Help please i need it before tomorrow if possible

Help Please I Need It Before Tomorrow If Possible

Answers

Answer 1

Enthalpy Changes the overall energy change in the substance portrayed in the graph at  48°C.

What are the data that were obtained from the question?

Mass (m) = 0.3 Kg

Initial temperature (T1) = 20°C

Heat (Q) added = 35 KJ

Specific heat capacity (C) = 4.18 KJ/Kg°C

Final temperature (T2)

The final temperature of water can be obtained as follow:

Q = MC(T2 – T1)

35 = 0.3 x 4.18 (T2 – 20)

35 = 1.254 (T2 – 20)

Clear the bracket

35 = 1.254T2 – 25.08

Collect like terms

1254T2 = 35 + 25.08

1.254T2 = 60.08

Divide both side by the coefficient of T2 i.e 1.254

T2 = 60.08/1.254

T2 = 47.9 ≈ 48°C

Therefore, the final temperature of the water is 48°C.

Learn more about temperature on:

https://brainly.com/question/11464844

#SPJ1


Related Questions

4.5.2 For loop: printing a dictionary python

Answers

Answer:

for x, y in thisdict.items():

 print(x, y)

Explanation:

In java I need help on this specific code for this lab.


Problem 1:


Create a Class named Array2D with two instance methods:


public double[] rowAvg(int[][] array)


This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per row of the 2D array argument.


The method will adjust automatically to different sizes of rectangular 2D arrays.


Example: Using the following array for testing:


int [][] testArray =

{

{ 1, 2, 3, 4, 6},

{ 6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

must yield the following results:


Averages per row 1 : 3.20

Averages per row 2 : 8.20

Averages per row 3 : 13.20

While using this other array:


double[][] testArray =

{

{1, 2},

{4, 5},

{7, 8},

{3, 4}

};


must yield the following results:


Averages per row 1 : 1.50

Averages per row 2 : 4.50

Averages per row 3 : 7.50

Averages per row 4 : 3.50

public double[] colAvg(int[][] array)


This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per column of the 2D array argument.


The method will adjust automatically to different sizes of rectangular 2D arrays.


Example: Using the following array for testing:


int [][] testArray =

{

{ 1, 2, 3, 4, 6},

{ 6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

must yield the following results:


Averages per column 1: 6.00

Averages per column 2: 7.00

Averages per column 3: 8.00

Averages per column 4: 9.00

Averages per column 5: 11.00

While using this other array:


double[][] testArray =

{

{1, 2},

{4, 5},

{7, 8},

{3, 4}

};


must yield the following results:


Averages per column 1: 3.75

Averages per column 2: 4.75



My code is:


public class ArrayDemo2dd

{


public static void main(String[] args)

{

int [][] testArray1 =

{

{1, 2, 3, 4, 6},

{6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

int[][] testArray2 =

{

{1, 2 },

{4, 5},

{7, 8},

{3,4}

};


// The outer loop drives through the array row by row

// testArray1.length has the number of rows or the array

for (int row =0; row < testArray1.length; row++)

{

double sum =0;

// The inner loop uses the same row, then traverses all the columns of that row.

// testArray1[row].length has the number of columns of each row.

for(int col =0 ; col < testArray1[row].length; col++)

{

// An accumulator adds all the elements of each row

sum = sum + testArray1[row][col];

}

//The average per row is calculated dividing the total by the number of columns

System.out.println(sum/testArray1[row].length);

}

} // end of main()


}// end of class


However, it says there's an error... I'm not sure how to exactly do this type of code... So from my understanding do we convert it?

Answers

Answer:

Explanation:

The following code is written in Java and creates the two methods as requested each returning the desired double[] array with the averages. Both have been tested as seen in the example below and output the correct output as per the example in the question. they simply need to be added to whatever code you want.

public static double[] rowAvg(int[][] array) {

       double result[] = new double[array.length];

     for (int x = 0; x < array.length; x++) {

         double average = 0;

         for (int y = 0; y < array[x].length; y++) {

             average += array[x][y];

         }

         average = average / array[x].length;

         result[x] = average;

     }

     return result;

   }

   public static double[] colAvg(int[][] array) {

       double result[] = new double[array[0].length];

       for (int x = 0; x < array[x].length; x++) {

           double average = 0;

           for (int y = 0; y < array.length; y++) {

               average += array[y][x];

           }

           average = average / array.length;

           result[x] = average;

       }

 

       return result;

   }

Create a recursive procedure named (accumulator oddsum next). The procedure will return the sum of the odd numbers entered from the keyboard. The procedure will read a sequence of numbers from the keyboard, where parameter oddsum will keep track of the sum from the odd numbers entered so far and parameter next will (read) the next number from the keyboard.

Answers

Answer:

Explanation:

The following procedure is written in Python. It takes the next argument, checks if it is an odd number and if so it adds it to oddsum. Then it asks the user for a new number from the keyboard and calls the accumulator procedure/function again using that number. If any even number is passed the function terminates and returns the value of oddsum.

def accumulator(next, oddsum = 0):

   if (next % 2) != 0:

       oddsum += next

       newNext = int(input("Enter new number: "))

       return accumulator(newNext, oddsum)

   else:

       return oddsum

the
Wnte
that
Program
will accept three
Values of
sides of a triangle
from
User and determine whether Values
carceles, equal atera or sealen
- Outrast of your
a
are for
an​

Answers

Answer:

try asking the question by sending a picture rather than typing

Complete the problem about Olivia, the social worker, in this problem set. Then determine the telecommunications tool that would best meet Olivia's needs.


PDA

VoIP

facsimile

Internet

Answers

Answer:

PDA is the correct answer to the following answer.

Explanation:

PDA refers for Programmable Digital Assistant, which is a portable organizer that stores contact data, manages calendars, communicates via e-mail, and manages documents and spreadsheets, typically in conjunction with the user's personal computer. Olivia needs a PDA in order to communicate more effectively.

Discuss the relationship of culture and trends?

Answers

A good thesis would be something like “Modern culture is heavily influenced by mainstream trends” and just building on it.

PLEASE HELP!!!
Question 6:
A retailer of computers maintains a record containing the following information for every individual
computer sold
• Manufacturer name
• Model number
• Physical memory size
• Processor name
• Date of sale
• Price sold for
Using only the database, which of the following CANNOT be determined?
The average price of a computer was sold by the retailer
In which months less than 100 computers were sold
o Which models of computer stocked by the retailer have not had a single sale
The most popular model of computer sold by the retailer

Answers

I think A since I don’t think it would matter who sells to the consumer but the amount sorry if I’m wrong
price sold i know it because i did it

SOMEONE PLS HELP?!?!!

Answers

Answer:

B. To continuously check the state of a condition.

Explanation:

The purpose of an infinite loop with an "if" statement is to constantly check if that condition is true or false. Once it meets the conditions of the "if" statement, the "if" statement will execute whatever code is inside of it.

Example:

//This pseudocode will print "i is even!" every time i is an even number

int i = 0;

while (1 != 0)       //always evaluates to true, meaning it loops forever

  i = i + 1;               // i gets incrementally bigger with each loop

     if ( i % 2 == 0)     //if i is even....

               say ("i is even!"); //print this statement

What is the difference between an information system and a computer application?

Answers

Answer:

An information system is a set of interrelated computer components that collects, processes, stores and provides output of the information for business purposes

A computer application is a computer software program that executes on a computer device to carry out a specific function or set of related functions.

Write the Java classes for the following classes. Make sure each includes 1. instance variables 2. constructor 3. copy constructor Submit a PDF with the code The classes are as follows: Character has-a name : String has-a health : integer has-a (Many) weapons : ArrayList has-a parent : Character has-a level : Level (this should not be a deep copy) Level has-a name : String has-a levelNumber : int has-a previousLevel : Level has-a nextLevel : Level Weapon has-a name : String has-a strength : double Monster is-a Character has-a angryness : double has-a weakness : Weakness Weakness has-a name : String has-a description: String has-a amount : int

Answers

Answer:

Explanation:

The following code is written in Java. It is attached as a PDF as requested and contains all of the classes, with the instance variables as described. Each variable has a setter/getter method and each class has a constructor. The image attached is a glimpse of the code.

Consider the following two relations for Millennium College

STUDENT(StudentID, StudentName,CampusAddress, GPA)
REGISTRATION(StudentID, CourseID, Grade)

Following is a typical query against these Relation:

SELECT Student_T.StudentID,StudentName,
CourseID, Grade
FROM Sudent_T, Registration_T
WHERE Student_T.StudentID =
Registration_T.StudentID
AND GPA> 3.0
ORDER BY StudentName;

Required:
On what attributes should indexes be defined to speed up this Query? PLease give reasons for each selected

Answers

Thryyrryyfyfuguhoojihugtdtddt

what materials can I find at home and make a cell phone tower​

Answers

Answer:

you cant

Explanation:

You simply cant make a tower from materials found in a household

Create a list of 30 words, phrases and company names commonly found in phishing messages. Assign a point value to each based on your estimate of its likeliness to be in a phishing message (e.g., one point if it’s somewhat likely, two points if moderately likely, or three points if highly likely). Write a program that scans a file of text for these terms and phrases. For each occurrence of a keyword or phrase within the text file, add the assigned point value to the total points for that word or phrase. For each keyword or phrase found, output one line with the word or phrase, the number of occurrences and the point total. Then show the point total for the entire message. Does your program assign a high point total to some actual phishing e-mails you’ve received? Does it assign a high point total to some legitimate e-mails you’ve received?

Answers

Answer:

Words found in phishing messages are:

Free gift

Promotion

Urgent

Congratulations

Check

Money order

Social security number

Passwords

Investment portfolio

Giveaway

Get out of debt

Ect. this should be a good starting point to figuring out a full list

Suppose you are choosing between the following three algorithms:
• Algorithm A solves problems by dividing them into five subproblems of half the size, recursively solving each subproblem, and then combining the solutions in linear time.
• Algorithm B solves problems of size n by recursively solving two subproblems of size n − 1 and then combining the solutions in constant time.
• Algorithm C solves problems of size n by dividing them into nine sub-problems of size n=3, recursively solving each sub-problem, and then combining the solutions in O(n2) time.
What are the running times of each of these algorithms (in big-O notation), and which would you choose?

Answers

Answer:

Algorithm C is chosen

Explanation:

For Algorithm A

T(n) = 5 * T ( n/2 ) + 0(n)

where : a = 5 , b = 2 , ∝ = 1

attached below is the remaining part of the solution

To use cache memory main memory are divided into cache lines typically 32 or 64 bytes long.an entire cache line is cached at once what is the advantage of caching an entire line instead of single byte or word at a time?

Answers

Answer:

The advantage of caching an entire line in the main memory instead of a single byte or word at a time is to avoid cache pollution from used data

Explanation:

The major advantage of caching an entire line instead of single byte is to reduce the excess cache from used data and also to take advantage of the principle of spatial locality.

Animation timing is does not affect the
speed of the presentation
Select one:
True
False​

Answers

Answer:

True

Explanation:

I think it's true.....

Write a recursive method called permut that accepts two integers n and r as parameters and returns the number of unique permutations of r items from a group of n items. For given values of n and r, this value P(n, r) can be computed as follows:
n!/(n - r)!
For example , permut (7, 4) should return 840.

Answers

Answer:

Following are the code to the given question:

public class Main//defining a class Main

{

static int permut(int n, int r)//defining a method permut that holds two variable

{

return fact(n)/fact(n-r);//use return keyword to return calcuate value

}

static int fact(int n)//defining a fact method as recursive to calculate factorials

{

return n==0?1:n*fact(n-1);//calling the method recursively

}

public static void main(String[] abs)//main function

{

//int n=7,r=4;//defining integer variable

System.out.println(permut(7,4));//use print method to call permut method and print its values

}

}

Output:

840

Explanation:

Following is the explanation for the above code.

Defining a class Main.Inside the class two methods, "permut and fact" were defined, in which the "permut" accepts two values for calculating its permutated value, and the fact is used for calculates factorial values recursively. At the last, the main method is declared, which uses the print method to call "permut" and prints its return values.

How was the first computer reprogrammed

Answers

Answer:

the first programs were meticulously written in raw machine code, and everything was built up from there. The idea is called bootstrapping. ... Eventually, someone wrote the first simple assembler in machine code.

Explanation:

How does it relate
to public domain
and fair use?

Answers

Because the corilateion of the hippo

Which of the follwing are examples of meta-reasoning?
A. She has been gone long so she must have gone far.
B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.
C. I am getting tired so I am probably not thinking clearly.
D. I am getting tired so I will probably take a nap.

Answers

Answer: B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.

C. I am getting tired so I am probably not thinking clearly

Explanation:

Meta-Reasoning simply refers to the processes which monitor how our reasoning progresses and our problem-solving activities and the time and the effort dedicated to such activities are regulated.

From the options given, the examples of meta reasoning are:

B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.

C. I am getting tired so I am probably not thinking clearly

Which of the following describes a codec? Choose all that apply.
a computer program that saves a digital audio file as a specific audio file format
short for coder-decoder
converts audio files, but does not compress them

Answers

Answer:

A, B

Explanation:

A non-profit organization decides to use an accounting software solution designed for non-profits. The solution is hosted on a commercial provider's site but the accounting information suchas the general ledger is stored at the non-profit organization's network. Access to the software application is done through an interface that uses a coneventional web browser. The solution is being used by many other non-profit. Which security structure is likely to be in place:

Answers

Answer:

A firewall protecting the  software at the provider

Explanation:

The security structure that is likely to be in place is :A firewall protecting the  software at the provider

Since the access to the software application is via a conventional web browser, firewalls will be used in order to protect against unauthorized Internet users gaining access into the private networks connected to the Internet,

Joseph learned in his physics class that centimeter is a smaller unit of length and a hundred centimeters group to form a larger unit of length called a meter. Joseph recollected that in computer science, a bit is the smallest unit of data storage and a group of eight bits forms a larger unit. Which term refers to a group of eight binary digits? A. bit B. byte O C. kilobyte D. megabyte​

Answers

Answer:

byte

Explanation:

A byte is made up of eight binary digits

Which of the following techniques is a direct benefit of using Design Patterns? Please choose all that apply Design patterns help you write code faster by providing a clear idea of how to implement the design. Design patterns encourage more readible and maintainable code by following well-understood solutions. Design patterns provide a common language / vocabulary for programmers. Solutions using design patterns are easier to test

Answers

Answer:

Design patterns help you write code faster by providing a clear idea of how to implement the design

Explanation:

Design patterns help you write code faster by providing a clear idea of how to implement the design. These are basically patterns that have already be implemented by millions of dev teams all over the world and have been tested as efficient solutions to problems that tend to appear often. Using these allows you to simply focus on writing the code instead of having to spend time thinking about the problem and develop a solution. Instead, you simply follow the already developed design pattern and write the code to solve that problem that the design solves.

To add musical notes or change the volume of sound, use blocks from.

i. Control ii. Sound iii. Pen​

Answers

Sorry but what’s the question?
ii-i-iii I got you.

Which of the following transfer rates is the FASTEST?
1,282 Kbps
O 1,480 Mbps
1.24 Gbps
181 Mbps

Answers

Answer:

The correct answer is 1,480 Mbps.

Explanation:

For this you have to know how to convert bytes to different units.

1,000 Bytes (b)  = 1 Kilobyte (Kb)

1,000 Kilobyte (Kb) = 1 Megabyte (Mb)

1,000 Megabytes (Mb) = 1 Gigabyte (Gb)

and Finally, 1,000 Gigabytes (Gb) = 1 Terrabyte (Tb)

Answer:

1,480 Mbps

Explanation:

1,480 Mbps is equal to 1.48 Gbps, and so it is the fastest transfer rate listed because it is greater than 1.24 Gbps. In summary, 1,480 Mbps > 1.24 Gbps > 181 Mbps > 1,282 Kbps.

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.

Answers

Answer:

The main problem with such a tool would be resource usage

Explanation:

The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.

Earl develops a virus tester which is very good. It detects and repairs all known viruses. He makes the software and its source code available on the web for free and he also publishes an article on it. Jake reads the article and downloads a copy. He figures out how it works, downloads the source code and makes several changes to enhance it. After this, Jake sends Earl a copy of the modified software together with an explanation. Jake then puts a copy on the web, explains what he has done and gives appropriate credit to Earl.
Discuss whether or not you think Earl or Jake has done anything wrong?

Answers

Answer:

They have done nothing wrong because Jake clearly gives credit to Earl for the work that he did

Explanation:

Earl and Jake have nothing done anything wrong because Jake give the proper credit to Earl.

What is a virus tester?

A virus tester is a software that scan virus on computer, if any site try to attack any computer system, the software detect it and stop it and save the computer form virus attack.

Thus, Earl and Jake have nothing done anything wrong because Jake give the proper credit to Earl.

Learn more about virus tester

https://brainly.com/question/26108146

#SPJ2

This lab was designed to teach you more about using Scanner to chop up Strings. Lab Description : Take a group of numbers all on the same line and average the numbers. First, total up all of the numbers. Then, take the total and divide that by the number of numbers. Format the average to three decimal places Sample Data : 9 10 5 20 11 22 33 44 55 66 77 4B 52 29 10D 50 29 D 100 90 95 98 100 97 Files Needed :: Average.java AverageRunner.java Sample Output: 9 10 5 20 average = 11.000 11 22 33 44 55 66 77 average = 44.000 48 52 29 100 50 29 average - 51.333 0 average - 0.000 100 90 95 98 100 97 average - 96.667

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

 String score;

 System.out.print("Scores: ");

 score = input.nextLine();

 String[] scores_string = score.split(" ");

 double total = 0;

 for(int i = 0; i<scores_string.length;i++){

     total+= Double.parseDouble(scores_string[i]);  }

 double average = total/scores_string.length;

 System.out.format("Average: %.3f", average); }

}

Explanation:

This declares score as string

 String score;

This prompts the user for scores

 System.out.print("Scores: ");

This gets the input from the user

 score = input.nextLine();

This splits the scores into an array

 String[] scores_string = score.split(" ");

This initializes total to 0

 double total = 0;

This iterates through the scores

 for(int i = 0; i<scores_string.length;i++){

This calculates the sum by first converting each entry to double

     total+= Double.parseDouble(scores_string[i]);  }

The average is calculated here

 double average = total/scores_string.length;

This prints the average

 System.out.format("Average: %.3f", average); }

}

Write a SELECT statement that displays each product purchased, the category of the product, the number of each product purchased, the maximum discount of each product, and the total price from all orders of the item for each product purchased. Include a final row that gives the same information over all products (a single row that provides cumulative information from all your rows). For the Maximum Discount and Order Total columns, round the values so that they only have two decimal spaces. Your result

Answers

Answer:

y6ou dont have mind

Explanation:

Other Questions
In square ABCD, mBCE=(5x+9).What is the value of x?Enter your answer, as a decimal, in the box.x = Which type of circuit has no return path for current to flow through? O responses short O short broken O broken open O open series In QRS, s = 5.2 inches, S=129 and Q=30. Find the length of r, to the nearest 10th of an inch. Consider a 8.4 percent coupon bond with eleven years to maturity and a current price of $1,041.40. Suppose the yield on the bond suddenly increases by 2 percent.a. Use duration to estimate the new price of the bond. (Do not round intermediate calculations. Round your answer to 2 decimal places. Omit the "$" sign in your response.) Price $b. Calculate the new bond price. (Do not round intermediate calculations. Round your answer to 2 decimal places. Omit the "$" sign in your response.) Price $ What four features are shared by all cells ? All of the following are dividend options except: dividend accumulations, fixed-period option, paid-up additions, reduction of premiums Is pewter toxic to humans? A patient is diagnosed with amyotrophic lateral sclerosis, also known as als or lou gehrigs disease. the nurse understands that the symptoms of the disease will begin in what way? FILL IN THE BLANK. protein is generally not found in the urine because __________. Is atherosclerosis the same as Alzheimer's? during the meeting, you also learn that meer-kitty videos are hosted on their website. for each product offered, there is an accompanying video for customers to learn more. so, more views for a video suggests greater consumer interest. your goal is to identify which videos are most popular, so meer-kitty knows what topics to explore in the future. unfortunately, meer-kitty has just three months of data available because they only recently launched the videos on their site. without enough data to identify long-term trends about the video subjects that people prefer, what are your available options? select all that apply. A ship's propeller of diameter 3 m makes 10.6 revolutions in 30s. What is the angular velocity of the propeller?a 90.0 rad/sb 31.8 rad/sc 2.22 rad/sd 66.7 rad/s What does solar and wind have in common? question 7 a stakeholder objects to the steps of your analysis. what are some appropriate ways to respond to this objection? select all that apply. 1 point communicate the assumptions you made in your analysis defend the results of your analysis explain why you think any discrepancies exist take steps to investigate your analysis question further How do you write 308 in expanded form? What is the total area of the tiles Felix needs to buy? Which of the following factors contributed to william mckinleys victory over william jennings bryan in the 1896 election?a. McKinley had greater support in the population dense northeastb. McKinley was able to spend five times more than Bryan on the campaignc. Bryans campaign was unable to generate the high voter turnout in areas of theirsupportd. All of the above jane is one of 10 chiropractors in her city. demand for chiropractic services is low enough that all chiropractors in the city are suffering losses. after three chiropractors close their practices, which of the following changes does jane's practice not experience? its demand curve shifts to the right. it loses market power. it sells more chiropractic services. its price falls. which choice identifies attributes required for an x.509 compliant digital certificate? Discuss change management validity tools for a chosen organization. How could you apply analytical frameworks to illustrate possible project outcomes?