An array of integers can be assigned to a memory address in the ...
An array of integers can be assigned to a memory address in the .datanumbers
section of a MIPS assembly language program as show below. Here the length of the array is stored first, and then the elements of the array next.

Implement a MIPS assembly language program to perform the functionality of the following C program and print the updated array content, by listing each integer in it.

It should ask a user to enter three integers, a starting index, an ending index, and an integer to use for a comparison. It should examine only the elements in the array located from the entered starting index, to the entered ending index to check if each of them is greater the last entered integer, then if it is, subtract 3*the last entered integer to each such element in the array.

For instance, if a user enters 2, enters 9, then enters 3, then the output will be the following:

45

-6

14

-7

6

-17

2

-4

14

-26

2

19





i.e., the numbers that are located between the index 2 and 9 are examined to see if each of them is greater than the last entered number (3 in this case),

then each of such element is subtracted with 3 times that number (3 in this case) if it is.

If the entered ending index is larger than 11, then the program should exam elements in the array until the end, and if the entered starting index is less than 0, then it should start examining elements from the first one in the array.

.data

numbers_len: .word 12

numbers: .word 45, -6, 23, -7, 15, -17, 11, -4, 23, -26, 2, 19}





The following shows how it looks like in a C program:


int numbers[12] = {45, -6, 23, -7, 15, -17, 11, -4, 23, -26, 2, 19};

int startIndex, endIndex, num1;
int j;

printf("Enter a starting index:n");

//read an integer from a user input and store it in startIndex
scanf("%d", &startIndex);


printf("Enter an ending index:n");

//read an integer from a user input and store it in endIndex
scanf("%d", &endIndex);

printf("Enter an integer:n");

//read an integer from a user input and store it in num1
scanf("%d", &num1);

if (startIndex < 0)
startIndex = 0;


for (j = startIndex; j <= endIndex && j < 12; j = j+1)
{
if (numbers[j] > num1)
{
numbers[j] = numbers[j] - (3 * num1);
}
}


printf("Result Array Content:n");
for (j = 0; j < 12; j = j+1)
{
printf("%dn", numbers[j]);
}




The following is a sample output (user input is in bold):

Enter a starting index:

2

Enter an ending index:

9

Enter an integer:

3

Result Array Content:

45

-6

14

-7

6

-17

2

-4

14

-26

2

19

Please make sure it can output like the sample above

Answers

Answer 1

Answer:

A :)

Explanation:


Related Questions

Help your professor to calculate the exam average and the number of students passing the course by writing a maria program. The program will take as input the number of exam papers and the exam points for each student. At the and show the class average and the number of students passing the course. Note that the passing grade is 60.

Answers

#include <iostream>

using namespace std;

int main ()

{

int num =0 ;

int points=0 ;

int pointss=0;

int term =0;

int passes =0;

cout<<"type number of "<<endl;

cin>> num;

for(int i =0;i<num;i++)

{

cout<<"type points "<<endl;

cin>>points;

pointss=points + pointss;

if(points>=60)

{

passes++;

}

}

cout<<"that are points: "<<endl;

cout<<pointss<<endl;

cout<<"that is num: "<<endl;

cout<<num<<endl;

cout<<"average: "<<endl;

cout<<pointss/num<<endl;

cout<<"Number of students who pass: "<<endl;

cout<<passes<<endl;

return 0;

}

4. What organization is responsible for publishing Request for Comments (RFC)?

Answers

Answer:

IETF

Explanation:

The Internet Engineering Task Force.

hello everyone I need some help with what a footer is on a web page

Answers

Answer:

A website's footer is an area located at the bottom of every page on a website, below the main body content

Explanation:

By including a footer, you make it easy for site visitors to keep exploring without forcing them to scroll back up.

Excel 365 is primarily used to produce Word documents.

Answers

If this is a true and false question it would be False

Excel 365 is primarily used to produce Word documents is a false statement.

What is Microsoft Word and Excel meant for?

Microsoft Word is known to be a kind of word processing software that is often used for writing letters, memos, reports and others.

The Microsoft Excel is known to be a spreadsheet software that is meant to be used for calculations, creating charts and recording data about any  business processes.

Conclusively, Excel 365 is primarily used to produce calculations and not word document.

Learn more about Excel from

https://brainly.com/question/25879801

A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like to know the operating system of a target device and scan for commonly used ports. Select the nmap commands that will be useful in this case. (Select all that apply.)

Answers

The Network Mapper (Nmap) commands that would be useful on this test network are:

nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -A

What is a penetration test?

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

Operating systemWeb softwareHost deviceNetwork

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

The Network Mapper (Nmap) commands.

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -A

Read more on penetration test here: https://brainly.com/question/25813524

A(n) _____ is a network connection device that can build tables that identify addresses on each network. Group of answer choices switch adapter card dynamic router hub

Answers

A network connection device that is designed and developed to build tables that identify IP addresses on each network is called a: C. dynamic router.

What is a dynamic router?

A dynamic router can be defined as a network connection device that is designed and developed to use adaptive routing in creating or building tables that identify IP addresses on each network.

An adaptive routing is also referred to as dynamic routing and it refers to a network protocol that allows optimal data routing by selecting paths using complex routing algorithms, according to real time routing table changes in a dynamic router.

Read more on dynamic router here: https://brainly.com/question/24812743

In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____. Group of answer choices create, read, update, and delete copy, revise, undo, and define create, repeat, undo, and develop copy, read, update, and define

Answers

Answer:

C.R.U.D stands for Create, Read, Update, Delete.

Explanation:

Write the program of while loop .

Answers

Answer:#include<stdio.h>  

int main(){    

int i=1;      

while(i<=10){      

printf("%d \n",i);      

i++;      

}  

return 0;  

}    

Explanation:

This is the program I coded on the while loop.

In this exercise we have to use the knowledge of programming in C code  to describe a looping so we have the code.

The code can be found in the attached image.

How to repeat code in C?

Repeat commands are a feature that allows a certain piece of code in a program to be repeated a certain number of times. In C there are three repetition commands: while, do-while and for.

So in a simpler way the code is:

#include<stdio.h>  

int main(){    

int i=1;  

while(i<=10){    

printf("%d \n",i);    

i++;    

}  

return 0;  

}    

See more about C code at brainly.com/question/25870717

how can one improve the quality of the search results when using internet services such as research methods

Answers

Answer:

Vary Your Search Engine. Use Specific Keywords.Simplify Your Search Terms. Use Quotation Marks. Remove Unhelpful Words. Refine Your Search Using Operators.Avoid Search Pitfalls.

Explanation:

Write a program to store the elements (30,3,8,7,5) and display their location

Answers

Answer:

why did you delete my answeR?

30, 3, 8, 7, 5

examples of a computer organizing itself

Answers

I don’t think if there is one that can do that only softwares

(C) Describe about the different types of computer
peripherals and memory devices.

Answers

Computer peripheral device

Monitor.

Monitor. Keyboard.

Monitor. Keyboard. Mouse.

Monitor. Keyboard. Mouse. Trackball.

Monitor. Keyboard. Mouse. Trackball. Touchpad.

Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick.

Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick.

Monitor. Keyboard. Mouse. Trackball. Touchpad. Pointing stick. Joystick. Light pen.

MEMORY DEVICES :

The main storage is the primary memory, and data and programs are stored in secondary memory. However, memory is not stored in the CPU, but the CPU would only be a mess of wires without it!

RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. ... Hard Disk, CD, DVD, Pen/Flash drive, SSD, etc, are examples of secondary storage.

Thus, Computer storage is of two types: ... RAM (Random Access Memory) and ROM (Read Only Memory) are examples of primary storage. Secondary Storage Devices: Secondary storage is a memory that is stored external to the computer. It is mainly used for the permanent and long-term storage of programs and data.

Identify science and technology policies that could be adapted or implemented in the Philippines?​

Answers

Answer:

In the Philippines, universities dominate the research arena. So you have scientists who make research for the sake of research.

The private sector may or may not adopt the research. If a research in UP finds a molecule that may kill cancer, we are not sure whether that research will be adopted or not.

We are not sure if that research will be continued to actual creation of a medicine of cancer. This is because our scientists are working in universities and not in actual pharma companies.

In other countries, the scientists build their own companies. So their research go from drug development to actual manufacturing and marketing of medicines.

So when they start a research, you know that in the next 5 to 10 years, these scientists will produce drugs which the public can benefit from.

This is why the Philippine research is not thriving as it should. Our government should support our start ups.

When scientists are given grants for research, they should also be given grants to start their company. Unfortunately, start up grant is not a function of the DOST. It is of the DTI.    

Explanation:

In the Philippines, universities dominate the research arena. So you have scientists who make research for the sake of research.

Which sector does not adopt research?

The private sector may or may not adopt the research. If a research in UP finds a molecule that may kill cancer, we are not sure whether that research will be adopted or not.

We are not sure if that research will be continued to actual creation of a medicine of cancer. This is because our scientists are working in universities and not in actual pharma companies.

In other countries, the scientists build their own companies. So their research go from drug development to actual manufacturing and marketing of medicines. So when they start a research, you know that in the next 5 to 10 years, these scientists will produce drugs which the public can benefit from.

This is why the Philippine research is not thriving as it should. Our government should support our start ups. When scientists are given grants for research, they should also be given grants to start their company. Unfortunately, start up grant is not a function of the dust. It is of the DTI.  

Therefore, In the Philippines, universities dominate the research arena. So you have scientists who make research for the sake of research.

Learn more about Philippine on:

https://brainly.com/question/26599508

#SPJ2

 

Described the importance of developing strategies to conduct educational research.

Answers

Step 1: Identifying a Problem.

2

Step 2: Reviewing the Literature.

3

Step 3: Specifying a Purpose and Research Questions. Writing purpose statements, research questions, and hypotheses provide critical direction to an educational research study. ...

4

Step 4: Designing a Study.

ecu

Modify the FitnessTracker class, created in Chapter 4 Programming Exercise 3AB, so that the default constructor calls the three-parameter constructor. Use TestFitnessTracker2 to test the new version of the class.

FitnessTracker2.java:
import java.time.*;
public class FitnessTracker2 {
String activity;
int minutes;
LocalDate date;
public FitnessTracker2() {
}
public FitnessTracker2(String activityParam, int minutesParam, LocalDate dateParam) {
}
public String getActivity() {
}
public int getMinutes() {
}
public LocalDate getDate() {
}
}

TestFitnessTracker2.java:
import java.time.*;
public class TestFitnessTracker2
{
public static void main(String[] args)
{
FitnessTracker2 exercise = new FitnessTracker2();

System.out.println(exercise.getActivity() + " " + exercise.getMinutes() +
" minutes on " + exercise.getDate());

// code to test constructor added for exercise 3b

LocalDate date = LocalDate.of(2020, 8, 20);
FitnessTracker2 exercise2 = new FitnessTracker2("bicycling", 35, date);

System.out.println(exercise2.getActivity() + " " + exercise2.getMinutes() +
" minutes on " + exercise2.getDate());
}
}

Answers

Answer:

Is this coding?

Explanation:

Question 1
Which of the following is a software threat?
a
O A) session hijacking
OB) overflow attack
OC) cross-site scripting (XSS)
OD) hacking

Answers

well we can rule out session as this is a threat to the computer not the software

next let's talk about overflow attack as this can be used on any software that has connecten to the internet

cross site scripting is for websites only as it involves loading code on to a website

and hacking if a very broad term so I would rule that out also

so I believe the answer is b

hope I helped

scav

The one that is software threat is an overflow attack. The correct option is b.

What is a software threat?

Software threats are harmful programs and pieces of code that can harm your computer and steal your personal or financial data. Because of this, these harmful programs are frequently referred to as malware (short for "malicious software").

Nowadays, many software vulnerabilities explicitly target smartphones, making cybersecurity strategies based on desktop PCs ineffective in some cases.

Apps, and smartphone viruses, are merely mobile versions of viruses that target your desktop or laptop computer. Blue jacking is the practice of sending unwanted or unsolicited Bluetooth messages to complete strangers.

Therefore, the correct option is b, overflow attack.

To learn more about software threats, refer to the below link:

https://brainly.com/question/28048202

#SPJ2

What does the x mean in .docx

Answers

Answer:

When Microsoft switched to XML-based file formats in Office 2007, they added the 'x' to the file extensions to differentiate from the previous, incompatible formats such as dox to docx.

In other words. X is extended.

In the code segment below, assume that the ArrayList object numbers has been properly declared and initialized to contain [0, 2, 4, 5]. for (int k = numbers.size() - 1; k >= 0; k--) { if (numbers.get(k) > k) { System.out.print(k + " "); } } What, if anything, is printed as a result of executing the code segment?

Answers

Answer:

Result: C The output that will be printed will be:  3 2 1 If the program is executed, the loop runs in reverse. So it runs from 3 to 0. In the first iteration: at index 3 the corresponding number is 5, so since 5 is greater than present value of k.

"A document stored on web server and is available on the web is called web page" TRUE OR FALSE​

Answers

Answer:

true .................

1. (A) What do you mean by computer? Discuss the use of
computer in daily life.

Answers

Answer:

A computer is an electronic device that manipulates information or data.

We use computers in schools and colleges all around the world.

Computer technologies are important to teach students digitally and creatively with data visualization. In a classroom, students used computers to explore their creativity and imagination.

Answer:

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Some people use a computer to take online classes.Computers have many other uses at home like financial calculations also. You can also access banking and business services from home via the internet with the help of a computer.

_____ is the use of large amounts of data, organized and presented to identify patterns and trends. Continuous Improvement Continuous Improvement Usability testing Usability testing Analytics Analytics System implementation

Answers

Analytics is the use of large amounts of data, organized and presented to identify patterns and trends.

What is Data?

This is defined as the raw form of information which has to undergo processing and analysis.

Analytics involves the use of data which aren't easily detected in ensuring that patterns and trends are identified through their interpretation.This therefore makes it the most appropriate choice.

Read more about Analytics here https://brainly.com/question/25819900

Answer:

Analytics

Explanation:

got it right on edge

Which formula is used to measure accuracy?

Answers

The accuracy formula provides accuracy as a difference of error rate from 100%. To find accuracy we first need to calculate the error rate. And the error rate is the percentage value of the difference of the observed and the actual value, divided by the actual value

4. The is the metal box that contains the main components of the computer ​

Answers

Answer:

The computer case

Explanation:

"The computer case is the metal and plastic box that contains the main components of the computer, including the motherboard, central processing unit (CPU), and power supply. The front of the case usually has an On/Off button and one or more optical drives."

A game is played by moving a game piece left or right along a horizontal game board. The board consists of spaces of various colors, as shown. The circle represents the initial location of the game piece.

Yellow Black Green Green Red Yellow Black Black Yellow Black

The following algorithm indicates how the game is played. The game continues until the game is either won by landing on the red space or lost when the piece moves off either end of the board.

Step 1: Place a game piece on a space that is not red and set a counter to 0.
Step 2: If the game piece is on a yellow space, move the game piece 3 positions to the left and go to step 3. Otherwise, if the game piece is on a black space, move the game piece 1 position to the left and go to step 3. Otherwise, if the game piece is on a green space, move the game piece 2 positions to the right and go to step 3.
Step 3: Increase the value of the counter by 1.
Step 4: If game piece is on the red space or moved off the end of the game board, the game is complete. Otherwise, go back to step 2. If a game is begun by placing the game piece on the rightmost black space for step 1, what will be the value of the counter at the end of the game

Required:
If game piece is on the red space or moved off the end of the game board, the game is complete. Otherwise, go back to step 2. If a game is begun by placing the game piece on the rightmost black space for step 1, what will be the value of the counter at the end of the game?

Answers

The value of the counter of the given algorithm at the end of the game is; 4

How to solve Algorithms?

From the attached table, we see the algorithm of the given game.

Now, the black circle is initially under the column black.

From the given conditions, step 1 says since the space is not red we should set a counter to 0. Thus, the counter will be set to 0.

Since the game piece is under the black column, according to step 2, we will move the game piece 1 position to the left and go to step 3.

By moving one position to the left, the game piece will be under the yellow column. We now increase the counter by 1 to 1.

According to step 2, at yellow, we move the game piece 3 places to the left and it will land on yellow and we increase the counter to 2 and move 3 places to the left again to stop at green.

At green we increase the counter to 3 and then move two spaces to the left which is the left end of the board and we will increase the counter to 4 and the game will be complete according to step 4.

Read more about Solving Algorithms at; https://brainly.com/question/24793921

What are some ways that an extremely large group of processors could be maintained?

Answers

The extremely large group of processors could be maintained from the manufacturer industry by an installation of a very good cooling system.

What challenges does processors pose?

Despite the capability of modern processor, the heating system presented a major challenge for the system because it might shut down the system on the thermostat observed the processor is emitting alarming heat.

In conclusion, the extremely large group of processors could be maintained from the manufacturer industry by an installation of a very good cooling system.

Read more about computer processors

brainly.com/question/614196

We call any device connected to the Internet a(n) ________. Group of answer choices router host IP client

Answers

Answer:

ADSL modem

Explanation:

What module do you need to import in order to use a pseudo-random number in your game?

A. randomizer
B. guess
C. guesser
D. random

Answers

D: Random I don’t think the others are even valid python Libs

By using the radiant method from the random module and need to import in order to use a pseudo-random number in your game.

What is randint method?

The randint() method is a method or function in the random python module. It is used to get or return an integer number within a specified range.

To use the method, the module must be imported into the python file with the "import random" statement, then the method is referenced using dot notation and specifying the range of integer numbers. Syntax: random. randint first_number, last_number note that the last number in the range is inclusive in the selection.

Random numbers refers to a set of unbiased numbers formed within a defined set of interval. Random number generation using programming paradigm are done using the random module and not the math module.

Therefore, By using the radiant method from the random module and need to import in order to use a pseudo-random number in your game.

Learn more about radiant method on:

https://brainly.com/question/29102331

#SPJ2

2 What is the different between mouse and trackbeel?​

Answers

Answer:

Trackball and Mouse is that trackball is a stationary pointing device with a ball on its top or side. While mouse is a pointing device that fits comfortably under the palm of your hand. With a mouse, users control the movement of the pointer.

Explanation:

I hope this helps!

Answer:

mouse moves by using a sensor to see how far the mouse has moved in real time and give the input to the computer. and a trackball uses sensors to see how far the ball has moved and give the input to the computer

Explanation:

Determine the binary encoding for a system that uses two’s complement of the base-10
quantities negative six and six for a digital system where all binary numbers are represented by four bits, one where all numbers are represented by eight bits (one byte).

Answers

Answer:

4 bits:

6 = 0110

-6 = 1010

8 bits:

6 = 00000110

-6 = 11111010

Explanation:

2's complement is easier to implement, because it only has one representation of 0 and starts counting backwards from the highest number you can represent with the available bits.

e.g.,

7 = 0111

6 = 0110

5 = 0101

4 = 0100

3 = 0011

2 = 0010

1 = 0001

0 = 0000

-1 = 1111

-2 = 1110

-3 = 1101

-4 = 1100

-5 = 1011

-6 = 1010

For 4 bits:

-6 = 01106 = 1010

For 8 bits (1 byte):

-6 = 0000 + 0110 = 000001106 = 1111 + 1010 = 11111010

What is binary encoding?

Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.

The two’s complement of base-10.

In Computer programming, two's complement of base-10 is generally easier to implement because it has a single representation of 0 only.

Decimal      Two’s Complement      Decimal      Two’s Complement

    0                       0000                        0                        0000

    1                       1111 1111                       -1                      0000 0001

    2                      1111 1110                      -2                    0000 0010

    3                      1111 1101                      -3                    0000 0011

    4                      1111 1100                     -4                    0000 0100

    5                      1111 1011                      -5                    0000 0101

    6                      1111 1010                     -6                    0000 0110

    7                      1111 1001                     -7                    0000 0111

    8                      1111 1000                    -8                    0000 1000

For 4 bits:

-6 = 0110

6 = 1010

For 8 bits (1 byte):

-6 = 0000 + 0110 = 00000110

6 = 1111 + 1010 = 11111010

Read more on binary encoding here: https://brainly.com/question/5381889

explain 3 advantages and 3 disadvantages of computers ​

Answers

Answer:

advantage

1: finish tedious tasks faster (writing an essay)

2: the internet (you can learn anything)

3: reduces the use of paper

disadvantage

1: social media (being addictive toxic)

2: decreasing jobs

3: less time for people to interact in person

Explanation:

hiya!!!

advantages:

1. computers make information more accessible
2. they help pass time
3. they store documents and data

disadvantages:

1. information can get leaked
2. costly
3. uses up electricity
Other Questions
50 POINTS AND BRAINLIESTEcon U2 Intro to EconomicsMultiple Choice-----------------------------------------------------------------3. A sports collector is considering the purchase of either a hockey jersey or a baseball that was struck for a home run. If the collector chooses to purchase the jersey, what is the opportunity cost? *1pointthe time lost looking at both itemsthe net value of the jersey for the collectorthe net value of the ball for the collector4. A farmer must decide between growing peppers or growing tomatoes. Which trade-off is the farmer considering? *1 pointthe profit of growing peppers, compared to the profit of growing tomatoesthe retail value of peppers at the store, compared to the retail value of tomatoes at the storethe cost of growing peppers, compared to the cost of growing tomatoes5. Kendra is trying to decide whether to go to Abby's house to watch a movie or to go to Samuel's house to play board games. They live about the same distance away, and there is no cost for either event. If she chooses to go to Abby's house, what is the opportunity cost? *1 pointThere is no opportunity cost because there is no cost associated with either option. Economics do not apply to this kind of decision.The difference in value to Kendra of the two optionsThe net value to Kendra of going to Samuel's house to play games.6. Sergei had to decide among watching a two-hour movie with a cost of $20, buying a book to read for $10 that would take about four hours to read, and going to a three-hour concert for $30. If he considers the benefit of each situation to be proportional to the amount of time, with a value of about $50 per hour, what is the opportunity cost of the best decision? *1 point$80$150$1209. How does a pure command economy answer the basic question of which goods and services should be produced? *1 pointThe producers decide what should be produced.The government decides what should be produced.The consumers decide what should be produced.10. How does a pure market economy answer the basic question of which goods and services should be produced? *1 pointProducers decide what should be produced.The government decides what should be produced.The law of supply and demand drives this choice.11. Which of the following principles of a free enterprise system BEST explains why businesses in an industry cannot maintain an artificially high price? *1 pointproducer sovereignty - they can choose to produce what they wantproperty rights - producers can own or rent the building they manufacture inopen opportunity - other producers can decide to sell it slightly cheaper to attract more customers12. Which of the following is an example of open opportunity? *1 pointA student learns to make web pages and starts making websites for local small businesses.A business decides to change its website provider to reduce cost.A farmer has the right to decide which crops to plant in his field.13. Which is an example of a private good? *1 pointan internet connection from a local cable companya personal computer or tablet used to access the internetpositions in a free online game limited to 100 people14. Which of the following is a positive externality that would result from converting the inner part of a city to a pedestrian only area? *1 pointthe increase in commute time for people who work in the areaa decrease in business in the areathe decrease of pollution in the city HELP PPLEASE I BEG HEY HELPPLEASE :,) OK I NEED HELP ON THESE BUT CAN U PLEASE LIKE EXPLAIN Y What are some of the typical/traditional roles of coders and health information professionals?. Write a polynomial function of least degree with rational coefficients so that P(x) = 0 has the given roots.11, 11-1P(x)=x4 - 22x3 + II X2 - 2,662x + 14,762 WHich one is it? help pls why did europe play a large role in the african slave trade before the 1400s? What are the two types of fermentation? An experiment requires 74.2 mL of ethyl alcohol. If the density of ethyl alcohol is 0.790 g/cm3, what is the mass of74.2 mL of ethyl alcohol?O a. none of theseO b.58.6 gO c.93.9 gO d. 7.90 gOe. 10.6 g Reflect the figure over the line y=x+1 Suppose that prolog facts are used to define the predicates mother(m, y) and father(f, x), which represent that m is the mother of y and f is the father of x, respectively. Give a prolog rule to define the predicate grandfather(x, y), which represents that x is the grandfather of y. Use a comma to denote "and" and a semicolon to denote "or. ". Each player on a softball team will get a uniform with a randomly selectednumber between 1 and 30. No two players will have the same number.The first player to get a uniform thinks the probability that she willget a single-digit number is 10 Is the player correct? Explainyour reasoning.9 what are some obstacles that the challenger deep crew faced? One suggestion for helping poor countries enjoy the benefits of free trade is for richer nations to reduce barriers to importing products from those nations particularly for __________ and agricultural products. What does the zig zag line help with on a periodic table Look at the picture this thing doesnt make sence Why couldn't Odysseus save his men? Whats the correct answer for this question? if you were to select one passage from the novel to represent one of the five major characters (nick,gatsby,daisy,tom,or jordan) which passage would best reflect the character's personality and why Which of the following is not released by trees into the atmosphere? a. Oxygen b. Water vapor c. Ozone d. None of the above Please select the best answer from the choices provided A B C D.