Write a static method named lowestPrice that accepts as its parameter a Scanner for an input file. The data in the Scanner represents changes in the value of a stock over time. Your method should compute the lowest price of that stock during the reporting period. This value should be both printed and returned as described below.

Answers

Answer 1

Answer:

Explanation:

The following code is written in Java. It creates the method as requested which takes in a parameter of type Scanner and opens the passed file, reads all the elements, and prints the lowest-priced element in the file. A test case was done and the output can be seen in the attached picture below.

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

class Brainly{

   public static void main(String[] args) throws FileNotFoundException {

       Scanner console = new Scanner(System.in);

       System.out.print("file location: ");

       String inputLocation = console.next();

       File inputFile = new File(inputLocation);

       Scanner in = new Scanner(inputFile);

       lowestPrice(in);

   }

   public static void lowestPrice(Scanner in) {

       double smallest = in.nextDouble();

       while(in.hasNextDouble()){

           double number = in.nextDouble();

           if (number < smallest) {

               smallest = number;

           }

       }

       System.out.println(smallest);

       in.close();

   }

}

Write A Static Method Named LowestPrice That Accepts As Its Parameter A Scanner For An Input File. The

Related Questions

what is a microscope ​

Answers

Answer:

an optical instrument used for viewing very small objects, such as mineral samples or animal or plant cells, typically magnified several hundred times

Answer:

A microscope is a laboratory instrument used to examine objects that are too small to be seen by the naked eyes.

1) It is possible to email a document
directly from the Word application.
O FALSE
O TRUE

Answers

Answer:

True

Explanation:

in order to switch from paper to digital medical records the hospital bought in several individuals to introduce and implement the tools needed to organize the files . These individuals would best be described as

Answers

Available options are:

A. Technical champions

B. Engaged filmmakers

C. Business partners

D. Compliance champions

Answer:

Technical champions

Explanation:

Given that a "Technical Champion" is someone whose responsibility is to introduce and perform the role of enabling the use of technology, development of skills across the organization, and strengthen communication between Information Technology and the staff or employees.

Hence, in this case, considering the job descriptions described in the question above, these individuals would best be described as TECHNICAL CHAMPIONS

Write a program named prices.c that repeatedly asks users to enter the price of an item until they enter zero. Prices less than zero will be ignored. The program will then print the number of items purchased, the subtotal of the prices, the sales tax charged (at a rate of 7.5%), and the grand total.

Answers

Answer:

Explanation:

The following is written in Java. It creates a while loop that requests price from the user and goes adjusting the quantity and subtotal as more prices are added. If 0 is entered it breaks the loop and outputs the quantity, subtotal, tax, and grand total to the user.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int quantity = 0;

       double subtotal = 0;

       double tax, grandTotal;

       while (true) {

           System.out.println("Enter a price: ");

           double price = in.nextDouble();

           if (price == 0) {

               break;

           } else if (price > 0) {

               quantity += 1;

               subtotal += price;

           }

       }

       tax = subtotal * 0.075;

       grandTotal = subtotal + tax;

       System.out.println("Quantity: $" + quantity);

       System.out.println("Subtotal: $" + subtotal);

       System.out.println("Tax: $" + tax);

       System.out.println("GrandTotal: $" + grandTotal);

   }

}

how can you explain that algorithm and flowchart are problem solving tools?​

Answers

Answer:

Algorithm and flowchart are the powerful tools for learning programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way. Algorithm and flowcharts helps to clarify all the steps for solving the problem.

Which XXX declares a student's name. public class Student { XXX private double myGPA; private int myID; public int getID() { return myID; } } Group of answer choices String myName; public String myName; private myName; private String myName;

Answers

Question:

Which XXX declares a student's name.

public class Student {

   XXX

   private double myGPA;  

   private int myID;

   public int getID() {

        return myID;

   }

}

Group of answer choices

a. String myName;

b. public String myName;

c. private myName;

d. private String myName;

Answer:

private String myName;

Explanation:

To declare a student's name, the following should be noted.

i. The name of the student is of type String

ii. Since all of the instance variables (myGPA and myID) have a private access modifier, then myName (which is the variable name used to declare the student's name) should be no exception. In other words, the student's name should also have a private access.

Therefore, XXX which declares a student's name should be written as

private String myName;

Option (a) would have been a correct option if it had the private keyword

Option (b) is not the correct option because it has a public access rather than a private access.

Option (c) is not a valid syntax since, although it has a private access, the data type of the variable myName is not specified.

Option (d) is the correct option.

01 Describe all the possible component of a chart​

Answers

Answer:

Explanation:

1) Chart area: This is the area where the chart is inserted. 2) Data series: This comprises of the various series which are present in a chart i.e., the row and column of numbers present. 3) Axes: There are two axes present in a chart. ... 4)Plot area: The main area of the chart is the plot area

LAB: Warm up: Drawing a right triangle This program will output a right triangle based on user specified height triangle_height and symbol triangle_char. (1) The given program outputs a fixed-height triangle using a character. Modify the given program to output a right triangle that instead uses the user-specified triangle_char character. (1 pt) (2) Modify the program to use a loop to output a right triangle of height triangle_height. The first line will have one user-specified character, such as % or* Each subsequent line will have one additional user-specified character until the number in the triangle's base reaches triangle_height. Output a space after each user-specified character, including a line's last user-specified character. (2 pts) Example output for triangle_char = % and triangle_height = 5: Enter a character: Enter triangle height: 5 273334.1408726 LAB ACTIVITY 16.6.1: LAB: Warm up: Drawing a right triangle 0/3 main.py Load default template... 1 triangle_char - input('Enter a character:\n') 2 triangle_height = int(input('Enter triangle height:\n')) 3 print('') 4 5 print ('*') 6 print ("**') 7 print ("***') 8

Answers

Answer:

The modified program in Python is as follows:

triangle_char = input('Enter a character:\n')

triangle_height = int(input('Enter triangle height:\n'))  

for i in range(triangle_height):

   print(triangle_char * (i+1))

Explanation:

This gets the character from the user

triangle_char = input('Enter a character:\n')

This gets the height of the triangle from the user

triangle_height = int(input('Enter triangle height:\n'))  

This iterates through the height

for i in range(triangle_height):

This prints extra characters up to the height of the triangle

   print(triangle_char * (i+1))

Here's the modified program that incorporates the requested changes:

python

Copy code

triangle_char = input('Enter a character:\n')

triangle_height = int(input('Enter triangle height:\n'))

print('')

for i in range(1, triangle_height + 1):

   line = triangle_char * i + ' ' * (triangle_height - i)

   print(line)

This program uses a loop to iterate from 1 to triangle_height. In each iteration, it creates a line by concatenating triangle_char repeated i times with spaces (' ') repeated (triangle_height - i) times. The resulting line is then printed.

For example, if the user enters % as the character and 5 as the height, the output will be to make sure to maintain the indentation properly in your code for it to work correctly.

Learn more about python on:

https://brainly.com/question/30391554

#SPJ6

what are the different steps while solving a problem using computer? explain​

Answers

Explanation:

The following six steps must be followed to solve a problem using computer.

Problem Analysis.

Program Design - Algorithm, Flowchart and Pseudocode.

Coding.

Compilation and Execution.

Debugging and Testing.

Program Documentation.

You trained a binary classifier model which gives very high accuracy on thetraining data, but much lower accuracy on validation data. The following maybe true:
a. This is an instance of overfitting.
b. This is an instance of underfitting.
c. The training was not well regularized.
d. The training and testing examples are sampled from different distributions.

Answers

Answer:

a. This is an instance of overfitting.

Explanation:

In data modeling and machine learning practice, data modeling begins with model training whereby the training data is used to train and fit a prediction model. When a trained model performs well on training data and has low accuracy on the test data, then we say say the model is overfitting. This means that the model is memorizing rather Than learning and hence, model fits the data too well, hence, making the model unable to perform well on the test or validation set. A model which underfits will fail to perform well on both the training and validation set.

five technology tools and their uses​

Answers

Answer:

Electronic boards

Videoconferencing ability

Search engines

Cloud services

Computing softwares

Explanation:

Technology tools are used to simplify task bring ease, comfort as well as better satisfaction :

The use of electronic boards for teaching is an essential tool for students and educators alike as it provides great features aloowibg teachers to write and make drawings without hassle. This clear visual display goes a long way to aide student's understanding.

Videoconferencing breaks the barrier that distance and having to travel bring swhen it comes to learning. With this tools, students and educators can now organize classes without having to be physically present un the same class room.

Search engines : the means of finding solutions and hints to challenging and questions is key. With search engines, thousands of resources can now be assessed to help solve problems.

Cloud services : this provud s a store for keeping essential information for a very long time. Most interestingly. These documents and files can be assessed anywhere, at anytime using the computer.

Computing softwares : it often seems tune consuming and inefficient solving certain numerical problems, technology now p ovide software to handles this calculation and provides solutions in no time using embedded dded to codes which only require inputs.

In C complete the following:

void printValues ( unsigned char *ptr, int count) // count is no of cells
{
print all values pointed by ptr. //complete this part
}
int main ( )
{

unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;
call the printValues function passing the array data //complete this part
}

Answers

Answer:

#include <stdio.h>

void printValues ( unsigned char *ptr, int count) // count is no of cells

{

 for(int i=0; i<count; i++) {

   printf("%d ", ptr[i]);

 }

}

int main ( )

{

 unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;

 printValues( data, sizeof(data)/sizeof(data[0]) );

}

Explanation:

Remember that the sizeof() mechanism fails if a pointer to the data is passed to a function. That's why the count variable is needed in the first place.

Select all that apply to Enums: Group of answer choices While mainly a readability feature, we can technically use Enum to do things like spoof a boolean type in C allowing us some level of functionality Enums let us build a series of any kind of constant Enums allow us to print names for integers instead of numbers Enums are great for representing states and other common constants like colors Enums let us specifically value each constant we create Flag question: Question 59 Question 59

Answers

Answer:

-- While mainly a readability feature, we can technically use Enum to do things like spoof a Boolean type in C allowing us some level of functionality.

-- Enums are great for representing states and other common constants like colors.

-- Enums let us specifically value each constant we create.

Explanation:

Enums is a part of a programming language which helps a developer or a programmer to defined a set of the named constants. Using the enums will help in making it easier to document the intent and also to create set of distinct cases.

Option 1 is applicable as in the Boolean there are only TRUE and FALSE values. By using enum one can add more state like that of being difficult or normal or easy.

Option 4 is applicable because enums are used to represent various states and also other constants.

Option 5 is also applicable they allow the developer to create each value constant.

2. 5s is a Chinese principle adapted for use in the workplace.
True or False​

Answers

Answer:

A. true

Explanation:

because 5s is the.................

What are the basic characteristics of the linear structure in data structure

Answers

Explanation:

A Linear data structure have data elements arranged in sequential manner and each member element is connected to its previous and next element. This connection helps to traverse a linear data structure in a single level and in single run. Such data structures are easy to implement as computer memory is also sequential.

tools used to type text on Ms paint​

Answers

this is ur answer hope this answer will help u

Write a class named Pet, with should have the following data attributes:1._name (for the name of a pet.2._animalType (for the type of animal that a pet is. Example, values are "Dog","Cat" and "Bird")3._age (for the pet's age)The Pet class should have an __init__method that creates these attributes. It should also have the following methods:-setName -This method assigns a value to the_name field-setAnimalType - This method assigns a value to the __animalType field-setAge -This method assigns a value to the __age field-getName -This method returns the value of the __name field-getAnimalType -This method returns the value of the __animalType field-getAge - This method returns the value of the __age fieldWrite a program that creates an object of the class and prompts the user to enter the name, type, and age of his or her pet. This should be stored as the object's attributes. Use the object's accessor methods to retrieve the pet's name, type and age and display this data on the screen. Also add an __str__ method to the class that will print the attributes in a readable format. In the main part of the program, create two more pet objects, assign values to the attirbutes and print all three objects using the print statement.Note: This program must be written using Python language

Answers

Answer:

Explanation:

The following is written in Python, it contains all of the necessary object attributes and methods as requested and creates the three objects to be printed to the screen. The first uses user input and the other two are pre-built as requested. The output can be seen in the attached image below.

class Pet:

   _name = ''

   _animalType = ''

   _age = ''

   def __init__(self, name, age, animalType):

       self._name = name

       self._age = age

       self._animalType = animalType

   def setName(self, name):

       self._name = name

   def setAnimalType(self, animalType):

       self._animalType = animalType

   def setAge(self, age):

       self._age = age

   def getName(self):

       return self._name

   def getAnimalType(self):

       return self._animalType

   def getAge(self):

       return self._age

   def __str__(self):

       print("My Pet's name: " + str(self.getName()))

       print("My Pet's age: " + str(self.getAge()))

       print("My Pet's type: " + str(self.getAnimalType()))

name = input('Enter Pet Name: ')

age = input('Enter Pet Age: ')

type = input('Enter Pet Type: ')

pet1 = Pet(name, age, type)

pet1.__str__()

pet2 = Pet("Sparky", 6, 'collie')

pet3 = Pet('lucky', 4, 'ferret')

pet2.__str__()

pet3.__str__()

NO LINKS
Write a C++ program to accept a 5 digit integer and to validate the input based on the following rules.

Rules

1) The input number is divisible by 2. 2) The sum of the first two digits is less than last two digits. if the input number satisfies all the rules, the system prints valid and invalid, otherwise,

Example 1:

Enter a value: 11222

Output: Input number is valid

Example 2:

Enter a value: 1234

Output: Input number is invalid​

Answers

Answer:

#include <iostream>

#include <string>

#include <regex>

using namespace std;

int main()

{

   cout << "Enter a 5-digit number: ";

   string number;

   cin >> number;

   bool valid = regex_search(number, regex("^\\d{4}[02468]$"));

   if (valid) {

       valid = stoi(number.substr(0, 1)) + stoi(number.substr(1, 1))  

           < stoi(number.substr(3, 1)) + stoi(number.substr(4, 1));

   }

   cout << number << (valid ? " is valid" : " is invalid");

}

Explanation:

Regular expressions can do all of your checking except for the sum of digits check. The checks are i.m.o. easiest if you don't treat the input as a number, but as a string with digits in it.

The regex means:

^ start of string

\d{4} exactly 4 digits

[02468] one of 0, 2, 4, 6 or 8 (this is what makes it even)

$ end of string

4. All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent
through visual and auditory channels.
Communication includes both the verbal and nonverbal messages sent and received.
The goal of effective communication is mutual understanding.
You can improve your communication by improving your understanding of yourself, others,
and the context of the communication.
When you are listening to another person speak, you can avoid sending any messages by not
speaking and not making eye contact.

Answers

Answer:

D

Explanation:

Communication are happen when 2 people are response each other

It is not true that when you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact. The correct option is 4.

What is communication?

The process of communicating information, concepts, ideas, or sentiments between two or more people through a variety of means and channels, including verbal and nonverbal communication, is referred to as communication.

It is a myth that you may avoid transmitting any messages when you are listening to someone else speak by remaining silent and avoiding eye contact.

Your body language and nonverbal communication, such as your facial expressions and eye contact, can still convey information to the speaker even if you are not replying verbally or establishing eye contact.

Hence, even if a message is unintended or nonverbal, all types of communication entail sending and receiving messages.

Thus, the correct option is 4.

For more details regarding communication, visit:

https://brainly.com/question/22558440

#SPJ2

Your question seems incomplete, the probable complete question is:

All of the following statements are true EXCEPT one. Which

statement is NOT true?

Select the best option.

Communication occurs between senders and receivers within a context by messages sent through visual and auditory channels.Communication includes both the verbal and nonverbal messages sent and received. The goal of effective communication is mutual understanding.You can improve your communication by improving your understanding of yourself, others, and the context of the communication.When you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact.

Dan frequently organizes meetings and would like to automate the handling of the meeting responses. What should he
do to automatically move those responses into a subfolder?
O Configure an automatic reply.
O Configure the default meeting request options.
O Configure a Meeting Response Rule.
O Nothing, Dan must respond individually.

Answers

Answer:

Configure an automatic reply.

Explanation:

Dan's best option would be to configure an automatic reply. This reply will instantly be sent to any individual that messages Dan requesting a meeting. Once configured, Dan will no longer need to manually respond to each one of the messages and it will instead be handled automatically. These messages will also be automatically moved to the outbox where the messages that have been sent usually go.

Answer:

C

Explanation:

A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on the user’s/attacker’s screen and does not modify data stored on the server.

Answers

Answer:

" Non-persistent" is the right response.

Explanation:

A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.

Write a C class, Flower, that has three member variables of type string, int, and float, which respectively represent the name of the flower, its number of pedals, and price. Your class must include a constructor method that initializes each variable to an appropriate value, and your class should include functions for setting the value of each type, and getting the value of each type.

Answers

Answer and Explanation:

C is a low level language and does not have classes. The language isn't based on object oriented programming(OOP) but is actually a foundation for higher level languages that adopt OOP like c++. Using c++ programming language we can implement the class, flower, with its three variables/properties and functions/methods since it is an object oriented programming language.

Consider a file system using the indexed allocation. The block size is 512 bytes and the pointer to a block takes 2 bytes. The largest file size that a one level indexed allocation method could handle is ___________ KB. Recall that 1KB is equal to 210 bytes. Answer -1 if there is no limit based on the provided information.

Answers

Answer:

128 KB      

Explanation:

Given data :

The block size = 512 bytes

Block pointer size = 2 bytes

In an indexed allocation, a special block named Index Block contains all the pointers to the blocks that the file had occupied.

Therefore, the maximum number of block pointer in 1 block :

[tex]$=\frac{\text{block size}}{\text{pointer size}}$[/tex]

[tex]$=\frac{512}{2}$[/tex]

= 256

Thus, a block can hold maximum 256 pointers.

It is given the level of indexing is one. So,

Maximum size of the file =  maximum number of block pointers in 1 file x block size

                                          = 256 x 512

                                          [tex]$=2^8 \times 2^9$[/tex]

                                          [tex]$=2^{8+9}$[/tex]

                                           [tex]$=2^{17}$[/tex]

                                          [tex]$=2^7 \times 2^{10}$[/tex]

                                          [tex]$=128 \times 2^{10}$[/tex]

                                          = 128 KB   (∵ 1 KB = [tex]2^{10} \ B[/tex] )

Therefore, the largest file that 1 level if indexed allocation method can handle is 128 KB.

If the code for JAVA is LCXC, what is the code for BASIC?

Answers

Answer:

DCUKE

Explanation:

Given that,

Code for JAVA = LCXC

To find,

Code for BASIC = ?

As we observe the pattern,

In "JAVA", every letter moved two-letter forward in their alphabetical order or we can say that every third alphabet of the given letter is used to make the code:

J + 2 = L

A + 2 = C

V + 2 = X

A + 2 = C

Similarly,

B + 2 = D

A + 2  = C

S + 2 = U

I + 2  = K

C + 2 = E

Thus, DCUKE is the code for BASIC.

The code for BASIC given the code for JAVA is; DCUKE

We are given the code for JAVA as LCXC

From that code for "JAVA", we see that every letter is moved forward two letters in their alphabetical order. This means

J = L because L comes after J and KA = C because C comes after A and BV = X because X comes after V and UA = C because C comes after A and B

Similarly for BASIC;

B = D because D comes after B and CA = C because C comes after A and BS = U because U comes after S and TI = K because K comes after I and JC = E because E comes after C and D

Thus, finally the code for BASIC is DCUKE

Read more about JAVA at; https://brainly.com/question/18554491

Does anyone know what type of Chromebook this is?

Answers

A chromebook of course lol jk look it up and u can find what kind it is

Answer: Its............ A Chromebook type of Chromebook...??

Explanation:

Ion know I aint a geek, geezer -_- (Thats a lie)

Which of the following statement is true? Single choice. (2 Points) Views are virtual tables that are compiled at run time All of the Mentioned Views could be looked as an additional layer on the table which enables us to protect intricate or sensitive data based upon our needs Creating views can improve query response time

Answers

Answer:

All of the mentioned views could be looked as an additional layer in the table which enables us to protect intricate or sensitive data based upon our needs.

Explanation:

View is a virtual table which executed a pre compiled query. It is a table in which selective portion of the data can be seen from one or more tables. Queries are not allowed in indexed views and adding column is not possible. Views can be looked as an additional layer in the virtual table which protects sensitive data.

Physical safeguards, also called logical safeguards, and are applied in the hardware and software of information systems.

a. True
b. False

Answers

Answer:

False

Explanation:

They are not applied in the hardware and software of information systems.

Challenge: What is the largest decimal value you can represent, using a 129-bit unsigned integer?

Answers

Answer:

680564733841876926926749214863536422911

Explanation:

2¹²⁹ - 1 = 680564733841876926926749214863536422911

When performing the ipconfig command, what does the following output line depict if found in the tunnel adapter settings?
IPv6 Address: 2001:db8:0:10:0:efe:192.168.0.4
a. IPv6 is disabled.
b. The addresses will use the same subnet mask.
c. The network is not setup to use both IPv4 and IPv6.
d. IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe

Answers

Answer:

d. IPv4 Address 192.168.0.4 is associated with the globe IPv6 address 2001:db8:0:10:0:efe

Explanation:

The adapter setting will be associated with the global IP address. When Ipconfig command is operate the IP address finds the relevant domain and then address will use a different subnet. The network will use both IPv4 and IPv6 subnets in order to execute the command.

In the tunnel adapter settings, when performing the ipconfig command, the given output line depicts: D. IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe.

What is a tunnel adapter?

A tunnel adapter can be defined as a virtual interface which is designed and developed to encapsulate packets as a form of tunnel or virtual private network (VPN) protocol while sending them over another network interface.

In Computer networking, an output line of "IPv6 Address: 2001:db8:0:10:0:efe:192.168.0.4" in the tunnel adapter settings simply means that an IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe.

Read more on IP address here: https://brainly.com/question/24812743

Carla is assigning tasks to others and she needs to ensure that she is aware of their progress. Which option should
she choose?
O Send status report when I complete an assigned task
O Completed task color
O Set Quick Click flag
O Keep my task list updated with copies of tasks

Answers

Answer: Send status report when I complete an assigned task

Explanation:

In order to be aware of their progress, the option to choose is the "Send status report when I complete an assigned task".

To do this click on options on the tools menu, then click on task options. Then, after the keep updated copies of the assigned tasks on my task list has been selected in the check box, one will then select "Send status reports when the assigned tasks are completed".

Other Questions
Analyze the diagram below and complete the instructions that follow.Find the exact value of tan(M). Find the difference. 7.6 - 5.88 What is the inverse of the function g(x) = 1/2x + 1/2? The hire purchase price of a fridge is 16400. 25% is paid as deposit, the rest is spread over 12 equally monthly instalments. If the cash price is 20% less the hire purchase pries, (a) find the costs price of the fridge (b) calculate the deposit (c) what is the monthly installments (d) what is the differences between the cash price and the hire purchase prie This political cartoon is from 1919:An image shows a worker bound and gagged, lying on an anvil that is labeled capital. In front of the man stands an armored man labeled Knights of Labor. The armored man holds a hammer above the worker that reads Strike. The caption reads, Between the hammer and the anvil. The Granger Collection/Image Quest 2012Based on the cartoon, which of the following conclusions can be drawn? Union leaders worked to increase benefits for the common worker using two means: violence and illegal tactics. Workers strongly believed that striking was the only method that would cause government leaders to change unfair working conditions. Workers were had two unfavorable conditions: government regulation of business and the dangers of unions. Union leaders did little to help individual workers and instead took strides to benefit only themselves and their government supporters. What is the surface area and volume of the sphere shown below?Your response should show all necessary calculations and diagrams. In which artistic style is this painting, The Artist's Garden atGivernyImpressionistromanticabstractcubist examples of intuitionism theory in health care please help with this !!!! SO you hopefully selected that an Allele is a form of a gene. BUT what is this really...A. an allele is a protein that causes hair no hair in the guinea pigB. an allele is a length of DNA with a specific sequence of nitrogen bases that make a protein that results in Hair or No Hair on the guinea pig PLS HELP ASAP! FIND THE VOLUME OF X. A rectangle is 1 1/2 length and 4 1/4 width what is the area of rectangle The numbers are a whole and a fraction thats why there is a space Who was elected president of South Korea in 1948?O Mao Tse-tungO Syngman RheeO Chiang Kai-shekKim Il-Sung how do i solve this x^2 12x+36=0 What are the two great objectives that President Bush named?President Bush argued that Saddam Hussein had been the terrorist mastermind behind 9/11.Most nations in the world wanted to invade Iraq, and the United States agreed to lead the effort.After 9/11, President Bush declared war on people like Hussein who had threatened America in a terroristic way.After 9/11, President Bush argued that a man like Hussein could not be trusted with WMDs. PLEASEEEEEEE HELPPPPPPPPPPPPPPPPPPPP Point O is the center of dilation. Triangle D E F is dilated to create smaller triangle D prime E prime F prime. The length of O F prime is 3. The length of F prime F is 7. What is the scale factor of the dilation of triangle DEF? Will give brainliest if correctReread the poem "When I Rise" by Georgia Douglas Johnson.When I Rise UpWhen I rise up above the earth,And look down on the things that fetter me,I beat my wings upon the air,Or tranquil lie,Surge after surge of potent strengthLike incense comes to meWhen I rise up above the earthAnd look down upon the things that fetter me.Georgia Douglas JohnsonHow can you tell that "When I Rise" is a lyric poem? (Select all correct answers.)A- It uses imagery and metaphor.B- It expresses an emotional state.C- It is written in simple language.D- It doesn't tell a story. II-U-II-U-IH-U-IH-C-HH-C-HIU-U-ITiI-U-I 50 points!! please help!! drag each label to the correct location on the image. each label will be used once. which rights did the states have and which rights did the federal government have under the articles of confederation? declare war, control militia, run post office, negotiate with foreign powers, all other powers not specified in document, collect taxes categories: states | federal government