Which of the following statements demonstrates the consequence of segregated medical
care?
A. Inequitable access to education and funding for Black doctors
B. Fewer predominately white medical schools being open to Black students
C. Both A and B
D. Neither A nor B

Answers

Answer 1

Answer:

C. Both A and B

Explanation:

Not only is inequitable access to education and funding for Black doctors a consequence of segregated medical care, it also resulted in less predominately white medical schools allowing Black students.

Answer 2

The statements that demonstrate the consequence of segregated medical care are both statements A and B. The correct option is C.

What is segregated medical care?

To distinguish or put apart from others or the general population. Segregated medical care has led to Black students being accepted into less primarily white medical institutions, which has resulted in unequal access to education and funding for Black professionals.

Black doctors have unequal access to education and funding. Less predominantly white medical colleges accept students of color.

Medical discrimination, racialized socioeconomic deprivation, and a segregated healthcare system all contribute to drastically different experiences in care for Black and White patients.

Therefore, the correct option is C. Both A and B.

To learn more about segregated medical care, refer to the link:

https://brainly.com/question/10812745

#SPJ6


Related Questions

what technical was the microscope invented in?

Answers

Answer:

Two Dutch spectacle-makers and father-and-son team, Hans and Zacharias Janssen, create the first microscope in 1590.

Explanation:

A microscope is an instrument that makes an enlarged image of a small object, thus revealing details too small to be seen by the unaided eye. The most familiar kind of microscope is the optical microscope, which uses visible light focused through lenses. Eeuwenhoek observed animal and plant tissue, human sperm and blood cells, minerals, fossils, and many other things that had never been seen before on a microscopic scale. He presented his findings to the Royal Society in London, where Robert Hooke was also making remarkable discoveries with a microscope.

1. Write a class Name that stores a person’s first, middle, and last names and provides the following methods:
public Name(String first, String middle, String last)—constructor. The name should be stored in the case given; don’t convert to all upper or lower case.
public String getFirst()—returns the first name
public String getMiddle()—returns the middle name
public String getLast()—returns the last name
public String firstMiddleLast()—returns a string containing the person’s full name in order, e.g., "Mary Jane Smith".
public String lastFirstMiddle()—returns a string containing the person’s full name with the last name first followed by a comma, e.g., "Smith, Mary Jane".
public boolean equals(Name otherName)—returns true if this name is the same as otherName. Comparisons should not be case sensitive. (Hint: There is a String method equalsIgnoreCase that is just like the String method equals except it does not consider case in doing its comparison.)
public String initials()—returns the person’s initials (a 3-character string). The initials should be all in upper case, regardless of what case the name was entered in. (Hint: Instead of using charAt, use the substring method of String to get a string containing only the first letter—then you can upcase this one-letter string. See Figure 3.1 in the text for a description of the substring method.)
public int length()—returns the total number of characters in the full name, not including spaces.
2. Now write a program TestNames.java that prompts for and reads in two names from the user (you’ll need first, middle, and last for each), creates a Name object for each, and uses the methods of the Name class to do the following:
a. For each name, print
first-middle-last version
last-first-middle version
initials
length
b. Tell whether or not the names are the same.
Here is my code. I keep getting a method error with getFullName in the Name.java file. Please help me re-write the code to fix this issue.
//Name.java
public class Name
{
private String firstName, middleName, lastName, fullName;
public Name(String first, String middle, String last)
{
firstName = first;
middleName = middle;
lastName = last;
String fullName = firstName '+' middleName '+' lastName;
}
public String getFirst()
{
return firstName;
}
public String getMiddle()
{
return middleName;
}
public String getLast()
{
return lastName;
}
public String firstMiddleLast()
{
return firstName + ' ' + middleName + ' ' + lastName;
}
public String lastFirstMiddle()
{
return lastName + ", " + firstName + ' ' + middleName;
}
public boolean equals(Name otherName)
{
return fullName.equalsIgnoreCase(otherName.getFullName());
}
public String initials()
{
return firstName.toUpperCase().substring(0,1)
+ middleName.toUpperCase().substring(0,1)
+ lastName.toUpperCase().substring(0,1);
}
public int length()
{
return firstName.length() + middleName.length() + lastName.length();
}
}
//NameTester.java
import java.util.Scanner;
public class NameTester
{
public static void main(String[] args)
{
Scanner input = new Scanner(System.in);
String firstName1 = new String();
String middleName1 = new String();
String lastName1 = new String();
String firstName2 = new String();
String middleName2 = new String();
String lastName2 = new String();
System.out.print("\nPlease enter a first name: ");
firstName1 = input.nextLine();
System.out.print("Please enter a middle name: ");
middleName1 = input.nextLine();
System.out.print("Please enter a last name: ");
lastName1 = input.nextLine();
Name name1 = new Name(firstName1, middleName1, lastName1);
System.out.print("\nPlease enter another first name: ");
firstName2 = input.nextLine();
System.out.print("Please enter another middle name: ");
middleName2 = input.nextLine();
System.out.print("Please enter another last name: ");
lastName2 = input.nextLine();
Name name2 = new Name(firstName2, middleName2, lastName2);
System.out.println();
System.out.println(name1.firstMiddleLast());
System.out.println(name2.firstMiddleLast());
System.out.println(name1.lastFirstMiddle());
System.out.println(name2.lastFirstMiddle());
System.out.println(name1.initials());
System.out.println(name2.initials());
System.out.println(name1.length());
System.out.println(name2.length());
if (name1.equals(name2))
System.out.println("The names are the same.");
else
System.out.println("The names are not the same.");
}
}

Answers

i dont know the answer lol thats too long

Explanation:

A switch on a circuit board can be in two states what are they​

Answers

Answer:

on and off

Explanation:

How does the pay for many Science, Technology, Engineering, and Mathematics workers compare to the overall median for all careers? It is far lower than the overall median. It is far higher than the overall median. It is slightly higher than the overall median. It is about the same as the overall median.

Answers

Answer:

B

Explanation:

It just is

Answer:

B is correct

Explanation:

Why do we use return statements? Choose all that apply

A.
Javascript requires functions to have return values.

B.
To return multiple data types simultaneously

C.
To allow a function to give different values depending on input.

D.
So that we no longer have to use console.log();

E.
To save the result of a function in a variable in other functions

Answers

Answer:

A.

Javascript requires functions to have return values.

We begin with a computer implemented in a single-cycle implementation. When the stages are split by functionality, the stages do not require exactly the same amount of time. The original machine had a clock cycle time of 12 ns. After the stages were split, the measured times were IF, 3 ns; ID, 2.5 ns; EX, 2 ns; MEM, 3 ns; and WB, 1.5 ns. Use 0.1 ns for the pipeline register delay (i.e., the additional time to spend for keeping more registers and logic between pipeline stages).
A. What is the clock cycle time of the 5-stage pipelined machine?
B. If there is a stall every 4 instructions, what is the CPI of the new ?machine?
C. What is the speedup of the pipelined machine over the single- cycle machine?
D. If the pipelined machine had an infinite number of stages, what would its speedup be over the single-cycle machine?

Answers

Answer:

3.1 ns ; 1.25 ; 3.097

Explanation:

Given :

IF, 3 ns;

ID, 2.5 ns;

EX, 2 ns;

MEM, 3 ns;

WB, 1.5 ns.

Use 0.1 ns for the pipelineregisterdelay

maximum time required for MEM = 3 ns

Pipeline register delay = 0.1 ns.

Clock cycled time of the pipelined machine= maximum time required + delay

3ns+0.1 ns = 3.1 ns

2.) for stall after every 4 instruction :

CPI of new machine :

(1 + (1 /4)) = 1 + 0.25 = 1.25

3.)

The speedup of pipelined machine over the single-cycle machine is given by :

Average time per instruction of single cycle ÷ average time per instruction of pipelined

Clock time of original machine = 12ns

Ideal CP1 = 1

CPI of new machine = 1.25

Clock period = 3.1 ns

(12 * 1) / (1.25 * 3.1) = 12 / 3.875

= 3.097

D. Speed up will equal the number of stages in the machine

Pls help I will give points

Answers

Answer:

Desktop

Explanation:

........................ allows you to press a key or code for insertion of long phrases that you may require using repeatedly which saves time. *

Answers

Answer:

text expander

Explanation:

Answer:

The answer to this is a text expander!

Hope this helps you! Have a nice day!

Classify the characteristics as abstract classes or interfaces.

A. Uses the implements keyboard
B. Cannot have subclasses
C. Does not allow static and final variables
D. Can have subclasses
E. Uses the extends keyboard
F. Allows static and final variables

Answers

E for eeeedeerreeeee

What will be the output?
class num:
def __init__(self, a);
self.number = a
def_mul__(self,b):
* return self.number + b.number
#main program
numA = num(8)
numB = num(4)
result = numA* numb
print(result)
O4
O 12
O 32
4096

Answers

Answer : 32

Explanation

the variable a & b and A & B are different. So the only program that work is at #main program.

Hence that A = 8 and B = 4 and the result is A * B so 8*4=32.

Sorry if im wrong

32  will be the output of this question

What is the output?

An industry's output is the total amount of goods and services generated within that industry over a specific time period and sold to customers or other firms. An industry's annual production of boxes of cookies or tons of sugar, for instance, can be considered output.

The quantity a person produces in a particular period of time. d.: energy or power given or produced by a device or system (as for storage or for conversion in kind or in characteristics)Here is how we might define these two phrases in business terms: The results are what the business requires or wants to accomplish. The acts or things that help achieve an outcome are called the outputs.

Variables a and b and A and B are distinct. Thus, the #main program is the only program that functions. Because A = 8 and B = 4, the outcome is A * B, which equals 8*4=32.

Therefore,  the output of this question

Learn more about output here:

https://brainly.com/question/13736104

#SPJ5

the internet is a network of only ten thousands computers true or false

With saying why true or why false

Thanks ​

Answers

Answer: False

Reason: There's a lot more then 10 thousand computers on the internet.

Need help plz with the code

Answers

Answer:

its blocked

Explanation:

The science of how an object reacts to its motion through air is called _______________. (12 letters)
HURRY!!!

ANSWER CORRECTLY AND YOULL GET BRAINLIEST

Answers

Explanation:

friction drag that is your answer 12 letters

Answer:

drag

Explanation:

im not the brightest but in the sentients it should have "drag" in it but u can listen to others answers to make sure

ANSWER QUICK 50 POINTS
You have the following code in your program.

from array import *
Which line of code would create an array?


D = array([2.5, 3, 7.4])

D = array('f',[2.5, 3, 7.4])

D = array['f',[2.5, 3, 7.4]]

D = array('f',2.5, 3, 7.4)

Answers

Answer:

D = array('f',[2.5, 3, 7.4])

Explanation:

is the answer

A variable must be declared with an array type before the array itself can be created. Array types resemble other Java types, with the exception that square brackets are placed after them ( [] ). Thus, option D is correct.

What line of code would create an array?

Using the NumPy library, new data types known as arrays can be produced in Python. NumPy arrays are created for numerical studies and only contain one data type.To build an array, use the array() method after importing NumPy. The input for the array() function is a list.

An array, also known as a database system, is a group of things or data that is held in a contiguous memory area in coding and programming. Several instances of the same kind of data are grouped together in an array.

Therefore, D = array('f',2.5, 3, 7.4)  line of code would create an array.

Learn more about array here:

https://brainly.com/question/22296007

#SPJ2

What is the influence of new technology on society?
Ο Α. .
New technology hardly has any impact on society.
OB.
New technology is only beneficial to society and cannot be detrimental.
OC.
New technology is detrimental, as it makes the existing technology obsolete.
OD. New technology normally utilizes a lot of resources and can adversely affect the economy.
O E.
New technology is beneficial but can also be usedly a detrimental way.

Answers

Answer:

E. New technology is beneficial but can also be used in a detrimental way.

Explanation:

New technology such as cryptocurrency (powered by blockchain technology) can be regarded as a welcome development that has benefited the society in so many good ways. However, cryptocurrency as a new technology also has disadvantages it presents to the society. One of such negative influence cryptocurrency has is that it can be used for illicit activities such as money laundering, funding terrorism and so on.

So, in summary, we can conclude that:

"New technology is beneficial but can also be used in a detrimental way."

Prompt
Using complete sentences post a detailed response to the following.

While visiting a friend’s house, you hear their siblings arguing over whether or not “visual novels” are “real games” or not. You hear Boris, the older sibling, saying “…and you just sit there and click to read the next line—you might as well be reading a comic book and turning a page and call that a ‘game’!” When they find out you’ve been taking a class on game design, they ask you to settle the argument for them. What would you say to them?

Answers

Prompt is a game code technically a tiko machine that turns into machines that fraud into the new line that put in a friends house.

Answer:

As long as it works like a game and not a book i would say its a game.

Explanation:

What infection type can send information on how you use your computer to a third party without you realizing it

Answers

Answer:

Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. they also install trojan horses

Explanation:

______ are special characters that allow you to
search for multiple words at the same time.
-Find expressions
-Defined expressions
-Regular expressions
-Search expressions

Answers

Answer:

Defined Expression

Explanation:

This will be your answer

PROJECT: RESEARCHING THE HISTORY OF THE INTERNET
The Internet has had a profound effect on how we conduct business and our personal lives. Understanding a bit about its history is an important step to understanding how it changed the lives of people everywhere.

Using the Internet, books, and interviews with subject matter experts (with permission from your teacher), research one of the technological changes that enabled the Internet to exist as it does today. This may be something like TCP/IP, the World Wide Web, or how e-mail works. Look at what led to the change (research, social or business issues, etc.) and how that technology has advanced since it was invented.
Write a research paper of at least 2, 000 words discussing this technology. Make sure to address the technology’s development, history, and how it impacts the Internet and users today. Write in narrative prose, and include a small number of bullet points if it will help illustrate a concept. It is not necessary to use footnotes or endnotes, but make sure to cite all your sources at the end of the paper. Use at least five different sources.

Submission Requirements
Use standard English and write full phrases or sentences. Do not use texting abbreviations or other shortcuts.
Make any tables, charts, or screen shots neat and well organized.
Make the information easy to understand.

Answers

E-mail, short for “electronic mail” is one of most widely used forms of digital communication. It can be used from nearly any device, and unlike paper mail, it is delivered nearly instantly. E-mail is used in all strata of society, and has endless possibilities for personal and professional uses.

It can be used to send messages, links, images and files, essentially everyone on the planet who uses computers will use e-mail. It powers business and connects families together across continents, and the best part of all is that it is essentially free. People use e-mail on personal computers, mobile phones, tablets, even on ‘smart’ televisions!

Every e-mail address has an inbox. This is where new messages are deposited. An e-mail message has a status called “unread” which disappears after the e-mail has been opened. A typical e-mail inbox will also have a ‘Sent’ folder for viewing messages that you have sent in the past. It also will have an ‘Outgoing’ folder, where messages stay until they have been fully transmitted. It is also common to have a ‘Drafts’ folder for messages that were started but never sent, and a ‘Spam’ folder, where unwanted marketing messages will usually be directed. You can of course setup your own folders and sort your e-mails however you like .

In the binary system, 1 and 0 are not known as digits. Instead, they are called
bits
switches
flow
variables
decimals​

Answers

Answer:

Variables

Explanation:

I hope it helps

Answer:

C variables

Explanation:

An articulated robot has a T-type wrist axis that can be rotated a total of 2 rotations (each rotation is a full 3600 ). It is desired to be able to position the wrist with a control resolution of 0.250 between adjacent addressable points. (a) Determine the number of bits required in the binary register for that axis in the robot's control memory. (b) Using this number of bits, what is the actual control resolution of the joint

Answers

T pose my guy cuz my friend here Justin is next to me

Write a program that calculates the area & perimeter of a rectangle, where
the values for width and length are given by the users.

Answers

Answer:

In Python:

Length = float(input("Length: "))

Width = float(input("Width: "))

Area = Length * Width

Perimeter = 2*(Length + Width)

print(Area)

print(Perimeter)

Explanation:

This gets the length from the user

Length = float(input("Length: "))

This gets the width from the user

Width = float(input("Width: "))

This calculates the area

Area = Length * Width

This calculates the perimeter

Perimeter = 2*(Length + Width)

This prints the area

print(Area)

This prints the perimeter

print(Perimeter)

In Python!!
1. Correcting string errors
It's easy to make errors when you're trying to type strings quickly.
Don't forget to use quotes! Without quotes, you'll get a name error.
owner = DataCamp
Use the same type of quotation mark. If you start with a single quote, and end with a double quote, you'll get a syntax error.
fur_color = "blonde'
Someone at the police station made an error when filling out the final lines of Bayes' Missing Puppy Report. In this exercise, you will correct the errors.
# One or more of the following lines contains an error
# Correct it so that it runs without producing syntax errors
birthday = "2017-07-14'
case_id = 'DATACAMP!123-456?
2. Load a DataFrame
A ransom note was left at the scene of Bayes' kidnapping. Eventually, we'll want to analyze the frequency with which each letter occurs in the note, to help us identify the kidnapper. For now, we just need to load the data from ransom.csv into Python.
We'll load the data into a DataFrame, a special data type from the pandas module. It represents spreadsheet-like data (something with rows and columns).
We can create a DataFrame from a CSV (comma-separated value) file by using the function pd.read_csv.
# Import pandas
import pandas as pd
# Load the 'ransom.csv' into a DataFrame
r = ___.___('___')
# Display DataFrae
print(r)
3. Correcting a function error
The code in the script editor should plot information from the DataFrame that we loaded in the previous exercise.
However, there is an error in function syntax. Remember that common function errors include:
Forgetting closing parenthesis
Forgetting commas between each argument
Note that all arguments to the functions are correct. The problem is in the function syntax.
# One or more of the following lines contains an error
# Correct it so that it runs without producing syntax errors
# Plot a graph
plt.plot(x_values y_values)
# Display the graph
plt.show()
4. Snooping for suspects
We need to narrow down the list of suspects for the kidnapping of Bayes. Once we have a list of suspects, we'll ask them for writing samples and compare them to the ransom note.
A witness to the crime noticed a green truck leaving the scene of the crime whose license plate began with 'FRQ'. We'll use this information to search for some suspects.
As a detective, you have access to a special function called lookup_plate.
lookup_plate accepts one positional argument: A string representing a license plate.
# Define plate to represent a plate beginning with FRQ
# Use * to represent the missing four letters
____ = ____
Please help out~~~

Answers

Answer:

Following are the solution to the given points:

Explanation:

For point 1:

birthday = "2017-07-14" # defining a string variable birthday that string value  

case_id = 'DATACAMP!123-456?' #defining a variable case_id that stores the string value

In this, two variable "birthday and case_id" is defined, that holds the string value. In the first variable, it uses the hyphen sign to hold the date value as a string. In the second variable, it uses a single quoit to store string value.  

For point 2:

import pandas as pd # using import package to import pandas  

r = pd.read_csv('ransom.csv')# defining r variable that uses pandas to Load the 'ransom.csv' file

print(r)#use print method to print r value

In this code, a pandas package is imported, and in the next step r variable is defined that uses the read method to hold the csv file , and the print method to print r value.

For point 3:

plt.plot(x_values, y_values) # Plot method to hold parameters values

plt.show()#calling the show method

In this code, the plot method is used, which accepts two-parameter to store its value into plt, and in the next step, it uses the show method.  

For point 4:

# Defining a plate variable to represents the plate that starts with FRQ

# Using the * to represent the four missing letter

plate = lookup_plate('FRQ*)  

Count operation Lucky twos
Lucky Twos determines and displays the number of digits that are 2s in a whole number. For example, the number of 2s in 3487 is 0, while the number of 2s in 272521 is 3. Note: whole numbers are non-negative integers starting at zero 0, 1, 2, 3, 4.
Assume that the fractional part is discarded in the division:
10 / 4 = 2
8 / 5 = 1
20 / 3 = 6
Read number
set count to 0
while number > 0
If the number module 10 is Then add
1 to count
End If
Compute number as number / 10
End while
Display count.
Let n be the number of digits of the whole number. What is the number of operations that are executed in the code in terms of n?

Answers

Answer:

Following are the solution to this question:

Explanation:

Its complexity of both the pseudo-code described is indeed proportional to the number of digits. So, how often number there are in this specific number is the query. Whenever a number is considered, the d digit would be between [tex]10^{(d-1)}.[/tex] inclusive exclusive [tex]10^d[/tex] That would be as, let d become the number of digits at N, and the inequalities, They can tell

[tex]10^{(d-1)} \leq N < 10^d[/tex]

We get, we take a logarithm,

[tex]d-1 \leq \log(N) < d[/tex]

The increase of 1 to the left inequality, [tex]d \leq \log(N)+1[/tex], and Combining the previous outcome, we got, [tex]\log(N) < d \leq \log(N) + 1[/tex]. That's would be to say, that number of number d by [tex]O(\log(N))[/tex] is higher and lower. Consequently, the number of transactions in the code is [tex]O(\log(N))[/tex]

We have that the number of operations that are executed in the code in terms of n  is mathematically given as

The quantity of operations done in the code is O(log(N))

Operation

Generally the equation for the   is mathematically given as

If we think about a number,

with d digits is between 10^(d-1) inclusive and 10^d exclusive.

Let d be the wide variety of digits in N

10^(d-1) <= N < 10^d

d-1 <= log(N) < d

d <= log(N) + 1,

The Inequality

log(N) < d <= log(N) + 1.

Therefore

The quantity of operations done in the code is O(log(N))

For more information on Inequality visit

https://brainly.com/question/19491153

Given three subroutines of 550, 290, and 600 words each, if segmentation is used then the total memory needed is the sum of the three sizes (if all three routines are loaded). However, if paging is used, then some storage space is lost because subroutines rarely fill the last page completely, and that results in internal fragmentation. Determine the total amount of wasted memory due to internal fragmentation when the three subroutines are loaded into memory using each of the following page sizes:
a. 100 words
b. 600 words
c. 700 words
d. 900 words

Answers

The answer is D i got it right when I did it

Typically, external fragmentation wastes one-third of memory. Internal fragmentation occurs when space inside a designated region is wasted. Thus, option D is correct.

What wasted memory due to internal fragmentation?

The mounted-sized block is allotted to a method whenever a request for memory is made. Internal fragmentation is the term used to describe the situation where the memory allotted to the method is a little bigger than the amount requested.

Normally, memory is allocated in uniformly sized blocks, but sometimes a process doesn't use the entire block, leading to internal fragmentation.

Memory fragmentation occurs when a memory allocation request can be satisfied by the whole amount of accessible space in a memory heap, but no single fragment (or group of contiguous fragments) can.

Therefore,  when the three subroutines are loaded into memory using each of the following page sizes 900 words.

Learn more about memory here:

https://brainly.com/question/16953854

#SPJ5

How do I fix a phone if I don't have enough money for me to fix it?

Answers

Answer:

depends whats wrong with it

Explanation:

is the screen smashed orr~

Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.
Ex: If the input is:
6
the output is:
110
Your program must define and call the following two functions. The function integer_to_reverse_binary() should return a string of 1's and 0's representing the integer in binary (in reverse). The function reverse_string() should return a string representing the input string in reverse.
def integer_to_reverse_binary(integer_value)
def reverse_string(input_string)
Note: This is a lab from a previous chapter that now requires the use of a function.

Answers

Answer:

#include <iostream>//header file

#include <string>//header file

using namespace std;

string integer_to_reverse_binary(int integer_value)//defining a method integer_to_reverse_binary  

{

   string ret = "";//defining string variable

   while (integer_value > 0) //using while loop to check integer_value value is greater than 0

   {

       ret += '0' + (integer_value % 2);//adding zeros in remainder value

       integer_value /= 2;//holding quotient value

   }

   return ret;//return string value

}

string reverse_string(string input_string)//defining a method reverse_string that holds a parameter user_String  

{

   string result;//defining a string variable  

   for (int i = 0; i < input_string.length(); ++i)//use for loop to calculate value  

   {

       result += input_string[input_string.length()-i-1];//add value in result variable

   }

   return result;//result result variable value

}

int main()//defining main method  

{

   int num;//defining integer variable

   string str;//defining string variable

   cin >> num;//input num value

   str = integer_to_reverse_binary(num);//use str variable to call the integer_to_reverse_binary method

   cout << reverse_string(str) << endl;//printing the reverse_string method value

   return 0;

}

Output:

6

110

Explanation:

In this code two string method "integer_to_reverse_binary and reverse_string" is defined that holds one parameter "integer_value and input_string".

In the first method a string variable is defined, that use the while loop to check integer value is greater than 0 and add zeros in the value and return its value as a string.

In the second it reverse the string value and store into the result variable, and in the main method the "num and str" variable is defined, and in the num it takes integer value and pass into the above method and print its return value.    

Your computer system looses power while you are working on a project for a very important client

Answers

isljgaek jadkghdkjhasdkjfhadskj afhdsfkjdahk dh

Answer:

I never knew that, thank you for telling me! I'll note that down

what is 30 x 30 x 30 x 30

Answers

810,000 i asked siri

Answer:

its is 810000

Explanation:

hope this helps

(15) You are a Pascal teacher (a very good programmer using assembly language(i.e., machine language) of your local machine). You are given only the following programmes:(at) A compiler written in P-code: translate a program in Pascal to one in P-code(P-code is very close to your local machine language).(b) A P-code interpreter written in Pascal: able to interpret any program writtenin P-code.a) (10) What will you do (with minimal effort) to run the Pascal programs yourstudents submit on your local machine

Answers

If you Could out A B C D separate that would help
Other Questions
Please please help me with the questions 1. what is Meaning of Declaration of freedom conscience and religion How many moles is 1.46 g of hydrogen gas Can u guys plz help me it's timed What is another way to write a2 b3 c2 d? 1. What did you think Joe should do at first? After reading the text, did you change your answer? Why orwhy not? What is the main reason why foodborne illnesses can take hours or days before symptoms occur? please help i dont understand this 6y + 118y - 3What is the value of y? 2(1 x) > 2x HELP ASAP!!! I CANT FIGURE THIS OUT what is DNA replication similar to How do you think changing the names of German items (frankfurters) to American names (liberty sausages) affected the war effort? Explain your answer. my is the bass Research and describe the biotic and abiotic factors that work together to create your animals habitat. You must research and describe at least 5 total factors, maybe 2 from biotic and 3 from abiotic. You mix how you choose as long as you have a mix of biotic and abiotic totaling 5! Look at the last 2 bullet points below for help.Describe the impact of your vertebrate (animal) on humans.Describe humans impact on your vertebrate.You must use at least 2 different resources to find your information.Biotic Factors to explore--- predators, food preferences and supply, population density (how many of that population in that habitat), other species with which your vertebrate interacts in its habitat (think about your symbiotic relationships-mutualism, commensalism, parasitism), diseaseAbiotic Factors to explore---temperature range, precipitation, water, topography (what are the land features-hilly, mountainous, flat, combination), wind, shelter, nesting site and place to raise young, escape routes from predators Describe what the name Epimetheus means Please HELP!! Ill mark brainliest to anyone who answers plzzzzzzz helpppppppppppp A typical hour-long television program runs for 42 minutes, excluding commercials. What percent of this type of program is set aside for commercial? If f(x)=(1/8)(8x) what is f(3)? Which government policy, intended to regulate society, is used in both North Korea and China?A: Bans against smokingB: Censorship of free speechC: Unrestricted Travel vouchersD: limitation of one child per family Please help!!!Explain a time in your life that you were affected by the Bill of Rights. Find the length of CD.PLEASE HELP quickkkk