and promote constant improvement.

Learn more about program here-

https://brainly.com/question/14618533

#SPJ4

PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST

1.) Online crimes causing loss of money: give 5 names and examples to each

2.) Online misconduct or crimes targeting medical offices and services: give 5 names and examples to each

3.) Online misconduct or crimes that you have experienced: give 5 names and examples to each

Answers

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity? a. There must be a maximum of one attribute instance. b. There must be many instances of the attribute. c. There must be at most one entity instance that each attribute instance describes.d. There must be at least one instance of the attribute. e. There must be zero or more instances of the attribute.

Answers

A: The correct answer is option C: There must be at most one entity instance that each attribute instance describes.

What is attribute?

An attribute is a characteristic or quality that describes an object, person, or concept. It can refer to physical or psychological characteristics, such as color, size, shape, texture, behavior, personality, or mood. Attributes can also describe intangible qualities, such as intelligence, creativity, or morality. Attributes can be used to describe and differentiate between different objects, people, or ideas. In programming, an attribute is a property or value associated with a particular object or element. Attributes are used to store data and provide information about an object. For example, in HTML, attributes are used to define the structure and content of a webpage.

This means that each attribute must uniquely identify a single instance of the entity, and no two instances of the entity can have the same value for the attribute. This ensures that the attribute can be used as a primary key, as it can be used to uniquely identify each instance of the entity.

To learn more about attribute
https://brainly.com/question/30487692
#SPJ4

what is a common indicator of a phishing attempt?

Answers

Strangely phrased subject lines :An email subject line that contains a word or phrase that doesn't sound appropriate is the most clear sign that it is a phishing email.

Phishing efforts can be disguised in a variety of ways to persuade you to divulge your personal information. In addition to the numerous varieties of phishing, such as spear phishing, pop-up phishing, and social media phishing, it can be challenging to distinguish between a legitimate bank website and a fraudulent one, so it's critical to be aware of what to watch out for. Common signs of a phishing effort include:Despite the fact that phishing assaults have become much more complex over time, they may still be quickly identified if you know what to look fortypical phishing indicator that should raise serious red flags. Cybercriminals frequently send you unsolicited offers of free iPads, iPhones, expensive handbags and luggage, trips to exotic locales, and other items in an effort to seduce you. Anyone providing such items is nearly always a phisher seeking to obtain your personal information.

To learn more about " cybercriminals" Click on below link brainly.com/question/27146593

#SPJ4

Give three examples of NON-TRADITIONAL web authoring tools
3 pour

Answers

Some other type of authoring tools 1. Card or Page based tools 2. Icon based, event driven tools 3. Time based and presentation Tools.

A network of Raspberry Pis are organized into a Beowulf cluster. There are 32 devices running non-stop. In a period of 72 hours, three of them failed. Calculate the mean time between failures (MTBF).

Answers

The mean time between failures (MTBF) for the Beowulf cluster of Raspberry Pis is 696 hours.

To calculate the mean time between failures (MTBF) for the Beowulf cluster of Raspberry Pis, we need to first define the formula for MTBF.

MTBF is calculated by dividing the total uptime of all devices by the number of failures. We can then convert this value into hours to get the MTBF.
In this case, we know that there are 32 Raspberry Pis in the cluster and three of them failed in a 72-hour period. This means that there were 29 devices that were running non-stop for 72 hours.

To calculate the total uptime, we can multiply the number of devices by the time they were operational:
Total uptime = 29 devices x 72 hours = 2,088 hours
Next, we can calculate the MTBF by dividing the total uptime by the number of failures:
MTBF = Total uptime / Number of failures = 2,088 / 3 = 696 hours
Therefore, the mean time between failures (MTBF) for the Beowulf cluster of Raspberry Pis is 696 hours.

For more questions on mean time between failures

https://brainly.com/question/30188655

#SPJ11

When first designing an app, all of the folldwing are important EXCEPT
A. debugging
B. determining how a user would interact with the app.
C. determining the purpose of the app
D. identifying the target audience

Answers

Answer:

B

Explanation:

Determining how the user could interact with the app varies person to person, the others are essential to creating apps though.

Which code is easier to learn, Python or C++. And which one is better than the other in your opinion

Answers

Okay so I’m terms of easiest to learn it depends on the person for me it is Python and python is better because it can be used for lots of purposes

Which security measure uses a physiological element that is unique to a person and cannot be stolen, lost, copied, or passed on to others

Answers

The security measure that uses a physiological element unique to a person and cannot be stolen, lost, copied, or passed on to others is known as "biometric authentication."

Biometric authentication relies on specific physical or behavioral characteristics of an individual to verify their identity. These characteristics can include fingerprints, iris patterns, facial features, voice recognition, or even unique typing patterns. Biometric data is captured and stored securely, and during the authentication process, the presented biometric data is compared with the stored data to grant access or verify identity.

Biometric authentication provides a high level of security as the physiological elements used are unique to each individual and cannot be easily replicated or forged. It offers a more reliable and convenient method of authentication compared to traditional methods like passwords or tokens.

To know more about security measures click here: brainly.com/question/32673449

#SPJ11

How do I delete the Chrome apps folder, because I tried to remove from chrome but it won't let me

Answers

Answer:

Explanation:

1. Open your Start menu by selecting the Windows logo in the taskbar and then click the “Settings” cog icon.

2. From the pop-up menu, click “Apps.”

3.Scroll down the “Apps & Features” list to find  g00gle chrome

4. Click “G00gle Chrome” and then select the “Uninstall” button.

Hope this help!

Helped by none other than the #Queen herself

which of the following statements about rfid is not true? rfids require line-of-sight contact to be read. rfids transmit only over a short range. rfids use an antenna to transmit data. microchips embedded in rfids are used to store data. rfids can track individual units within a shipment.

Answers

The statement "RFIDs require line-of-sight contact to be read" is not true. RFIDs do not require line-of-sight contact to be read, which is contrary to the other statements that are true about RFIDs.

RFID (Radio Frequency Identification) technology is commonly used for identification, tracking, and data transmission purposes. It consists of tags or labels that contain a microchip and an antenna. These tags can be attached to objects or products, enabling them to be identified and tracked wirelessly.

Contrary to the statement, RFIDs do not require line-of-sight contact to be read. Unlike traditional barcodes, which need to be scanned directly, RFIDs can be read without a direct line of sight. The radio waves used in RFID technology can penetrate materials such as plastic, cardboard, and even some metals. This allows for convenient and efficient reading of RFIDs, even when they are enclosed or hidden within objects or packaging.

RFIDs typically transmit data over a short range, usually within a few meters. The exact range may vary depending on the specific RFID system and the operating frequency used. However, advancements in RFID technology have led to the development of long-range and even passive RFID systems capable of greater transmission distances.

To learn more about RFIDs - brainly.com/question/29538641

#SPJ11

in 1982, atari released the 5200 home game console which was a significant update from the 2600 in regards to sound. the 5200 had a dedicated audio processor with:

Answers

In 1982 the Atari 5200 home gaming system included a dedicated audio processor with four independent sound channels, which was a substantial improvement over the sound features of the Atari 2600.

What is the processor?

An interconnected electronic circuit called a processor is what does the calculations for a computer. A cpu executes basic instructions from an operating system, containing arithmetic, logical, input/output (I/O), and other operations (OS). The vast of other operations depend on the action of a processor.

Is RAM faster than the processor?

A stronger processor will be useful for activities like streaming or managing several programs. Large quantity of RAM will aid with multitasking even while organisational effectiveness in demanding processes and applications.

To know more about processor visit :

https://brainly.com/question/30255354

#SPJ4

Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data

Answers

Answer:

Data management.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a software that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

In conclusion, data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

What enhancement to ext2 does ext3 have that helps prevent file damage and loss of integrity in the event of a system crash or power outage?
a. EFS
b. journaling
c. shadow copies
d. hot fix

Answers

The enhancement to ext2 does ext3 have that helps prevent file damage and loss integrity is: b. journaling.

The enhancement that ext3 has over ext2 to help prevent file damage and loss of integrity in the event of a system crash or power outage is journaling.

Ext3 is a journaled file system that keeps track of changes to the file system by recording them in a journal before committing them to the file system. The journal acts as a log that can be used to recover the file system in the event of a crash or power outage. This helps to prevent file damage and loss of integrity that may occur when the file system is not properly written to disk.

Learn more about journaling:https://brainly.com/question/1643608

#SPJ11

What is the correct way to write an argument? =A1 > 4= [A1 > 4] “A1 > 4” (A1 > 4)

Answers

The correct way to write an argument is  [A1 > 4]

What is meant by argument?

You can provide a function more information by using an argument. The data can then be used by the function as a variable as it executes. To put it another way, when you construct a function, you have the option of passing data as an argument, also known as a parameter.

A value that is passed between programmes, functions, or subroutines in programming. Arguments are autonomous objects, or variables, that include information or codes. It is customary to refer to an argument as a "parameter" when it is used to modify a programme for a user. view argc

Astronomy, which historically used tables to determine the spatial positions of planets from their positions in the sky, is where the term "argument" in this sense originated.

To learn more about parameter refer to:

https://brainly.com/question/29223118

#SPJ9

Datawriter
Create a File object using "data.txt" as the argument to its constructor. Store the reference to the new File object in a variable of type File.
Will mark brainliest

Answers

Answer:

Explanation:

1. (A+B)(B'+C)(C+A)
2. A'B'C'
3. (X+Y)(X'+Z)(Y+Z)
4. A'B'C'+A'BC'+A'BC+ABC'

Answers

you need to put your question

Please help me!!!

Use searching laterally to find more out about obesitymyths.com and if it is credible. Share your findings here.

Answers

Explanation:

I am verry bad at computer science. ...........

Using the search tool, it is discovered that the website is not a credible website.

Why is the website not credible?

This is due to the fact that the domain of the website has been put up for sale. The website does not contain information about what its name suggests.

There is a transfer of ownership waiting to happen. Hence we can conclude that it is not a credible website.

Read more on websites here: https://brainly.com/question/1382377

#SPJ2

Write an algorithm and draw flowchart to print 30 terms in the following sequence
1,-2,3,-4,5,-6,7,-8,...........................up to 30 terms.

Answers

Answer:

/*

I don't know what language you're using, so I'll write it in javascript which is usually legible enough.

*/

console.log(buildSequence(30));

function buildSequence(maxVal){

   maxVal = Math.abs(maxVal);

   var n, list = [];

   for(n = 1; n < maxVal; n++){

       /*

        to check for odd numbers, we only need to know if the last bit

        is a 1 or 0:

       */

       if(n & 1){ // <-- note the binary &, as opposed to the logical &&

           list[list.length] = n;

       }else{

           list[list.length] = -n;

       }

   }

   return list.implode(',');

}

Explain whats Cropping in your own words (photos) ​

Answers

It’s just means to make sure all of the words in the question are cropped enough that the system will be able to process and read it to give you the answers you need I hope this helped!

;w;) - Actually, cropping is just removing parts of a picture to have the main scene on focus. I was once in a photography class, and I took a picture of the Appalachian mountains.

NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.

Answers

Answer:

NBA bank data is completely destroyed since it has not maintained any backup.

Explanation:

All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.

Complete the sentences.
The ACCUPLACER exam is a diagnostic test that evaluates the students’ progress in a specific academic field. It is divided into sections that assess reading, writing, and mathematics skills. The
section tests students’ ability to solve problems related to algebra, trigonometry, and geometry. The
section tests how well the students can write. The
section tests the students’ knowledge about sentence structure.

Answers

Answer:

fiances

Explanations it just  is

Samantha wants to create a network group that allows open sharing of data without restrictions. What type of network should she create?

Answers

Answer:

I'm doing by slbl network, iso, I think that's your answer

employees of a company need remote access to the corporate network by connecting to a virtual private network (vpn). to validate credentials, the network administrator suggests installing an authentication, authorization, and accounting (aaa) server. if the server and client configure the same shared secret, what protocol should be used in this scenario?

Answers

In this scenario, the protocol that should be used is the Remote Authentication Dial-In User Service (RADIUS) protocol. RADIUS is a networking protocol that provides centralized authentication, authorization, and accounting management for users who connect and use a network service.

It is commonly used in situations where users need remote access to a corporate network, such as through a VPN. When a user attempts to connect to the network through the VPN, the VPN client sends the user's credentials to the RADIUS server. The RADIUS server then checks the credentials against its user database and either grants or denies access to the network. The RADIUS server also tracks the user's network usage for accounting and auditing purposes. In this scenario, the shared secret configured between the RADIUS server and the VPN client ensures secure communication between the two. The shared secret is a pre-configured password that is used to authenticate and encrypt communications between the RADIUS server and the VPN client. Overall, using a RADIUS server with a shared secret is a secure and efficient way to manage remote access to a corporate network through a VPN.

Learn more about VPN here-

https://brainly.com/question/31764959

#SPJ11

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

URGENT! REALLY URGENT! I NEED HELP CREATING A JAVASCRIPT GRAPHICS CODE THAT FULFILLS ALL THESE REQUIREMENTS!

Answers

In the program for the game, we have a garden scene represented by a green background and a black rectangular border. The cartoon character is a yellow circle with two black eyes, a smiling face, and arcs for the body. The character is drawn in the center of the screen.

How to explain the information

The game uses Pygame library to handle the graphics and game loop. The garden is drawn using the draw_garden function, and the cartoon character is drawn using the draw_cartoon_character function.

The game loop continuously updates the scene by redrawing the garden and the cartoon character. It also handles user input events and ensures a smooth frame rate. The game exits when the user closes the window.

This example includes appropriate use of variables, a function definition (draw_garden and draw_cartoon_character), and a loop (the main game loop). Additionally, it meets the requirement of using the entire width and height of the canvas, uses a background based on the screen size, and includes shapes (circles, rectangles, arcs) that are used appropriately in the context of the game.

Learn more about program on

https://brainly.com/question/23275071

#SPJ1

What are the default page settings for a Google Doc? *

Answers

Wym sir/ma’am (Click File > Page Setup. Change the page size to A4. Click Set as default) if that’s what you need

Jennifer works as a programmer. She has fixed certain bits of code in a program while developing it. She has purposely left specific code in the program so she can access the program later and obtain confidential information. Which programming threat has she created?
A. logic bomb
B. trap door
C. Trojan horse
D. virus

Answers

Answer:

B. trap door

Explanation:

It's also referred to as the back door

Other Questions
Please Help Me!!! Its Homework1. How can writing expressions show how quantities are related?2. Rewrite the expression 12x + 8 to find an equivalent expression. Show three possible expressions. What do the rewrite expressions among quantities?3. A rope is used to make a fence in the shape of an equilateral triangle around a newly planted tree. The length of the rope is represented with the expression 9x + 15. a. Rewrite the expression to represent the three side lengths of the rope fence b. What is the length of one side?4. The expression (x - 0.35x) represents 35% off the cost of an item x. How is this equivalent to multiplying x by 065x?Please take your time on this its worth 100% Use the Law of Syllogism to write new conditional statement, ifpossible. "If a book is more than 200 pages, I will not read it. A bookis 210 pages." Sales tax in your community is 6 percent. If you go to a sporting goods store and buy a soccer ball for $19.95, socks for $5.95, and a headband for $10.00, what amount will you pay once the sales tax is added to your purchase? the has claws on its wings to help it climb through vegetation What is the area of the circle shown in square inches use 22/7 Target Co is a wholly owned subsidiary of MegaCorp Inc. MegaCorp supplies a number of services to Target. Target sells some of its products to other MegaCorp subsidiaries. Target also buys products from other MegaCorp subsidiaries that are used as inputs in producing Target's products. Which of the following adjustments should the acquirer make to Target's financial statements before valuing the firm?A. Deduct the actual cost of services required by Target that are being supplied by the parent without charge from targets cost of sales.B. Deduct the difference between the cost of products purchased from other MegaCorp subsidiaries at below market prices and the actual market prices for such products from Targets cost of sales.C. Deduct the difference between the cost of products purchased from other MegaCorp subsidiaries at above market prices and the actual cost of such products if purchased from other sources from Targets cost of salesD. A and B only.E. None of the above. Richard B. Russell- seen here- helped Georgia during World War II in what way? Which is the best example of positive peer pressure?A. Jessica dresses in nice designer clothes every day at school. Everyone else at the school wants to be like her.B. Javier invites his fellow seniors to his house after the prom. He is not serving alcohol, and his parents will be there.C. Lindsay starts a yoga group with several friends from school. More and more students join the group each week. Weakness #1:A weak national (or central) government. Explanation: Weakness #2:Congress could not tax or regulate trade. Explanation: Weakness #3:One vote per state no matter the size of the population or land size. Explanation: OUT OF TORONY TreeOf the 48 students in a class, 40 are taking the class because it is a major requirement, and the other8 aretaking it as an elective. If two students are selected at random from this class, what is the probability that thefirst student is taking the class as an elective and the second is taking it because it is a major requirement?What is the probability that the first student is taking the class because it is a major requirement and thesecond student is taking the class as an elective? Discribe what tim did not like about being in a office, and what tim did like working for the subway if the market doesn't look so great, but we are awesome in creating products of this sort, the key question is whether we can develop a market. which of the following would we not need to invest in for this strategy? hiring new people market research advertising possible product modifications if you expend a 10 j of work to push a 1-C charge against an electric field what is its change in velocity In "The Raven and the First Men: The Beginnings of the Haida, which evidence best helps the reader infer that the Haida might find it acceptable behavior to play tricks on one another? What is 3 to the 7th power times 8 to the 5th power? My question got deleted so I'll post these into two separate posts 100 POINTS! Convert 1 million seconds to years. (Round to 3 decimal places.) If your teacher is 50 years old, what is their age in seconds? Convert 46 inches to miles (there are 12 inches in one foot). Round 6 decimal places. What substance is produced at the cathode during the electrolysis of molten calcium bromide, cabr2cabr2? assume standard conditions Please, Please, Please help me with this!Match the letter with the place it represents on the map.MartiniquePuerto Rico Cuba The Bahamas***ABCD What forces the fluid from the capillaries of the glomerulus into the Bowman's capsule? you are the owner of a firm that produces household robots. this industry is in the introductory stage in a diverse set of countries. you figure that a firm can produce a dominant design faster if it enters multiple countries at once to get information from a culturally diverse set of customers. according to the integration-responsiveness framework, what is the best strategy if you want to expand to other countries right now?