Describe how data is transmitted using half-duplex serial data transmission.

Answers

Answer 1

Answer:

In half duplex mode, the signal is sent in both directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same time. In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.


Related Questions

Create a list of lists, named hamsplits, such that hamsplits[i] is a list of all the words in the i-th sentence of the text. The sentences should be stored in the order that they appear, and so should the words within each sentence. Regarding how to break up the text into sentences and how to store the words, the guidelines are as follows: Sentences end with '.', '?', and '!'. You should convert all letters to lowercase. For each word, strip out any punctuation. For instance, in the text above, the first and last sentences would be: hamsplits[0] == ['and', 'can', 'you', 'by', ..., 'dangerous', 'lunacy'] hamsplits[-1] == ['madness', 'in', 'great', ..., 'not', 'unwatchd', 'go']

Answers

Answer:

Explanation:

The following code is written in Python. It takes in a story as a parameter and splits it into sentences. Then it adds those sentences into the list of lists called hamsplits, cleaned up and in lowercase. A test case is used in the picture below and called so that it shows an output of the sentence in the second element of the hamsplits list.

def Brainly(story):

   story_split = re.split('[.?!]', story.lower())

   hamsplits = []

   for sentence in story_split:

       hamsplits.append(sentence.split(' '))

   for list in hamsplits:

       for word in list:

           if word == '':

               list.remove(word)

To access a ___ library, you will need a computer and Internet access.

Answers

To access an online library, you will need a computer and an internet connection.

What are online libraries?

Online libraries are digital collections of books, journals, and other materials that are available to users through a web browser.

With a computer and internet access, users can browse, search, and read or download materials from the online library. Many online libraries also offer features such as personalized user accounts, bookmarking, and citation tools.

Online libraries have become increasingly popular as more content becomes available in digital format, making it easier and more convenient for people to access information from anywhere with an internet connection.

Read more about online library here:

https://brainly.com/question/20406929

#SPJ1

what was the computer works in binary functions

Answers

Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing.

Given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a VendingMachine object that performs the following operations:

Purchases input number of drinks
Restocks input number of bottles
Reports inventory
The VendingMachine is found in VendingMachine.java. A VendingMachine's initial inventory is 20 drinks.

Ex: If the input is:

5 2
the output is:

Inventory: 17 bottles

Need this answer in java! !!!!!!!!!!!!

Answers

Answer:

import java.util.Scanner;

class Main {

 public static void main (String args[])

 {

   Scanner input = new Scanner(System.in);

   VendingMachine machine = new VendingMachine(20);

   System.out.print("Enter nr to purchase: ");

   int nrPurchased = input.nextInt();

   System.out.print("Enter nr to re-stock: ");

   int nrRestock = input.nextInt();

   machine.Transaction(nrPurchased, nrRestock);

   input.close();

 }

}

class VendingMachine {

 private int inventory;

 public VendingMachine(int initialInventory) {

   inventory = initialInventory;

 }

 public void Transaction(int nrToBuy, int nrToRestock) {

   inventory += nrToRestock - nrToBuy;

   System.out.printf("Inventory: %d bottles.\n", inventory);

 }

}

The program is an illustration of a sequential program, and it does not require loops, iterations and branches.

The program in java, where comments are used to explain each line is as follows:

import java.util.Scanner;

class Main {

public static void main (String args[]){

   //This creates a scanner object

  Scanner input = new Scanner(System.in);

  //This gets input for the number of purchases

  int Purchased = input.nextInt();

  //This gets input for the number of restocks

  int Restock = input.nextInt();

  //This calculates and prints the inventory

System.out.print("Inventory: "+(20 - Purchased + Restock)+" bottles");

}

}

At the end of the program, the net inventory is printed.

Read more about similar programs at:

https://brainly.com/question/22851981

the grade point average collected from a random sample of 150 students. assume that the population standard deviation is 0.78. find the margin of error if c = 0.98.

Answers

Answer:

[tex]E = 14.81\%[/tex]

Explanation:

Given

[tex]n = 150[/tex]

[tex]\sigma = 0.78[/tex]

[tex]c = 0.98[/tex]

Required

The margin of error (E)

This is calculated as:

[tex]E = z * \frac{\sigma}{\sqrt{n}}[/tex]

When confidence level = 0.98 i.e. 98%

The z score is: 2.326

So, we have:

[tex]E = 2.326 * \frac{0.78}{\sqrt{150}}[/tex]

[tex]E = 2.326 * \frac{0.78}{12.247}[/tex]

[tex]E = \frac{2.326 *0.78}{12.247}[/tex]

[tex]E = \frac{1.81428}{12.247}[/tex]

[tex]E = 0.1481[/tex]

Express as percentage

[tex]E = 14.81\%[/tex]

A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor's website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?

a. Perform antivirus and anti-malware scans of the file.
b. Perform a hash on the file for comparison with the vendor’s hash.
c. Download the file a second time and compare the version numbers.
d. Compare the hash of the file to the previous firmware update.

Answers

Answer: B. Perform a hash on the file for comparison with the vendor’s hash.

Explanation:

Before installing the firmware update, the step that the technician should perform to ensure file integrity is to perform a hash on the file for comparison with the vendor’s hash.

Hashing refers to the algorithm that is used for the calculation of a string value from a file. Hashes are helpful in the identification of a threat on a machine and when a user wants to query the network for the existence of a certain file.

about system implementation in long

Answers

Answer:

Systems implementation & evaluation

What is systems implementation?

What are the tools for physical systems design?

What are the issues to consider before an information system is operational?

What are the key indicators of a quality system?

What are the techniques for systems evaluation?

Systems implementation is the process of:

defining how the information system should be built (i.e., physical system design),

ensuring that the information system is operational and used,

ensuring that the information system meets quality standard (i.e., quality assurance).

Systems design

Conceptual design – what the system should do

Logical design – what the system should look to the user

Physical design – how the system should be built

Physical system design using structured design approach:

à To produce a system that is easy to read, code, and maintain

1. Factoring: decomposition

2. Span of control: 9 subordinate modules

3. Reasonable size: 50-100 LOC

4. Coupling: minimize inter-module dependency

5. Cohesion: single module functionality

6. Shared use: multiple calls to lower level modules from different bosses

Structured design tools

· Organization of programs and program modules (structure chart)

· Processing logic specification in each module (pseudocode)

Structure chart – to show graphically

how the various program parts/modules of an information system are physically organized hierarchically

how the modules communicate with each other through data couple (data exchange) and flag (control/message)

how the modules are related to each other in terms of sequence, selection, and repetition

bao bì chủ động active packaging và bao bì thông minh intelligent packaging khác biệt như thế nào

Answers

answer:

yes....................

Design a function char maxChar (char,char)- to return the smallest character from the arguments.
in java please please​

Answers

Answer:

Following are the program to the given question:

public class Main//defining Main method

{

   char maxChar (char x1,char x2)//defining a method maxChar that takes two char parameter

   {

       if(x1<x2)//use if to compare char value

       {

           return x1;//return first char value

       }

       else//else block

       {

           return x2;//return second char value

       }

       

   }

public static void main(String[] args)//defining main method

{

    char x1,x2;//defining char variable

    x1='d';//use char to hold value

    x2='a';//use char to hold value

    Main ob=new Main();//creating class Object

 System.out.println(ob.maxChar(x1,x2));//calling method and prints its return value

}

}

Output:

a

Explanation:

In this code, a method "maxChar" is defined that holds two char variable "x1,x2" in its parameters, and use if conditional statement that checks the parameter value and print its return value.

In the main method, two char variable is declared that hold char value and passing the value in the method and prints its return value.  

Solve the following linear program graphically (each line represents one unit). The feasible region is indicated by the shading and the corner points have been listed for you. Determine the objective function value at the corner points and indicate the optimal solution (if any). Minimize: Z

Answers

Answer:

(a): The value of the objective function at the corner points

[tex]Z = 10[/tex]

[tex]Z = 19[/tex]

[tex]Z = 15[/tex]

(b) The optimal solution is [tex](6,2)[/tex]

Explanation:

Given

[tex]Min\ Z = X_1 + 2X_2[/tex]

Subject to:

[tex]-2X_1 + 5X_2 \ge -2[/tex] ---- 1

[tex]X_1 + 4X_2 \le 27[/tex] ---- 2

[tex]8X_1 + 5X_2 \ge 58[/tex] --- 3

Solving (a): The value of the at the corner points

From the graph, the corner points are:

[tex](6,2)\ \ \ \ \ \ (11,4)\ \ \ \ \ \ \ \ (3,6)[/tex]

So, we have:

[tex](6,2)[/tex] ------- Corner point 1

[tex]Min\ Z = X_1 + 2X_2[/tex]

[tex]Z = 6 + 2 * 2[/tex]

[tex]Z = 6 + 4[/tex]

[tex]Z = 10[/tex]

[tex](11,4)[/tex] ------ Corner point 2

[tex]Min\ Z = X_1 + 2X_2[/tex]

[tex]Z = 11 + 2 * 4[/tex]

[tex]Z = 11 + 8[/tex]

[tex]Z = 19[/tex]

[tex](3,6)[/tex] --- Corner point 3

[tex]Min\ Z = X_1 + 2X_2[/tex]

[tex]Z = 3 + 2 * 6[/tex]

[tex]Z = 3 + 12[/tex]

[tex]Z = 15[/tex]

Solving (b): The optimal solution

Since we are to minimize Z, the optimal solution is at the corner point that gives the least value

In (a), the least value of Z is: [tex]Z = 10[/tex]

So, the optimal solution is at: corner point 1

[tex](6,2)[/tex]

what are the functions of the windows button, Task View and Search Box? give me short answer

Answers

Answer:

Windows button = You can see a Start Menu

Task view = You can view your Tasks

Search Box = You can search any app you want in an instance

What intangible benefits might an organization obtain from the development of an

information system?​

Answers

Answer:

The immaterial benefits stem from the development of an information system and cannot easily be measured in dollars or with confidence. Potential intangible advantages include a competitive need, timely information, improved planning and increased flexibility in organisation.

Explanation:

Intangible advantages

Take faster decisionsCompetitive needMore information timelyNew, better or more information availability.

Lower productivity and the lack of 'think outside' employees and managers as well as greater sales include the intangible costs of such an operational environment. All these factors improve when employees spend less of their time in addressing current methods of operation and are concerned about whether they will have a job or an employer in six months or a year. The automation level envisaged in this new system should enhance the overall efficiency of management. The operative controls and design functions should be simplified by tight system integrations with accessible automated database sources. However, it is difficult to describe the exact form of these simplifications.

Tangible costs of the new system include costs of analysis, design and construction of the system, such as the recruitment of contractors or new employees, and the assignment of existing staff. Also consideration shall be given to hardware, software purchased and operating costs. Intangible costs include disturbances to the current activities caused by development and deployment and potential adverse effects on the morals of employees.

While the new system may feel good in the long term, short-term stress and other negative consequences will still be present. In the way that Reliable does virtually everything, the system is the focus of a major change. An organisation's monumental change has widespread negative effects on operations and employees.

trình bày ngắn gọn hiểu biết của bản thân về mạng máy tính theo mô hình OSI hoặc TCP/IP

Answers

Answer:

OSI đề cập đến Kết nối hệ thống mở trong khi TCP / IP đề cập đến Giao thức điều khiển truyền. OSI theo cách tiếp cận dọc trong khi TCP / IP theo cách tiếp cận ngang. Mô hình OSI, lớp truyền tải, chỉ hướng kết nối trong khi mô hình TCP / IP là cả hướng kết nối và không kết nối.

Explanation:

dab

Information systems cannot solve some business problems. Give three examples and explain why technology cannot help

Answers

Answer:

The following are brief descriptions or the three examples of the declaration presented.

Explanation:

The information capable of supplying just the data in a method to achieve the following objectives. However, the machine cannot decide about the company.Technology is unable to document as well as to adapt it according to the scenario, everything remains to be accomplished by hand.Individuals must thus recognize but instead capitalize mostly on regions of opportunity.

In a certain game, a player may have the opportunity to attempt a bonus round to earn extra points. In a typical game, a player is given 1 to 4 bonus round attempts. For each attempt, the player typically earns the extra points 70% of the time and does not earn the extra points 30% of the time. The following code segment can be used to simulate the bonus round.
success - 0
attempts - RANDOM 1, 4
REPEAT attempts TIMES
IF (RANDOM 110 s 7
success - success + 1
DISPLAY "The player had"
DISPLAY attempts
DISPLAY "bonus round attempts and"
DISPLAY success
DISPLAY "of them earned extra points."
Which of the following is not a possible output of this simulation?
А. The player had 1 bonus round attempts and 1 of them earned extra points.
B The player had 2 bonus round attempts and of them earned extra points.
С The player had 3 bonus round attempts and 7 of them earned extra points.
D The player had 4 bonus round attempts and 3 of them earned extra points.

Answers

Answer:

С The player had 3 bonus round attempts and 7 of them earned extra points.

Explanation:

Given

See attachment for correct code segment

Required

Which of the options is not possible?

From the question, we understand that:

[tex]attempts \to [1,4][/tex] --- attempt can only assume values 1, 2, 3 and 4

The following "if statement" is repeated three times

IF RANDOM[1,10] <= 7:

   success = success + 1

This implies that the maximum value of the success variable is 3

The first printed value is the attempt variable

The second printed value is the success variable.

From the list of given options, (a), (b) and (d) are within the correct range of the two variable.

While (c) is out of range because the value printed for variable success is 7 (and 7 is greater than the expected maximum of 3)

The ________ is the most important component in a computer because without it, the computer could not run software. Note: You may use an acronym to respond to this question.

Answers

Answer:

Central processing unit (CPU)

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Hence, the most important component in a computer is the central processing unit (CPU) because without it, it is practically impossible for the computer to run any software application or program.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

Describe computer in your own words on three pages

Answers

no entendi me explicas porfavor para ayudarte?

My iPhone XR screen is popping out. Is it because I dropped it?

Answers

Answer:

Yes that is most likely why your screen is popping out.

Explanation:

Most likely

Need help ASAP!

Which of the following statements is true?

1) A PCAP format is handy because there is no additional tool to read it.
2) Network traffic can be captured using the Tcpdump protocol analyzer.
3) Normally, traffic inside a network is recorded within a capture file.
4) Sniffer is a program to save the network capture to a specific format.

Answers

The statement that  is true is that  Network traffic can be captured using the Tcpdump protocol analyzer.

How is network traffic captured?

Network traffic can be taken in using the Tcpdump. This is known to be a kind of packet sniffer that is often used to look and record network traffic on an interface.

An example is when a person capture 1,000 packets through the use of tcpdump. One can then analyze network traffic by using actual network traffic analyzer, which is as Wireshark.

Learn more about Network traffic from

https://brainly.com/question/26199042

Let’s say you’re having trouble locating a file on your computer. Which of the following are good places to look for the file?

a. The Recycle Bin
b. Default folders like My Documents
c. The Downloads folder

Answers

Answer:

The downloads folder ( C )

Explanation:

when you have difficulty locating a file on your computer you can look for the file in any of the options listed ( The recycle bin, Default folders like My Documents  or The Downloads folder )

But the best place out of these three options is the Downloads folder. and this is because by default all files downloaded into your computer are  placed in the Downloads folder regardless of the type of file

which of the following is an example of how science can solve social problems?
It can reduce the frequency of severe weather conditions.
It can control the time and day when cyclones happen.
It can identify the sources of polluted water.
It can stop excessive rain from occurring.

Answers

Answer:

It can identify the sources of polluted water.

Explanation:

Science can be defined as a branch of intellectual and practical study which systematically observe a body of fact in relation to the structure and behavior of non-living and living organisms (animals, plants and humans) in the natural world through experiments.

A scientific method can be defined as a research method that typically involves the use of experimental and mathematical techniques which comprises of a series of steps such as systematic observation, measurement, and analysis to formulate, test and modify a hypothesis.

An example of how science can solve social problems is that it can identify the sources of polluted water through research, conducting an experiment or simulation of the pollution by using a computer software application.

In conclusion, science is a field of knowledge that typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life.

Answer:

It can identify the sources of polluted water.

Explanation:

discuss three ways in which the local government should promote safe and healthy living​

Answers

Answer:

1. Secure drinkable water

2. Promote organic products through the provision of subsidiaries

3. Create a place for bioproducts to be sold

Explanation:

Whether drinking, domestic, food production, or for leisure purposes, safe and readily available water is important for public health. Better water supply and sanitation and improved water resource management can boost economic growth for countries and can make a significant contribution towards reduced poverty.some of the claimed benefits of organic food:

Without the use of pesticides and chemical products, organic farming does not toxic residues poison land, water, and air. Sustainable land and resource use in organic farming. Crop rotation promotes healthy and fertile soil.

In conventional farming, the use of pesticides contaminates runoff, which is a natural part of the water cycle. In groundwater, surface water, and rainfall, pesticide residues are found. This means that in food produced with pesticides, contamination may not be isolated, but also affect the environment.

Create a place for bioproducts to be sold

Biologics offer farmers, shippers, food processors, food retailers, and consumers a wide range of benefits. Biocontrols can also help protect the turf, ornamentals, and forests in addition to food use. They can also be used for disease and harm controls in public health, i.e., mosquitoes and the control of ticks.

The benefits of the use of biologicals in farming applications tend to be more direct, though they are indirect. The list includes benefits to crop quality and yield which help farmers supply consumer products worldwide with healthy and affordable fruit and vegetables. Biocontrols also allow farmers in their fields to maintain positive populations of insects (natural predators) through their highly-target modes of action, reducing their reliance on conventional chemical pesticides.

Think Critically 5-1 Creating Flexible Storage.
It's been 6 months since the disk crash at CSM Tech Publishing, and the owner is breathing a little easier because you installed a fault-tolerant solution to prevent loss of time and data if a disk crashes in the future. Business is good, and the current solution is starting to get low on disk space. In addition, the owner has some other needs that might require more disk space, and he wants to keep the data on separate volumes. He wants a flexible solution in which drives and volumes aren't restricted in their configuration. He also wants to be able to add storage space to existing volumes easily without having to reconfigure existing drives. He has the budget to add a storage enclosure system that can contain up to 10 HDDs. Which Windows feature can accommodate these needs, and how does it work?

Answers

Answer:

The Storage Spaces feature in Windows

Explanation:

The Storage Spaces feature can be used here. This feature was initiated in Windows server 2012 and allows the user store his files on the cloud or virtual storage. This makes it possible to have a flexible storage as there is a storage pool which is updated with more storage capacity as it decreases. The feature also offers storage security, backing up files to other disks to protect against total loss of data on a failed disk.

3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, process, and retrieve data whenever needed. b. Modern processors run so fast in term of megahertz (MHz). c. If millions of calculations are to be performed, a computer will perform every calculation with the same accuracy. d. It is very safe to store data and information on the computer independently. e. If some electrical or electronic damages occur, there are no any chances of data loss or damage f. The output devices of the computer like monitor, printer, speaker, etc. can store meaningful information, g. The input devices can display the output after processing. h. Students can also use computer as their learning tools.​

Answers

Answer:

a,b,c,d,f,g are true only e is false

which of the following indicates that the loop should stop when the value in the quantity variable is less than the number 50​

Answers

Answer:

while (quantity >= 50)

Explanation:

Required

Stop when quantity is less than 50

To do this, we make use of a while statement and the syntax is:

while (condition){ }

If the loop should stop when quantity is less than 50; then it means the loop would continue when quantity is greater or equal to 50

So, we have:

while (quantity >= 50)

Questions to ask people on how corona has affected the religion sectors​

Answers

Answer:

bcoz of corona all churches and temples are closed and pilgrimage are cancelled

A technician is able to connect to a web however, the technician receives the error, when alternating to access a different web Page cannot be displayed. Which command line tools would be BEST to identify the root cause of the connection problem?

Answers

Answer:

nslookup

Explanation:

Nslookup command is considered as one of the most popular command-line software for a Domain Name System probing. It is a network administration command-line tool that is available for the operating systems of many computer. It is mainly used for troubleshooting the DNS problems.

Thus, in the context, the technician receives the error "Web page cannot be displayed" when he alternates to access different web page, the nslookup command is the best command tool to find the root cause of the connection problem.

preguntas sobre la búsqueda de alternativas de solución​

Answers

Answer:

Explanation:

Qué tipo de solución alternativa estás buscando

Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector (except the last value) with the last value in the vector subtracted from each value. Output each value on a new line. Ex: If the input is -46 66 76 9 -1, the output is:
-55
57
67

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> nums;

int num;

cin>>num;

while(num != -1){

 nums.push_back(num);

 cin>>num; }  

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

return 0;

}

Explanation:

This declares the vector

vector<int> nums;

This declares an integer variable for each input

int num;

This gets the first input

cin>>num;

This loop is repeated until user enters -1

while(num != -1){

Saves user input into the vector

 nums.push_back(num);

Get another input from the user

 cin>>num; }

The following iteration print the vector elements

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

or Java,
program to perform this computa
3.
Isaac Newton devised a clever method to casily approximate the square root of a number without having
to use a calculator that has the square root function. Describe this method with illustration​

Answers

Answer:

The illustration in Java is as follows:

import java.util.*;

import java.lang.Math.*;

class Main{

public static void main (String[] args){

 Scanner input = new Scanner(System.in);

 double num, root, temp;

 num = input.nextDouble();

 temp = num;

 while (true){

  root = 0.5 * ( (num / temp)+temp);

  if (Math.abs(root - temp) < 0.00001){

   break;   }

  temp = root;  }

 System.out.println("Root: "+root);

}}

Explanation:

This declares all necessary variables

 double num, root, temp;

This gets input for num (i.e the number whose square root is to be calculated)

 num = input.nextDouble();

This saves the input number to temp

 temp = num;

This loop is repeated until it is exited from within the loop

 while (true){

Calculate temporary square root

  root = 0.5 * ( (num / temp)+temp);

The loop is exited, if the absolute difference between the root and temp is less than 0.00001

  if (Math.abs(root - temp) < 0.00001){

   break;   }

Save the calculated root to temp

  temp = root;  }

This prints the calculated root

 System.out.println("Root: "+root);

Other Questions
The combustion of ethylene proceeds by the reaction C2H4 (g) + 3O2 (g) 2CO2 (g) + 2H2O (g)When the rate of disappearance of C2H4 is 0.13 M s-1, the rate of appearance of CO2 is ________ M s-1. Question 1 of 25Which equation is an example of a synthesis reaction?A. HNO3 + KOH KCI + H20B. 2Li+ CaCl2 - 2LiCl + CaO C. S+ 02 - S027O D. CH4 + 202 - 2H2O + CO2 Dng kin thc v suy lun3.1. Pht biu cc quy tc suy din modus ponens, la chn v bc cu.3.2. Em hy vit mt on vn ngn (khng qu 30 t, khng ging gio trnh) tha:1) Quy tc modus tollens.2) Quy tc, ( )( )x p xp a.3.3. Em hy xem on suy lun sau y theo quy tc logic no, c hp logic hay khng?1) Mt t nc mun pht trin v nhiu mt th cn phi hi nhp quc t. Vit Nam munpht trin v nhiu mt. Vy Vit Nam cn phi hi nhp quc t.2) Nu trng hc khng c thy gio tt v khng c c s vt cht tt th khng c chtlng gio dc tt. Trng X khng c c s vt cht tt m c cht lng gio dc tt.Vy trng X c thy gio tt. What are differences between Juneteenth and Fourth of July??5 for Juneteenth 5 for Fourth of JulyWhat are some similarities of Juneteenth and Fourth July? Give me 5 examples.ASAP please!! 4 1/3 - 2 1/2 divided by 1 2/3 1. My number has two digits.2. Double my number is less than 150.Follother3. I am not divisible by 12.4. My digits are different from each other.5. The second digit in my number is divisibleby an odd number.6. My first digit is less than my second digit.7. My digits add up to 14.way. The osmotic pressure of a solution formed by dissolving 0.231 g of the protein in 150 mL of water at 298 K is found to be 2.054 torr. Select the correct answer.In the following passage from Great Astronomers by Robert Stewall Ball, the author states that he will trace the developments in astronomy from the time of Ptolemy to the nineteenth century. Based on the content and style of the excerpt, what kind of audience did Ball primarily have in mind when he was writing this book?The history of astronomy thus becomes inseparable from the history of the great men to whose labours its development is due. In the ensuing chapters we have endeavoured to sketch the lives and the work of the great philosophers, by whose labours the science of astronomy has been created. We shall commence with Ptolemy, who, after the foundations of the science had been laid by Hipparchus, gave to astronomy the form in which it was taught throughout the Middle Ages. We shall next see the mighty revolution in our conceptions of the universe which are associated with the name of Copernicus. We then pass to those periods illumined by the genius of Galileo and Newton, and afterwards we shall trace the careers of other more recent discoverers, by whose industry and genius the boundaries of human knowledge have been so greatly extended. Our history will be brought down late enough to include some of the illustrious astronomers who laboured in the generation which has just passed away.A. students specializing in the study of astronomyB. people with a casual interest in astronomyC. scientists and mathematicians working with astronomersD. geologists and cartographers Find an equation for the perpendicular bisector of the line segment whose endpoints are (8,-5)(8,5) and (4,3)(4,3). Please help me on this question 1.Which of the following distinguishes the role of a floriculturist?forces bulbs for seasonal salesprovides attractively arranged flowers for the cut-flower tradegrows flowers for gardeners, landscapers, and floristsspecializes in greenhouse production of flowers Consider y=h() described in the table. When comparing h() to the parent function f()=cos(), which statements are true? Select all that apply. Kyle works at a donut factory, where a 10-oz cup of coffee costs 95, a 14-oz cup costs $1.15, and a 20-oz cup costs $1.50. During one busy period, Kyle served 14 cups of coffee, using 204 ounces of coffee, while collecting a total of $16.70. How many cups of each size did Kyle fill?Kyle filled ___ 10-oz cup(s), ___ 14-oz cup(s), and ___ 20-oz cup(s). How many ways can a person toss a coin 16 times so that the number of heads is between 7 and 14 inclusive How many quarters are there in 5 1? ?2 Interest rate (with changing years). Keiko is looking at the following investment choices and wants to know what annual rate of return each choice produces. a.Invest $360.00 and receive $788.17 in 11 years. b.Invest $3 comma 000.00 and receive $11 comma 499.87 in 17 years. c.Invest $31 comma 542.31 and receive $140 comma 000.00 in 22 years. d.Invest $32 comma 895.12 and receive $1 comma 100 comma 000.00 in 40 years. Derive the equation of the parabola with a focus at (0, 1) and a directrix of y = -1.c El volumen de un prisma de base rectangular es 24 m3. Si el largo de la base es 2,5 m y su ancho es 4 m, cul es la altura del prisma? x 8.2 = 10. What is the value of x? Matthew grows wheat on his farm. One of his fields produced 66.8 bushels of wheat this year. If wheat is currently selling for $5.40 per bushel, how much will Matthew earn from this field?