Which of the following statements are true of an integer data type? Check all that apply.
It can be a whole number.
It can be a negative number.
x - It uses TRUE/FALSE statements.
x - It represents temporary locations.
It cannot hold a fraction or a decimal number.

Answers

Answer 1

Answer:

It can be a whole number

It can be a negative number

It cannot hold a fraction or a decimal

Explanation:

An integer is a whole number such as 1, 2, 5, 15, -35 etc. It never goes into decimals/doubles such as 1.12, 2.34 etc.


Related Questions

In this exercise, you are going to build a hierarchy to create instrument objects. We are going to create part of the orchestra using three classes, Instrument, Wind, and Strings. Note that the Strings class has a name very close to the String class, so be careful with your naming convention! We need to save the following characteristics: Name and family should be saved for all instruments We need to specify whether a strings instrument uses a bow We need to specify whether a wind instrument uses a reed Build the classes out with getters and setters for all classes. Only the superclass needs a toString and the toString should print like this: Violin is a member of the Strings family. Your constructors should be set up to match the objects created in the InstrumentTester class.
These are the files given
public class InstrumentTester
{
public static void main(String[] args)
{
/**
* Don't Change This Tester Class!
*
* When you are finished, this should run without error.
*/
Wind tuba = new Wind("Tuba", "Brass", false);
Wind clarinet = new Wind("Clarinet", "Woodwind", true);
Strings violin = new Strings("Violin", true);
Strings harp = new Strings("Harp", false);
System.out.println(tuba);
System.out.println(clarinet);
System.out.println(violin);
System.out.println(harp);
}
}
////////////////////////////
public class Wind extends Instrument
{
}
///////////////////////////
public class Strings extends Instrument
{
}
/////////////////////////
public class Instrument
{
}

Answers

Answer:

Explanation:

The following code is written in Java and creates all of the necessary classes as requested so that the main class runs perfectly without having to change anything...

package sample;

class InstrumentTester {

   public static void main(String[] args) {

       /*** Don't Change This Tester Class!** When you are finished, this should run without error.*/

       Wind tuba = new Wind("Tuba", "Brass", false);

       Wind clarinet = new Wind("Clarinet", "Woodwind", true);

       Strings violin = new Strings("Violin", true);

       Strings harp = new Strings("Harp", false);

       System.out.println(tuba);

       System.out.println(clarinet);

       System.out.println(violin);

       System.out.println(harp);

   }

}

class Wind extends Instrument {

   boolean usesReef;

   public Wind(String name, String family, boolean usesReef) {

       this.setName(name);

       this.setFamily(family);

       this.usesReef = usesReef;

   }

   public boolean isUsesReef() {

       return usesReef;

   }

   public void setUsesReef(boolean usesReef) {

       this.usesReef = usesReef;

   }

}

class Strings extends Instrument{

   boolean usesBow;

   public Strings (String name, String family, boolean usesBow) {

       this.setName(name);

       this.setFamily(family);

       this.usesBow = usesBow;

   }

   public Strings (String name, boolean usesBow) {

       this.setName(name);

       this.setFamily("String");

       this.usesBow = usesBow;

   }

   public boolean isUsesBow() {

       return usesBow;

   }

   public void setUsesBow(boolean usesBow) {

       this.usesBow = usesBow;

   }    

}

class Instrument{

   private String family;

   private String name;

   public String getName() {

       return name;

   }

   public void setName(String name) {

       this.name = name;

   }

   public String getFamily() {

       return family;

   }

   public void setFamily(String family) {

       this.family = family;

   }

   public String toString () {

       System.out.println(this.getName() + " is a member of the " + this.getFamily() + " family.");

       return null;

   }

}

Which of these situations would benefit from the AutoRecover feature? Check all that apply.
You clicked Don't Save when you closed a file but later realized you did want that file after all.
You decided you wanted to rename a folder, but you could not remember what it was called.
Your computer crashed while bu were working on a file.
Your friend wants you to e-mail her a file.

Answers

Answer: Your friend wants you to email her.

Explanation:

Answer:

Its 1 and 3 on edge 2021

Explanation:

how does equal employment opportunity apply to nursing practice?​

Answers

Well, regardless of what practices you may wanting and go into, equal employment opportunity (EEO) should apply to everyone equally, even if you're a student.

picture question please help me

Answers

Answer:

where is the picture?????

The Answer is c hope this helps

Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will describe the goals that define a secure application. Consider the following questions for web server software and web browsers: 1. What functions should this software application provide? 2. What functions should this software application prohibit? 3. What controls are necessary to ensure this applications software operates as intended? 4. What steps are necessary to validate that the software operates as intended? Tasks Create two policies—one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps. Use the following as a guide for both policies: ▪ Type of application software ▪ Description of functions this software should allow ▪ Description of functions this software should prohibit ▪ Known vulnerabilities associated with software ▪ Controls necessary to ensure compliance with desired functionality ▪ Method to assess security control effectiveness

Answers

Answer:

Navigate to Prohibit Software from the Inventory tab. This will list the details of all the software that are already prohibited.

Click Add Prohibited Software. This will open the Add Prohibited Software dialog listing all the software detected in the managed computers. You should have scanned the Windows systems at least once to have the details of the software here.

Select the software that you wish to prohibit and move them to Prohibited List.

Note: In case you have grouped certain software and you are adding that Software

to assign length and breadth to display area of a rectangle​

Answers

Answer:

In Python:

Length = float(input("Length: "))

Breadth = float(input("Breadth: "))

Area = Length * Breadth

Print(Area)

Explanation:

Get values for length and breadth

Length = float(input("Length: "))

Breadth = float(input("Breadth: "))

Calculate area

Area = Length * Breadth

Print area

Print(Area)

Write a program that plays the popular scissor-rock-paper game. (A scissor can cut a paper, a rock can break a scissor, and a paper can cover a rock.) The program randomly generates a number 0, 1, or 2 representing scissor, rock, and paper. The program prompts the user to enter a number 0, 1, or 2 and displays a message indicating whether the user or the computer wins, loses, or draws. Allow the user to continue playing or quit.

Answers

Answer:

Explanation:

The following program is written in Python and follows all the instructions accordingly to create the rock paper scissor game as requested.

from random import randint

answers = ["Scissors", "Rock", "Paper"]

computer = answers[randint(0, 2)]

continue_loop = False

while continue_loop == False:

   

   player_choice = input("Choose a number, 0 = Scissors, 1 = Rock , 2 = Paper?")

   player_choice = answers[int(player_choice)]

   if player_choice == computer:

       print("Tie!")

   elif player_choice == "Rock":

       if computer == "Paper":

           print("You lose!", computer, "covers", player_choice)

       else:

           print("You win!", player_choice, "smashes", computer)

   elif player_choice == "Paper":

       if computer == "Scissors":

           print("You lose!", computer, "cut", player_choice)

       else:

           print("You win!", player_choice, "covers", computer)

   elif player_choice == "Scissors":

       if computer == "Rock":

           print("You lose...", computer, "smashes", player_choice)

       else:

           print("You win!", player_choice, "cut", computer)

   else:

       print("That's not a valid play. Check your spelling!")

   continue_or_not = input("Would you like to play again? Y/N")

   continue_or_not = continue_or_not.lower()

   if continue_or_not != "y":

       break

   computer = answers[randint(0, 2)]

PLEASE SOMEONE ANSWER THIS

If the old code to a passcode was 1147, and someone changed it, what would the new code be?





[I forgot my screen time passcode please someone help I literally can’t do anything on my phone.]

Answers

maybe 7411 or someones birthday in the family
Hm, maybe you should try any special days of the year like an anniversary or any favorite numbers.

Write a recursive function next_pow2(n) that returns the smallest integer value p such that for a non-negative value n. For example: function call return value next_pow2(0) 0 next_pow2(1) 0 next_pow2(2) 1 next_pow2(3) 2 next_pow2(4) 2 next_pow2(5) 3 next_pow2(6) 3 next_pow2(7) 3 next_pow2(8) 3 next_pow2(9) 4 next_pow2(255) 8 next_pow2(256) 8 next_pow2(257) 9

Answers

Answer:

Explanation:

The following code is written in Python and is a recursive function as requested that uses the current value of p (which is count in this instance) and raises 2 to the power of p. If the result is greater than or equal to the value of n then it returns the value of p (count) otherwise it raises it by 1 and calls the function again.

def next_pow2(n, count = 0):

   if (2**count) < n:

       count += 1

       return next_pow2(n, count)

   else:

       return count

Which of the following is a key difference between a Windows 7 restore point and one you set yourself?


Windows 7 restore points are not all-inclusive, while those you set manually are.

Windows 7 restore points take far longer to initiate a restore point, while it’s faster when you do it yourself.

Windows 7 restore points are set automatically.

Windows 7 restore points are reliable so you won’t have to deal with a corrupted system configuration.

Answers

Answer:

Windows 7 restore points are not all-inclusive, while those you set manually are.

Explanation:

Write a program that will input letter grades (A, B, C, D, F), the number of which is input by the user (a maximum of 50 grades). The grades will be read into an array. A function will be called five times (once for each letter grade) and will return the total number of grades in that category. The input to the function will include the array, number of elements in the array and the letter category (A, B, C, D or F). The pro- gram will print the number of grades that are A, B, etc.

Answers

Answer:

In Java:

import java.util.*;

public class Main{

public static int countgrades(char[]letterGrades,char Grade, int lent){

    int count = 0;

    for(int i =0;i<lent;i++){

        if(letterGrades[i]==Grade){

            count++;         }     }

    return count;

}

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int lent;

 System.out.print("Length: ");

 lent = input.nextInt();

 while(lent >30 || lent<1){

     System.out.print("Invalid input\nLength: ");

     lent = input.nextInt();  }

 char[] letterGrades = new char[lent];

 for(int i  =0; i<lent;i++){

     letterGrades[i] = input.next().charAt(0);

 }

 char[] letters = {'A','B','C','D','F'};

 for(char i:letters){

     System.out.println(i+": "+countgrades(letterGrades,i, lent));

 }

}

}

Explanation:

See attachment where I I used comment to explain each lin e

Following are the code to the given question:

Program Explanation:

Include header file.Defining a method "count_Char" that takes three variable in the parameter that are "g as character array, x as integer variable, and a character variable l".Inside the method two integer variable "i,s" is declared.In the next step, a for loop is declared that use if block that checks input value is in array and return incremented s value.In the next line, a main method is declared inside this two integer variable "i,x" and  two character array is declared that inputs value, and define a loop that call the above method, and print its value.

Program:

#include <iostream>//header file

using namespace std;

int count_Char(char g[], int x, char l)//defining a method count_Char that takes 3 variable in parameter

{

int i,s=0;//defining integer variable

for(i=0;i<x;i++)//defining for loop that checks input value find in array

{

  if(g[i]==l)//defining if block that check value is in array

   {  

       s++;//incrementing s value by 1

   }

}

return s;//return s value

}  

int main()//defining main method

{

int i,x;//defining integer variable

char g[50],l[5]={'A','B','C','D','F'};//defining 2 character array

cout<<"Please input the number of grades to be read in.(1-50): ";//print message

cin>>x;//input integer value

cout<<"all grades must be upper case A B C D or F\n";//print message

for(i=0;i<x;i++)//defining loop that Input array value

{

cout<<"Input a grade: ";//print message

cin>>g[i];//input array value

}

for(i=0;i<5;i++)//defining loop that prints array value and prints its match value

{  

cout<<"Number of "<<l[i]<<"s ="<<count_Char(g,x,l[i])<<endl;//prints array value with matched value

}

return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/19512947

Write a Java program that prompts for integers and displays them in binary. Sample output: Do you want to start(Y/N): y Enter an integer and I will convert it to binary code: 16 You entered 16. 16 in binary is 10000. Do you want to continue(Y/N): y Enter an integer and I will convert it to binary code: 123 You entered 123. 123 in binary is 1111011. Do you want to continue(Y/N): y Enter an integer and I will convert it to binary code: 359 You entered 359. 359 in binary is 101100111. Do you want to continue(Y/N): y Enter an integer and I will convert it to binary code: 1024 You entered 1024. 1024 in binary is 10000000000. Do you want to continue(Y/N): n

Answers

Answer:

Explanation:

The following code is written in Java and creates a loop that cycles the same prompt until the user states no. While the loop runs it asks the user for an integer value and returns the binary code of that value

public static void main(String[] args) {

               Scanner in = new Scanner(System.in);

               boolean continueLoop = true;

               while (continueLoop) {

                   System.out.println("Would you like to continue? Y/N");

                   String answer = in.nextLine().toLowerCase();

                   if (answer.equals("y")) {

                       System.out.println("Enter int value: ");

                       int number = in.nextInt();

                       System.out.println("Integer: "+number);

                       System.out.println("Binary = " + Integer.toBinaryString(number));

                   } else if (answer.equals("n")){

                       System.out.println("breaking");

                       break;

                   }

               }

       }

When artists have a successful career, there is sometimes the need to collect all their works in an anthology album. Given main() and a base Album class, define a derived class called BoxSet. Within the derived Album class, define a printInfo() method that overrides the Album class' printInfo() method by printing not only the title, author, publisher, and publication date, but also whether it is the complete works, and number of discs.
Ex. If the input is:
Master of Puppets
Metallica
Elektra
1986
The Complete Studio Albums
Creedence Clearwater Revival
Fantasy
27 Oct 2014
true
7
the output is:
Album Information:
Album Title: Master of Puppets
Author: Metallica
Publisher: Elektra
Publication Date: 1986
Album Information:
Album Title: The Complete Studio Albums
Author: Creedence Clearwater Revival
Publisher: Fantasy
Publication Date: 27 Oct 2014
Is Complete Works? true
Number of Discs: 7
AlbumInformation.java
import java.util.Scanner;
public class AlbumInformation {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
Album myAlbum = new Album();
BoxSet myBoxSet = new BoxSet();
String title, author, publisher, publicationDate;
String bTitle, bAuthor, bPublisher, bPublicationDate;
boolean isCompleteWorks;
int numDiscs;
title = scnr.nextLine();
author = scnr.nextLine();
publisher = scnr.nextLine();
publicationDate = scnr.nextLine();
bTitle = scnr.nextLine();
bAuthor = scnr.nextLine();
bPublisher = scnr.nextLine();
bPublicationDate = scnr.nextLine();
isCompleteWorks = scnr.nextBoolean();
numDiscs = scnr.nextInt();
myAlbum.setTitle(title);
myAlbum.setAuthor(author);
myAlbum.setPublisher(publisher);
myAlbum.setPublicationDate(publicationDate);
myAlbum.printInfo();
myBoxSet.setTitle(bTitle);
myBoxSet.setAuthor(bAuthor);
myBoxSet.setPublisher(bPublisher);
myBoxSet.setPublicationDate(bPublicationDate);
myBoxSet.setIsCompleteWorks(isCompleteWorks);
myBoxSet.setNumDiscs(numDiscs);
myBoxSet.printInfo();
}
}
Album.java
public class Album {
protected String title;
protected String author;
protected String publisher;
protected String publicationDate;
public void setTitle(String userTitle) {
title = userTitle;
}
public String getTitle() {
return title;
}
public void setAuthor(String userAuthor) {
author = userAuthor;
}
public String getAuthor(){
return author;
}
public void setPublisher(String userPublisher) {
publisher = userPublisher;
}
public String getPublisher() {
return publisher;
}
public void setPublicationDate(String userPublicationDate) {
publicationDate = userPublicationDate;
}
public String getPublicationDate() {
return publicationDate;
}
public void printInfo() {
System.out.println("Album Information: ");
System.out.println(" Album Title: " + title);
System.out.println(" Author: " + author);
System.out.println(" Publisher: " + publisher);
System.out.println(" Publication Date: " + publicationDate);
}
}
BosSet.java
public class BoxSet extends Album {
// TODO: Declare private fields: isCompleteWorks, numDiscs
// TODO: Define mutator methods -
// setIsCompleteWorks(), setNumDiscs()
// TODO: Define accessor methods -
// getIsCompleteWorks(), getNumDiscs()


// TODO: Define a printInfo() method that overrides
// the printInfo in Album class

}

Answers

Answer:

Answered below

Explanation:

public class BoxSet extends Album{

private boolean isCompleteWork;

private int numDiscs;

public void setIsCompleteWorks( boolean cw){isCompleteWorks = cw;

}

public boolean getCompleteWorks(){

return isCompleteWorks;

}

public void setNumDiscs(int discs){

numDiscs = discs;

}

public int getNumDiscs(){

return numDiscs;

}

public void printInfo(){

super.printInfo();

System.out.print(isCompleteWorks);

System.out.print(numDiscs);

}

}

A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are:

1) The year must be divisible by 4

2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400

Some example leap years are 1600, 1712, and 2016.

Write a program that takes in a year and determines whether that year is a leap year.

Ex: If the input is:

1712
the output is:

1712 - leap year
Ex: If the input is:

1913
the output is:

1913 - not a leap year
LABACTIVITY

5.24.1: LAB: Leap year

0 / 10

main.py

Load default template...

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

33

34

35

else

isLeapYear = false;

}

else

isLeapYear = true;

}

else

isLeapYear = false;

if(isLeapYear)

System.out.println(inputYear + " is a leap year.");

else

System.out.println(inputYear + " is not a leap year.");

}

Answers

Answer:

hmmmmmmmmmmmmmmmmmmmmmmmmmmm

Why are your interactive ads so broken?
Why do you charge people for answers you aren't even answering, the people are doing all your work for you?

Answers

Answer:

lol truuuue

Explanation:

How do computers solve complex problems?

Answers

Answer:

Computers solve complex problems by coding

Explanation:

I hope this helps

Which of the following would NOT be stored
using an array?
A first name
O The names of the top ten movies of 2019
Prices for 25 different shoes at a store
O Longitude and latitude tracking data of a wild
polar bear

Answers

O longitude and latitude tracking data of a wild polar bear

The data cannot be stored using an array is Longitude and latitude tracking data of a wild polar bear.

It should be noted that arrays are the contiguous block  as regards the memory locations, the first element is been stored by the lowest position of the array

Some of the data that can be stored using arrays are:

first nameThe names of the top ten movies of 2019.Prices for 25 different shoes at a store

Learn more about array at:

https://brainly.com/question/19586990

list two precautions you should take when using free utility software available on the web

Answers

Answer:

dont use any personal information. make sure its a safe website

*When a computer programmer is finished writing or developing a program, what has to happen first before the computer can understand and utilize the code?
A.a service pack needs to be applied to the newly created program
B.the object code has to be translated into source code C.the source code has to be translated into object code
D.a device driver for the program has to be installed E.the programmer needs to obtain a software license

Answers

Answer:

C. The source code has to be translated into object code.

Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.
52
53
82
83
1. Line 1
for numB in (5,8]
2. Line 2
for numA in [2,3]:
3. Line 3
print (numB, numA)
SUBMIT ANSWER
ASK FOR HELP
TURN ITIN
2014 Cylyonne All right reserved

Answers

for numb in [5,8]:
for numa in [2,3]:
print(str(numb) + str(numa))

We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that the program can input arbitrary N-bit queue and for actual N-bit input also the program output will be always N bits long. Additionally we noticed that the longer program input is, the longer will be the output calculating time. After performing some repeating tests we also determined that the program working time depends only and exactly on input length, not on the input itself.



Finally we fixed some actual working times:



-for N=10 - 10.576 seconds;

-for N=20 - 11.087 seconds;

-for N=25 - 13.544 seconds;

-for N=30 - 27.442 seconds;

-for N=35 - 1 minute 46.059 seconds;

-for N=40 - 9 minutes 10.784 seconds.



Task:



a) Find the program working time for N=50.

b) Please derive the mathematical formula using which is possible to calculate actual working time for arbitrary N.

Answers

Answer:

i dont know

Explanation:

Junie is researching Ancient Egypt. She found a website that is full of information and great
images. As she is reading the text, she notices that there are little bits of information that don't
really agree with any of the other research she has done. What should she do?
O Use the website. Most of the information seems correct.
OUse only the information that she needs and ignore the information that doesn't seem right.
O Ask her friend what he thinks about the website.
O Evaluate the site using the CARS checklist to see if the site is valid and reliable.

Answers

Answer: Evaluate the site using the CARS checklist to see if the site is valid and reliable.

Explanation:

After turning on your computer ,it prompts you to type a password to continue the boot process. However ,you forgot the password. What are your next steps to allow the computer to continue the boot process ,start Windows ,and access the file on the hard disk.​

Answers

Answer:

It depends if you are using a PC or laptop

Explanation:

PC:

Remove the BIOSjumper from the motherboard (look in your manual to find this). Turn on the PC without the jumper and let everything load up. Then turn off your PC again and turn it back on with the BIOSjumper back in.

Laptop:

Turn off the laptop (plugged out). Then remove the CMOS battery from the motherboard (again manual). Wait around 15 minutes then put it back in and boot up your laptop again.

The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use the Filter pattern to filter the list in order to return a new list which contains only strings longer than five characters. The current implementation breaks when it encounters integers in the list. Fix it to return a properly filtered new list.student.py HNM 1 - Hef filter_only_certain_strings (data_list): new_list = [] for data in data_list: if type (data) == str and len(data) >= 5: new_list.append(data) return new_list Restore original file Save & Grade Save only

Answers

Answer:

Explanation:

The Python code that is provided in the question is correct just badly formatted. The snippet of code that states

return new_list

is badly indented and is being accidentally called inside the if statement. This is causing the function to end right after the first element on the list regardless of what type of data it is. In order for the code to work this line needs have the indentation removed so that it lines up with the for loop. like so... and you can see the correct output in the attached picture below.

def filter_only_certain_strings(data_list):

   new_list = []

   for data in data_list:

       if type(data) == str and len(data) >= 5:

           new_list.append(data)

   return new_list

The relationship between social media and the Internet is complex. Individual Internet behavior involves a myriad of factors that contribute either safety or risk-taking behaviors that can begin in adolescence. Discuss risks currently derived from online interactions, including coverage of violence trending on social media and identification of its characteristics. Be sure to include at least one example (case) that demonstrates this relationship.

Answers

Answer:

Explanation:

The internet could be regarded has a marketplace or platform which gives individuals, businesses the opportunity to interact, relate, access opportunities, learn in an easy manner with the help of a data connection. The internet has redefined the process and concept of acesing information and interaction with the ease and coverage it brings. The Social media is could be seen a part of the internet platform which allows people to relate and interact, make friends, promote brands and so on. The internet and social media platforms however, in spite of its huge benefits comes with its inherent risk. Including the surge in cyber crime, immorality and information theft to mention a few. Common scenarios whereby banking details are being stolen from databases resulting in wholesale illegal transfer of funds. Issues of blackmail and violent defamation by groups of cohorts has also been a con in the advent of internet and social media, including growing trends of fake news which usually escalate tension, in which the recent unrest in my vicinity benefitted negatively from.

Advantages that users experience when working with computers

Answers

Answer:

Multitasking Multitasking – Multitasking Multitasking is one among the main advantage of computer. ...

Speed – Now computer isn't just a calculating device. ...

Cost/ Stores huge – Amount of knowledge it's a coffee cost solution. ...

Accuracy – ...

Data Security – ...

Task completer – ...

Communication – ...

Productivity –

Explanation:

I hope that this is what you were looking for

2. A technology to connect various people using computers​

Answers

Answer:

Network technologies allow two or more computers to connect with each other. The most common of these technologies include Local Area Network (LAN), Wireless Area Network (WAN), the Internet via client servers and Bluetooth.

Not only did 1 in 4 teenagers experience online abuse, but how many are exposed to it

Answers

Answer: lots of teens will get this from cyber bullying and some people will mostly expeirience  it because they are not as popular as others

Explanation:

9% of U.S. teens have been bullied or harassed online, and a similar share says it's a major problem for people their age. At the same time, teens mostly think teachers, social media companies and politicians are failing at addressing this issue.

What are all the Answer Streaks (Fun Facts) for brainly?

Answers

Answer:

I only know 7 of them.

They are as follows: An apple, potato, and onion all taste the same if you eat them with your nose plugged , Bananas are curved because they grow towards the sun ☀️, During your lifetime, you will produce enough saliva to fill two swimming pools ‍♀️, Tennis players are not allowed to swear when they are playing in Wimbledon , Recycling one glass jar saves enough energy to watch television for 3 hours , Iceland does not have a railway system , and Vincent van Gogh ‍ only sold one painting in his lifetime.

Hope this helps! If it did, please give brainliest! It would help me a lot! Thanks! :D

streak number 1: An apple, potato, and onion all taste the same if you eat them with your nose plugged

streak number 2: Bananas are curved because they grow towards the sun ☀️

streak number 3: During your lifetime, you will produce enough saliva to fill two swimming pools ‍♀️

streak number 4: Tennis players are not allowed to swear when they are playing in Wimbledon

streak number 5: Recycling one glass jar saves enough energy to watch television for 3 hours

Streak number 6 : Iceland does not have a railway system

streak number 7: Vincent van Gogh ‍ only sold one painting in his lifetime.

streak number 8: The average person walks‍♀️the equivalent of five times around the world in their lifetime.

streak number 13 is: Marie Curie remains the only person to earn Nobel prizes in two different sciences

streak number 12: Some cats are allergic to humans ‍♀️

streak number 11: Thanks to 3D printing, NASA can basically “email” tools to astronauts

streak number 10: Chickens are the closest living relatives to the T-Rex

streak number 9: Squirrels forget where they hide about half of their nuts

4. Describe a report that a company might want to create and run on a regular basis. (1-3
sentences. 3.0 points)

Answers

Answer:

A report,.. hmm.. maybe about their company.=

A report that they would like people to see. One that says who they are. Also, what they do there, and why.

Explanation:

Spreadsheet software is often utilized throughout database applications. A further explanation is provided below.

Company reportSince there are several positions available, such as sales manager or human resources manager. It's incredibly beneficial to save marketing as well as customer data throughout a spreadsheet since it allows you to establish a database as well as evaluate current sales.There seems to be a wealth of tools available to assist consumers throughout studying databases within spreadsheets.

Find out more information about the company report here:

https://brainly.com/question/2870954

Other Questions
The difference between twice a number and 16 is 30. Which math statement is an equation that represents this relationship?A) 30 16 = xB) x 16 = 30C) 2x + 16 = 30D) 2x 16 = 30E) 2x + 30 = 16 How do I do this I need help I dont wanna fail this quarter!!!! 2/5 of a number equals 36 Please help me with this !!! Who was President Sam Houston talking about in the excerpt when he referred to a "bad chief"? What gives a pant cell a rigid shape?A: ChloroplastB: VacuoleC: Cell wallD: Cell membraneHelp me please Extra points & brainlest A certain shade of paint is made by mixing 5 parts blue paint with 2 parts white paint. To get the correct shade, how many quarts of white paint should be mixed with 8.5 quarts of blue paint. Give 5 comparisons of the three employees with the highest net paypls someone helppp mee Given the following data, calculate the cost of goods sold using the average-cost method. (Round any intermediary and final answers to two decimal places.) Date Item Unit 1/1 Beginning inventory 40 units at $15 per unit 4/11 Purchase of inventory 25 units at $20 per unit 10/1 Purchase of inventory 40 units at $25 per unit 12/31 Ending inventory 45 unitsa. $590000 b. $51,000.00 c. $1.400.00 d. $1200.00 solve the following inequality -2(x-3)< -3x+8 30. The secret diplomatic communication was called:a. Lusitaniab. 14 Pointsc. self-determinismd. Zimmerman Telegram Im need some help with this Use the present progressive form of the verbs in parenthesis 1. Ella es mi prima Blanca. Blanca ___ (dormir) debating de in rbol. 2. Aqu esto yo. ___(Leer) el peridico en el parque. 3. Aqu estn mis tos Jairo y Alba. Ellos ___(servir) el desayuno enel jardn de la casa. 4. Mi primita Alina es muy considerada. Aqu ella ___(traer) todassus cosas para jugar conmigo. 5. Y aqu estamos Blanca y yo, las dos ___(seguir) las instruccionesde mi ta para hacer limonada. Mi ta have la mejor limonada del mucho!6. Y esta es una foto vieja. Sabes quin es? Eres t el da de Hallowneen Te ___(vestirse) de oso. HELP ASAP! 20 POINTS! NOTHING OFF G00GLE!WHOEVER ANSWERS CORRECTLY WILL GET BRAINLIEST AND 5 STARS! IF YOU ANSWER JUST FOR POINTS I WILL REPORT YOU!! NO LINKS OR ANYTHING I HAVE TO DOWNLOAD JUST ANSWER-Why did settlers in Tennessee form the State of Franklin in 1784?aThey were frustrated with North Carolinas failure to protect thembThey wanted independence from Great BritaincThey wanted to buy land at cheap pricesdThey were living outside the boundary of any stateWhy did the State of Franklin fail to be recognized as a state?aIt did not get permission from North Carolinab. It did not have a constitutionc. It did not get enough votes in the Confederation CongressdIt did not have enough settlersWhat was the common name of the Tennessee country after it was ceded by North Carolina in 1789?aSoutheast TerritorybNorthwest TerritorycSouthwest TerritorydNortheast TerritoryWho was appointed governor of the Southwest Territory?aWilliam CockebWilliam BlountcJohn DonelsondJohn SevierWhat is the practice of buying cheap land and hoping that prices will rise called?aLand reformationbLand reclamationcLand speculationd. Land leasing Lincoln said that the Civil War was a test. What was that test? I really need help on this please help me solveplease help asap What does Tybalt mean when he says "Thou consortest with Romeo"? a. Any friend of Romeo is a friend of mine. b. Any friend of Romeo is an enemy of mine. c. He wanted the three of them to hang out together. d. He thinks Romeo is a great guy. A Story bought headphones for $50 the mark up the price 65% what is the selling price of the phone. What ideas in the passage tell more information about the topic of equal rights for women? Check all that apply.Men need to have more children so they have more practice parenting.Men are not expected to share responsibility in raising children.Women engage in vanity because they are denied equal rights.Women will try to gain power in negative ways when they do not have rights.When women do not have rights, they can act in ways that negatively affect men. Ethos, Pathos, or Logos? If you decide not to come for Thanksgiving, it would break your grandmother's heart. Ethos Pathos O Logos