PLEASE HELP IN JAVA

A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs.

Ex: If the input is:

3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank

the output is:
867-5309

Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize)

Hint: Use two arrays: One for the string names, and the other for the string phone numbers.

Answers

Answer 1

Answer: import java.util.Scanner;

public class ContactList {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Read the number of word pairs in the list

       int n = scnr.nextInt();

       scnr.nextLine(); // Consume the newline character

       

       // Read the word pairs and store them in two arrays

       String[] names = new String[n];

       String[] phoneNumbers = new String[n];

       for (int i = 0; i < n; i++) {

           String[] parts = scnr.nextLine().split(",");

           names[i] = parts[0];

           phoneNumbers[i] = parts[1];

       }

       

       // Read the name to look up

       String name = scnr.nextLine();

       

       // Call the getPhoneNumber method to look up the phone number

       String phoneNumber = getPhoneNumber(names, phoneNumbers, name, n);

       

       // Print the phone number, or "None" if the name is not found

       if (phoneNumber != null) {

           System.out.println(phoneNumber);

       } else {

           System.out.println("None");

       }

   }

   

   public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) {

       // Search for the name in the array and return the corresponding phone number

       for (int i = 0; i < arraySize; i++) {

           if (nameArr[i].equals(contactName)) {

               return phoneNumberArr[i];

           }

       }

       // If the name is not found, return null

       return null;

   }

}

Explanation: The program inputs the number of word sets, stores them in two clusters (names and phoneNumbers), and looks up a title by calling the getPhoneNumber strategy to return the comparing phone number. Prints phone number or "None" in the event that title not found. getPhoneNumber strategy takes nameArr, phoneNumberArr, contactName, and arraySize as contentions. The strategy looks for a title and returns the phone number in case found, something else invalid.


Related Questions

What is your biggest concern when it comes to purchasing a used phone or laptop?

Answers

Answer:

quality

Explanation:

if i know about the phone or laptop quality and quantity then i can know which is important if i buy.

i can give you example by laptop. For example i want to get buy laptop. i should know about the quantity and quality. then if i choose quantity i can buy so many laptops if they are more than 3 laptops and i get it in low price. then i take it and i try to open the laptops for some other thing to do but they cant opened so it means it has lowest quality.

and if i choose the quality. may be i can't buy more than 1 laptops but the qulaity of the laptops is high so when i open the laptop it opened

Note

quality is the superiority or the quality level of a things.

quantity is the abundance or the quantity level of a thing

an ___ is a percentage of the loan that is charged to cover the cost of giving the loan

Answers

A fraction is a percentage of the loan that is charged to cover the cost of giving the loan.

Thus, A loan is the lending of money by one or more people, businesses, or other entities to other people, businesses, or other entities. The recipient, or borrower, incurs a debt and is often responsible for both the main amount borrowed as well as interest payments on the debt until it is repaid.

The promissory note used to prove the obligation will typically include information like the principal amount borrowed, the interest rate the lender is charging, and the due date for repayment. When a loan is made, the subject asset(s) are temporarily reallocated between the lender and the borrower.

The payment of interest encourages the lender to make the loan. Each party to a legal loan.

Thus, A fraction is a percentage of the loan that is charged to cover the cost of giving the loan.

Learn more about Loan, refer to the link:
https://brainly.com/question/11794123

#SPJ1

fruitsDict = {
'Apple' : 100 ,
'Orange' : 200 ,
'Banana' : 400 ,
'pomegranate' : 600
}
Write lines of codes that will print the keys and corresponding values of the above dictionary, (PYTHON)

Answers

Answer:

Here's the code to print the keys and corresponding values of the FruitsDict dictionary:

scss

for key, value in FruitsDict.items():

   print(key, ":", value)

This code uses a for loop to iterate over the key-value pairs in the FruitsDict dictionary using the .items() method. For each key-value pair, the code prints the key, a colon, and the corresponding value using the print() function. The output will be:

yaml

Apple : 100

Orange : 200

Banana : 400

pomegranate : 600

Explanation:

Here's the code to print the keys and corresponding values of the FruitsDict dictionary:scss

for key, value in FruitsDict.items():

print(key, ":", value)

This code uses a for loop to iterate over the key-value pairs in the FruitsDict dictionary using the .items() method. For each key-value pair, the code prints the key, a colon, and the corresponding value using the print() function. The output will be:

yaml

Apple : 100

Orange : 200

Banana : 400

pomegranate : 600

Learn more about fruits on:

https://brainly.com/question/13048056

#SPJ1

what are the steps for the go daddy root certificate

Answers

Navigate to the GoDaddy product page. Choose SSL Certificates, then Manage for the certificate you want to download. Select a Server type and then Download Zip File under Download Certificate.

What is meant by the term root certificate?

A root certificate is a digital certificate issued by the Certificate Authority. It comes pre-installed in most browsers and is saved in a "trust store." CAs closely guard the root certificates. Intermediate Diploma.

Root certificates are the foundation of software authentication and security on the Internet. They are granted by a certified authority (CA) and serve to confirm that the software/website owner is who they claim to be.

Learn more about  root certificate here:

https://brainly.com/question/31615287

#SPJ1

Finish the VPython code to move the ball to the left six units.
ball.pos. ✓= ball.pos.

Answers

Answer: x - 6

Explanation:


Answer

✓ - vector(6,0,0)

Increase the value of cell C30 by 15% using the cell referencing single MS Excel formula or function

Answers

To do this Excel formula,  we must enter  the following:
= C30 * 15%  or = C30 * 1.15.

How  is this so ?

Assuming the value to increase is in cell C30, you can use the following formula in another cell to increase it by 15%:

=C30*1.15

This multiplies the value in cell C30 by 1.15, which is equivalent to adding 15%. The result will be displayed in the cell containing the formula.

Learn more about Excel formula at:

https://brainly.com/question/30324226

#SPJ1

e A computer virus. the normal operation of a computer.​

Answers

Answer:

Computer Virus Overview

Roshan Mandal

A computer virus is a type of malicious software program that can infect and damage computer systems. It is designed to spread from one computer to another and can be transmitted through email attachments, downloads, or other means.

When a computer is infected with a virus, the normal operation of the computer can be disrupted. Depending on the type of virus, it may slow down the computer's performance, cause programs to crash, delete files, or even render the computer completely unusable.

To protect against viruses, it is important to use up-to-date antivirus software and to be cautious when opening email attachments or downloading files from the internet. It is also recommended to keep software and operating systems updated to ensure they are protected against known vulnerabilities.

what is integration literacy

Answers

Answer: Integration literacy refers to the ability to understand and apply concepts related to integration. Integration is the process of combining different parts or elements into a whole. In mathematics, integration refers to the process of finding the integral of a function, which is the inverse of differentiation. In the context of education, integration literacy refers to the ability to integrate different subjects or disciplines in order to create a more comprehensive and interconnected understanding of a topic. This involves understanding how different subjects relate to each other and how they can be combined to create a deeper understanding of a particular topic. Integration literacy is an important skill for students to develop, as it can help them to become more critical thinkers and problem solvers.

Explanation:

Integration literacy refers to the ability to understand, use and manage different software applications and services in a coordinated way to achieve a specific goal. It involves the knowledge and skills to integrate data, workflows, and systems across different platforms and technologies. Integration literacy is becoming increasingly important as more organizations adopt cloud-based services and need to integrate them with their existing systems. It is also essential for individuals who work with multiple software tools and need to streamline their workflows.

In a game, a sword does 1 point of damage and an orc has 5 hit points. We want to introduce a dagger that does half the damage of a sword, but we don’t want weapons to do fractions of hit point damage. What change could we make to the system to achieve this goal?

Answers

One arrangement to get  the objective of presenting a dagger   that does half the harm of a sword without managing divisions of hit point harm would be to alter the hit focuses of the orcs.

What is the changes  about?

A person  might increase the hit focuses of orcs to 10. This way, the sword would still do 1 point of harm and the blade might do 0.5 focuses of harm, but we would still be managing with entire numbers for hit focuses.

One might present a adjusting framework where any further harm is adjusted up or down to the closest entirety number. In this case, the sword would still do 1 point of harm, but the dagger would circular down to focuses of harm.

Learn more about game from

https://brainly.com/question/908343

#SPJ1

Need help with Exercise 5 (JAVA)

Answers

Using knowledge in computational language in JAVA it is possible to write a code that install java and set java home to point to the java installation directory.

Writting the code:

For Maven I tried :

1. open cmd

2. type mvn -version

3. Error appeared :

C:\Users\Admin>mvn -version

ERROR: JAVA_HOME is set to an invalid directory.

JAVA_HOME = "C:\Program Files\Java\jre7\bin"

Please set the JAVA_HOME variable in your environment to match the

location of your Java installation

For ANT I tried and worked :

1. open cmd

2. type mvn -version

3. Apache Ant(TM) version 1.9.1 compiled on May 15 2013

There are multiple ways to copy elements from one array in Java, like you can manually copy elements by using a loop, create a clone of the array, use Arrays. copyOf() method or System. arrayCopy() to start copying elements from one array to another in Java.

See more about java at:

brainly.com/question/12975450

#SPJ1

Answer please…………………

Answers

Due to the slower speed of hard drives compared to RAM, the CPU avoids direct access to programs and data stored on them.

What is the RAM about?

RAM's faster speed is attributed to its random accessibility design, enabling the CPU to rapidly access any portion. Also, hard drives necessitate the physical movement for data retrieval, leading to significantly longer wait times.

The initiation of the computer triggers the allocation of frequently accessed software and information into the RAM, thus enhancing its performance speed. The Central Processing Unit proceeds to retrieve the necessary programs and data from the Random Access Memory, since this process is considerably quicker than retrieving them from the hard drive.

Learn more about RAM  from

https://brainly.com/question/13196228

#SPJ1

See text



Task 1

1. Research on the Internet new computers from a manufacturer of your choice.

(a) What is the typical amount of RAM and hard drive size that they are including in their computers as standard?

(b) The amount of storage in hard drives is usually far higher than the amount of RAM on the computer.

Why doesn't the CPU access programs and other data from the hard drive directly?

(HURRY) What is the cloud?

all the remote servers in the world

all the things you can access over the internet

all the data that is stored in physical devices

the pollution caused by the internet and technology

Answers

all the data that is stored in physical devices

6.20 LAB: Track laps to miles

One lap around a standard high-school running track is exactly 0.25 miles. Define a function named LapsToMiles that takes a double as a parameter, representing the number of laps, and returns a double that represents the number of miles. Then, write a main program that takes a number of laps as an input, calls function LapsToMiles() to calculate the number of miles, and outputs the number of miles.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
printf("%0.2lf\n", yourValue);

Ex: If the input is:

7.6

the output is:

1.90

Ex: If the input is:

2.2

the output is:

0.55

The program must define and call a function:
double LapsToMiles(double userLaps)

i need this wrote in c.

Answers

Miles Morales

Explanation:

EH EH EH EH OOH OOH OOH OOOOOH YEA YEA YOULL BE LEFT IN THE DUST UNLESS YOU STUCK BY US YOURE A SUNFLOWER I THINK YOUR LOVE WOULD BE TOO MUCH

List the steps involved in creating a table in Excel if you were using the range A7:G34.

Please be specific and not give false answers.

Answers

Answer:

Sure, here are the specific steps to create a table in Excel using the range A7:G34:

Open a new or existing Excel workbook.

Click on the first cell of the range where you want to create the table (in this case, cell A7).

Drag the cursor to select all the cells in the range A7:G34.

Click on the "Insert" tab in the Excel ribbon.

Click on the "Table" button in the "Tables" group.

Ensure that the range A7:G34 is correctly displayed in the "Create Table" dialog box.

Check the box next to "My table has headers" if your table has column headers.

Click on the "OK" button to create the table.

Your table will now be created with the specified range and any column headers you may have specified. You can then format and modify the table as needed.

Explanation:

Create Task for AP computer science principles python

Answers

The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Thus, The more comprehensive of the two courses, AP Computer Science Principles teaches students the fundamentals of computer science while emphasizing teamwork.

Although computer science is a useful subject to study, is the exam challenging to pass.

For aspirant AP Computer Science Principles students, it's a good thing that the subject isn't ranked in the top 10 most challenging AP courses. But that doesn't make it any less difficult. Visit our AP Computer Science Principles resource page.

Thus, The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Learn more about AP program, refer to the link:

https://brainly.com/question/3121467

#SPJ1

Write a program that allows the user to input two numbers and then outputs the average of the
numbers.

Answers

Answer:

Here's a Python program that takes two numbers as input from the user, calculates their average and displays it as output:

# Taking input from user

num1 = float(input("Enter first number: "))

num2 = float(input("Enter second number: "))

# Calculating average

average = (num1 + num2) / 2

# Displaying output

print("The average of", num1, "and", num2, "is", average)

Explanation:

In this program, we use the input() function to take input from the user in the form of two floating-point numbers. We then calculate their average by adding the two numbers and dividing the result by 2. Finally, we display the average to the user using the print() function.

Note: We convert the input to float data type using the float() function to ensure that the division operation produces a floating-point result even if the inputs are integers.

Does an MVP need to have a polished GUI to be delivered? If not, what's the minimum elements that are needed? What elements might not be needed to be completely finished for an MVP? Explain your rationale.

Answers

Answer:

Whether you consider an MVP to be the part before or after the initial polish shouldn't really matter. For your example, I imagine having a "clean" UI would be a pretty important factor in whether it's functionally fun (as defined above), so you should definitely be polishing that a bit

Explanation:

How can you optimize the performance of a function written in assembly language, while ensuring that it still performs the intended functionality and produces correct outputs? What factors should you consider when making trade-offs between speed and correctness?

Answers

While optimizing the performance of an assembly language function, a range of techniques can be implemented such as minimizing data access, reducing instruction count and utilizing hardware features like caching and pipelining.

Why  is this so ?

It is vital to validate that these optimizations do not compromise the intended functionality of the program or lead to erroneous results.

To achieve this, comprehensive testing should be deployed on different inputs and conditions to guarantee that the optimized function behaves as anticipated.

As one makes trade-offs between speed and correctness, various factors must be considered like the complexity of code, criticality of function and how error impacts system operation.

Learn more about performance optimization:
https://brainly.com/question/14015474
#SPJ1

Which user interface part shows graphical output of mined data?
The
real estate part of the user interface shows graphical output of mined data.

Answers

Screen real estate is the  user interface part shows graphical output of mined data.

What is the  user interface?

Data visualization facilitates users to observe data from various angles. An essential concern regarding user interfaces is how to display a vast quantity of data on a limited screen space. The term "screen real estate" refers to the amount of space available on the display for presenting visual information.

Due to the limited display area, it is unfeasible for users to perceive information distinctly. The requisite data fluctuates among different users. The capacity of data mining ought to encompass generating insights on a diverse range of subjects.

Learn more about  user interface from

https://brainly.com/question/29541505

#SPJ1

Using the Replace Color adjustment, you can change the hue of all Red colors in an
image or selection. Curve adjustments always apply color changes to the entire
image.
True
False

Answers

Answer:

this is ........ pen I bought yesterday.(a;an;the;nothing)

The learning center teaches 2 classes. Each class has its list of student names.

Some students are taking one class, some are taking both the classes. Write a function (getResult) with the list parameters (classOne and classTwo). The function will return the the list of students who are taking both classes. (PYTHON)

Answers

Sure, here's an example Python function that takes two lists of student names as arguments and returns a list of students who are taking both classes:

def getResult(classOne, classTwo):

   # use set intersection to find students who are in both classes

   studentsTakingBoth = list(set(classOne) & set(classTwo))

   return studentsTakingBoth

Here's an example usage of the function:

classOne = ['Alice', 'Bob', 'Charlie', 'David']

classTwo = ['Bob', 'David', 'Eve', 'Frank']

studentsTakingBoth = getResult(classOne, classTwo)

print(studentsTakingBoth) # should print ['Bob', 'David']

In this example, the getResult function takes two lists classOne and classTwo as arguments, and finds the intersection of the two sets of students using the set intersection operator &. The resulting list is then returned. Note that we first convert the set intersection result into a list before returning it, since the set data type does not preserve the order of elements.

Drag each tile to the correct location.
Distinguish between the features of low-level and high-level languages.
assembly language
Java
machine language
High-Level Language
Python
Low-Level Language

Answers

Answer

Low-Level Language:
- Assembly language
- Machine language

High-Level Language:
- Java
- Python

Which tasks can a user accomplish by using the Find and Replace feature of Word? CORRECTLY Check all that apply.

changing the size of the page
changing the case of a word
changing the spelling of a word
changing the margins of the page
changing a word to another word

Answers

The tasks that a user accomplish by using the Find and Replace feature of Word is A: changing the case of a word

What is the Replace feature?

Users have the ability to utilize Word's Find and Replace function, which enables them to identify particular text in a document and swap it with alternative text.

Despite its functionality, this attribute does not provide users with the ability to manipulate the dimensions, boundaries, or formatting of the entire document, as these aspects are generally predetermined by the document's page layout configuration.

Learn more about Replace feature from

https://brainly.com/question/12245516

#SPJ1

Online _ are the way in which people define themselves on social media sites and other Internet-based venues.

Answers

Online identity are the way in which people define themselves on social media sites and other Internet-based venues.

What is online identity?

This refers to how a person choosing to define themselves on the internet via varous social media.

This may or may not be different from their real persona. In some cases, people's online identify become their real identity and note the other way round.

Thus, it is correct to state that online identity are the way in which people define themselves on social media sites and other Internet-based venues.

Learn more about online identity:
https://brainly.com/question/13692041
#SPJ1

c. Explain how computer memory is measured a. Using a table, categorize bardware devices into input, output and storage devices b. State four similarities and four differences between first and second generation of computers e Describe the fourth and fifth generation of conten​

Answers

Answer:

a. Computer memory is measured in bytes - a unit of digital information storage. Usually, computer memory is referred to as Random Access Memory (RAM), and its size is usually measured in gigabytes (GB). b. Input devices are used to input data into the computer system, for example, keyboard, mouse, scanner, and microphone. Output devices display and present data to the user, for example, monitor, printer, and speakers. Storage devices are used for storing data, for example, hard disk drive, solid-state drive, and USB drive. First-generation computers were large, bulky, and expensive, using vacuum tubes as their main components to process data. They were not user-friendly and lacked programming languages. Second-generation computers were faster, smaller, and cheaper than their predecessors. They used transistors in place of vacuum tubes, which reduced power consumption and generated less heat. They also used programming languages like COBOL and FORTRAN.

c. Fourth-generation computers were smaller in size and used microprocessors for processing data. They were characterized by faster speed, increased storage capacity, and cost-effectiveness. Fourth-generation computers could also support multitasking and multi-user operations. Fifth-generation computers are currently being developed, aiming at creating machine intelligence based on natural language processing, AI algorithms, and advanced parallel processing. They are expected to be able to learn from experience and understand and interpret human speech and natural language.

Overall, the evolution of computers has led to an exponential increase in both computing power and accessibility to users, as well as the use of more efficient and compact hardware devices.

Explanation:

Answer:

The civilizations of the Maya, Aztec, and Inca that once flourished in Central and South America shared common elements. People practiced farming, developed social structures, raised armies, and worshipped many gods. The three civilizations were as diverse as the terrains in which they lived

In VPython, which object can be used to create this object?

myObject =_____(pos= vector (0, 5, 2))

box
cube
prism

Answers

In VPython, Box object can be used to create this object. myObject =box (pos= vector (0, 5, 2))

What is VPython?

The VPython box object is capable of producing 3D structures like a cube, prism, or box. The box entity accepts various inputs, including pos (the center location of the box), size (the width, length, and height of the box), color (the hue of the box), and opacity (the level of transparency of the box).

As an example, suppose you want to fashion a red-colored box that measures 1 inch in length, 2 inches in width, and 3 inches in height, and is situated at coordinates (0, 5, 2) it will be: myObject = box(pos=vector(0, 5, 2), size=vector(1, 2, 3))

Learn more about Box object from

https://brainly.com/question/28780500

#SPJ1

Write a assembly code function (decode) to clean the data in a variable (one byte long) from '0'. The variable address is placed in ECX

Write a function (encode) to 'ADD' an ascii 0 to a variable. The variable address is placed in ECX

Answers

The assembly code function (decode) to clean the data in a variable (one byte long) from '0'. The variable address is placed in ECX is given below:

Here's the assembly code for the two functions for variable:

; Function to clean data in a byte variable from '0'

decode:

   push ebp            ; Save base pointer

   mov ebp, esp        ; Set up new base pointer

   mov al, [ecx]       ; Load byte from variable into AL register

   cmp al, 30h         ; Compare AL with '0' character

   jb end_decode       ; If AL is less than '0', jump to end

   cmp al, 3Ah         ; Compare AL with ':' character

   jae end_decode      ; If AL is greater than or equal to ':', jump to end

   sub al, 30h         ; Subtract '0' from AL to clean the data

   mov [ecx], al       ; Store cleaned data back into variable

end_decode:

   pop ebp             ; Restore base pointer

   ret                 ; Return from function

; Function to add an ascii 0 to a variable

encode:

   push ebp            ; Save base pointer

   mov ebp, esp        ; Set up new base pointer

   mov al, [ecx]       ; Load byte from variable into AL register

   add al, 30h         ; Add '0' to AL to encode the data

   mov [ecx], al       ; Store encoded data back into variable

   pop ebp             ; Restore base pointer

   ret                 ; Return from function

Thus, this is the assembly code for the given scenario.

For more details regarding assembly code, visit:

https://brainly.com/question/31590404

#SPJ1

✓ Details
C++
Write a program in which an array is initialized through user input Use these elements in an array named Temps: 98.6, 32.0, 87.1, 45.7 and -1.2.
Output the values in the array. The outputs should look like this: The elements in the array named Temps are (list the elements).

Answers

Here is a sample C++ program that initializes an array with user input and outputs the values in the array:

```
#include
using namespace std;

int main() {
const int SIZE = 5;
double Temps[SIZE];
cout << "Enter " << SIZE << " temperature values:" << endl;
for (int i = 0; i < SIZE; i++) {
cin >> Temps[i];
}
cout << "The elements in the array named Temps are: ";
for (int i = 0; i < SIZE; i++) {
cout << Temps[i] << " ";
}
cout << endl;
return 0;
}
```

This program declares an array named `Temps` with a size of 5 and initializes it with user input. It then outputs the values in the array using a `for` loop. The output is formatted to match the specifications in the prompt.

Please Help! Which of the following is a common file extension of program install packages? Question 6 options: .exe .pptx .xlsx .docx

Answers

Answer: A. .exe

Explanation:

The extension ".exe" is widely recognized as a file extension utilized for installation packages of programs on Windows-based computers. An executable file possessing the extension ".exe" is employed to effectuate the installation or execution of software on a computer system. File extensions such as ".pptx", ".xlsx", and ".docx" are commonly linked to file formats used in Microsoft Office documents.

1.1 Explain each Advantages and Disadvantage of using computer?​

Answers

Answer:

Advantages of using computers:

Speed: Computers can process data much faster than humans, allowing for quick and efficient completion of tasks.Accuracy: Computers are not prone to human errors and can perform calculations and tasks with a high degree of accuracy.Storage: Computers can store vast amounts of data in a small space, making it easy to access and organize information.Automation: Computers can automate repetitive tasks, freeing up humans to focus on more complex and creative tasks.Connectivity: Computers can be connected to the internet, allowing for instant access to information from around the world.

Disadvantages of using computers:

Dependence: Overreliance on computers can lead to a loss of critical thinking and problem-solving skills.Health risks: Extended computer use can lead to vision problems, back pain, and other health issues.Security risks: Computers are vulnerable to hacking, viruses, and other security threats, which can compromise sensitive information.Cost: Computers can be expensive to purchase and maintain, and upgrades may be necessary to keep up with changing technology.Social isolation: Excessive computer use can lead to social isolation and reduce face-to-face interactions, which can be detrimental to mental health.

Other Questions
The _____ bones form the bridge of the nose.A) ethmoidB) lacrimalC) mandibleD) nasal Urban LegendHi! I just read this. Really scary stuff. Please forward to anyone you know who travels!TRAVELERS BEWARE!!!Law enforcement agencies in major cities throughout the United States are scrambling to protect thousands of people who have had their identities stolen. The culprits: hotel employees.Room keys are digital cards that contain frightening amounts of your personal information, including:Your FULL nameYour home addressYour phone numberYour family members' namesYour credit card and banking informationWhen you turn in your key card after a nice vacation, you are actually handing over your most personal information to the people behind the desk. These are part-time employees who are difficult to trace, and they can walk out with your card at any time, stealing your identity.If you have visited a hotel with an electronic key card, check your bank account! Change your passwords! Do everything in your power to protect your livelihood. In the future, NEVER return the key cards to the hotel desk. It isn't worth it!How can you best use an author's work to locate more sources for your search?A) Plagiarize your paper from someone.B) Look at the sources the author used.C) Make the sources up on your own.D) Choose the first sources you find. if methylene blue was omitted from the acid-fast stain, non-acid-fast cells would be ___ at the end of the staining process A student government class has 20 students. Four students will be chosen at random to represent the school at a city council meeting. (Lesson 21.3) (2 points) a. Is this a permutation or combination? Explain. b. How many different ways can 4 students be chosen from a group of 20? Tim and his family are driving 1,560 miles across the country to visit relatives. They plan to complete the trip in 3 days. If they drive 8 hours per day, what is the average speed at which Tims family will be traveling? 1) The turnover (M Ft) of a firm between 2015 and 2019. Year Turnover (M Ft)2015=100%Previous Year=100% 2015 250 2016 260 2017 275 2018 2019 350 300 Task: a.) Calculate the missing values! b.) Calculate and interpret and! (average relative and absolute change) c) Interpret the ratios of 2016! An____ ______ creates a situation where you must choose between two equally unsatisfactory alternatives The clavicle is also known as the:A) cheekboneB) collarboneC) breastboneD) shoulder blade How were these characteristics of the Baroque era shown in the music? coefficient (a) and an exponent (b) are missing in the two monomials shown below. ax 6xb The least common multiple (LCM) of the two monomials is 18x5. Which pair of statements about the missing coefficient and the missing exponent is true? AThe missing coefficient (a) must be 9 or 18. The missing exponent (b) must be 5. BThe missing coefficient (a) must be 9 or 18. The missing exponent (b) can be any number 5 or less. CThe missing coefficient (a) can be any multiple of 3. The missing exponent (b) must be 5. DThe missing coefficient (a) can be any multiple of 3. The missing exponent (b) can be any number 5 or less An object traveling a circular path of radius 5 m at constant speed experiences an acceleration of 3 m/s2. If the radius of its path is increased to 10 m, but its speed remains the same, what is its acceleration? A. 0. 3 m/s2 B. 1. 5 m/s2 C. 6 m/s2 D. 12 m/s2 40 yo M presents with pain in the right groin after a motor vehicle accident. His right leg is flexed at the hip, adducted, and internally rotated. What the diagnose? consider the vectors x and a and the symmetric matrix a. i. what is the first derivative of at x with respect to x? ii. what is the first derivative of xt ax with respect to x? what is the second derivative? Julia is planning a narrative that will focus on a protagonist in a conflict with nature. Which of the following settings would best enhance this conflict? A line waiting to ride a frightening roller coaster A courtroom, where people are waiting for a verdict to be read A fishing boat caught in a terrible storm A high school football game against rival teams Which cloud services characteristic best describes the nature of rapid elasticity? What increases the likelihood of trainee auditors reporting an ethical violation by an audit partner?A. A reward exists for whistleblowingB. Firm quality controls existC. Formal structures for whistleblowing existD. Informal structures for whistleblowing exist PLS HELP ME!! HOW DOES THIS QUOTE HELP PORTRAY MACBETH AS A DECEITFUL PERSON??"Stars, hide your light so no one can see the terrible desires within me. I wont let my eye look at what my hand is doing, but in the end Im still going to do that thing Id be horrified to see." What was the war that started near Pittsburg in 1754 known as in North America? if abcde is a regular pentagon, find the smallest rotation about e which maps a to d. (mathcounts 1984) provide suitable recommendations and solution to the problem