Write a loop that continually asks the user what pets the user has, until the user enters "rock", in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say "You have a dog with a total of 1 pet(s)" if they enter dog, and so on.
Sample Run:
User enters:
lemur parrot cat rock
Outputs:
You have a lemur with a total of 1 pet(s)
You have a parrot with a total of 2 pet(s)
You have a cat with a total of 3 pet(s)

Answers

Answer 1

Answer:

Check the explanation

Explanation:

The Python program that frequently asks the user what pets the user has,

until the user enters "rock", in which case the loop ends can be analysed in the written codes below.

'''

# count of pets

count = 0

# read the user input

pet = input()

# loop that continues till the user enters rock

# strip is used to remove the whitespace

while pet.strip() != 'rock':

  # increment the count of pets

  count += 1

  # output the pet name and number of pets read till now

  print('You have a %s with a total of %d pet(s)' %(pet.strip(),count))

  pet = input() # input the next pet

#end of program

Answer 2

Following are the python program to use the loop to count the number of pets until the user enters the "rock":

Program:

c = 0#defining a variable c that initilzes with 0

p = input()#defining a variable p that input value

while p != 'rock':#defining a loop that check p value not equal to rock

  c += 1#using c variable for counts total number of pets

  print('You have a %s with a total of %d pet(s)' %(p,c))#print total number of pet

  p = input() #input value

Output:

Please find the attached file.

Program Explanation:

Defining a variable "c" that is initialized with 0, which is used to count input values.In the next line, a "p" variable is declared as the input value from the user end.A while loop is declared to check that the p-value is not equal to 'rock'.Inside this loop, the "c" variable is used for counting the total number of pets, and a print method is used to print the total number of pets.Another input method is used that works until the user inputs the value that is "rock".

Find out more about the loop here:

brainly.com/question/17067964

Write A Loop That Continually Asks The User What Pets The User Has, Until The User Enters "rock", In

Related Questions

Plz help, will guve brainliest to best answer (if i can)

Plz help, will guve brainliest to best answer (if i can)

Answers

Answer:

Online text:1,3,4

not online text:2,5

Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns their count (that is, how many there are) So if the input was:
hooligan sausage economy
ruin palatial
the function would return 5 because there are 5 strings there.

Answers

Answer:

The function written in C++

int str(string word) {

int count = 1;

for(int i =0; i<word.length();i++) {

 if(word[i] == ' ') {

  count++;

 }

}

return count;

}

Explanation:

This line defines the function

int str(string word) {

This line initializes count to 1

int count = 1;

This line iterates through the input string

for(int i =0; i<word.length();i++) {

This line checks for blank space

 if(word[i] == ' ') {

Variable count is incremented to indicate a word count

  count++;

 }

}

return count;

}

See attachment for full program

Computer one on network A, with IP address of 10.1.1.8 want to send a package to computer to with IP address of 10.1.1.205. Taking in consideration that computer one is sending an FTP request to computer to the store support on computer one is 21086, which of the following contains the correct information for the first TCP segment of data

Answers

Note that the right information for the first TCP segment of data in the given scenario is  -

Source Port - 21086Destination Port - 21Sequence Number - 1 Acknowledgment   Number - 2

Why  is this so?

Since   Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21   (FTP default port),the sequence number   would start at 1, and the acknowledgment number would be 2.

A TCP segment is a  unit of data encapsulatedin a TCP /IP packet used for communication between devices over a   network.

Learn more about TCP at:

https://brainly.com/question/18956070

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 10.1.1.205. Taking in consideration that computer 1 is sending a FTP request to computer 2, and the source port on computer 1 is 21086, which of the following contains the correct information for the first TCP segment of data?

Source Port: 5000

Destination Port: 80

Sequence Number: 1

Acknowledgment Number: 2

Source Port: 21086

Destination Port: 21

Sequence Number: 1

Acknowledgment Number: 2

Source Port: 21

Destination Port: 21

Sequence Number: 4

Acknowledgment Number: 1

Source Port: 80

Destination Port: 5000

Sequence Number: 1

Acknowledgment Number: 1

Answer:

Explanation:

Note that the right information for the first TCP segment of data in the given scenario is  -

   Source Port - 21086

   Destination Port - 21

   Sequence Number - 1

   Acknowledgment   Number - 2

Why  is this so?

Since   Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21   (FTP default port),the sequence number   would start at 1, and the acknowledgment number would be 2.

A TCP segment is a  unit of data encapsulatedin a TCP /IP packet used for communication between devices over a   network.

What is a complier in computers

Answers

Answer:

Explanation:

A compiler is a computer program that translates source code into object code.

You may review Chapter 2, pages 67-71 of the textbook or communication skills.
Now please answer the following questions:
• What communication systems do you believe are best to be used at a help desk?
• What may be a couple of reasons for the satisfaction disparity?
• How can you ensure that all employees are satisfied with the help desk's services regardless of how
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 50-100-w
found to be compelling and enlightening. To help you with your discussion, please consider the following
• What differences or similarities do you see between your posting and other classmates' postings?
**what communication system do you believe are best to be used at a help desk?

Answers

The communication systems that are said to be used at help desks are:

Phone as well as Call Center SystemThe use of Email SystemThe use of Ticketing System

What is the communication systems?

In terms of Phone as well as Call Center System: This is seen as a form of a traditional system of communication  that is often used as help desks.

It is one that gives room for a lot of users to be able ot call as well as speak directly with the person who is a help desk agents for any form of assistance.

Hence the choice of communication  the the person who is help desk wants to use can depend on a lot of factors.

Learn more about   communication systems from

https://brainly.com/question/30023643

#SPJ1

TCPDump is used by Wireshark to capture packets while Wireshark own function is:

a. to provide a graphical user interface (GUI) and several capture filters.
b. to act as an intrusion prevention system (IPS) by stopping packets from a black-listed website or packets with payloads of viruses.
c. to defend the network against TCP SYN Flooding attacks by filtering out unnecessary TCP packets.
d. yet to be defined.

Answers

Answer:

a. to provide a graphical user interface (GUI) and several capture filters

Explanation:

TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text

Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.

The objective is to work with your partner to fix the HTML bugs so that none of the code is pink. In general, how do I change HTML code color?

Answers

Answer:

Click inspect then go to change color

Explanation:

there you go have a nice day!

what is the difference between hydra and hadoop?​

Answers

Hadoop is batch oriented whereas Hydra supports both real-time as well as batch orientation.

The Hadoop library is a framework that allows the distribution of the processing of large data maps across clusters of computers using simple as well as complex programming models. batch-oriented analytics tool to an ecosystem full of multiple sellers in its own orientation, applications, tools, devices, and services has coincided with the rise of the big data market.

What is Hydra?

It’s a distributing multi - task-processing management system that supports batch operations as well as streaming in one go. It uses the help of a tree-based data structure and log algorithms to store data as well as process them across clusters with thousands of individual nodes and vertexes.

Hydra features a Linux-based file system In addition to a job/client management component that automatically allocates new jobs to the cluster and re-schedules the jobs.

Know more about Big Data: https://brainly.com/question/28333051

PLEASE HELP!! QUICKLY! WILL GIVE BRAINLIEST!
Describe at least three important considerations when upgrading to new software in complete sentences.

Answers

Answer:

Storage

How it changes the layout

How it differs from the previous software

Explanation:

Storage is one of the most important things to think about because, if you do not have enough storage then the update only hurts you. Then plus you cannot even get the update in most cases. How it changes the layout and how it changes the computers is important because it can be what makes a person hate the newest software or not. If the layout changes to something you do not agree with, then it can leave a person all mixed up. Lastly how it differs is important because, how it differs from the previous can be the reason why or why not you even need the update. The differences could be good or bad. But whenever updating software always look at the terms and conditions, what it changes, and what it takes to update the software.

In which sections of your organizer should the outline be located?

Answers

The outline of a research proposal should be located in the Introduction section of your organizer.

Why should it be located here ?

The outline of a research proposal should be located in the Introduction section of your organizer. The outline should provide a brief overview of the research problem, the research questions, the approach, the timeline, the budget, and the expected outcomes. The outline should be clear and concise, and it should be easy for the reader to follow.

The outline should be updated as the research proposal evolves. As you conduct more research, you may need to add or remove sections from the outline. You may also need to revise the outline to reflect changes in the project's scope, timeline, or budget.

Find out more on outline at https://brainly.com/question/4194581

#SPJ1

how do unblock a school chromebook

Answers

you simple just grab it drop it on the ground, stomp on it a couple times and it should be like new!
1. open chrome
2. go to a website
3. to the left address click the icon you see: Lock, Info, or Dangerous.
4. click Site settings
5. change a permission setting. your changes will automatically save

In the 1940s, computers were programmed using punch cards, or pieces of paper that had holes in them that represented binary code. If a mistake was made using this type of primitive programming, which of the following BEST describes what would need to be done to correct the problem?

A.
The entire program of punch cards had to be re-punched.

B.
The entire program of punch cards had to be loaded again and started over.

C.
The entire program needed to be rewritten and a different set of punch cards were used.

D.
The entire program could be fixed by adding or removing a card for the existing stack of papers.

Answers

Answer:

If a mistake was made using punch cards to program computers in the 1940s, the entire program of punch cards had to be re-punched to correct the problem. This was because punch cards were the primary means of input for the computer, and any changes or corrections to the program had to be physically made by punching new cards or modifying existing ones. Once the program was re-punched correctly, it could be loaded into the computer and executed.

Explanation:

Certain directors feel that the decision to increase the loan was a poor decision. Do you agree with this view? Explain. Quote TWO financial indicators and figures​

Answers

Determining if the choice to amplify a loan was unwise or not is reliant on several factors and particularities specific to the situation at hand.

What are the financial indicators to use?

There are two financial metrics that might provide insight into the situation, namely the debt-to-equity ratio and the interest coverage ratio.

An elevated ratio of debts-to-equity could imply elevated financial risk, whereas a meager ratio of interest coverage may indicate challenges in paying interest expenses.

In order to develop an informed viewpoint, a thorough evaluation of the company's financial situation supplemented by these crucial markers would be essential.

Read more aobut financial indicators here:

https://brainly.com/question/30453655

#SPJ1

After analyzing the following code, which statement is not True:
import sqlite3
connection = sqlite3.connect("aquarium.db")
a. import sqlite3 gives our Python program access to the sqlite3 module.
b. The sqlite3.connect() function returns a Connection object
c. The aquarium.db file is created automatically by sqlite3.connect() if aquarium.db does not already exist on our computer.
d. A syntax error, if aquarium.db does not already exist on our computer.

Answers

Answer:

d. A syntax error, if aquarium.db does not already exist on our computer.

Explanation:

The SQLite database is a relational database used readily in python backend web frameworks to store and retrieve data. The python packages like the sqlite3 are extensions of python proving its flexibility and power as a multi-purpose programming language.

The sqlite3 package is first installed and imported in the python file and a sqlite connection is made to the database which is automatically saved in the aquarium.db file ( created if it doesn't already exist ).

give one major environmental and
one energy problem kenya faces as far as computer installations are concerned?​

Answers

One considerable predicament that Kenya encounters pertaining to the utilization of computers is managing electronic waste (e-waste).

Why is this a problem?

The mounting number of electronic devices and machines emphasizes upon responsibly discarding outdated or defective hardware in order to avoid environmental degradation.

E-waste harbors hazardous materials such as lead, mercury, and cadmium which can pollute soil and water resources, thereby risking human health and ecosystem sustainability.

Consequently, a significant energy drawback with computer use within Kenya pertains to the insufficiency or instability of electrical power supply.

Read more about computer installations here:

https://brainly.com/question/11430725

#SPJ1

Discuss the Von-Neumann CPU architecture?​

Answers

The Von Neumann architecture is a traditional CPU design named after John von Neumann and widely implemented since the mid-20th century.

What is the Von-Neumann CPU architecture?​

Basis for modern computers, including PCs, servers, and smartphones. Von Neumann architecture includes components for executing instructions and processing data. CPU is the core of Von Neumann architecture.

It manages operations, execution, and data flow in the system. Von Neumann architecture stores both program instructions and data in a single memory unit. Memory is organized linearly with each location having a unique address. Instructions and data are stored and retrieved from memory while a program runs.

Learn more about   Von-Neumann CPU architecture from

https://brainly.com/question/29590835

#SPJ1

A programmer is developing a word game. The programmer wants to create an algorithm that will take a list of words and return a list containing the first letter of all words that are palindromes (words that read the same backward or forward). The returned list should be in alphabetical order. For example, if the list contains the words ["banana", "kayak", "mom", "apple", "level"], the returned list would contain ["k", "l", "m"] (because "kayak", "level", and "mom" are palindromes). The programmer knows that the following steps are necessary for the algorithm but is not sure in which order they should be executed. Executing which of the following sequences of steps will enable the algorithm to work as intended?
I. First shorten, then keep palindromes, then sort
II. First keep palindromes, then shorten, then sort
III. First sort, then keep palindromes, then shorten
Pilihan jawaban
a. I only
b. II only
c. I and III
d. II and III

Answers

Based on the above statement, pick (D) is the correct one. Prioritize palindromes, then shorten, and then sort III. Sorting was followed by shortening and retaining palindromes.

That would be what sort of an algorithm?

Common examples of algorithms include the method for baking a cake, the approach we use to solve a long division challenge, washing laundry, and running a search query.

What is the simple definition of an algorithm?

An algorithm is a technique used to do calculations or solve issues. Algorithms perform as a precise set of instructions which carry out preset activities consecutively in either hardware-based and software-based routines. Algorithms play a big role in information technology across the board.

To know more about Algorithm visit:

https://brainly.com/question/28650391

#SPJ4

Computers are used to input, store, process, find and share vast amounts of data and information, and they can do so in
fractions of a second. Discuss the concept of abstraction and abstract data types on computer programming

Answers

The concept of abstraction and abstract data types on computer programming is given below.

The use of abstraction to manage complexity is crucial. When anything is regarded abstractly, just the salient characteristics are highlighted. It is not necessary to recall or even notice the information that is left out.

What is abstraction?

An abstraction of a data structure that merely provides the interface to which the data structure must conform is referred to as an abstract data type. No precise information about how something should be implemented or in what programming language is provided by the interface.

An object's behavior can be described by a set of values and a set of actions, and this behavior is known as an abstract data type (ADT).  The definition of ADT merely specifies the actions that must be taken, not how they must be carried out.

Therefore, List data structures, stack data structures, and queue data structures are examples of abstract data types in data structures. The abstract data type defines a number of legitimate operations that can be performed on a specific data structure.

Learn more about abstraction  from

https://brainly.com/question/7994244
#SPJ1

Which statements are true about mobile apps? Select 3 options.

Which statements are true about mobile apps? Select 3 options.

Answers

The statements are true about mobile app development are;

Software development kits can provide a simulated mobile environment for development and testingMobile app revenues are expected to growWhether a mobile app is native, hybrid, or web, depends on how the app will be used and what hardware needs to be accessed by the app

How is this so?

According to the question, we are to discuss what is mobile app and how it works.

As a result of this mobile app serves as application that works on our mobile phone it could be;

nativehybridweb

Therefore, Software development kits can provide a simulated mobile environment.

Learn more about mobile apps at:

https://brainly.com/question/26264955

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Which of the following statements are true about mobile app development? Select 3 options.

• Software development kits can provide a simulated mobile environment for development and testing

• Testing is not as important in mobile app development, since the apps are such low-priced products

• Mobile apps can either take advantage of hardware features or can be cross-platform, but not both

• Mobile app revenues are expected to grow

• Whether a mobile app is native, hybrid, or web, depends on how the app will be used and what hardware needs to be accessed by the app

you have a desktop computer that provides a 250-watt power supply. you recently added a four-disk raid 10 array to the system, and now it spontaneously shuts down. which of the following would most likely solve this issue?

Answers

Upgrade to a power supply that provides more volts. The correct option is 4.

What is desktop computer?

PC is an umbrella term for all Windows-based computers. Any computer that is stationary and is not a laptop is referred to as a desktop. PCs are all Windows-based desktops, but not all PCs are desktops.

Because you have a desktop computer with a 250-watt power supply. You recently added a four-disk raid 10 array to the system, and it is now shutting down on its own. Upgrade to a higher-voltage power supply.

Thus, the correct option is 4.

For more details regarding desktop computer, visit:

https://brainly.com/question/29130374

#SPJ1

Your question seems incomplete, the probable complete question is:

You have a desktop computer that uses a 250-watt power supply. You recently added a four-disk RAID 10 array to the system, and now it spontaneously shuts down.

Which of the following would MOST likely solve this issue?

Use the switch on the power supply to switch from 115 VAC to 230 VAC.Upgrade to a power supply that provides more watts.Upgrade to smaller capacity hard drives.Upgrade to a power supply that provides more volts.

the time base for a timer instruction is 0.01 seconds. what is the delay time if the preset value is 3000

Answers

Answer:

suppose time base is set to 0.1 and delay increment is set to 50. timer has 5 sec delay (0.1*50)

not sure.

Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.

Answers

Answer:

Here's an example of a program that does what you've described:

# Get the number of elements in the array

n = int(input("Enter the number of elements to store in the array: "))

# Initialize the array

arr = []

# Get the elements of the array from the user

print("Enter the elements of the array:")

for i in range(n):

   arr.append(int(input()))

# Print out which numbers are divisible by 5

print("The following numbers are divisible by 5:")

for i, x in enumerate(arr):

   if x % 5 == 0:

       print(f"{i}: {x}")

This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.

Explanation:

"our account has been moderated because one or more of the charges on the account were reported as unauthorized or disputed by the billing account holder". what notification is this?

Answers

This notification means that your account has been moderated because one or more of the charges on the account were reported as unauthorized or disputed by the billing account holder.

If you receive this notification, it means that your account has been moderated because one or more of the charges on the account were reported as unauthorized or disputed by the billing account holder.

This can happen if you make a charge that the account holder does not recognize, or if there is a dispute about a charge. If this happens, you will need to contact the billing account holder to resolve the issue.

For more questions like Notification click the link below:

https://brainly.com/question/6199558

#SPJ4

X565: Simple Text Parameter Output

Answers

The given method is incomplete, and there are errors in the examples and expected output provided. Here is the corrected method to print out the parameter in the explanation part.

What is programming?

Making a set of instructions that instruct a computer how to carry out a task is the process of programming. Computer programming languages like JavaScript, Python, and C++ can all be used for programming.

The corrected method to print out the parameter is:

public void simplePrint(String a) {

   System.out.println(a);

}

Examples and expected output:

simplePrint("Hello") outputs HellosimplePrint("Hello world!") outputs Hello world!simplePrint("hello") outputs hellosimplePrint("Hello World!") outputs Hello World!simplePrint("This is a sentence") outputs This is a sentencesimplePrint("1, 2, 3") outputs 1, 2, 3simplePrint("A new sentence") outputs A new sentence

Thus, this can be the expected outputs.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ9

Your question seems incomplete, the probable complete question is:

Simple Text Parameter Output Complete this method to print out the parameter.

Examples:

simpleprint (Hello) outputs Hello

simplePrint(Hello world!) outputs Hello world!

Your Answer: 1

public void simplePrint(String a) 2 { 3 43 5

simplePrint(Hello) outputs Hello -

simplePrint(hello) outputs hello

SimplePrint("hello") outputs "hello" expected:<[h]ello> but was:<[H]ello> simplePrint(Hello World!) outputs Hello World! SimplePrint("Hello World!") outputs "Her World!" expected:<Hello[ World!]> but w- <Hello[]>

simplePrint(This is a sentence) outputs TI is a sentence SimplePrint("This is a sentence") outputs "This is a sentence" expected:<[This is a sentence]> but was:<[Hello]>

simplePrint(1,2,3) outputs 1,2,3 SimplePrint("1, 2,3") outputs 1, 2, 3" expected:<[1, 2, 3]> but was:<[Hello]>

simplePrint(A new sentence) outputs A new

What type of system software manages memory?

Answers

Answer:

"Operating System"

Explanation:

The type of system software that manages memory is an operating system. To manage memory, the operating system employs a number of software strategies.

What is system software?

The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer.

You can converse with the computer using this method even if you don't understand its language. Memory connections are the structures that come before and after all memory areas, whether they are allocated or available.

Working memory, short-term memory, and long-term memory are the three primary categories of memory. While long-term memory stores your enduring memories, working memory and short-term memory enable you to retain and use transient information.

Therefore, an operating system is a sort of system software that controls memory.

To learn more about system software, refer to the link:

https://brainly.com/question/12908197

#SPJ2

Array Basics pls help

Array Basics pls help

Answers

Answer:

import java.util.Random;

class Main {

 static int[] createRandomArray(int nrElements) {

   Random rd = new Random();

   int[] arr = new int[nrElements];

   for (int i = 0; i < arr.length; i++) {

     arr[i] = rd.nextInt(1000);

   }

   return arr;

 }

 static void printArray(int[] arr) {

   for (int i = 0; i < arr.length; i++) {

     System.out.println(arr[i]);

   }

 }

 public static void main(String[] args) {

   int[] arr = createRandomArray(5);

   printArray(arr);

 }

}

Explanation:

I've separated the array creation and print loop into separate class methods. They are marked as static, so you don't have to instantiate an object of this class type.

Which part of the Result block should you evaluate to determine the needs met rating for that result

Answers

To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.

What is the  Result block

The assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.

The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.

Learn more about Result block from

https://brainly.com/question/14510310

#SPJ1

Which four of the following are true about fair use?

Which four of the following are true about fair use?

Answers

D,C,B

Should be the correct answers. I'm not the best when it comes to copyright but I believe those are correct.

What is a common method used in social engineering?

Answers

Explanation:

they are phishing, pretexting, baiting, quid pro quo and tailgating.

What are the advantages, strengths and/or weaknesses of remote access methods and techniques such as RADIUS, RAS, TACACS+ and VPN?

Answers

Answer:

they store authentication details in the remote server and its retrieval is encrypted. But it can also be very slow when the network signal is down.

Explanation:

Private IP network like in a small or enterprise company needs access control methods to prevent unwanted access to files by unauthorized employees. The regular router ssh authentication is good for a small company but it has no backup storage to hold user login details and easily be hacked by attackers. So the AAA policy is adopted to prevent this. it stands for authentication, authorization and accounting, and uses protocols like the RADIUS, TACAS+, VPN, etc, to prevent unwanted access. it is fast and saves all the login details of all the employees in the network, but experiences slow or no authentication when network is down.

Other Questions
The power of a(n) ________ is the ability to link tables to one another -5x-2x-4x Write the polynomial in standard form. Then identify the polynomial by the number of terms. Find the value of n. All STDs will go away if left untreated. A. True B. False I need this answered pleasefind the midpoint of the fico score interval 550-599 45 POINTS Which of the following statements is not true regarding the intention of this piece of art known as the Perumal Temple Statue? a. The expressions on the faces of the deities encourage calmness and faith. b. The sameness of the deities displays unity. c. The hands of the deities are open to provide a sense of openness and safety. d. The images are multi-colored to show Hindu acceptance of all races. What is the slope of the line 3y=6x-1 Nurse jamie is caring for a client hospitalized with acute exacerbation of copd which finding would the nurse expect to note on assessment of this client? bonjour j'ai besoin d'aide pour rpondre a cette question : "Quels sont les codes de l'amour courtois dont le texte se moque, et pourquoi ?"en ce servant du texte ci-dessous : Jadis dans un autre paysUn chevalier aima une dame.Tant que la dame fut son avantage,Elle lui refusa son amour,Jusqu'au jour o elle lui dit : Ami, Je vous ai longtemps amus par mes paroles;Or votre amour est connu et prouv, Dsormais, je serai toute votre gr. Le chevalier la regarda bien en face, Il la vit pale et dcolore. Dame, fait-il, je n'ai pas de chanceQue ds l'autre anne, vous n'ayez eu cette pense.Votre beau visage qui ressemblait la fleur de lisMe parat avoir tellement chang de mal en pisQu'il m'est avis que vous n'tes plus la mme mes yeux.Vous avez pris bien tard cette dcision, madame. Quand la dame s'entendit railler' de cette manire, Elle en eut honte, et elle dit tourdiment : Par Dieu, vassal", croyez-vous qu'on doive vous aimer Et que je parle srieusement?Cela ne m'est pas venu l'esprit.Jamais je n'aurai daign vous aimerVu que vous avez souvent plus grande envieD'embrasser un bel adolescent. - Madame, j'ai bien oui parlerDe votre beaut, mais ce n'est pas d'aujourd'hui.J'ai oui conter de TroieQue cette ville fut jadis de trs grande puissance, Et maintenant on en trouve peine l'emplacement.Pour ce, je vous conseille d'excuserQue soient accuss de tricherieCeux qui dsormais ne voudront vous aimer. - Vassal, vous avez eu une fcheuse ide De me reprocher mon ge;Si ma jeunesse est tout fait passe,Je suis d'autre part riche et de haut parage" On m'aimerait avec un peu de beaut.Il n'y a pas un moisQue le marquis m'envoya son messagerEt le Barrois a jout pour l'amour de moi. Par Dieu, dame, cela doit bien vous ennuyer De regarder toujours la haute situation.On n'aime pas une dame pour sa parent, Mais on l'aime quand elle est belle et sage;45 Vous en saurez un jour la vrit :Car il y en a bien cent qui ont jout pour l'amour de vous, Qui, fussiez-vous la fille du roi de Carthage, Ne le voudraient plus aujourd'hui. Merci d'avance the zipper like mountain ranges the run across the flor of the ocean are called ?? why did V.M molotv come up with the moltv plan ? 1. Under pegged exchange rates, interest rate differences influence the movement of exchange rates.a.Trueb.False2.Which transactions are recorded in the balance of payments?A) Donations to charities based in another countryB) Payments of membership dues in international organizationsC) Transfers from citizens working abroad to their parentsD) All of the above3.If a country has a balance of payment deficit, this means:A) It exports less goods than it importsB) It exports less goods and services than it importsC) Its transfers send abroad exceed the transfers receivedD) The sum of its goods exports, service exports, and transfers received is less than the sum of is goods imports, service imports, and transfers sent. With reference to the straight-line depreciation method, which of the following statement is false? a. The asset is depreciated down to a book value equal to the salvage value. b. The book value of the asset decrements by a fixed amount each year. c. The depreciation life (N) is set based on the MACRS property classes. d. An equal amount of depreciation is allocatted in each year. ook up the standard size headers for the protocols tcp, ip, and ethernet. what is the overhead for sending a 2 byte application packet using these protocols? what is the overhead for sending an 800 byte application packet? to d Multiple (2x+1)(x-5) Match the fast glycolytic fibers to its characteristics Moderate myoglobin, mitochondria, and blood capillaries Fatigue-resistant None of the included answers is correct Few myoglobin, mitochondria, b In attempting to navigate New York City's subway system in a wheelchair, John Hockenberry reports that: during your first day on the job, you are asked to respond to a customer inquiry regarding an extended warranty. the best informal information gathering technique for this situation would be to: how would the period of pendulum differ from an equivalent one on earth? Draw a quadrilateral with one pair of parallel sides and two right angles. Explain why this figure is a trapezoid.