Construir un pseudocódigo que permita ingresar la temperatura de una ciudad. Si ingresa un valor mayor a 20 debe mostrar "Temperatura alta", si es mayor de 10 y menor o igual a 20 debe mostrar "Temperatura normal", caso contrario debe mostrar "Temperatura baja"

Answers

Answer 1

Answer:

VARIABLES

Real temperatura

ALGORITMO

Si temperatura > 20 haga:

Escriba "Temperatura alta"

Fin-Si

Si temperatura > 10 y temperatura <= 20 haga:

Escriba "Temperatura normal"

Fin-Si

Sino:

Escriba "Temperatura baja"

Fin-Si

Explanation:

A continuación, describimos el pseudocódigo para lograr las funcionalidades deseadas:

VARIABLES

Real temperatura

ALGORITMO

Si temperatura > 20 haga:

Escriba "Temperatura alta"

Fin-Si

Si temperatura > 10 y temperatura <= 20 haga:

Escriba "Temperatura normal"

Fin-Si

Sino:

Escriba "Temperatura baja"

Fin-Si


Related Questions

Write a Fortran Program to calculate area of a circle​

Answers

Explanation:

πr square

That's the formula for calculating area of a circle.

Describe computer in your own words on three pages

Answers

no entendi me explicas porfavor para ayudarte?

A company is considering making a new product. They estimate the probability that the new product will be successful is 0.75. If it is successful it would generate $240,000 in revenue. If it is not successful, it would not generate any revenue. The cost to develop the product is $196,000. Use the profit (revenue − cost) and expected value to decide whether the company should make this new product.

Answers

Answer:

-16000

Explanation:

Given

P(success) = 0.75

Amount generated on success, X = 240000

P(not successful) = P(success)' = 1 - 0.75 = 0.25

Revenue generated, 0

Product development cost = 196000

Profit = Revenue - cost

When successful ; 240000 - 196000 = 44000

Unsuccessful ; 0 - 196000 = - 196000

x __________ 44000 _____ - 196000

P(x) _________ 0.75 _________ 0.25

The expected value ; E(X) = Σx * p(x)

Σx * p(x) = (44000 * 0.75) + (-196000 * 0.25)

= 33000 + - 49000

= - 16000

Hence, the company should not make the product

Answer:

-16000

Given P(success) = 0.75

Amount generated on success, X = 240000

P(not successful) = P(success)' = 1 - 0.75 = 0.25

Revenue generated, 0

Product development cost = 196000

Profit = Revenue - cost

When successful ; 240000 - 196000 = 44000

Unsuccessful ; 0 - 196000 = - 196000

x __________ 44000 _____ - 196000

P(x) _________ 0.75 _________ 0.25

The expected value ; E(X) = Σx * p(x) Σx * p(x) = (44000 * 0.75) + (-196000 * 0.25) = 33000 + - 49000 = - 16000 Hence, the company should not make the product

Explanation:

edge 2021

full form of computer​

Answers

Answer:

COMPUTER: Common Operating Machine Purposely used for Technological and Educational research.

Explanation:

By the way, a computer is not an acronym and is the name of an electronic device.

A computer is a simple machine that we can program for a lot of logical and arithmetic functions, and it executes our work according to our instructions.

in simple words, a computer is an electronic device that makes our work easy, and any computer that has been programmed for some set of works, it performs that task or works quickly and correctly.

Examine the following output:
4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62]
5 39 ms 39 ms 65 ms placa01gr00.bb.ispxy.com [154.11.12.11]
6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14]
7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [204.171.205.29]
8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1]
Which command produced this output?
a. tracert
b. ping
c. nslookup
d. netstat

Answers

Answer:

a. tracert

Explanation:

Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.

Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector (except the last value) with the last value in the vector subtracted from each value. Output each value on a new line. Ex: If the input is -46 66 76 9 -1, the output is:
-55
57
67

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> nums;

int num;

cin>>num;

while(num != -1){

 nums.push_back(num);

 cin>>num; }  

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

return 0;

}

Explanation:

This declares the vector

vector<int> nums;

This declares an integer variable for each input

int num;

This gets the first input

cin>>num;

This loop is repeated until user enters -1

while(num != -1){

Saves user input into the vector

 nums.push_back(num);

Get another input from the user

 cin>>num; }

The following iteration print the vector elements

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

Need help ASAP!

Which of the following statements is true?

1) A PCAP format is handy because there is no additional tool to read it.
2) Network traffic can be captured using the Tcpdump protocol analyzer.
3) Normally, traffic inside a network is recorded within a capture file.
4) Sniffer is a program to save the network capture to a specific format.

Answers

The statement that  is true is that  Network traffic can be captured using the Tcpdump protocol analyzer.

How is network traffic captured?

Network traffic can be taken in using the Tcpdump. This is known to be a kind of packet sniffer that is often used to look and record network traffic on an interface.

An example is when a person capture 1,000 packets through the use of tcpdump. One can then analyze network traffic by using actual network traffic analyzer, which is as Wireshark.

Learn more about Network traffic from

https://brainly.com/question/26199042

x-1; while x ==1 disp(x) end, then the result a. infinity or b. (1) ​

Answers

Answer:

1 is the answer because ur trying to trick us

Explanation:

After reading all L02 content pages in Lesson 02: Inheritance and Interfaces, you will complete this assignment according to the information below.Do not use the scanner class or any other user input request. You application should be self-contained and run without user input.Assignment ObjectivesPractice on implementing interfaces in JavaFootballPlayer will implement the interface TableMemberOverriding methodswhen FootballPlayer implements TableMember, FootballPlayer will have to write the real Java code for all the interface abstract methodsDeliverablesA zipped Java project according to the How to submit Labs and Assignments guide.O.O. Requirements (these items will be part of your grade)One class, one file. Don't create multiple classes in the same .java fileDon't use static variables and methodsEncapsulation: make sure you protect your class variables and provide access to them through get and set methodsAll the classes are required to have a constructor that receives all the attributes as parameters and update the attributes accordinglyAll the classes are required to have an "empty" constructor that receives no parameters but updates all the attributes as neededFollow Horstmann's Java Language Coding GuidelinesOrganized in packages (MVC - Model - View Controller)Contents

Answers

Solution :

App.java:  

import Controller.Controller;

import Model.Model;

import View.View;  

public class App

{  

public static void main(String[] args) // Main method

{  

Model model = new Model(); // Creates model object.    

View view = new View(); // Creates view object.    

Controller controller = new Controller(view, model); // Creates controller object that accepts view and model objects.    

}

}  

[tex]\text{Controller.java:}[/tex]  

package Controller;  

[tex]\text{impor}t \text{ Model.Model;}[/tex]

import View.View;  

[tex]\text{public class Controller}[/tex]

{

Model model; // Model object    

View view; // View object

public Controller(View v, Model m) // Method that imports both model and view classes as objects.

{

model = m;    

view = v;  

//view.basicDisplay(model.getData()); // basicDisplay method from View class prints FootballPlayer objects as Strings from Model class.  

view.basicDisplay(model.getMembers().get(1).getAttributeName(3));    

view.basicDisplay(model.getMembers().get(1).getAttribute(3));    

view.basicDisplay(model.getMembers().get(1).getAttributeNames());    

view.basicDisplay(model.getMembers().get(1).getAttributes());    

view.basicDisplay("size of names=" + model.getMembers().get(1).getAttributeNames().size());    

view.basicDisplay("size of attributes=" + model.getMembers().get(1).getAttributes().size());

}  

}  

FootballPlayer.java:

package Model;  

import java.util.ArrayList;  

public class FootballPlayer extends Person implements TableMember { // Used "extends" keyword to inherit attributes from superclass Person, while using "implements" to implement methods from TableMember interface.    

private int number; // Creating private attribute for int number.    

private String position; // Creating private attribute for String position.  

public FootballPlayer(String name, int feet, int inches, int weight, String hometown, String highSchool, int number, String position) // Full parameter constructor for FootballPlayer object (using "super" keyword to incorporate attributes from superclass).

{

super(name, feet, inches, weight, hometown, highSchool); // Used super keyword to include attributes from superclass.  

this.number = number; // Value assigned from getNumber method to private number instance variable for FootballPlayer object.  

this.position = position; // Value assigned from getPosition method to private position instance variable for FootballPlayer object.    

}  

public FootballPlayer() // No parameter constructor for FootballPlayer object.

{

this.number = 0; // Default value assigned to private number instance variable under no parameter constructor for FootballPlayer object.    

this.position = "N/A"; // Default value assigned to private position instance variable under no parameter constructor for FootballPlayer object.    

}  

Override

public String getAttribute(int n) // getAttribute method that is implemented from interface.

{

switch (n) { // Switch statement for each attribute from each FootballPlayer object. Including two local attributes, denoted by this. While the others are denoted by "super".

case 0:

return String.valueOf(this.number); // Use of the dot operator allowed me to discover String.valueOf method to output int attributes as a string.

case 1:

return this.position;

case 2:

return super.getName();

case 3:

return super.getHeight().toString();

case 4:

return String.valueOf(super.getWeight());

case 5:

return super.getHometown();

case 6:

return super.getHighSchool();

default:

return ("invalid input parameter");

}

}  

Override

public ArrayList<String> getAttributes() // getAttributes ArrayList method that is implemented from interface.

{

ArrayList<String> getAttributes = new ArrayList<>();    

for(int i = 0; i <= 6; i++){ // For loop to add each attribute to the getAttributes ArrayList from getAttributes method.    

getAttributes.add(getAttribute(i));    

}    

return getAttributes;

}  

Override

public String getAttributeName(int n) // getAttributeName method implemented from interface.

{

switch (n) { // Switch statement for the name of each attribute from each FootballPlayer object.

case 0:

return "number";

case 1:

return "position";

case 2:

return "name";

case 3:

return "height";

case 4:

return "weight";

case 5:

return "hometown";

case 6:

return "highSchool";

default:

return ("invalid input parameter");

}  

}  

The ________ is the most important component in a computer because without it, the computer could not run software. Note: You may use an acronym to respond to this question.

Answers

Answer:

Central processing unit (CPU)

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Hence, the most important component in a computer is the central processing unit (CPU) because without it, it is practically impossible for the computer to run any software application or program.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

diagram of a central processing unit​

Answers

Hehehehehehehehehehdurnrjrir

Given the following snippet of code, answer the following two questions based on the code: typedef enum {Sun, Mon, Tue, Wed, Thu, Fri, Sat} days; days x = Mon, y = Sat; while (x != y) { x++; } y++; printf("x = %d, y = %d", x, y); 1. What value will be printed for variable x? [ Select ] . 2. What value will be printed for variable y? [ Select ]

Answers

Answer:

1) The value of x will be 6.

2) The value of y will be 7.

Explanation:

1) The value of x will be 6.  

The enum values are labeled by default from 1. This means that Sun = 1, Mon = 2, Tue = 3 and so on.  

So, x = Mon = 2 and y = Sat = 6  

x increases up to y = 6 in the while loop.  

and then y also increments by 1.  

2)So the value of y = 7.  

You will need actual printf("Sun") or printf("Mon") for printing the actual text for the enum.

Decomposing and modularizing software refers to the process of combining a number of smaller named components having well-defined interfaces that describe component interactions into a single, larger monolithic system.

a. True
b. False

Answers

Answer:

b. False

Explanation:

Decomposing and modularizing means that a large software is being divided into smaller named components that have a well-defined interfaces which basically describes the component interactions. The main goal is to place these different functionalities as well as the responsibilities in different components.

Decomposition and modularization forms the principle of software design.

Hence, the answer is false.

¿Cuál es la diferencia de un ciudadano digital entre la vida real y la vida en línea?

Answers

No podes ir a lugar sin tarjeta verde en los Estados Unidos Digitalmente podes comprar lo que puedas

Describe what happens at every step of our network model, when a node of one network...

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

Compute the approximate acceleration of gravity for an object above the earth's surface, assigning accel_gravity with the result.
The expression for the acceleration of gravity is: (G*M)/(d2), where G is the gravitational constant 6.673 x 10-11, M is the mass of
the earth 5.98 x 1024 (in kg), and d is the distance in meters from the Earth's center (stored in variable dist_center)
Sample output with input: 6.3782e6 (100 m above the Earth's surface at the equator)
Acceleration of gravity: 9.81

Answers

Answer:

The summary of the given query would be summarized throughout the below segment. The output of the question is attached below.

Explanation:

Given values are:

[tex]G = 6.673e-11[/tex][tex]M = 5.98e24[/tex][tex]accel \ gravity = 0[/tex][tex]dist\ center=float(inp())[/tex]

here,

inp = input

By utilizing the below formula, we get

⇒ [tex]\frac{GM}{d^2}[/tex]

Now,

⇒ [tex]accel \ gravity=\frac{G\times M}{dist \ center**2}[/tex]

⇒ print("Acceleration of gravity: {:.2f}".format(accel_gravity))

how to add a fixed decimal value to an identifier using Delphi 10 coding?​

Answers

Answer:A declaration defines an identifier (such as the name of a function or variable) that ... This topic introduces the Delphi language character set, and describes the syntax for ... The Delphi language uses the Unicode character encoding for its character set, ... Integer and real constants can be represented in decimal notation as ...

Explanation:

Write an ALTER TABLE statement that adds two new columns to the Products table: one column for product price that provides for three digits to the left of the decimal point and two to the right. This column should have a default value of 9.99; and one column for the date and time that the product was added to the database.

Answers

Answer:

ALTER TABLE Products

ADD Products_price float(5,2) DEFAULT 9.99,

ADD Adding_time datetime;

Explanation:

So at first we need to use ALTER TABLE statement, when we use this statement we also need to provide the table name. In this case, i assume it is 'Products'.

Then, as per question, we need to add two columns.

The first one is 'product_price' and it contains decimal points. So, we need to use ADD statement and give a column name like 'Prodcuts_price' and its datatype 'float' because it contains decimal or floating points. so, for 3 digits on the left and 2 digits on the right, it makes a total of 5 digits. So, we need to declare it like this. (5,2) it means a total of 5 digits and 2 after the decimal point. after that, we need to set our Default value using the DEFALUT statement. so DEFAULT 9.99. it will set the default value to 9.99 for existing products.

And for our next column, we give its a name like 'Adding_time' then it's datatype 'datetime' because it will contain date and times.

what was the computer works in binary functions

Answers

Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing.

Which of the following is not true about deep learning

Answers

Answer: it is also known as supervised learning

Explanation:

Deep learning is a sub field of machine learning and it refers to an artificial intelligence function that has to do with the imitation of the way that the brain works in the processing data which are used in making decisions.

It should be noted that deep learning is not thesame as supervised learning. While there's no creation of high-level abstraction of input features in the supervised learning, there's formation of abstractions of input features in deep learning.

Given that s refers to a set, write a statement that attempts to remove integer 11 from the set, but will do nothing if 11 is not in the set.

Answers

Answer:

Here is the code:-

#(5) Given that s refers to a set, write a statement that attempts  

#to remove the int value 11 from the set, but will do nothing if 11 is  

#not in the set  

#check if 11 is in not in s  

if 11 is not in s:  

   pass  

else:  

   #other wise remove 11 from s  

   s.remove(11)

Explanation:

PLS PAK I ANSWER NITO KAILANGAN LANGPO​

Answers

1. E-gro.up

2. Faceb.ook

3. Gm.ail

4. Go to www.gm.ail.com

5. Gm.ail

6. Go to www.faceb.ook.com

These are the answers.

the grade point average collected from a random sample of 150 students. assume that the population standard deviation is 0.78. find the margin of error if c = 0.98.

Answers

Answer:

[tex]E = 14.81\%[/tex]

Explanation:

Given

[tex]n = 150[/tex]

[tex]\sigma = 0.78[/tex]

[tex]c = 0.98[/tex]

Required

The margin of error (E)

This is calculated as:

[tex]E = z * \frac{\sigma}{\sqrt{n}}[/tex]

When confidence level = 0.98 i.e. 98%

The z score is: 2.326

So, we have:

[tex]E = 2.326 * \frac{0.78}{\sqrt{150}}[/tex]

[tex]E = 2.326 * \frac{0.78}{12.247}[/tex]

[tex]E = \frac{2.326 *0.78}{12.247}[/tex]

[tex]E = \frac{1.81428}{12.247}[/tex]

[tex]E = 0.1481[/tex]

Express as percentage

[tex]E = 14.81\%[/tex]

7. Lower than specified oil pressure is measured on a high-mileage engine. Technician A says that worn main or rod bearings could be the cause. Technician B says that a clogged
oil pump pickup screen could be the cause. Who is correct?

O A. Neither Technician A nor B

O B. Technician B

O C. Technician A

O D. Both Technicians A and B

Answers

Technician B as Technician A was a fraud

3 Marks] Q 2. A host has the IP address 196.22.44.133/21. What are the network address, broadcast address and valid host addresses for the IP subnet which the host is a member of​

Answers

Answer:

Address:   192.22.44.133         11000000.00010110.0 0101100.10000101

Netmask:   255.255.128.0     11111111.11111111.1 0000000.00000000

Network:   192.22.0.0/17         11000000.00010110.0 0000000.00000000 (Class C)

Broadcast: 192.22.127.255        11000000.00010110.0 1111111.11111111

HostMin:   192.22.0.1            11000000.00010110.0 0000000.00000001

HostMax:   192.22.127.254        11000000.00010110.0 1111111.11111110

Explanation:

about system implementation in long

Answers

Answer:

Systems implementation & evaluation

What is systems implementation?

What are the tools for physical systems design?

What are the issues to consider before an information system is operational?

What are the key indicators of a quality system?

What are the techniques for systems evaluation?

Systems implementation is the process of:

defining how the information system should be built (i.e., physical system design),

ensuring that the information system is operational and used,

ensuring that the information system meets quality standard (i.e., quality assurance).

Systems design

Conceptual design – what the system should do

Logical design – what the system should look to the user

Physical design – how the system should be built

Physical system design using structured design approach:

à To produce a system that is easy to read, code, and maintain

1. Factoring: decomposition

2. Span of control: 9 subordinate modules

3. Reasonable size: 50-100 LOC

4. Coupling: minimize inter-module dependency

5. Cohesion: single module functionality

6. Shared use: multiple calls to lower level modules from different bosses

Structured design tools

· Organization of programs and program modules (structure chart)

· Processing logic specification in each module (pseudocode)

Structure chart – to show graphically

how the various program parts/modules of an information system are physically organized hierarchically

how the modules communicate with each other through data couple (data exchange) and flag (control/message)

how the modules are related to each other in terms of sequence, selection, and repetition

preguntas sobre la búsqueda de alternativas de solución​

Answers

Answer:

Explanation:

Qué tipo de solución alternativa estás buscando

Describe how data is transmitted using half-duplex serial data transmission.

Answers

Answer:

In half duplex mode, the signal is sent in both directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same time. In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.

Consider an array inarr containing atleast two non-zero unique positive integers. Identify and print, outnum, the number of unique pairs that can be identified from inarr such that the two integers in the pair when concatenated, results in a palindrome. If no such pairs can be identified, print -1.Input format:Read the array inarr with the elements separated by ,Read the input from the standard input streamOutput format;Print outnum or -1 accordinglyPrint the output to the standard output stream

Answers

Answer:

Program.java  

import java.util.Scanner;  

public class Program {  

   public static boolean isPalindrome(String str){

       int start = 0, end = str.length()-1;

       while (start < end){

           if(str.charAt(start) != str.charAt(end)){

               return false;

           }

           start++;

           end--;

       }

       return true;

   }  

   public static int countPalindromePairs(String[] inarr){

       int count = 0;

       for(int i=0; i<inarr.length; i++){

           for(int j=i+1; j<inarr.length; j++){

               StringBuilder sb = new StringBuilder();

               sb.append(inarr[i]).append(inarr[j]);

               if(isPalindrome(sb.toString())){

                   count++;

               }

           }

       }

       return count == 0 ? -1 : count;

   }

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       String line = sc.next();

       String[] inarr = line.split(",");

       int count = countPalindromePairs(inarr);

       System.out.println("RESULT: "+count);

   }

}

Explanation:

OUTPUT:

Which statement, executed once at the start of main(), enables a program to generate a different sequence of pseudo-random numbers from rand() each time the program is run?

Answers

Answer:

(b) srand(time(0))

Explanation:

Given

See attachment for options

Required

Which would generate different set of random numbers

To do this, we analyze each of the options - one at a time.

(a) srand()

The above is an invalid usage of srand() because srand() requires an argument for it to function e.g. srand(2)

(b) srand(time(0))

The above is valid, and it will return different pseudo random numbers each time the statement is executed because time(0) lets srand() seed to the current time.

(c) srand(100)

The above is a valid usage of srand(), however rand() will generate same set of numbers because srand() has been seeded to only 100.

(d) time(srand())

The above is also an invalid usage of srand().

Other Questions
Toula has just baked a cake in the shape of a rectangle. Shewants to divide the cake into two right-angled triangles bycutting along a diagonal of the cake. Toula is then going to placea cake ribbon around the outside of each of the two triangularpieces of cake. If the length of the cake is 32 cm and its width is24 cm, how much cake ribbon will she need to buy, giving youranswer to an appropriate accuracy. When taken consistently, PrEP has been shown to reduce the risk of HIV infection in people who are at high risk bymore than___%.100%90%80%70% 10. Use the vertical line test to determine if the graph belowrepresents a function. If it is not a function, tell where thevertical line test fails. 11. If you put quotation marks around a key phrase in an internet search, what results will you get?A. Sites that contain all of those words in that orderB. Sites that contain none of those wordsC. Sites that contain all of those words in any orderD. Sites that contain any of those words 1. A nurse in a health clinic is reviewing contraceptive use with a group of adolescent clients. Which of the following statements by an adolescent reflects an understanding of the teaching? A."A water soluble lubricant should be used with condoms." B. "A diaphragm should be removed 2 hours after intercourse. 6. "Oral contraceptives can worsen a case of acne D. "A contraceptive patch is replaced once a month. Tanning Company analyzes its receivables to estimate bad debt expense. The accounts receivable balance is $360,000 and credit sales are $1,000,000. An aging of accounts receivable shows that approximately 5% of the outstanding receivables will be uncollectible. What adjusting entry will Tanning Company make if the Allowance for Doubtful Accounts has a credit balance of $1,200 before adjustment A square coffee shop has a perimeter of 20 meters. How long is each side of the coffee shop? Please help please just help me Othello Company understated its inventory by $20,000 at December 31, 2017. It did not correct the error in 2017 or 2018. As a result, Othello's stockholders' equity was: Question 4) Cmo______ (usted) a la escuela? a) vas b) voy d) va (a+b)^2*(a-b) please answer me fast Use the graph of the function to find its domain and range. Write the domain and range in interval notation. 5x^2-9x+4=0 zero product property Circle o has diameter AB and chord AC. Calculate the measure of 2 CAB if BC = 62".D Estimate 9272 - 28 by first rounding each number so that it has only 1 nonzero digit. qwertyuioplkjhgfdsazxcvbnmkijnhjuhnbhgygbvgftrfvcdswqwertyuioplkmnhgfdsazxcvbnm,koiuytrewsxcvghytrdfvh In a study, researchers wanted to measure the effect of alcohol on the hippocampal region, the portion of the brain responsible for long-term memory storage, in adolescents. The researchers randomly selected 23 adolescents with alcohol use disorders to determine whether the hippocampal volumes in the alcoholic adolescents were less than the normal volume of 9.02 cm3. An analysis of the sample data revealed that the hippocampal volume is approximately normal with no outliers and x=8.16 cm3 and s=0.7 cm3. Conduct the appropriate test at the =0.01 level of significance. (Please help if you can, I need this last answer done by tonight.)Use the universal law of gravitation to solve the following problem.Hint: mass of the Earth is = 5.97 x 1024 kgA scientific satellite of mass 1300 kg orbits Earth 200 km above its surface. If Earth has a radius of 6378 km, what is the force of gravity acting on the scientific satellite?a. Write out the formula for this problem.b. Plug in the values from this problem into the formula.c. Solve the problem, writing out each step.d. Correct answer Una masa de Hidrogeno ocupa 0.2 L a 100C. Determine su volumen a 0C, si la presin se mantiene constante. Como la presin y la cantidad de materia se mantienen constantes, podemos aplicar la ley de Charles Angelo cuts a piece of wood for a project. The first cut is shown and can be represented by the equation y = 1/5x-1. The second cut needs to be parallel to the first. It will pass through the point (0,6). Identify the equation that represents Angelo's second cut. 10 -10 10 --10 O A. y = -5x-6 B. y = 5x + 6 C. y = 5x + 6 O D. y - 18 x - 6