Add a new method to the Point class and change the attributes (x, y) to private from the above question: public double distance(Point next) This method returns the distance between the current Point object and the next Point object in the parameter. The distance between two points is the square root of the sum of the square of the differences of the x and y coordinates: square root of ( (x2 – x1)2 + (y2 – y1)2 ). (6 points) In the Point class, add private to int x and int y. You will have to modify the RefereceX.java and Point.java to deal with this change of modifier from the public to private. (6 points) Based the question 4 codes with the above additions, you should have the following results ( 3 points to display results) inside addTox(..): 14 14 7 9 14 3 inside addTox(..): 18 18 7 9 14 18 distance of p1 from origin is 14.142135623730951 distance of p2 from origin is 18.439088914585774 distance between p1 and p2 is = 4.47213595499958 Code: public class Point { int x; int y; // Constructs a new point with the given (x, y) location. // pre: initialX >= 0 && initialY >= 0 public Point(int initialX, int initialY) { this.x = initialX; this.y = initialY; } // Returns the distance between this point and (0, 0). public double distanceFromOrigin() { return Math.sqrt(x * x + y * y); } // Shifts this point's location by the given amount. // pre: x + dx >= 0 && y + dy >= 0 public void translate(int dx, int dy) { this.x += dx; this.y += dy; } public double distance(Point next) { //help } } public class ReferenceX { public static void main(String[] args) { int x = 7; int y = 9; Point p1 = new Point(1, 2); Point p2 = new Point(3, 4); addToX(x, p1); System.out.println(x + " " + y + " " + p1.x + " " + p2.x); addToX(y, p2); System.out.println(x + " " + y + " " + p1.x + " " + p2.x); } public static void addToX(int x, Point p1) { x += x; p1.x = x; System.out.println(" inside addTox(..): " + x + " " + p1.x); } }

Answers

Answer 1

Answer:

Following are the code to this question:

   public double distance(Point next) //defining distance method that accepts Constructor

   {

   int x1,x2,y1,y2;//defining integer variables

   double d;//defining double variable dis

   x1=this.x; //use x1 variable that use this keyword to store x variable value

   y1=this.y;//use y1 variable that use this keyword to store y variable value

   x2=next.x;//use x2 variable that use this keyword to store x variable value

   y2=next.y;//use y1 variable that use this keyword to store y variable value

   d=Math.sqrt((x1-0)*(x1-0) + (y1-0)*(y1-0));//use d variable that calculates distance between p1 to origin and store its value

   d=Math.sqrt((x2-0)*(x2-0) + (y2-0)*(y2-0));//use d variable that calculates distance between p2 to origin and store its value

   d=Math.sqrt((x2-x1)*(x2-x1) + (y2-y1)*(y2-y1));//calculating the distance from p1 to p2 and store its value

   return d;//return dis value

   }

Explanation:

In the above-given code, the double type method "distance" is defined, that accepts a constructor in its parameter, and inside the method, four integer variable "x1,x2,y1, and y2" and one double variable "d" is declared.  

After holding the value of x and y into the declared integer variable the "d" variable is used, that uses the maths square method with an integer variable, which holds p1 to origin value, p2 to origin value, and the distance from p1 to p2, and use the return keyword for return its value.


Related Questions

When you are using a keyword search what are you most likely doing?

Answers

Answer:

Just typing words or answering questions

Answer:

when using a keyword search, you are looking for close results to what you are looking for.

Explanation: its a general search not specific. thus you are likely to get very many results with the same word. hope this helps. :)

What type of switch is used to combine multiple network connections into a single link?a. core switchb. gateway switchc. aggregation switchd. access switch

Answers

Answer:

C. Aggregation switch.

Explanation:

Aggregation switch is a type of switch used to combine multiple network connections into a single link.

In Computer Networking, Aggregation switches are primarily designed to be used for connecting the Top-of-Rack (ToR) switches to a core switch or router, as the case may be.

Generally, the core switch is typically placed at the top of the data center network architecture topology.

An aggregation switch is usually designed to be large in size and has a lot of interfaces or ports for the connection of multiple networks into a single logical link.

Additionally, the connections are mainly done in parallel in order to prevent total downtime or redundancy in a network, as well as to enhance the throughput than what is obtainable in a single network.

Write a destructor for the CarCounter class that outputs the following. End with newline.
Destroying CarCounter
#include
using namespace std;
class CarCounter {
public:
CarCounter();
~CarCounter();
private:
int carCount;
};
CarCounter::CarCounter() {
carCount = 0;
return;
}
/* Your solution goes here */
int main() {
CarCounter* parkingLot = new CarCounter();
delete parkingLot;
return 0;
}

Answers

Answer:

Following are the code to this question:

CarCounter::~CarCounter()//Defining destructor CarCounter

{

cout << "Destroying CarCounter\n";//print message Destroying CarCounter

}

Explanation:

Following are the full program to this question:

#include <iostream>//Defining header file

using namespace std;

class CarCounter //Defining class CarCounter

{

public:

CarCounter();//Defining constructor CarCounter

~CarCounter();//Defining destructor CarCounter

private:

int carCount;//Defining integer variable carCount

};

CarCounter::CarCounter()//declaring constructor  

{

carCount = 0;//assign value in carCount variable

return;//using return keyword

}

CarCounter::~CarCounter()//Defining destructor CarCounter

{

cout << "Destroying CarCounter\n";//print message Destroying CarCounter

}

int main() //Defining main method

{

CarCounter* parkingLot = new CarCounter();//Defining class object parkingLot

delete parkingLot;//

return 0;

}

In the given C++ language code, a class "CarCounter" is defined, and inside the class, a "constructor, Destructors, and an integer variable" is defined.  Outside the class, the scope resolution operator is used to define the constructor and assign value "0" in the integer variable.  In the above-given code, the scope resolution operator, to define destructor and inside this cout function is used, which prints a message.  In the main method, the class object is created, which automatically calls its class constructor and destructors.  

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port. Which two mandatory options are used to configure a VLAN interface? (Choose two.)

Answers

Incomplete question. Here's the full question:

Which two mandatory options are used to configure a VLAN interface?  

A customer wants to set up a VLAN interface for a Layer 2 Ethernet port.

Which two mandatory options are used to configure a VLAN interface? (Choose two.)

A. Virtual router

B. Security zone

C. ARP entries

D. Netflow Profile

Answer:

A. Virtual router

B. Security zone

Explanation:

According to the networking protocol to create a virtual local area network (VLAN) you must:

1.  Have a configured Virtual router

2.  Create or configure a Layer 2 Security Zones.

Although there are other network requirements to successfully create VLAN but this are the basic ones needed.

Aside from the malicious link, there are also several other indicators on the email that shows it is likely a phishing email. Can you identify anything else that looks suspicious in the email?

Answers

Answer:

The senders email domain.

Explanation:

The senders email address is from a different email domain than the receivers email domain. The senders has a hyphen whereas the recipients does not.

Which of the following are screen objects used to maintain, view, and print data from a database?
A. Form.
B. Field.
C. Data files.
D. Entities.

Answers

The answer is Forms. hope this helped

What is the value of scores[3] after the following code is executed? var scores = [70, 20, 35, 15]; scores[3] = scores[0] + scores[2];

Answers

scores[3]( 15 ) = scores[0]( 70 ) + scores[2]( 35 ) == 105

Which type of alert is the Client Software Deployment Failure set to?

Answers

Answer:

Microsoft Intune will display the critical alert Client Software Deployment Failure if the client software fails. It will be displayed in the System Overview page and Alerts pages of the Microsoft Intune administrator console. To check for alert, let us follow these steps below:

Explanation:

In the Microsoft Intune administration console, click Alerts > Overview.

On the Alerts overview page, you can review the following information:

The top three alerts, which can be sorted by date, category, or severity

The total number of active alerts

Click All Alerts to display the following information on the Alerts page. Critical alerts are displayed first:

Name – The name of the alert type that generated the alert.

Source – A link to the source of the alert.  If the display threshold of the alert type is set to All, then this link will display a single affected device.  If the display threshold of the alert type is set to a value, then this link will display a list of all the devices that are affected by this alert.

Last Updated – This indicates the time when the alert was last modified. If an alert is closed, the time when the alert was closed is displayed.

Severity – This indicates the severity of the alert

Double-clicking any failed logon attempt in the Even Viewer will open the:______.

Answers

Answer:

Event property window

Explanation:

The event property window can be used to know who signed into your computer without your knowledge. This feature will have to be enabled and configured by the owner of the system so as to be able to monitor unauthorized activities on your system which includes to find out who has been using your device without permission, troubleshoot certain problems, among other things..

Which tool encrypts entire drives, rendering them unusable unless one possesses the correct key to unlock the drive?

Answers

Answer:

Whole disk encryption.

Explanation:

Whole disk encryption, also known as, the full disk encryption is a tool that encrypts the entire drive. The whole disk encryption protects the whole hard drive from unwanted visitor to enter into your system.

This tool protects your entire data, softwares, files, etc stored in the hard drive. Whole disk encryption cedes the entire hard drive unusuable untill correct key is entered to unlock the drive.

Thus the correct answer is 'whole disk encryption.

RFID can be used for all of the following applications except:_________.
A. Access control
B. Access point repeater
C. Asset management
D. Automated payment

Answers

Answer:

B. Access point repeater

Explanation:

RFID can be used for all of the listed applications except for Access point repeater. This is because Radio Frequency Identification is a technology, which includes wireless data capture and transaction processing for both short and long-range applications. Usually tracking, tracing, accessing, and managing information. It can unfortunately not be used for repeating the same RFID signal or any access point for that matter.

Chris wants to view a travel blog her friend just created. Which tool will she use?

Answers

Answer:

WEEB BROWSER

Explanation:

Get it

Chris wants to view a travel blog her friend just created. The tool that she will use is a web browser. The correct option is B.

What is a web browser?

Anywhere on the internet is accessible with a web browser. It pulls data from other websites and displays it on your computer or mobile device. The Hypertext Send Protocol, which outlines how text, pictures, and video are communicated on the web, is used to transfer the information.

A web browser, also known as a "browser," is a programme used to open and view web pages. Microsoft, Internet Explorer, Chrome, Mozilla, and Apple Safari are popular web browsers.

A blog is a written story by a person. Blogs can be informational and entertaining. Blogs are always searched on browsers.

Therefore, the correct option is B, web browser.

To learn more about the web browser, refer to the link:

https://brainly.com/question/9776568

#SPJ2

Fiber deployment architectures include all of the following except:
A. Free space optic (FSO).
B. Mesh.
C. Ring.
D. Point to multipoint (PMP).

Answers

Answer:

C

Explanation:

The answer should C.

The system administrator in your office quits unexpectedly in the middle of the day. It's quickly apparent that he changed the server password and no one knows what it is. What might you do in this type of situation?

Answers

Answer:

You should use an effective password cracker.

Explanation:

Since the system administrator decided to quit unexpectedly and apparently, he changed the server password and no one knows what it is. What you might do in this type of situation is to use an effective password cracker.

A password cracker can be defined as a software application or program used for retrieving passwords from stored locations or computer data systems. This simply means that, a password cracker is used to recover passwords in order to gain access to a computer system that is protected by authentication.

Some examples of commonly used passwords cracker are ElcomSoft, Aircrack, Hashcat, John the Ripper, Hydra, Cain and Abel, DaveGrohl, Ophcrack etc.

After a merger between two companies a security analyst has been asked to ensure that the organization’s systems are secured against infiltration by any former employees that were terminated during the transition. Which of the following actions are MOST appropriate to harden applications against infiltration by former employees? (Select TWO)
A. Monitor VPN client access
B. Reduce failed login out settings
C. Develop and implement updated access control policies
D. Review and address invalid login attempts
E. Increase password complexity requirements
F. Assess and eliminate inactive accounts

Answers

C and F would be the ones to pick :)

What are three subject areas that are key to successfully working in the field of robotics

Answers

The brain ( computer science engineering)

The nervous system ( electrical engineering)

The body ( Mechanical engineering). The mechanical engineer is in the charge of the physical system that makes up the robot.

Suppose you are implementing the Comparable interface in a class representing a Book, where the ordering is based on the number of pages in the book. Write a compareTo method for this class. You may assume that in the Book class there is an instance variable called numPages and a method called getNumPages.

Answers

Answer:

Following are the code to this question:

public class Book implements Comparable<Book> //defining a class that inherits the interface

{

int numPage; //defining integer variable numPage

int getNumPage()//defining a method getNumPage

{

return numPage; //use return keyword to return numPage value

}

int compareTo(Book b)//defining a method compareTo that uses Book instance b

{

   //using multiple conditions

if (getNumPage() > b.getNumPage())//defining if block that checks getNumPage method value is greater then instance of getNumPage  

{

return 1; //return value 1

}

else if (getNumPage() == b.getNumPage())//defining else if block that checks method and its instance value is euqal    

{

return 0;//return 0

}

else //defining else block

{

return -1;//return value -1

}

}

}

Explanation:

In the above-given code, a class book is defined, that inherits the interface that is "Comparable<Book>". Inside the class, an integer variable "numPage" and a method "getNumPages" is defined, that returns the "numPage" value.

In the next step, the "compareTo" method is declared, which uses an instance of the book and use the conditional statement.

In the if block, It checks the "getNumPages" method value is greater than the instance of the "getNumPages" method if the value is true, it will return "1", otherwise goto else if block. In this block, it will check both "method and instance of method" values are equal, if the condition is true, it will return "0". In the else block, if the above condition is false, it will return the value that is "-1".  

CONVERT to C# C# C# C# Just need C and Dpublic class Patterns { public static void main(String[]args) { char[][] arr=new char[10][10]; int starCount = 10; for(int i=0; i }}Need this code converted to "C# C# C# C# C# Just need C and D

Answers

Answer:

following are converted C# code:

using System; //import System

class Patterns //defining class Pattern

{

public static void Main() //defining main method

{

char[,] arr=new char[10,10];//defining char array  

int starCount = 10;//defining integer variable starCount that holds value

int c=starCount;//defining integer variable c that holds starCount value  

for(int i=0; i<c;i++,starCount--)//defining loop for column  

{

for(int j=0; j<i; j++)//defining loop for rows

{

arr[i,j]='_'; //holds underscore value

}

for(int k=i; k<c; k++)//defining loop for rows  

{

arr[i,k]='*';//holds asterik value

}

}

for(int a=0; a<c; a++)//defining loop for print column value

{

for(int b=0;b<c;b++) //defining loop for print row value

{

Console.Write(arr[a,b]);//print value

}

Console.WriteLine();//print space value

}

}

}

Output:

please find the attachment.

Explanation:

In the above given C# language code, firstly we import the package system, in the next step, Patters is declared, inside the class a char array "arr" and integer variable "starCount" is declared, that store integer value and the main method is declared.

In the method, for loop is defined, inside the loop, it stores "underscore and asterisk" value in the array.

Outside to loop another loop is defined, which uses the print method to print its value.    

Recall that at a high level, categories of inter-process communication (IPC) facilities include those that share memory and those that transfer data. Which of the following statements are correct about IPC facilities?
A. Facilities that use data transfer, such as FIFO, can only be used between a parent process and a child process.
B. Facilities that share memory require more care in synchronizing data sharing.
C. Facilities that share memory can communicate a lot faster.

Answers

Answer:

Facilities that share memory require more care in synchronizing data sharing (B) and facilities that share memory can communicate a lot faster ( C )

Explanation:

The true statements about IPC facilities are : Facilities that share memory require more care in synchronizing data sharing  and facilities that share memory can communicate a lot faster.   this is because facilities that require the sharing of memory between themselves require more care in the synchronization of data and  also copying of messages is prohibited which in turn makes it faster for the facilities to communicate a lot faster.

A series of nested _____________ statements can be used to process the menu selections in lieu of the case statement

Answers

Answer: If-Else statement or If-Then-Else statement depending on the language.

Explanation: Although it's not recommended to nest a hundred if statements into each other, you can use them instead of a switch/case.

A series of nested If-Else statements can be used to process the menu selections in lieu of the case statement.

What is a menu selection?

The menu selection parameter needs to be created before utilizing a While loop to periodically evaluate a user's menu choices. Processing a user's menu choice always requires an iteration loop.

If a certain value is satisfied, the if/else sentence causes a block of code to be executed. An additional block of code can indeed be run if the condition is false. If you want to tell a block of code to run only if a certain expression is met, use the if statement.

f the same circumstance is false, use else to declare that a different block of code should be run. If the first conditions is false, use else if to define a new state to test. To provide a variety of different code blocks to be performed, use a switch.

Learn more about menu selection, Here:

https://brainly.com/question/29479833

#SPJ5

UC is trying to switch from legacy CRM to salesforce and wants to keep legacy CRM and salesforce in place till all the functionality is deployed in salesforce. The want to keep data in synch b/w Salesforce, legacy CRM and SAP. What is the recommendation

Answers

Answer: suggesting MDM solution and also linking MDM to both the salesforce and sap. More so, integrating SAP with both Salesforce and legacy CRM.

NB: Don't ever integrate legacy CRM to Salesforce

Explanation:

It should be noted that the best recommendation that could be given in order to keep data in synch b/w Salesforce, legacy CRM and SAP is by suggesting MDM solution and also linking MDM to both the salesforce and sap. More so, integrating SAP with both Salesforce and legacy CRM.

NB: Don't ever integrate legacy CRM to Salesforce

Describe how the presence or absence of balance can affect a visitor’s perceptions of a Web page.

Answers

Answer: the assessment of the destination image can assist managers by identifying the ... In particular, potential visitors with limited knowledge of destinations depend on ... Thus, a destination web page becomes a fundamental instrument in ... it and whose presence or absence determines the tourist's perception.

Explanation:

A mixture of benzene and toluene are to be separated in a flash tank. The pressure in the flash tank is 800 mm Hg. The units for Antoines equation are mm Hg and ◦C for pressure and temperature, respectively.
xB(Psat B) + (xT)(Psat T) = P
log10(Psat B) = 6.905 − (1211/ (T + 221))
log10(Psat T) = 6.953− (1344/ (T + 219 ))
At what temperature should the tank be operated to get the highest purity toluene in the liquid phase (maximizing xT)?

Answers

Answer:

At the temperature of 112.859°C

Explanation:

suppose xT denotes the amount of toluene in the mixture

xT ∈ (0,1)   xB = 1 -xT

substituting the value of xB and re-arrange to solve for xT, we have:

[tex]xT = \dfrac{P-Psat \ B}{P sat \ T - P sat \ B}[/tex]

For xT to be maximum, P needs to be equal to Psat T

∴ P = Psat T

or

Psat T = 800

log10 P sat T = log 10(800)

Using MATLAB code to solve the value of T (T_val), the code is inputed as:

syms T

equation = 6.953− (1344/ (T + 219 )) = log 10(800)

T_val = solve (equation,T);

T_val = double T_(val)

T_val= 112.859

What is Livvyo? Livvyo review

Answers

Answer:

Livvyo is a software that enables streaming video to be translated into multiple languages.

Explanation:

Livvyo is a latest desktop software developed to translate the live streaming videos. This app enables the businesses and companies to convert any video in multi-language to attract diverse audience of different languages.

The app is created by Misan Morrison & Firas Alame and launched on 23rd August, 2020.

Livvyo Review:

This app also helps to transcibe texts in the video automatically. This app helps to transform any video into Global sales machine.The purpose of this app is to attract audience and increase sales.

Using "subTotal" and "taxRate", what is the formula to determine the total bill including taxes (grandTotal)?

Answers

Answer:

The formula to determine the total bill including taxes, i.e. grand Total =

"subTotal" + ("taxRate" * "subTotal").

Another formula is:

"grandTotal" = ("subTotal" * 1 +"taxRate")

Explanation:

The above stated formulas produce the same outcome.  The first formula computes the tax amount and adds it to the subtotal before arriving at the grand total.  The second formula goes straight to compute the total bill without showing the tax amount.  It applies the tax factor (1 + "taxRate") to the "subTotal."  All two formulas are valid.  However, I prefer the second formula to the first, as it is very straight forward.

Broken computers are being eco-recycled by the user. Which stage of the hardware lifecycle does this scenario belong to

Answers

Answer:

Decommission, E-cycle & Disposal

Explanation:

The life cycle of every hardware starts from its architectural design and ends when the hardware is being disposed of.

The reason for disposal could be as a result of when hardware becomes broken down (as stated in the question) or got outdated or out of place.

However, the stage that this belongs to is called "Decommission, E-cycle & Disposal" stage of the hardware lifecycle.

Briefly explain how developers use a distributed version management system. You may assume that a master repository has been set up.

Answers

Answer:

Using version control tools like Git and Github.

Explanation:

Version control is a vital tool in programming in recent times. it helps to prevent loss of source codebase and creating unwanted folders for storing multiple codebases to prevent excess storage usage and time consumption.

Git and Github is a platform that handles version control and collaboration between co-workers. When a repository is created, its initial branch is called the master branch and when a staged code is committed, the commit is recorded. These records can be retrieved using the commit hash value and resetting the current unstaged file or code. A new branch can created to hold a different version of an application and merged later with the master branch.

For additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to:___________.

Answers

Answer:

Identify any program or services that you do not need.

Explanation:

As a network administrator, one of the preventive measures that could be adopted to complement your security system or architecture is to identify all the software applications or services that you do not need in an organization. This is because some of these programs might be a spyware, rootkit or compromised software which are used to gain unauthorized access to the network system. Also, you should identify the unused or unwanted programs or services in order to prevent redundancy and to optimize the performance of critical machines or processes in the organization's network.

Hence, for additional security and to optimize the performance of critical machines on your organization’s network, it is crucial to identify any programs or services that you don’t need.

The Windows Group Policy feature provides __________ that govern the way Windows operates in enterprise environments.

Answers

Answer:

A centralised set of rules

Explanation: The windows group policy is one of the features of Windows active directory that gives users of windows enough power and control over the use and Security as they make use of its features in their computers. The Windows group policy also guides how users of Windows computers effectively utilises its features and functions.

I made a binary sentence if you answer you get 75 points heres the code: 01101001 01100110 00100000 01111001 01101111 01110101 00100000 01100001 01110010 01100101 00100000 01110010 01100101 01100001 01100100 01101001 01101110 01100111 00100000 01110100 01101000 01101001 01110011 00100000 01001001 00100111 01101101 00100000 01110011 01110101 01110000 01110010 01101001 01110011 01100101 01100100 00100000 01111001 01101111 01110101 00100000 01100011 01100001 01101110 00100000 01110100 01110010 01100001 01101110 01110011 01101100 01100001 01110100 01100101 00100000 01110100 01101000 01101001 01110011 00100000 01110111 01100101 01101100 01101100

Answers

01001001 00100000 01100001 01100011 01110100 01110101 01100001 01101100 01101100 01111001 00100000 01110101 01110011 01100101 01100100 00100000 01100001 00100000 01000010 01101001 01101110 01100001 01110010 01111001 00100000 01100011 01101111 01100100 01100101 00100000 01000011 01101111 01101110 01110110 01100101 01110010 01110100 01100101 01110010 00100000 01101100 01101101 01100001 01101111

if you are reading this I'm suprised you can translate this well this is easy

Other Questions
Which is not a problem for the Polish economy?A difficulty attracting foreign investorsB continued Russian dominationC price increasesD unemployment ERASEWhen Marilyn was bom, her parents put $9,000 into a college fundaccount that earned 9% simple interest. What was the totalamount in the account at the end of 18 years?I = PRT=4000 - 0.09-1319580 accountAnswerExplain why this is incorrect and what Aliyahneeds to do to make it correct. complex machines are defined by... solve for x: 2+3 (x+2x) = -2x(2-4) +1 Skater A skates toward Skater B and gently pushes Skater B away. If the skaters are in a closed system, which statement is correct about the total momentum of the system? A. Total momentum may increase or decrease depending on the duration of the collision. B. Total momentum remains the same. C. Total momentum increases. D. Total momentum decreases. How would you write this number in scientific notation? (Use the carrot key to denote an exponent. ex: 6.02 x 10^23)5,890,000,000,000 (The distance to the sun in km)pls help. Plz helppppppppppppp Which two things are being compared in the following analogy? Sitting in the theater, I realized that the movie was a roller coaster ride of emotions. a.) movie and emotions b.) theater and roller coaster ride c.) movie and roller coaster ride d.) theater and movie 1. Being a safe and responsible driver takes a combination of knowledge, attitude andskill f the Fed wishes to increase the money supply, it can: Multiple Choice sell a bond to bank, and take the money it receives in exchange out of circulation in the economy. buy bonds from a bank, giving the bank cash in return, which it can then lend out. sell a bond to a bank, and take the money it receives and lend it out to someone else. buy a bond from a bank, requiring the bank to hold the money it receives as excess reserves. Can someone please help me answer theses, i have to have them turned in 3 hours. The atmospheric pressure on a mountain is 550 mmHg and 1 atm is equal to 760 mmHg. What is the pressure in atm? Give your answer to 2 significant figures760 mmHg what is the pressure in atm? experience you went through when you visited the city for the first time How many dots belong in the electron dot diagram of a boron (B) atom? three five eight thirteen A bicycle is traveling at 20 miles per hour.How many feet will it cover in 55 seconds?Round your answer to the nearest tenth of a foot. June bought three books. For the first book, she paid one half of her allowance plus $1 more. For the second book, she paid one half of her left-over money plus $2 more. For the third book, she paid one half of her left-over money plus $3 more. At this point, she had no money left. How much was her allowance? Pinterest allows users to save and share images they find online, building their own collections. This type of site is populated through a _________________ search. a. Social bookmarking b. Image optimization c. Social specialty d. Intellectual property Anatomy+ Chemistry List the 8 common ions in the human body and their charge. Identify each as a cation or anion. Help me in this problem. Coud 8 track tapes be ruined by weather?