we are interested in generating functions for the number of different ways to compose a bag of n donuts subject to various restrictions. for each of the restrictions in parts (a)-(e) below, find a closed form for the corresponding generating function. (a) all the donuts are chocolate and there are at least 3.

Answers

Answer 1

the donuts are chocolate and there are at least

Answer 2

(a) All the donuts are chocolate and there are at least 3, therefore, x³/1 − x.

What is function?

A function from a set X to a set Y in mathematics assigns each element of X exactly one element of Y. The domain and codomain of the function are denoted by the sets X and Y, respectively. [Reference required]

The concept of function was first discussed by two Persian mathematicians named Al-Biruni and Sharaf al-Din al-Tusi. Functions were originally used to represent the idealised relationship between varying quantities and other variables. For example, time has an impact on a planet's position.

The concept was first developed at the end of the 17th century with the infinitesimal calculus, and up until the 19th century, the functions taken into account were differentiable.

Learn more about function

https://brainly.com/question/22340031

#SPJ4


Related Questions

Which of the following captures the timelines for product deployment during the course of the project? 1. Product Backlog 2. Project Vision statement 3. Epics) 4. Release Planning Schedule

Answers

Backlogs for products and sprints are essential to agile planning. They list every action that needs to be taken to complete a project in detail.

Every product team is in charge of jotting down fresh suggestions and requests for improvements. These inputs are what fuel innovative business practises and a supportive workplace culture. However, you must do more than serve as a sounding board for various ideas. You require a method for compiling and assessing requests for your current roadmap. Most product teams utilise a backlog of some form to organize ideas and ongoing project.

Agile approaches are the foundation of the backlog idea. Many teams continually prioritize what to build and when using adaptive planning strategies. Even teams that do not strictly adhere to the agile methodology now frequently use backlogs to organize and prioritise work items.

Know more about project here:

https://brainly.com/question/29417593

#SPJ4

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.
a. application
b. baseline
c. technology design
d. turnpike design
e. backplane design

Answers

Once the needs have been defined in the logical network design, the next step is to develop a technology design.

What is technology design?

Practical applications are used to illustrate the engineering scope, content, and professional practises in technological design. In order to solve engineering design problems and create innovative designs, students in engineering teams use concepts and abilities from technology, science, and mathematics.

Engineering design criteria like design effectiveness, public safety, human factors, and ethics are researched, developed, tested, and evaluated by students. For students interested in engineering, design, innovation, or technology, this course is a must-take.

Students who take Technological Design are prepared for the capstone Engineering Design course, which serves as a transitional course for post-secondary study.

Learn more about technological design

https://brainly.com/question/20162876

#SPJ4

Question 7 (10 points) ✓ Saved Regarding GC (Garbage Collection) in Java, which of the following statements is true? Java developers need to explicitly create a new thread in order to deallocate the used memory space. A Java GC process is responsible to take care of heap memory and deallocate the space occupied by those objects no longer used. The Java memory management API allows developers to write code directly deallocating the used memory space. JDK offers an interface for Java developers to use in managing the memory heap, e.g. deallocate the memory after a given period of time. Question 8 (10 points) ✓ Saved About array and ArrayList in Java, which of the following statements is false? ArrayList is mutable but array is immutable Underlying implementation of ArrayList depends on array ArrayList is unsafe in terms of concurrency ArrayList is immutable but array is mutable

Answers

Regarding GC (Garbage Collection) in Java, the statements that is true is option B:

A Java GC process is responsible to take care of heap memory and deallocate the space occupied by those objects no longer used.

In regards to array and ArrayList in Java, the  statement that is false is option A: ArrayList is mutable but array is immutable

What is ArrayList about?

In Java, the GC (Garbage Collection) process is responsible for automatically deallocating the memory space occupied by objects that are no longer in use. This helps to prevent memory leaks and improve the efficiency of the Java application.

Note that An array is immutable, which means that its size cannot be changed once it is created. In contrast, an ArrayList is a dynamic data structure that can store an expandable list of elements.

Learn more about ArrayList from

https://brainly.com/question/8045197

#SPJ1

Determine the force in members CD, CF, and CG and state if these members are in tension or compression.

Answers

The force of given members in tension or compression are CD = 11.25 = 11.2 kN (C), CF = 3.21 kN (T), CG = 6.80 kN (C)

Rope bridges can support both themselves and the load they carry because tension forces cause material to be pulled and stretched in opposing directions. The rocks of an arch bridge press against one other to carry the weight because compression forces squeeze and push material inward. The bottom beam fiber tends to stretch when subjected to a normal vertical live load, whereas the top beam fiber tends to compress (tension). Comparatively speaking, the corresponding truss's bottom chord is under tension and its top chord is in compression. When two or more physical objects come into contact, they apply forces to one another. We label these contact forces differently depending on the objects that are in contact.

To learn more about  compression click here

brainly.com/question/30060592

#SPJ4

On mountain roads, if you have ____ or more vehicles behind you, you must use turnouts to let them pass.

Answers

On mountain roads, if you have __5__ or more vehicles behind you, you must use turnouts to let them pass.

Before passing a bus or truck, be sure you can see the driver in the side mirror. To safely and quickly pass the truck or bus, signal loudly, then move into the left lane and speed up. Stay out of the blind spot. In order to observe any items through the rear view glass on the right side and rear of the car, you should be backing up with your head pointed toward the right rear of your vehicle. Driving on two-way streets is simpler since you can readily observe the approaching cars. Never cross the centerline when you get close to a hill's top.

To learn more about mountain roads click the link below:

brainly.com/question/21065899

#SPJ4

T/F the fundamental difference between a switch and a router is that a switch belongs only to its local network and a router belongs to two or more local networks.

Answers

True, A switch belongs exclusively to its local network, whereas a router belongs to two or more local networks.

This is the main fundamental distinction between a switch and a router.

What is Local Area Network?

A group of different kinds of devices connected to one another in a single physical location/place, such as a building, office, or home, is known as a local area network (LAN). A LAN can be tiny or big, with one user's home network or hundreds of users and devices in an office or school as examples.

The fact that a LAN connects devices that are located in a single, constrained region is its sole distinguishing feature, regardless of size. A wide area network (WAN) or metropolitan area network (MAN), in contrast, spans a wider geographic area. A few WANs and MANs link numerous LANs collectively.

To know more about Network , visit: https://brainly.com/question/29675361

#SPJ4

question 2 repeat the problem above, but use a capacitor that has half of the physical area, a, of the original one.

Answers

Utilize a capacitor with a physical area, a, that is half that of the original capacitor. quadruple.

What practical applications can capacitors be found in?

As a substitute energy storage component, a capacitor can be used in place of batteries. In situations where a sudden surge of power is required, capacitors are frequently used as energy storage components.

How does a capacitor function? What is its purpose?

A capacitor, in contrast to a battery, is a component of a circuit that momentarily stores electrical energy by dispersing charged particles between (often two) plates to produce a potential difference. When a capacitor is charged, it may discharge all of its stored energy far more quickly than a battery.

To know more about capacitor  visit :-

https://brainly.com/question/17176550

#SPJ4

What does the following code display?
int d = 9, e = 12;
System.out.printf("%d %d\n", d, e);
a. %d 9
b. %9 %12
c. %d %d
d. 9 12

Answers

Answer:
The correct answer is option d.
9 12
Explanation:
Because the System.out.printf command is used to display output.
In this d=9, and e= 12. So the 9 and 12 output will be display.
\n is used for display output in new line


Part A Choose The Correct SI Form For KN/Ms. MN/S MN/S GN/S Submit Give Up

Answers

The Correct option is MN/s.

What is SI unit?

SI is that it is an acronym for Système International in French. The metric system that is used for all measurements is the International System of Units (SI). In technological and scientific research, SI units play a crucial role. It is composed of seven base units, which define 22 derived units. The SI units can be expressed as fractional quantities or standard multiples.

The various quantities can be expressed in a variety of SI units used in physics. Base units and derived units are the two categories that can be used to classify the quantities.

Given unit kN/ms

where k = kilo = (10)³

N = newton

s = second

m = mili = (10)⁻³

so kN/ms = ((10)³ N)/((10)⁻³ s)

kN/ms = ((10)³ (10)³ N)/s  

base same power add (10)³ (10)³ = (10)⁶

(10)⁶ = mega = M

kN/ms = ((10)⁶N)/s

kN/ms = MN/s

Hence the MN/s is correct SI form.

Learn more about  SI unit;

https://brainly.com/question/12750330

#SPJ4

synthetic polymer fibers, which all originate with petroleum products, are cellulose-based fibers.T/F

Answers

Answer:

False

Explanation:

None of the created elements are visible in floor plan: level 1 view. You may want to check the active view, its parameters, and visibility settings, as well as any plan regions and their settings

Answers

Note that the above prompt is related to the use of Autodesk Software. The cause of the above warning is: "The Revit or view settings prohibit the newly generated object from being displayed."

What is Autodesk?

Autodesk is a design software firm that serves customers in the manufacturing, architectural, building, and construction sectors, as well as media and entertainment. Autodesk has been in the forefront of robotics, augmented and virtual reality, and 3D printing.

It is to be noted that the Autodesk design tool is important because it is extensively utilized in many sectors.

It helps professionals in designing, testing, and visualizing goods and systems in a virtual environment, which may be more efficient and cost-effective than doing so in the actual world.

Learn more about Autodesk:
https://brainly.com/question/24788708
#SPJ1

Full Question:

Autodesk Related Prompt

Issue:

When creating an element, section, or linking a file within Revit, you receive the following warning message:

Warning

"None of the created elements are visible in Floor Plan: Level 2 View. You may want to check the active view, its Parameters, and Visibility settings, as well as any Plan Regions and their settings."

What is the cause of the above warning?

alter the program so that a valid password consists of 10 charac- ters, 6 of which must be digits and the other 4 letters.

Answers

To alter the program so that a valid password consists of 10 charac- ters, 6 of which must be digits and the other 4 letters.

What is password?

A password is a group of characters used to verify a user's identity on a computer system. You might, for instance, need to log in to a computer account. You must enter a true username and password in order to access your account. The term "login" is frequently used to describe this combination. Passwords are private to each user, whereas usernames are typically public knowledge.

Most passwords are made up of a number of characters, which can typically include letters, numbers, and the majority of symbols but not spaces. While picking a password that is simple to remember is a good idea, you shouldn't make it so straightforward that anyone can figure it out.

//CODE//

#include <iostream>

#include <cstring>

#include <cctype>

// #include

using namespace std;

// function prototypes

bool testPassWord(char[]);

int countLetters(char *);

int countDigits(char *);

int main() {

char passWord[20];

cout << "Enter a password consisting of exactly 10 characters, 6 digits and the other 4 letters:"

<< endl;

cin.getline(passWord, 20);

if (testPassWord(passWord))

cout << "Please wait - your password is being verified" << endl;

else {

cout << "Please enter a password with exactly 10 letters, 6 digits and 4 other"<< endl;

cout << "For example, my1237Ru99jhsggs is valid" << endl;

}

// Fill in the code that will call countLetters and countDigits and will

// print to the screen both the number of

// letters and digits contained in the password.

cout << "There are " << countLetters(passWord)

<< " letters in the password.\n";

cout << "There are " << countDigits(passWord) << " digits in the password.\n";

if (countLetters(passWord) == 10 && countDigits(passWord) == 6 && strlen(passWord)==20) {

cout << "password: " << passWord << endl;

} else

cout << "So, password: " << passWord << endl;

system("PAUSE"); // Pause the system for a while

return 0;

}

//**************************************************************

// testPassWord

//

// task: determines if the word in the character array passed to it, contains

// //exactly 10 letters,  6 digits and 4 other letters.

// data in: a word contained in a character array

// data returned: true if the word contains 10 letters, 6 digits and 4 other letters

// digits, false otherwise

//

//**************************************************************

bool testPassWord(char custPass[]) {

int numLetters, numDigits, length;

length = strlen(custPass);

numLetters = countLetters(custPass);

numDigits = countDigits(custPass);

// Check valid password consists of 10 characters,6 of which must be digits

// and the other 4 letters

if (numLetters == 10 && numDigits == 6 && length == 20)

return true;

else

return false;

}

//**************************************************************

// countLetters

//

// task: counts the number of letters (both

// capital and lower case)in the string

// data in: a string

// data returned: the number of letters in the string

//

//**************************************************************

int countLetters(char *strPtr) {

int occurs = 0;

while (*strPtr != '\0') {

if (isalpha(*strPtr))

occurs++;

strPtr++;

}

return occurs;

}

//**************************************************************

// countDigits

//

// task: counts the number of digits in the string

// data in: a string

// data returned: the number of digits in the string

//

//**************************************************************

int countDigits(char *strPtr) {

int occurs = 0;

while (*strPtr != '\0') {

if (isdigit(*strPtr)) // isdigit determines if the character is a digit

occurs++;

strPtr++;

}

return occurs;

}

Learn more about passwords

https://brainly.com/question/15016664

#SPJ4

Which statement is true about the pricing model on AWS? (Select the best answer.) In most cases, there is a per gigabyte charge for inbound data transfer. Storage is typically charged per gigabyte. Compute is typically charged as a monthly fee based on instance type. Outbound charges are free up to a per account limit.

Answers

It is to be noted that the statement that is true about the pricing model on AWS is: "Storage is typically charged per gigabyte." (Option B)

What is AWS?

One is to note that Amazon Web Services (AWS), Inc. is an Amazon company that offers metered, pay-as-you-go cloud computing platforms and APIs to consumers, businesses, and governments. Clients frequently use this in conjunction with autoscaling.

AWS has a pay-as-you-go pricing model, so you only pay for the resources you utilize. The kind and quantity of resources utilized, the area in which the resources are hosted, and the length of time the resources are used are all factors that might impact the cost of utilizing AWS.

Learn more about AWS:
https://brainly.com/question/28903912
#SPJ1

Use the ________________ property to configure rounded corners with CSS?

Answers

Answer: border-radius

Explanation:

A permanent split capacitor (psc) motor that is running and up to speed will have the start winding ____.

Answers

A permanent split capacitor (PSC) motor that is running and up to speed will have the start winding: A) energized.

What is an electric motor?

In Electrical engineering, an electric motor can be defined as an electrical machine that is designed and developed to convert electrical energy into kinetic energy, especially through electromagnetic induction.

What is a permanent split capacitor (PSC)?

A permanent split capacitor (PSC) Motor simply refers to a type of single-phase alternating current (AC) motor in which the capacitor is permanently connected, rather than being connected only when it is starting.

This ultimately implies that, the start winding of a permanent split capacitor (PSC) Motor is energized when it is running and up to speed.

Read more on electric motor here: https://brainly.com/question/479333

#SPJ1

Complete Question

A permanent split capacitor (PSC) motor that is running and up to speed will have the start winding ____.

A) energized

B) de-energized

C) in series with the run winding

D) removed from the circuit

Question 11 A highlight table is used to _____. Select an answer: visualize the relative proportion of values in a table emphasize the sort order of table values hide values in a table that are equal to zero colorize text based on a predefined color key

Answers

A highlight table is used to: A. visualize the relative proportion of values in a table.

What is tableau?

In Computer technology, tableau can be defined as an interactive data visualization software application (program) that is designed and developed by an American interactive data visualization software organization, with a primary focus on data visualization and business intelligence.

What is a highlight table?

In Computer technology, a highlight table can b defined as a type of table that is designed and developed to display, show, illustrate, represent, or visualize categorical data in a text table with the aid of a color.

Read more on data here: brainly.com/question/26207955

#SPJ1

he metallic radius of alpha-titanium (alpha-t1) is 0.1445 [nm] determine the lattice parameter. note: for hcp metals calculate the a lattice parameter.

Answers

What is a close packing hexagon?

How does hexagonal packing work? Hexagonally tightly packed (hcp) describes layers of packed spheres in which they alternately cover and expose one another. A close-packed structure called a slip framework is hexagonally close-packed. The hcp structure is very universal for elemental metals, including beryllium.

The titanium has a HCP.

unit cell for which lattice parameter c/a is 1.58

The radius of the titanium atom is 0.1445nm=1.445×−8c

For a titanium unit cell

Atomic weight (A)=47.867/mol

Volume-

Calculate the unit cell volume

(V)c=6R2c√3=6×(1.445×10−8)2×1.58a√3

Here

a=2R

(Vc)=6×(1.445×10−8)2×1.58×(2×1.445×10−8)×√3=9.9084×10−23 cm3/unitcell

To know more about close-packed structure visit:-

brainly.com/question/6665073

#SPJ4

T/F a weakness of a signature-based system is that it must keep state information on a possible attack.

Answers

Answer:

True

Explanation:

My Section Practice Exercise 4.3.7: Password Checker Goint Let's C Write a program with a method called panemarched to return if the string is a valid password. The method should have the signature shown in the starter code. The pasword must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the Hint Consider creating a Suring that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn't in one of those Strings, then it's an illegitimate password porcheck method. My Section racht 4.3.7: Password Checker Subesi ubmitted 1 public class Password 2-( 3 public static void main(String[] args) 5 public static void main(String[] args) { 6 //we import the input object first 7 Scanner input-new Scanner(System.in); 8 V/output the System 9 System.out.println("Please enter the Password. \n"); 10 7/Now we call the input object and take the String input 11 String passwordString - input.next(); 12 1/we parse the string and print the output 13 System.out.println(passwordCheck(passwordString)): 14 } 15- public static boolean passwordCheck(String password) { 16 // if length is more than equal to 8 AND 17 // password is a combination of characters from 18 // 0-9 OR A-Z or A-Z, we return true. 19 if(password, length()>-8 & password matches("[a-z0-9A-2]+){ 20 return true; 21 > 22 else 23 //This means is password is not valid. 24 return false; 25 3 26 1 27) < 13 ca I

Answers

Using the knowledge of computational language in JAVA  it is possible to write a code that method called panemarched to return if the string is a valid password.

Writting the code:

import java.util.Scanner;

// main class

public class Main {

public static void main(String[] args) {

Scanner sc = new Scanner(System.in);

// read string password from user

System.out.print("Please enter the Password: ");

String passwordString = sc.next();

// call function and print the result

System.out.println(passwordCheck(passwordString));

}

// method to check the password

// outputs true if correct and false otherwise

// input argument is a string of password

public static boolean passwordCheck(String password) {

// strings of alphabets and numbers

String alpha = "abcdefghijklmnopqrstuvwxyz";

String numeric = "1234567890";

// if length of password string is less than 8 we return false

if (password.length() < 8) {

return false;

}

// else we check the characters

else {

// loop to check each char in the string

for (int i = 0; i < password.length(); i++) {

String temp = Character.toString(password.charAt(i));

// if character is not an alphabet or a number we return false

if ((alpha.contains(temp) == false) && (numeric.contains(temp) == false)) {

return false;

}

}

// if code reaches here means the password is correct

return true;

}

}

}

See more about JAVA at brainly.com/question/29897053

#SPJ1

Assume that the ground temperature Tg is 40 F (10 C) and that the inside temperature of the basement is 68 F (20 C) for Problem 3. Estimate the temperature between the wall and insulation, T2 and between the gypsum board and insulation T1. Answer: T1 = 64.3 F; T2 = 49.36 F

Answers

At high temperatures, there is a large amount of radiative heat transfer via the fibre insulation employed in thermal protection systems (TPS) (1200 C).

At high temperatures, fibre insulation used in thermal protection systems (TPS) radiatively transfers a substantial amount of heat (1200 C). The TPS's ability to insulate can therefore be significantly affected by reducing the radiative heat transfer through the fibre insulation. Directly applying reflective coatings to the individual fibres of a fibrous insulation should reduce radiative heat transfer, resulting in a less effective thermally conductive insulation. Sol-gel processes have been used to create coatings with high infrared reflectivity. By using this method, fibre insulation can receive uniform coatings without noticeably increasing its weight or density. To assess coating performance, ellipsometry, scanning electron microscopy, and Fourier Transform infrared spectroscopy have all been used.

Know more about uniform here:

https://brainly.com/question/14716338

#SPJ4

when an engine that has a full feathering hartzell propeller installed is shut down on the ground what component prevents the blades from feathering

Answers

A part that stops the blades from feathering is a latch mechanism made of springs and lock pins.

How does a propeller that feathers operate?

A mechanism in feathering propellers allows the pitch to be adjusted to an angle of around 90 degrees. A propeller is typically feathered when the engine is unable to generate enough power to turn it. The drag on the aircraft is decreased by angling the propeller parallel to the direction of flight.

What happens when the engine is feathered?

Feathing is the term used to describe this procedure. On an engine that has failed or has been turned off on purpose, feathering the propeller during flight significantly minimizes the drag that would result from the blade pitch in any other state.

To know more about engine visit:-

https://brainly.com/question/23918367

#SPJ4

login failed. the login is from an untrusted domain and cannot be used with windows authentication

Answers

If you receive error 'The login is from an untrusted domain', this may mean that you changed password on your working machine and now need to update password on SQL Server machine.

Click Properties from the menu when you right-click the server you want to change. A security page should be chosen. Select either Windows Authentication or SQL Server and Windows Authentication mode under the Server authentication header. Select OK. Kerberos-based connections to SQL Server are supported by Azure Data Studio. You must configure a Kerberos ticket that connects your current user to a Windows domain account in order to use integrated authentication (Windows Authentication) on macOS or Linux. Click Start on the taskbar, then select Control Panel. Click Turn Windows Features on or off under Programs and Features in the Control Panel. Expand World Wide Web Services, Internet Information Services, and Security. Click OK after choosing Windows Authentication.

To learn more about untrusted domain click the link below:

brainly.com/question/28990038

#SPJ4

Currency Exchange Programming challenge description: Given A list of foreign exchange rates A selected curreny A target currency Your goal is to calculate the max amount of the target currency to 1 unit of the selected currency through the FX transactions. Assume all transations are free and done immediately If you cannot finish the exchange, return Input: You will be provided a list of fx rates, a selected currency, and a target currency. For example: FX rates list: USD to JPY 1 to 109 USD to GBP 1 to 0.71 GBP to JPY 1 to 155 Original currency: USD Target currency : OPY Output: Calculated the max target currency will can get. For example: USD to JPY -> 109 USD to GBP to JPY = 0.71 . 155 = 110.05 > 109. so the max value will be 110.05 Test 1 Test Input USD, GBP, 0.7;USD, JPY, 109;GBP, JPY, 155; CAD, CNY, 5.27; CAD, KRW, 921 USD CNY USD to GBP 1 to 0.71 GBP to JPY 1 to 155 Original currency: USD Target currency : JPY Output: Calculated the max target currency will can get. For example: USD to JPY -> 109 USD to GBP to JPY = 0.71 155 = 110.05 > 109, so the max value will be 110.95 Test 1 Test Input USD, GBP, 0.7;USD, JPY, 109; GBP, JPY, 155; CAD, CNY,5.27;CAD, KRW, 921 USD CNY Expected Output -1.2 Test 2 Test Input USD, CAD, 1.3;USD, GBP, 0.71; USD, JPY, 109;GBP, JPY, 155 USD JPY Expected Output 110.05 1 import sys 2 for line in sys.stdin: print(line, end="") 3

Answers

The Currency Exchange Programming for max amount of the target currency to 1 unit of the selected currency can be written using python.

The programming code in python is,

#The given code start

import sys

for line in sys.stdin:

   print(line, end="")

   #The given code end

   break

list_foreign_exchange = line.strip()

selected_currency = ""

target_currency = ""

found = False

max1 = 0

for line in sys.stdin:

   print(line, end="")

   if list_foreign_exchange == "":        

       list_foreign_exchange = line.strip()

   elif selected_currency == "":

       selected_currency = line.strip()

   else:

       target_currency = line.strip()

       break

if selected_currency == target_currency:

   print("0")  

else:

   currency = []

   currency_string = list_foreign_exchange.split(";")

   for cur in currency_string:

       currency.append(cur.split(","))

   for cur in currency:    

       if (selected_currency == cur[0]) and (target_currency == cur[1]):        

           max1 = float(cur[2])

           found = True

           break

   max2 = 1

   tried_index = 0

   ref = selected_currency

   for cur in currency:

       if ref == cur[0]:

           ref = cur[1]        

           max2 *= float(cur[2])

           if cur[1] == target_currency:

               found = True

               break

   if found == True:

       if (max2 > max1):

           print(max2)

       else:

           print(max1)

   else:

       print('-1.0')

In the code above, we use loop statement to iterate each currency and IF-ELSE function to check the each condition, so we can get the result exactly to the goal.

You question is incomplete, but most probably your full question was

(image attached)

Learn more about loop here:

brainly.com/question/26098908

#SPJ4

problem 8.54 for each of the following pairs of polymers, do the following: (1) state whether it is possible to decide whether one polymer has a higher tensile strength than the other; (2) if this is possible, note which has the higher tensile strength and cite the reason(s) for your choice; and (3) if it is not possible to decide, state why. (a) linear and isotactic poly(vinyl chloride) with a weight-average molecular weight of 100,000 g/mol; branched and atactic poly(vinyl chloride) having a weight-average molecular weight of 75,000 g/mol (b) graft acrylonitrile-butadiene copolymer with 10% of possible sites crosslinked; alternating acrylonitrile- butadiene copolymer with 5% of possible sites crosslinked (c) network polyester; lightly branched polytetrafluoroethylene

Answers

Possible, tensile strength increases with molecular weight. Therefore the linear and isotactic polymer will have the higher tensile strength.

What is about pairs of polymers?

Possible, tensile strength increases with molecular weight. Therefore the linear and isotactic polymer will have the higher tensile strength.

1) Possible, With an increase in molecular weight, tensile strength rises. As a result, polymers that are linear and isotactic will have a greater tensile strength.

2) It seems unlikely that both polymers display the same level of enhanced tensile strength, but we lack sufficient data to determine how much is raised and which polymer exhibits a greater value.

3) Due to a higher number of covalent bonds, network polymers may, in general, have higher tensile strengths than branch structures.

To learn more about isotactic polymer refer to:

https://brainly.com/question/13846558

#SPJ4

express the following decimal numbers in binary, octal, and hexadecimal forms: a. 173; b. 299.5; c. 735.75

Answers

A binary number is a number that is expressed using the base-2 numeral system or binary numeral system, a way of expressing numbers in mathematics that typically only employs the symbols "0" (zero) and "1." (one).

What is numeral system?

A numeral system, also known as a system of numeration, is a method of writing numbers; it is a type of mathematical notation used to consistently represent a set of numbers by using digits or other symbols.

In various numeral systems, the same set of symbols can represent various numbers. For instance, the number "11" stands for the numbers eleven in the decimal system, which is used in everyday life, three in the binary system, which is used in computers, and two in the unary system.

                       

                             Binary                       Octal               Hexadecimal

1)       173              = 10101101₂                  = 255₈                = AD₁₆

2)      299.5         = 100101011.1000₂      = 453.4₈              = 12 B.8₁₆

3)      735.75        = 1011011111.1100₂       = 1337.6₈             = 2 DF.C₁₆

Learn more about binary

https://brainly.com/question/16612919

#SPJ4

3 Dynamic Programming: Car Ownership In this question, we consider when it would be advantageous to sell the car you currently own and buy a new one. We assume that you have been given the following information from a eliable source p(i)-the price of a new car in year i, for 1sisn .v(i,k)-the resale value of a car purchased in year i and sold in year k, for 1 Si

Answers

As a result, Day(1,n+1) will be a list of days to buy a new automobile and sell the old one for the least amount of money. The code is given below.

What is dynamic programming?

Dynamic programming is mostly an improvement over straightforward recursion. Dynamic Programming may be used to optimize any recursive solution that has repeated calls for the same inputs. To avoid having to recompute the outcomes of sub-problems later, the idea is to just store them. With this straightforward improvement, time complexity is reduced from exponential to polynomial.

To write a program on dynamic program on car ownership:

By using the given data,

we have to write the program,

OPT(i, j) = minimum cost possible of purchasing car at year i, maintaining from i to j and then selling at j

OPT(i, i+1) = p(i)+m(i, i+1)-v(i, i+1)

OPT(i, j) =(min k) OPT(i, k)+OPT(k, j) for  i ≤ k ≤ j

For each pair of (i, j) where i<j, Day(i, j) will contain the list of days to buy car between i to j.

To see the code, see in the attached image.

Time complexity = O(n4).

Therefore, Day(1,n+1) will be a list of days to purchase a new automobile and sell the old one for the lowest price.

To learn more about the dynamic programming;

https://brainly.com/question/18720923

#SPJ4

Consider the postfix expression: A-B+C*(D*E-F)/(G+H*K). The equivalent postfix (reverse Polish notation) expression is:
A.
AB-C+DE*F-GH+K**/
B.
AB-CDE*F-*+GHK*+/
C.
ABC+-E*F-*+GHK*+/

Answers

Problem-solving becomes quicker and more effective thanks to RPN's elimination of the necessity for parenthesis in complicated calculations and keystroke reduction. The lowest two rows of the stack are always collapsed when an operator key (+ - x) is pressed. Thus, option C is correct.

What postfix (reverse Polish notation) expression?

The “infix notation” of conventional arithmetic expressions, in which the operator symbol appears between the operands, is in contrast to reverse Polish notation, also referred to as postfix notation. In real life, a stack structure makes it simple to assess RPN.

In contrast to the format we are accustomed to, infix notation, where the operator is between the numbers, the notation is chosen because the format that the equation is in makes it easier for machines to understand.

Therefore, ABC+-E×F-*+GHK*+/

Learn more about postfix here:

https://brainly.com/question/14294555

#SPJ4

My Section Pro Mesume 0 Exercise 5.1.5: Access for Employee Class Comme Let's Go! In this exercise, you are going to create the instance variables for an Employee class. The class needs to store the employee's name, their 4 digit drobe and hourly salary. You will need to give the instance variable an appropriate name, type, and privacy settings. Alter defining the instance variables, create the structure for the constructor similar to the previous exercise. Make sure you set the privacy Settings on the constructor correctly. Note: Because there is no main method, your code will not execute that's ok). Use the autograder to verify that you have the correct code I Sandbox My Section Practice Status: Not Submitted Save Sumit. Continue 51.5: Access for Employee Class 1 public class Employee 2-7 3 4) FILES Employee.java

Answers

Below is an example of the way that you can create the instance variables and constructor for the Employee class:

public class Employee {

 private String name; // instance variable to store the employee's name

 private int badgeNumber; // instance variable to store the employee's badge number

 private double hourlySalary; // instance variable to store the employee's hourly salary

 

 public Employee(String name, int badgeNumber, double hourlySalary) {

   this.name = name;

   this.badgeNumber = badgeNumber;

   this.hourlySalary = hourlySalary;

 }

}

What is the instance variables  about?

The name, badgeNumber, and hourlySalary variables are marked as private, which means that they can only be accessed within the Employee class. The constructor takes in three arguments: the name, badgeNumber, and hourlySalary of the employee.

Therefore, Note also that this is just one way to implement the Employee class and its constructor. There are other ways to do it as well.

Learn more about instance variables from

https://brainly.com/question/28265939
#SPJ1

Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? (Points : 5) 1000 Mbps Ethernet 10 Mbps 100 Mbps

Answers

Ethernet is not a type of circuit that needs to be considered when planning for technology design capacity.

What is Ethernet?

Ethernet has been used for connecting devices in wired LANs and wide area networks for years (WAN). Through a protocol—a set of guidelines or common network language—it enables devices to communicate with one another.

Ethernet is the term used to describe how network devices format and transmit data so that other devices connected to the same LAN or campus network can recognize, receive, and process the data. The actual, sheathed wiring used for data transmission is called an Ethernet cable.

Ethernet is most likely used by connected devices that connect wirelessly but use cables to access a physically localized network. End users of all types, including businesses and gamers, depend on the reliability and security of Ethernet connectivity.

Learn more about Ethernet

https://brainly.com/question/1637942

#SPJ4

which unit of electricity expresses the volume of electron movement in a circuit

Answers

Answer:

CURRENT (AMPERAGE) or Amp or amp or amps

Explanation:

CURRENT is the quantity or flow rate of electrons moving past a point within the circuit in one second. Current flow is also known as amperage, or amps for short. Higher voltage will produce higher current flow, and lower voltage will produce lower current flow.

The unit of electricity that typically expresses the volume of electron movement in a circuit is known as the ampere.

What are Electrons?

Electrons may be characterized as the types of subatomic particles which are always revolving around the nucleus of an atom. These types of subatomic particles are negatively charged in nature. Electrons were discovered by J.J. Thomson.

According to the context of this question, the measurement of the current is determined by the fact that it describes the quantity or flow rate of electrons moving in a circuit.

Ampere is the international unit that is specifically utilized in order to measure current. The unit of current, amperes expresses the number of electrons that generally flows past a point in a circuit over a given time.

Therefore, the unit of electricity that typically expresses the volume of electron movement in a circuit is known as the ampere.

To learn more about the Current flow, refer to the link:

https://brainly.com/question/29537921

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

Which unit of electricity expresses the volume of electron movement in a circuit?

Amperes.Volts.Coulomb.
Other Questions
The triangular pyramid has identical equilateral triangles as its faces. Find the surface area of the pyramid. Evaluate the power: (3)^4A. 81B. -81C. 243D. -331 Find both the number of combinations and the number of permutations for the given number of objects. 15 objects taken 7 at a time A drug is any substance, besides food, taken into the body that changesthe way you think, feel, or act.*True or false ? 5. What is terrorism? what is Efulefu in things fall apart When is the only time to abbreviate on a job application?Question 3 options:In the Personal Information sectionIn the Position & Availability sectionOnly when space is limitedSignature section Check all statements that are true.a. Adding two integers and then taking the remainder produces the same result as taking their remainders first, then adding them, and then applying the remainder operation once more.b. Saying that a divides b is the same as saying that b is a multiple of a.c. Adding two integers and then taking the remainder produces the same result as taking their remainders first and then adding them.d. When you perform division by 5 with remainder, the remainder is an integer from -5 to 5.e. If an integer a divides a product of two integers b and c, then a must divide b or a must divide c.f. If an integer divides two numbers, it also divides their difference.g. If an integer divides two numbers, it also divides their sum.h. When you perform division by 3 with remainder, the remainder is one of the integers 0,1,2.i. If a and b are positive integers, and a = bq + r is the decomposition of a given by the division algorithm, then q can be found as the floor of a/b, and then r can be found as r = a - bq.j. If an integer a divides an integer b, then a also divides any multiple of b. I saw 8 sunflowers, 7 roses, and 2 lavender when I was walking outside.I collected them and decided to arrange them. How many different arrangements can I create? Hormones are proteins uses as-chemical receptors-chemical messengers-sugar Find the measure of the angle indicated (x). Round to the nearest tenth Show your work to support your answer Find the equation of the line pls help The next dividend payment by Hoffman, Inc., will be $3.10 per share. The dividends are anticipated to maintain a growth rate of 6.25 percent forever. Assume the stock currently sells for $49.80 per share. a. What is the dividend yield Kirk used 10.2 centimeters of tape to wrap 3 presents. How many presents did Kirk wrap if he used 23.8 centimeters of tape? A student determined the value of x as shown. Explain the students error. (Click on photo and NO ABSOLUTELY NO LINKS) The largest population an environment can support is itsA. symbiosis.B.carrying capacity.C.population.D.limiting factor What are the five causes of poor infrastructure ? 6/8 is equal to 15/ what? NEED HELP ASAP PLZ will choose brainliest What are examples of convection currents?The movement of warm air into cooler air and cooler air into warm air.The movement of cool water into warmer water and warmer water into the cool water.The displacement of air/water molecules by other air/water molecules due to varying temperatures.All of the above. A rectangular flower garden in Samantha's backyard has 140 feet around its edge. The width of thegarden is 30 feet.What is the length of the garden?The length of the garden isfeet.