a heart murmur is caused by incorrect operation of ________?​

Answers

Answer 1

Answer:

the valves

Explanation:

science explains your questions answer. also did you know that the queen was an engineer in WWII? you probably did but you need 20 characters to submit an answere trust me it is the valves.


Related Questions

Assume that x is a char variable that has been declared and already given a value. Write an expression whose value is true if and only if x is a decimal digit (0-9).

Answers

Answer:

The expression in python is: x.isdigit()

Explanation:

Given

Character variable x

Required

Expression that evaluates if x is decimal or not

The expression in python is: x.isdigit()

If x is digit 0 - 9, x.isdigit() will equal True

Otherwise, it will equal False

Convert each number into scientific notation.
1. 4,000,000,000
2. 0.000000027
3. 67,760,000
4. 90,500
5. 540,900
6. 0.00904
7. 0.032
8. 512,000,000

Answers

Answer:

4 * 10^9

2.7 * 10^-8

6.776 * 10^7

9.05*10^4

5.409*10^5

9.04 * 10^-3

3.2 * 10^-2

5.12 * 10^8

Explanation:

1. 4,000,000,000

4 * 1,000,000,000 = 4 * (10*10*10*10*10*10*10*10*10) = 4 * 10^9

2. 0.000000027

27 * 10^-9 = 2.7 * 10^-8

0.000000027 = 2.7 * 10^-8

3. 67,760,000 = 6776 * 10000

6776 * 10000 = 6776 * 10^4

6776 * 10^4 = 6.776 * 10^3 * 10^4 = 6.776 * 10^7

4. 90,500

905 * 100 = (9.05 * 100) * 100

(9.05*100) * 100 = 9.05 * 10^2 * 10^2 = 9.05*10^4

5. 540,900

5409 * 100 = (5.409 * 1000) * 100

(5.409*1000)*100 = 5.409*10^3 * 10^2

5.409*10^3 * 10^2 = 5.409*10^5

6.) 0.00904

0.00904 = 904 * 10^-5

904 * 10^-5 = 9.04 * 10^-3

7. 0.032

32 * 10^-3 = 3.2 * 10^-2

8. 512,000,000

512 * 1000000

512 * 10^6 = 5.12 * 10^2 * 10^6 = 5.12 * 10^8

Suppose your training examples are sentences (sequences of words). Which of the following refers to the j^th word in the i^th training example?

We index into the ith row first to get ith the training example (represented by parentheses), then the column to get jth the word (represented by the brackets).

a. x^(j)
b. x^(j)
c. x^(i)

Answers

Answer:

a. x^<i>(j)

Explanation:

The solution has been explained in the question; however, I will provide further explanation.

The sequence to access a word is:

Training example --> Word

In other words, you first access the training example, before you gain access to the word being searched for.

Rewrite the following:

Training example --> Word

as:

ith training example --> jth word

Hence, the representation is:

[tex]x^{(i)<j>[/tex]

Examples of analog computer

Answers

Answer:

Some examples include:

planimeter

nomogram

operational amplifiers

mechanical integrators  

Explanation:

Write a program that will: 1. Call a function to input temperatures for consecutive days in an array. The temperatures are to be integer numbers. 2. The user will input the number of temperatures. There will be no more than 10 temperatures. 3. Call a function to sort the array by ascending order. You can use any sorting algorithm you wish as long as you can explain it. 4. Call a function that will return the average of the temperatures. The average should be displayed to two decimal places.

Answers

Answer:

Following are the program to the given question:

#include<iostream>//defining header file  

using namespace std;

float temperatures()//defining a method temperatures

{

int a[10],i,j,n,min,max,sum=0,temp;//defining integer variable

float avg;//defining floating point variable

cout<<"Please input the number of temperatures to be read: ";//print message

cin>>n;//input integer value

if(i>10)//use if to check array length greater than 10

return -1;//return integer value -1

for(j=0;j<n;j++)//defining loop to input value

{

cout<<"Input temperature: "<<endl;//print message

cin>>a[j];//holding value in loop

}

for(i=0;i<n-1;i++)//defining loop to compare array value

{

for(j=i+1;j<n-1;j++)//defining loop to compare array value

{

if(a[i]>a[j])//use if to compare array values

{

   //swapping

temp=a[j];//holding array value in temp

a[j]=a[i];//holding value in first index of array  

a[i]=temp;//holding temp value

}

}

}

max=min=a[0];//holding max value  

for (i = 0; i < n; i++)//defining loop to compare array value

{

if (a[i] > max)//use if to compare max array value

{

max = a[i];//holding max array value

}

else if (a[i] < min)//use else if to compare min array value

{

min = a[i];//holding min array value

}

}

for(i=0;i<n;i++)//use loop to add array value

sum=sum+a[i];//adding array value

avg=(float) sum/n;//calculating avg of the array

std::cout.setf(std::ios::fixed);//using namespace

std::cout.precision(2);//using precision method

cout<<"The average temperature is: "<<avg<<endl;//print avg value with message

cout<<"The highest temperature is: "<<max<<endl;//print max value with message

cout<<"The lowest temperature is: "<<min<<endl;//print min value with message

return avg;//return avg value

}

int main()//defining main method

{

float k;//defining float variable

k=temperatures();//calling method  

}

Output:

Please find the attached file.

Explanation:

In this code, a method "temperatures" is declared that defines the integer and float variable in which "n, array" is used to store the array value and inside the method min and max variable is declared that use the conditional statement to store its value.

Outside the main method, a floating-point variable "k" is declared that calls the method and stores its value.  

Which operation would occur in the equation =C3+D5*C6-B2 in excel.

Answers

Answer:

The operation that will occur first is D5*C6 (multiplication).

Explanation:

Excel’s default order of operator precedence mandates that Excel perform multiplication before addition and substraction. If you want the addition or substraction to be performed before multiplication or division, they must be in parentheses.

The order of operations in exel is:

1. Evaluate items in parentheses.

2. Evaluate ranges (:).

3. Evaluate intersections (spaces).

4. Evaluate unions (,).

5. Perform negation (-).

6. Convert percentages (%).

7. Perform exponentiation (^).

8. Perform multiplication (*) and division (/), which are of equal precedence.

9. Perform addition (+) and subtraction (-), which are of equal precedence.

10. Evaluate text operators (&).

11. Perform comparisons (=, <>, <=, >=).

PYTHON PROGRAMMING
The manager of the Super Supermarket would like to be able to compare the unit price for products sold there. To do this, the program should input the name and price of an item per pound and its weights in pounds and ounces. Then it should determine and display the unit price (the price per ounce) of that item and the total cost of the amount purchased. You will need the following variables:
ItemName PoundPrice Pounds
TotalPrice Ounces UnitPrice

You will need the following formulas:

UnitPrice = PoundPrice/16
TotalPrice = PoundPrice * (Pounds + Ounces/16)

Answers

Answer:

ItemName=input("Enter the name of the item purchased: ")

PoundPrice=input("Enter the price of an item per pound: ")

Pound=input("Enter the weight in pound: ")

Ounce=input("Enter the weight in ounce: ")

UnitPrice=int(PoundPrice)/16

TotalPrice=int(PoundPrice)*(int(Pound)+int(Ounce)/16)

print("The unit price is: "+UnitPrice)

print("The total price is: "+TotalPrice)

If this is what you needed:/

Martha works as a systems administrator in a multinational corporation. One of her colleagues is going on a sabbatical for six months. Martha must ensure that no one uses the colleague's user account until he returns. Which of the following actions can she take to ensure this?

a. Lock out the account
b. Disable the account
c. Change the account's password
d. Delete the account

Answers

Answer: Change the account's password

Explanation:

Since Martha wants to ensure that no one uses the colleague's user account until he returns, the best thing for her to do is to change the account's password.

If she changes the accounts password, then she can be the one that will have access to the account and then ensure its safety. It should be noted that the colleague's account can contain vital data and information, therefore it's vital to keep it safe.

Write a class called OrthokonBoard that represents the board for a two-player game that is played on a 4x4 grid.

Answers

Answer:

Explanation:

The following code is written in Java. It creates the class OrthokonBoard which holds a 4x4 grid board in which each space is an "x" . Once the user creates an OrthokonBoard object they need to pass the positions of player 1 and 2 as an integer array of an x and y coordinate on the grid. Then the constructor of the object places the players on the board. A test version of the class was added to the main method and the output can be seen in the attached picture below.

class Brainly {

   public static void main(String[] args) {

       int[] player1Pos = {1, 1};

       int[] player2Pos = {3,3};

       OrthokonBoard newBoard = new OrthokonBoard(player1Pos, player2Pos);

       for (char[] x : newBoard.board) {

           System.out.println("");

           for ( char y : x) {

               System.out.print(y + " ");

           }

       }

   }

}

class OrthokonBoard {

   char[][] board = {{'x', 'x', 'x', 'x'}, {'x', 'x', 'x', 'x'}, {'x', 'x', 'x', 'x'}, {'x', 'x', 'x', 'x'}};

   public OrthokonBoard(int[] playerOnePos, int[] playerTwoPos) {

       board[playerOnePos[0]][playerOnePos[1]] = '1';

       board[playerTwoPos[0]][playerTwoPos[1]] = '2';

   }

}

1. Briefly explain some examples of convergence in the wireless market.​

Answers

Answer:

Some examples of convergence in the wireless market include mobile phones, data communication, radio device etc.

Explanation:

Some examples of convergence in the wireless market are as follows –  

a) Using feature of radio device on phone which is nothing but a default application on the mobile device in the wireless market

b) Data communication is a mode to share data in wireless mode through the internet

c) Mobile phones – Mobile phones are best example of devices operating in the wireless market. It is basically used to call to one or many at a time through network service provider without using an internet

Another name for computer
programs


Answers

Answer:

popo gggggggghhhhhhhghghgggggggggggghhhhhhhhhhhhhh

System software hope this helps

Explain why the network administrator uses the hexadecimal

Answers

Answer:

The main reason why we use hexadecimal numbers is because it provides a more human-friendly representation and is much easier to express binary number representations in hex than it is in any other base number system. Computers do not actually work in hex. Lets take an example, using a byte.

Hope this answer is right!!

Write a program that does the following: - Ask user to input lengths of three sides. - Classify it into one of the following: o Equilateral triangle o Isosceles right triangle o Isosceles triangle that is not a right triangle o A triangle that is not an isosceles and not an equilateral For example, an execution could look like

Answers

Answer:

You did not specify which programming language you use, but you can use if statements to check each using the sides.

- A triangle is equilateral when all the 3 sides are equal. (a = b = c)

- A triangle is isoscles when two of the sides are equal (a = b or b = c or c = a)

- A triangle is right when square of side C is equal to the sum of the squares of the other two sides. (c^2 = a^2 + b^2)

- For the last classification you can use "else"

If you noticed, the condition to have an isosceles triangle is repeated for two of the tasks so we can use the same if statement to check if the triangle is isosceles right or just isoscles with two built-in if statements (if and else)- if it's right then it's isosceles right else it's just isosceles.

And else statement for the last task.

Example code structure:

If triangle is Equilateral then

- Equilateral Triangle

end

If triangle is Isoscles then

if triangle is right then

- Isoscles Right Triangle

end

else (the triangle is not right)

- Isoscles Triangle

end

end

else (the triangle is not Equilateral nor Isoscles)

- Triangle that is not isoscles nor equilateral.

end

Explanation:

Here is a code example with java, I hope it helps, although it might not be the programming language you use:

import java.util.Scanner;

public class Triangle {

public static void main(String[] args) {

Scanner input = new

Scanner(System.in);

System.out.print("side a = ");

int a = input.nextInt();

System.out.print("side b = ");

int b = input.nextInt();

System.out.print("side c = ");

int c = input.nextInt();

if (a == b &amp;&amp; b == c)

{

System.out.println("Equilateral Triangle);

}

else if (a == b || b == c || a == c) {

if ( (int) math.pow(c, 2) == (int) (math.pow(a, 2) + math.pow(b, 2)))

{

System.out.println("Isoscles Right Triangle");

}

else {

System.out.println("Isoscles triangle that is not a right triangle");

}

}

else {

System.out.println("Triangle that is not Isoscles nor Equilateral");

}

}

}

Let me know if you have any questions.

This program outputs a downwards facing arrow composed of a rectangle and a right triangle. The arrow dimensions are defined by user specified arrow base height, arrow base width, and arrow head width.
(1) Modify the given program to use a loop to output an arrow base of height arrowBaseHeight. (1 pt)
(2) Modify the given program to use a loop to output an arrow base of width arrowBaseWidth. Use a nested loop in which the inner loop draws the *’s, and the outer loop iterates a number of times equal to the height of the arrow base. (1 pt)
(3) Modify the given program to use a loop to output an arrow head of width arrowHeadWidth. Use a nested loop in which the inner loop draws the *’s, and the outer loop iterates a number of times equal to the height of the arrow head. (2 pts)
(4) Modify the given program to only accept an arrow head width that is larger than the arrow base width. Use a loop to continue prompting the user for an arrow head width until the value is larger than the arrow base width. (1 pt)
while (arrowHeadWidth <= arrowBaseWidth) {
// Prompt user for a valid arrow head value
}
Example output for arrowBaseHeight = 5, arrowBaseWidth = 2, and arrowHeadWidth = 4:
Enter arrow base height:
5
Enter arrow base width:
2
Enter arrow head width:
4

**
**
**
**
**
****
***
**
*
This is what I have:
import java.util.Scanner;
public class DrawHalfArrow
{
public static void main(String[] args)
{
Scanner scnr = new Scanner(System.in);
int arrowBaseHeight = 0;
int arrowBaseWidth = 0;
int arrowHeadWidth = 0;
System.out.println("Enter arrow base height:");
arrowBaseHeight = scnr.nextInt();
System.out.println("Enter arrow base width:");
arrowBaseWidth = scnr.nextInt();
while (arrowHeadWidth >= arrowBaseWidth)
{
System.out.println("Enter arrow head width:");
arrowHeadWidth = scnr.nextInt();
}
// Draw arrow base (height = 3, width = 2)
for(int i=0; i < arrowBaseHeight; ++i)
{
for(int j=0; j < arrowBaseWidth; ++j)
{
System.out.print("*");
}
System.out.println();
}
// Draw arrow head (width = 4)
for(int i=0; i < arrowHeadWidth; ++i)
{
for(int j=0; j < arrowHeadWidth-i; ++j)
{
System.out.print("*");
}
System.out.println();
}
return;
}
}

Answers

Answer:

The modified program in Java is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

 int arrowHeadWidth, arrowBaseWidth, arrowBaseHeight;

 System.out.print("Head Width: "); arrowHeadWidth = input.nextInt();

 System.out.print("Base Width: "); arrowBaseWidth = input.nextInt();

 System.out.print("Base Height: "); arrowBaseHeight = input.nextInt();

 while (arrowHeadWidth <= arrowBaseWidth) {

       System.out.print("Head Width: "); arrowHeadWidth = input.nextInt();

 System.out.print("Base Width: "); arrowBaseWidth = input.nextInt();      }

 for(int i = 0; i<arrowBaseHeight; i++){

     for(int j = 0; j<arrowBaseWidth;j++){

         System.out.print("*");        }

         System.out.println();    }

 for(int i = arrowHeadWidth; i>0;i--){

     for(int j = 0; j<i;j++){

         System.out.print("*");        }

         System.out.println();    }

}

}

Explanation:

This declares the arrow dimensions

 int arrowHeadWidth, arrowBaseWidth, arrowBaseHeight;

This get input for the head width

 System.out.print("Head Width: "); arrowHeadWidth = input.nextInt();

This get input for the base width

 System.out.print("Base Width: "); arrowBaseWidth = input.nextInt();

This get input for the base height

 System.out.print("Base Height: "); arrowBaseHeight = input.nextInt();

This loop is repeated until the head width is greater than the base width

 while (arrowHeadWidth <= arrowBaseWidth) {

       System.out.print("Head Width: "); arrowHeadWidth = input.nextInt();

 System.out.print("Base Width: "); arrowBaseWidth = input.nextInt();      }

This iterates through the base height

 for(int i = 0; i<arrowBaseHeight; i++){

This iterates through the base width

     for(int j = 0; j<arrowBaseWidth;j++){

This fills the base

         System.out.print("*");        }

This prints a new line

         System.out.println();    }

These iterate through the arrow head

 for(int i = arrowHeadWidth; i>0;i--){

     for(int j = 0; j<i;j++){

This fills the arrow head

         System.out.print("*");        }

This prints a new line

         System.out.println();    }

The device which superimposes information onto a high frequency signal for transmission is called: a modulator a demodulator the carrier the intelligence

Answers

Answer:

a modulator

Explanation:

Modulation can be defined as the conversion of digital signals into an analogue signal while transmitting it over a line. Similarly, demodulation is the conversion of analogue signal into a digital signal.

AM is an acronym for Amplitude Modulation and it's refers to a process that is typically used for coding sounds such as voices and music for transmission from one point to another.

On the other hand, FM is an acronym for frequency modulation used for the propagation and transmission of sound waves.

Basically, these two forms of modulation are used for broadcasting in radio transmission.

In Radio transmission, a modulator is an electronic device that is designed to superimpose a low frequency information onto a high frequency signal for transmission. Also, the high frequency is typically the carrier in the radio transmission process.

the nth term of the given sequence is n(n+1)÷2.calculate the number of dots in the 8th term​

Answers

Answer:

the 8th term of the given series =n( n+1)÷2= 8(8+1)÷2 = (8×9)/2 = 72÷2 = 36

The 8086 to enable the most significant data bus bits (D15-D8) during a read or a write operation using -------- A- RD, WR pin
B- BHE pin
C- S3 / S6 status bus pin. D - 10 / M​

Answers

Answer:

The correct option for the given question is an option (B) BHE pin.

Explanation:

   BHE stands for Bus High Enable. It is available at pin 34 and used to indicate the transfer of data using data bus D8-D15. This signal is low during the first clock cycle, thereafter it is active. It is available at pin 32 and is used to read signals for Read operation.      

(100 points) why does file explorer look like this and how do I fix it? I'm not good with computers, and I kinda need help

Answers

Go To View -> Navigation Pane -> Then Click Navigation Pane


Katie and her mom had an argument. Katie was at the mall when her mom called on her cell phone. What type of noise came up in their
communication?

Answers

Answer:

Noise pollution.

Explanation:

Noise pollution is too loud noise that is harmful to health or that significantly reduces the comfort of the environment or significantly impairs work. Noise pollution arises, for example, from traffic and work machines, as well as from noisy events such as open-air concerts. Noise pollution can also arise from industrial plants (such as wind turbines, rock crushers), work machines (such as cargo handling equipment in ports and other sites), individual machines and equipment (such as leaf blowers, clearing and chainsaws, air conditioners), water pumps) and other noise sources. The noise of the work machines also causes inconvenience to the user of the device if the source of the noise is close to the hearing system of the machine operator.

The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful of states. c. creates a safe cyberspace environment in which business communications cannot be intercepted or fraudulently altered. d. declares that a contract or signature may not be denied enforceability just because it is in electronic form.

Answers

Answer:

d. declares that a contract or signature may not be denied enforceability just because it is in electronic form.

Explanation:

The Uniform Electronic Transmission Act (UETA) is one of the Uniform Acts and key laws of the United States of America. This Act was proposed by the National Conference of Commissioners on Uniform State Laws (NCCUSL) and has since been adopted by forty eight (48) states including the U.S Virgin Islands and the District of Colombia.

However, New York and Illinois have not adopted UETA but they have similar state legislations and laws that recognizes electronic signatures.

The main purpose of UETA is to give legal validity to electronic signatures, electronic contracts and the harmonization of laws regarding the retention of paper records such as checks across the United States of America.

Hence, the function of UETA is to create unison or harmony between the laws regarding records in paper format and the authenticity of electronic signatures.

An electronic signature can be defined as an electronic data such as symbols, signs or sound which are attached to purchase order, contracts or any other contractual agreements adopted by an individual as an agreement to the deal.

According to the Uniform Electronic Transmission Act (UETA), an electronic contract or signature may not be denied enforceability just because it is in electronic form.

In conclusion, both the electronic version of a contract and signature are valid, legal and enforceable across states where they are recognized in the United States of America.

In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be corrupted or allow unauthorized changes to a corporate database.

Answers

Answer: Integrity

Explanation:

Refers to the accuracy and completeness of data. Security controls focused on integrity are designed to prevent data from being modified or misused by an unauthorized party.

Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Answers

I am not able to open the pdf kindly send the jpg form.

Which company was the first to develop personal computers?

Answers

Answer:

A small firm named MITS made the first personal computer, the Altair. This computer, which used Intel Corporation's 8080 microprocessor, was developed in 1974. Though the Altair was popular among computer hobbyists, its commercial appeal was limited.

Explanation:

a term to describe articles that can be displayed in their entirety,as opposed to abstract and references only

Answers

Answer:

Full Record - A screen containing complete or detailed citation information which may include a summary or abstract. Full Text - A term to describe articles that can be displayed in their entirety, as opposed to Abstract and References only.

Explanation:

Explain why Thompson's Construction Algorithm is considered to be a proof by induction. Hint: consider what the inductive steps and base cases are. What does Thompson's Construction Algorithm prove

Answers

Answer:

We assume that the NFA for the expression S is theorem by using the expressions given below.

Cases as

NFA for empty-expression is ε NFA for symbol is a  NFA for union expression is a|b NFA for concatenation expression is ab NFA for Kleene star expression is a*

Thompson's Construction Algorithm proves that any expression can be expressions in the NFA's.

Which effect is used in this image?
A.
sepia effect
B.
selective focus
C.
zoom effect
D.
soft focus

Answers

Answer:

Please show me the image, it is not there

Explanation:

I will wait, don't worry I will help you whenever you want! :)

there’s no picture
post the question again

define computer system and four basic operation​

Answers

Answer:

A computer along with additional hardware and software together is called a computer system.There are four main basic operations or functions of a computer system:

□Input,

□ Processing,

□ Storage,

□ Output,etc

You are working on a graphical app, which includes multiple different shapes. The given code declares a base Shape class with an abstract area() method and a width attribute. You need to create two Shape subclasses, Square and Circle, which initialize the width attribute using their constructor, and define their area() methods. The area() for the Square class should output the area of the square (the square of the width), while for the Circle, it should output the area of the given circle (PI*width*width). The code in main creates two objects with the given user input and calls the area() methods.

Sample Input:
5
2

Sample Output:
25
12.566370614359172

The area of the square is 5*5=25, while the area of the circle is PI*2*2=12.566370614359172

Answers

A class can have multiple subclasses, where each of the subclasses function independently. The extend keyword will be used to pass attributes from the Shape class to the Square and Circle subclasses

To answer this question, I will make the following assumptions

The Shape class is already definedThe area() method of the Shape class is also definedLines that begin with // are comments, and these lines will be used to explain the code segment

//This creates the Square class

class Square extends Shape {

//The creates a constructor for width variable

Square(int length) {  this.width = length;  }

//This defines the area() method from the Square class

void area() {  

//This calculates and prints the area of the square

System.out.print(Math.pow(width,2));  } }

//This creates the Circle class

class Circle extends Shape {

//The creates a constructor for width variable

Circle(int radius){  this.width = radius;  }

//This defines the area() method from the Square class

void area(){

//This calculates and prints the area of the circle

System.out.println(Math.PI*Math.pow(width,2));

} }

Read more about abstract class at:

https://brainly.com/question/20261938

Insert XXX to output the student's ID. public class Student { private double myGPA; private int myID; public getID) { return myID; public static void main(String [] args) { Student s = new Studento; XXX System.out.println("Student ID: "); System.out.println("Student ID:" + getID()); System.out.println("Student ID:" + s.getId()); System.out.println("Student ID:" + student.getID()); A static main() _ has direct access to class instance members can declare and create objects can call instance methods without an object O can not be included within a programmer-defined class What is stored in score1, score2, and grade? Integer scorel = 72; int score2 = 85; Character grade = 'C'; obj reference, 85, obj reference 72,85, obj reference, obj reference, obj reference obj reference, obj reference, Which is true? Instances of programmer-defined objects are immutable Contents of a Double instance can be modified after initialization An instance of String stores data rather than an object reference Reference variables store memory locations

Answers

Answer:

Explanation:

The question above is missing many details and are actually various questions in one. I will answer each one seperately below...

A. The piece of code to get the ID in this code snippet that needs to replace XXX would be the following ... System.out.println("Student ID: " + s.getID());

B. A static main() can declare and create objects. Once these objects are created their instance methods can then be called.

C. Integer score1 = 72;

    int score2 = 85;

    Character grade = 'C';

     In the above code snippet, the information stored in score1, score2, and grade are the following... obj reference, 85, obj reference. This is becasue both Integer and Character are classes and the values being passed to their variables are referencing that object class, while score2 is a primitive type of int and is therefore simply a number.

D. The statement that is true is ... Contents of a Double instance can be modified after initialization. Objects can be modified by calling its setter methods after initializing it.

Computer applications

Answers

Answer:

please tell the question clearly

Other Questions
What is misleading about the title of the novel, The Autobiography of an Ex Colored Man? I keep changing things and doing everything I possibly can but I just cant figure it out someone please help me out lol Item 2 Discount-Mart issues $10 million in bonds on January 1, 2021. The bonds have a ten-year term and pay interest semiannually on June 30 and December 31 each year. Below is a partial bond amortization schedule for the bonds: Date Cash Paid Interest Expense Increase in Carrying Value Carrying Value 01/01/2021 $ 8,640,967 06/30/2021 $ 300,000 $ 345,639 $ 45,639 8,686,606 12/31/2021 300,000 347,464 47,464 8,734,070 06/30/2022 300,000 349,363 49,363 8,783,433 12/31/2022 300,000 351,337 51,337 8,834,770 What is the carrying value of the bonds as of December 31, 2022 What is cerebellum ? Which firm will have a higher level of economic performance: a) a firm with valuable, rare, and costly-to imitate resources and capabilities operating in a very attractive industry or b) a firm with valuable, rare, costly-to-imitate resources and capabilities operating in a very unattractive industry Cmo evoluciona el sufragio en Chile desde comienzo desde el siglo XIX al siglo XXI? Plato/edmentum world geo B help? any sources yall found? what simple machine is a Window Screen Collect information about Rain water harvesting and suggest the differentways to conserve water. need help. will mark brainliest if correct You are about to run up a set of 100 stairs. The diagonal distance up the 100 stairs is 62.5feet and the angle of elevation from the base of the stairs to the top is3162.5 ft.h31What is the height difference from where you start to where you finish?Round your answer to the nearest hundredth.h=feet In the diagram the Sun, Earth, and Moon are in perfect alignment. Which two conclusions can be drawn based on the diagram? im not really sure how to solve for y here In The Tell-Tale Heart by Edgar Allan Poe, what does the beating heart that the narrator hears symbolize? Note: Please show all work and calculation setups to get full credit. T. he following may be used on this assignment: specific heat of (water=4.184 J/g oC; ice=2.03 J/g oC; steam=1.99 184 J/g oC); heat of fusion of water=80. cal/g; heat of vaporization=540 cal/g; 1cal=4.184J.Calculate the energy required (in J) to convert 25 g of ice at -15 oC to water at 75 oC. Why did the Allies target weak islands A. these islands held valuable natural resourcesB. The japanese were not as deeply entrenched on these islandsC. The people on these islands did not support the japaneseD. There was no risk in taking these islands ten instructions on how to adapt in a new envrionment 2.A ball is pulled out of a bag on the first pick. Then, itis replaced in the bag and another ball is picked out . Independent or dependent ? Una persona A tiene cierta cantidad de masa y una persona B tiene la mitad de masa de la persona A como es el peso de B respecto al de A? Why is it important to learn how to cook?