A buffer is filled over a single input channel and emptied by a single channel with a capacity of 64 kbps. Measurements are taken in the steady state for this system with the following results:

Average packet waiting time in the buffer = 0.05 seconds
Average number of packets in residence = 1 packet
Average packet length = 1000 bits

The distributions of the arrival and service processes are unknown and cannot be assumed to be exponential.

Required:
What are the average arrival rate λ in units of packets/second and the average number of packets w waiting to be serviced in the buffer?

Answers

Answer 1

Answer:

a) 15.24 kbps

b) 762 bits

Explanation:

Using little law

a) Determine the average arrival rate (  λ  ) in units of packets/s

λ  = r / Tr  --- 1

where ; r = 1000 bits , Tr = Tw + Ts = 0.05 + (( 1000 / (64 * 1000 ))  = 0.0656

back to equation 1

λ = 1000 / 0.0656 = 15243.9 = 15.24 kbps

b) Determine average number of packets w to be served

w =  λ * Tw =  15243.9 * 0.05 = 762.195 ≈ 762 bits


Related Questions

HEALTH AND SAFETY IN USING ICT TOOLS

Answers

Answer:

Health and Safety using ICT Tools.

...

Some of the long-term health effects are:

Headaches and tiredness. Using the mobile phone for hours can be very stressful and may lead to mild or severe headaches.

Creates joint pain. ...

Mobile phone battery explosion. ...

Induced ringing!

Answer:

ICT tools for health and safety. Find common health issues related to computer usage and other ICT tools.

Explanation:

Use of ICT instruments

ICT tools are computer-based equipment used for processing and communicating information and technology. There are certain ICT tools;

- TV.

- System of Public Address

- Radio

- Mobile Phone

- Computer

What are the adverse consequences of long-term television exposure?

You don't have eyes for hours to stare at the TV.

Taking hours on the TV can be dangerous and dangerous for the eye.

If you starve continuously, your eye will get overworked and this will cause an irritation of the eye, such as dry eye, red, itchy, and watery eyes, fatigue, eyelid weight or forehead, as well as eye concentration.

Certain long-term effects on health are:

1. Tiredness and headaches.

2. Make pain joint.

3. Battery explosion mobile phone.

4. Ringing induced! In ears.

Does anyone know what type of Chromebook this is?

Answers

A chromebook of course lol jk look it up and u can find what kind it is

Answer: Its............ A Chromebook type of Chromebook...??

Explanation:

Ion know I aint a geek, geezer -_- (Thats a lie)

Please Help Me!!!!!!!!!!!!!


A commercial photographer would most likely be employed by which of the following?

A business
A magazine
A travel agency
All the above

Answers

Explanation:

a magazine cause it helps put out commercial

Declare a seven-row, two-column int array named temperatures. The program should prompt the user to enter the highest and lowest temperatures for seven days. Store the highest temp in the first column and the lowest in the second column. The program should display the average high and average low temperature. Display the average temperatures with one decimal place.

Answers

Answer:

Following are the code to the given question:

#include<iostream>//header file

#include<iomanip>//header file 

using namespace std;

int main()//main method

{

  double temperatures[7][2];//defining a double array temperatures

  double lowAvg=0, highAvg=0;//defining a double variable

  for(int i = 0;i<7;i++)//defining loop to input the value

  {

     cout<<"Enter day "<<(i+1)<<" highest temperatures: ";//print message  

     cin>>temperatures[i][0];//input highest temperatures value

     cout<<"Enter day "<<(i+1)<<" lowest temperatures: ";//print message  

     cin>>temperatures[i][1];//input lowest temperatures value

  }  

  cout << fixed << setprecision(1);//using the setprecision method  

   for(int i = 0;i<7;i++)//defining loop to calculating the Average of the  

  {

     highAvg += temperatures[i][0];//holding highest value

     lowAvg += temperatures[i][1];//holding lowAvg value

  }

  cout<<"Average high temperature = "<<highAvg/7<<endl;//calculate amd print highest temperature Average

  cout<<"Average low temperature = "<<lowAvg/7<<endl;//calculate amd print lowest temperature Average

  return 0;

}

Output:

Please find the attached file.

Explanation:

In this code, a 2D array "temperatures" and two-variable "highAvg, lowAvg" as double is declared, that uses the two for loops.In the first loop, it uses an array to input the value from the user-end.In the second loop, it uses the double variable that calculates the average value of the temperature.

Write a function called reverse Return that is almost the same job as reverse, but instead of printing the letters straight to the screen, it returns a String in which the letters have been reversed. The function call would look like:

Answers

Answer:

The function in Python is as follows:

def reverse(inputstr):  

   outputstr = ""

   for i in inputstr:

       outputstr = i + outputstr

   return outputstr

Explanation:

This defines the function

def reverse(inputstr):

This initializes the output string

   outputstr = ""

This iterates through the input string

   for i in inputstr:

This generates the output string by reversing the input string

       outputstr = i + outputstr

This returns the reversed string

   return outputstr

Carla is assigning tasks to others and she needs to ensure that she is aware of their progress. Which option should
she choose?
O Send status report when I complete an assigned task
O Completed task color
O Set Quick Click flag
O Keep my task list updated with copies of tasks

Answers

Answer: Send status report when I complete an assigned task

Explanation:

In order to be aware of their progress, the option to choose is the "Send status report when I complete an assigned task".

To do this click on options on the tools menu, then click on task options. Then, after the keep updated copies of the assigned tasks on my task list has been selected in the check box, one will then select "Send status reports when the assigned tasks are completed".

You issue a transmission from your workstation to the following socket on your LAN: 10.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using

Answers

Answer:

POP

Explanation:

The application layer protocol that is been used here is POP, given that you issued a transmission to the socket on you LAN: 10.1.145:110.  and you use a standard port designation

Reason:

110 ( port number ) represents a POP3 process that is always used in a TCP/IP network , and the socket address started with an IP address as well. hence we can say that the application layer protocol is POP

What is XOR and XNOR logic gates?

Answers

Answer:

There are two remaining gates of the primary electronics logic gates: XOR, which stands for Exclusive OR, and XNOR, which stands for Exclusive NOR. In an XOR gate, the output is HIGH if one, and only one, of the inputs is HIGH. ... An XNOR gate is an XOR gate whose output is inverted.

Explanation:

There are two remaining gates of the primary electronics logic gates: XOR, which stands for Exclusive OR, and XNOR, which stands for Exclusive NOR. In an XOR gate, the output is HIGH if one, and only one, of the inputs is HIGH. ... An XNOR gate is an XOR gate whose output is inverted..

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
(1) Prompt the user to input a wall's height and width. Calculate and output the wall's area (integer). (Submit for 2 points).
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
(2) Extend to also calculate and output the amount of paint in gallons needed to paint the wall (floating point). Assume a gallon of paint covers 350 square feet. Store this value in a variable. Output the amount of paint needed using the %f conversion specifier. (Submit for 2 points, so 4 points total).
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.51 gallons
(3) Extend to also calculate and output the number of 1 gallon cans needed to paint the wall. Hint: Use a math function to round up to the nearest gallon. (Submit for 2 points, so 6 points total).
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.51 gallons
Cans needed: 1 can(s)
(4) Extend by prompting the user for a color they want to paint the walls. Calculate and output the total cost of the paint cans depending on which color is chosen. Hint: Use a dictionary to associate each paint color with its respective cost. Red paint costs $35 per gallon can, blue paint costs $25 per gallon can, and green paint costs $23 per gallon can. (Submit for 2 points, so 8 points total).
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.51 gallons
Cans needed: 1 can(s)
Choose a color to paint the wall:
red
Cost of purchasing red paint: $35
1 import math
2
3 # Dictionary of paint colors and cost per gallon
4 paint_colors = {
5 'red': 35,
6 'blue': 25,
7 'green': 23
8 }
9
10 # FIXME (1): Prompt user to input wall's width
11 # Calculate and output wall area
12 wall_height = int(input('Enter wall height (feet):\n'))
13 print('Wall area:')
14
15 # FIXME (2): Calculate and output the amount of paint in gallons needed to paint the wall
16
17 # FIXME (3): Calculate and output the number of 1 gallon cans needed to paint the wall, rounded up to nearest integer
18
19 # FIXME (4): Calculate and output the total cost of paint can needed depending on color
20

Answers

Answer:

The modified program in Python is as follows:

import math

paint_colors = {'red': 35,'blue': 25,'green': 23}

wall_height = int(input('Enter wall height (feet):\n'))

wall_width = int(input('Enter wall width (feet):\n'))

area = wall_height*wall_width

print('Wall area:',area,'square feet')

paint_needed = area/350.0

print('Paint needed: {:.2f} gallons'.format(paint_needed))

print('Cans needed:',round(paint_needed),'can(s)')

color = input("Choose a color to paint the wall: ")

print("Cost of purchasing", color, "paint: $",paint_colors[color])

Explanation:

The italicized are given from the question [unchanged]

import math

paint_colors = {'red': 35,'blue': 25,'green': 23}

wall_height = int(input('Enter wall height (feet):\n'))

This gets input for width

wall_width = int(input('Enter wall width (feet):\n'))

Calculate the wall area

area = wall_height*wall_width

Print the calculated wall area

print('Wall area:',area,'square feet')

Calculate the amount of paint needed

paint_needed = area/350.0

Print the amount of paint needed to 2 decimal places

print('Paint needed: {:.2f} gallons'.format(paint_needed))

Print the amount of can needed to nearest integer

print('Cans needed:',round(paint_needed),'can(s)')

Prompt user for color of paint [here, we assume the user input is correct]

color = input("Choose a color to paint the wall: ")

Prints the corresponding amount for the color

print("Cost of purchasing", color, "paint: $",paint_colors[color])

If the code for JAVA is LCXC, what is the code for BASIC?

Answers

Answer:

DCUKE

Explanation:

Given that,

Code for JAVA = LCXC

To find,

Code for BASIC = ?

As we observe the pattern,

In "JAVA", every letter moved two-letter forward in their alphabetical order or we can say that every third alphabet of the given letter is used to make the code:

J + 2 = L

A + 2 = C

V + 2 = X

A + 2 = C

Similarly,

B + 2 = D

A + 2  = C

S + 2 = U

I + 2  = K

C + 2 = E

Thus, DCUKE is the code for BASIC.

The code for BASIC given the code for JAVA is; DCUKE

We are given the code for JAVA as LCXC

From that code for "JAVA", we see that every letter is moved forward two letters in their alphabetical order. This means

J = L because L comes after J and KA = C because C comes after A and BV = X because X comes after V and UA = C because C comes after A and B

Similarly for BASIC;

B = D because D comes after B and CA = C because C comes after A and BS = U because U comes after S and TI = K because K comes after I and JC = E because E comes after C and D

Thus, finally the code for BASIC is DCUKE

Read more about JAVA at; https://brainly.com/question/18554491

You would like to upgrade the processor in your system to a 64-bit processor. Which of the components will you most likely need to upgrade as well to take full advantage of the new processor

Answers

Answer: Operating system

Explanation:

The components that will be required to upgrade as well to take full advantage of the new processor is the Operating system.

The operating system manages the software resources and the computer hardware, through the provision of common services for the computer programs. It simply supports the basic function of the computer like task scheduling

Wi-fi refers to a network that is based on the ____ standard

Answers

Answer:

Wi-fi refers to a network that is based on the 802.11 standard.

Answer:

It is based on the 802.11 standard

Explanation:

Please help me with this question

Answers

Answer:

2

Explanation:

evaluate the formula for n=2, then it says:

a₂ = 2a₁ - 3·2

So

a₂ = 2·4 - 3·2 = 8-6

a₂ = 2

Function newPriceTable = UpdatePriceTable(origPriceTable, changePrice, colNum) % UpdatePriceTable: Adds changePrice to column colNum of origPriceTable % Returns the updated price table newPriceTable % Inputs: origPriceTable - original price data table % changePrice - column array of pricing changes % colNum - specified column of priceTable to update % % Outputs: newPriceTable - updated price data table % Assign newPriceTable with data from priceTable; newPriceTable = [0, 0; 0, 0;]; % FIXME % Assign newPriceTable column specified by colNum with original price % data updated by changePrice newPriceTable = [0, 0; 0, 0;]; % FIXME end Run Your Solution Code to call your function when you click Run

Answers

Solution :

The function code is :

function newPriceTable = UpdatePriceTable(origPriceTable,changePrice, colNum)

newPriceTable = origPriceTable:

newpriceTable(:,colNum) = newPriceTable(:,colNum)+changePrice;

end

UpdatePriceTable ([19.99, 9.99; 14.99, 8.99;], [-1.00, -1.50] , 1)

ans = 18.9900      9.9900

         13.4900      8.9900

Accessing disk is much slower than accessing memory. As a result, many file systems have been designed with various optimizations to improve performance. What is an example of file system performance optimization

Answers

Answer:

An example of file system performance optimization is Caching - i.e. keep in memory a collection of blocks that logically belong on the disk, for performance reasons.

Explanation:

Caching - i.e. keep in memory a collection of blocks that logically belong on the disk, for performance reasons.

The ultimate frequent method employed to decrease the duration of disk elucidated as a collection of books i.e similar kind that is preserved in invisible area.

Write a program named prices.c that repeatedly asks users to enter the price of an item until they enter zero. Prices less than zero will be ignored. The program will then print the number of items purchased, the subtotal of the prices, the sales tax charged (at a rate of 7.5%), and the grand total.

Answers

Answer:

Explanation:

The following is written in Java. It creates a while loop that requests price from the user and goes adjusting the quantity and subtotal as more prices are added. If 0 is entered it breaks the loop and outputs the quantity, subtotal, tax, and grand total to the user.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int quantity = 0;

       double subtotal = 0;

       double tax, grandTotal;

       while (true) {

           System.out.println("Enter a price: ");

           double price = in.nextDouble();

           if (price == 0) {

               break;

           } else if (price > 0) {

               quantity += 1;

               subtotal += price;

           }

       }

       tax = subtotal * 0.075;

       grandTotal = subtotal + tax;

       System.out.println("Quantity: $" + quantity);

       System.out.println("Subtotal: $" + subtotal);

       System.out.println("Tax: $" + tax);

       System.out.println("GrandTotal: $" + grandTotal);

   }

}

A primary key ensures that —- are unique ?

Answers

Answer:

To qualify as a primary key, it is the data within each column that must be unique, not simply the column names themselves. At the same time, no value in the columns can be blank or NULL. A primary key, therefore, is used to ensure the data in a specific column is unique.

Explanation:

hope it's help

What are the things that a computer literate understands?Name thems.​

Answers

Answer:

•Determine your IP address.

•Verify physical connectivity to the network.

•Check that you have a logical connection to the network.

•Find out what path network traffic takes to get to its destination.

Translate from DNS names to IP addresses.

discuss seven multimedia keys​

Answers

Answer:

Any seven multimedia keys are :-

□Special keys

Alphabet keys

Number keys

□Control keys

Navigation keys

Punctuation keys

Symbol keys

Which of the following statements about the relationship between hardware and software is true? a) Hardware can be present in intangible form. b) A flash drive is an example of software. c) Software and hardware can act independently of each other. d) Software consists of instructions that tell the hardware what to do.

Answers

Answer:

C

Explanation:

The statements about the relationship between hardware and software that is true is: D. Software consists of instructions that tell the hardware what to do.

A hardware can be defined as the physical components of an information technology (IT) system that can be seen and touched such as:

RouterSwitchKeyboardMonitorMouse

Conversely, a software refer to a set of executable codes (instructions) that is primarily used to instruct a computer hardware on how it should process data, perform a specific task or solve a particular problem.

In conclusion, a software consist of a set of executable codes (instructions) that tell a computer hardware what to do.

Read more on hardware here: https://brainly.com/question/959479

Which of the following is NOT one of the five things that work in all applications?
Select one:
Cut, Copy, and Paste
Sort
Undo and Redo
File Menu

Answers

Answer:

its either sort or file menu

Why are mobile apps often easier to develop than desktop apps?

mobile apps use a lower screen resolution

mobile apps can be created in C#

mobile apps use less memory than desktop apps

mobile app creation platforms are available that reduce the need to code

Answers

Answer:

Mobile app creation platforms are available that reduce the need to code.

Explanation:

Simple app creation softwares and tools are all over the place for mobile app creation. To create a mobile app, no coding knowledge or experience is needed unlike desktops apps that requires the knowledge of some coding languages like python, JavaScript etc.

The availability of these softwares and platforms have made mobile apps creation easy.

Brody is concerned that he is going to exceed the quota set for his mailbox. Where should he go to access the Mailbe
Cleanup tools?
O Backstage view
Inbox
O Deleted Items Folder
Outlook Web App
ANSWER QUICK IM TIMED WILL GIVE OUT PTS

Answers

Answer:

Outlook Web App

Explanation:

For Brody to accomplish this he will need to go to the Outlook Web App. Here, he will need to navigate to the top of the application where the toolbar is located. Then he will need to click on File, then Tools, and finally Mailbox Cleanup. This will give him access to all of the cleanup tools that the Outlook Mailbox has for managing all of his electronic mail as well as adjusting the quota set for his mailbox.

Answer:

A. Backstage view indox

Explanation:

Explain briefly the FIREWALLS

Answers

Answer:

Think of a firewall as your own personal security guard. The firewall will block unapproved websites from talking to your computer and will stop your computer from talking to unapproved/unnecessary websites. Hope this helps!

Explanation:

You're installing two new hard drives into your network attached storage device. Your director asks that they be put into a RAID solution that offers redundancy over performance. Which would you use?
a. RAID 0
b. RAID 1
c. RAID 5
d. RAID 6
e. RAID 10

Answers

Answer:

d. RAID 6

Explanation:

RAID is a data storage technology that combines multiple physical disk drive components into a single logical unit. The functions of RAID is to provide performance and redundancy.

RAID 0 provides data stripping but it does not offer data stripping.

RAID 1 increases performance to about 2x but it limits the disk capacity to about 50%

RAID 5 provides redundancy and increased perfomance but it is limited to small disk drive.

RAID 6 also provides redundancy but it slows performance

RAID 10 increases performance and data protection.

RAID 6 is the best drive that offers redundancy over performance.

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

Answers

The question is incomplete. The complete question is :

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

The user's ID in plaintext.

10 bits of randomly chosen "salt," in plaintext.

The user's password, concatenated with the salt, and then encrypted.

There are very many such systems around the world, and Holly plans to steal the password files from as many as she can. The average system has 50 users in its password file.

Holly wants to create a master list of the encrypted versions of all the 100,000 passwords on her list, encrypted with all possible salt values. To create this master list, approximately how many encryptions of a password-concatenated-with-salt would Holly have to perform?

A. 2 million

B. 5 million

C. 100 million

D. 1 million

Solution :

It is given that the hacker, Holly wants break into the  UNIX-like systems using 100,000 common passwords that she has on her list. The system has at an average of 50 users in the password files.

Therefore, to create a master list, Holly have to perform about 50 x 100,000 = 5,000,000 encryptions for the password concatenated-with-salt.

Thus the correct option is option (B).  5 million

Which of the following ribbon tools would be most efficient for applying multiple
changes to text formatting?
a. Font Dialog Box
b. Paragraph Styles
c. Styles Dialog Box
d. Find and Replace

Answers

Answer:

Option A, Font Dialog Box

Explanation:

In order to make changes in the text formatting, the font setting in the dialog box can be used on the Ribbon's Home tab.

From the font settings in Word 2016, one can change the following change font color, size, style etc.

Hence, option A is correct

the derivative of
[tex]ln \: |x| [/tex]
is an odd function
True or False​

Answers

Answer:

true

Explanation:

the derivative of lnx is 1/x and 1/x is and odd function because x^-1 is raise to a negative odd number

Answer:

jidjdjdjdkdjdjkdjdhdjurjrhrjdjdjdjdjddjjd

Explanation:

kkfjfjfjfjfjfjfjfjfjjfjfjffjjfjfjfjfjf sorry po

what is a task that is not associated with loading existing data into a new ERP system.
A. Data mapping
B. Data cleanup
C. Data loading
D. Data reporting​

Answers

Answer:

I believe the answer would be D. Data Reporting!

hope this helps! <3

Answer:

Correct Answer D:- DATA Reporting.

Explanation:

Data reporting is the collection and submission of data that leads to accurate ground-based analysis incorrect data reporting can lead to extremely informed decision-making using wrong evidence. Data reporting is not only about information but also about data collection.

The reporting of data may be an unbelievably difficult task. In order to achieve the job of counting every resident of a country, census bureaus can hire even hundreds of thousands of workers.

Data reporting is a step that translates raw information into information. It is not the data analysis that transforms data and information into insights. If data is not reported, the problem is known as underreporting the opposite is wrong.

Question 6 Which of the following statements about datasets used in Machine Learning is NOT true? 1 point Testing data is data the model has never seen before and is used to evaluate how good the model is Training subset is the data used to train the algorithm Validation data subset is used to validate results and fine-tune the algorithm's parameters Training data is used to fine-tune algorithm’s parameters and evaluate how good the model is

Answers

Answer:

Training data is used to fine-tune the algorithm’s parameters and evaluate how good the model is

Explanation:

The statement about datasets used in Machine Learning that is NOT true is "Training data is used to fine-tune algorithm’s parameters and evaluate how good the model is."

This is based on the fact that a Training dataset is a process in which a dataset model is trained for corresponding it essentially to fit the parameters.

Also, Testing the dataset is a process of examining the performance of the dataset. This refers to hidden data for which predictions are determined.

And Validation of dataset is a process in which results are verified to perfect the algorithm's details or parameters

Other Questions
Plz help will be marked BRAINLIEST Write a test program that prompts the user to enter three sides of the triangle (make sure they define an actual triangle), a color, and a Boolean value to indicate whether the triangle is filled. wiczenie2Pocz kade pojcie z waciwym objanieniem. Uwaga! Skrel wyjanienie,ktre nie pasuje do adnego pojcia.UKADW RAPALLOUKADW LOCARNOWOJNA CELNAPOLITYKARWNOWAGIPOROZUMIENIE, NA MOCYKTREGO NIEMCY UZNAYSWOJ GRANIC Z FRANCJI BELGI, ALE NIE Z POLSKUTRZYMYWANIE POPRAWNYCH STOSUN-KW Z ZSRR I NIEMCAMI, BEZ ZBLIANIASI DO ADNEJ ZE STRONPOROZUMIENIE NIEMIECI ZSRR, KTRE NAWIZAYSTOSUNKI DYPLOMATYCZNEI PODJEU TAJNAWSPPRAC WOJSKOWWSTRZYMANIE PRZEZ NIEMCYIMPORTU WGLA Z POLSKI,A POTEM OBUSTRONNY ZAKAZSPROWADZANIA WIELU TOWARWI NAOENIE WYSOKICH CEL NAPOZOSTAEZAJCIE ZAOLZIAPRZEZ POLSKIE WOJSKO The cost to rent a moving truck is a flat fee of $25 plus $0.60 per mile. The equaticc, in dollars for the number of miles, m, traveled in the truck.Identify the independent and dependent variables.Theis the independent variable.Theis the dependent variable.$25 flat feecostmiles traveled? The shape of a carpet is a semicircle. Use 22 7 as an approximation for . a) Find its area. b) Janice wants to put a fringed border on all sides of the carpet. How many feet of fringe are needed? In 150 to 175 words, analyzes and give your opinion of the following statement. Antagonism arose among the conquered nomadic tribes of the Xiongnu. What were Justinian's achievements?Choose all correct answers.He doubled the size of the empire and ruled much of the Mediterranean world.He moved the imperial capital from Rome to Byzantium, so it would attract people from all over the world.He created a code of law that helped unite the Byzantine Empire and later served as a model for the codes of law in many modern nations.He built a huge domed cathedral called the Hagia Sophia, an enormous underground aqueduct, and a fabulous palace complex. impacts of social media platforms in the protection of human trafficking Selma uses a jogging trail that runs through a park near her home. The trail is a loop that is of a mile long. On Monday, Selma ran the loop in of an hour. What is Selma's unit rate in miles per hour for Monday's run? which is the best estimate for the percentage equivalent of 7/15 On April 1, year 1, Hyde Corp., a newly formed company, had the following stock issued and outstanding: 1) Common stock, no par, $1 stated value, 20,000 shares originally issued for $30 per share. 2) Preferred stock, $10 par value, 6,000 shares originally issued for $50 per share. Hyde's April 1, year 1 statement of stockholders' equity should reportCommon stock Preferred stock APICa) $20,000 $60,000 $820,000b) $20,000 $300,000 $580,000c) $600,000 $300,000 $0d) $600,000 $60,000 $240,000 The reduction of carbon dioxide by hydrogen gas takes place at 420C to produce water vapor and carbon monoxide. The equation forthis reaction at equilibrium is shown below.H2(g) + CO2(g) = H2O(g) + CO(g)Which of the following changes in concentration occur when more water vapor is added to the system under equilibrium conditions?O A [Hz] decreases, [CO] decreases, [CO] increasesOB (H) increases, (CO2) increases, [CO] decreasesOC [Hz, increases, [CO2, increases, [CO] increasesD. [H2, decreases, [CO] decreases, [CO] decreases the photograph shows some vacuum packed food there is no air inside the pack explain why this helps the food to keep fresh for a long time Tim Berners-Lee led the development of the World Wide Web.Which edit of the sentence above uses passive voice?A. Leading the team, Tim Berners-Lee developed the World Wide Web.B. Tim Berners-Lee developed the World Wide Web.C. The development of the World Wide Web was led by Tim Berners-Lee.D. Tim Berners-Lee was a leader in developing the World Wide Web. What could be the coordinates of the third vertex, z, of triangle xyz so that it would have a hypotenuse with a length of square root 45 units Faruq spends all of his income on two goods: tacos and milkshakes. His income is $100, the price of tacos is $10, and the price of milkshakes is $2. If Faruq purchases 10 milkshakes, he can purchase ________ tacos. Group of answer choices 18 8 50 10 slaves were traded for________________in west indies To encode a message, James first replaces each letter within the message with itscorresponding number, where A = 1, B = 2, , Y = 25, and Z = 26. Next, Jamesmultiplies each number by 3 and then subtracts 5, and continues this process a totalof n times. For example, when n = 2 the letter D is encoded to the number 16.If James encoded a four letter message to the four numbers 367 205 853 1339, whatis the value of n that he used?(A) 2 (B) 3 (C) 4 (D) 5 (E) 6 standard form, degree, leading coefficient of 2x(2)-7x(4)+5x HELP ME BEFORE I DIE!Your adjacent is 3, your opposite is 4, and you have a 90 degree angle. Find the value of cos V rounded to the nearest hundredth, if necessary.