who is known as the father of computer? ​

Answers

Answer 1

Answer:

Charles babbage ok my boy

Answer 2
Its Charles Babbage.
Thank you!

Related Questions

What are some uses for a class webpage?

Answers

Answer:

The webpage, either classroom- or grade-level, can be designed to include numerous items that are helpful to parents, community members, and students. It provides a place for parents to go after hours to view information about homework assignments, calendar of events, classroom pictures, study links, and more.

A testing lab wishes to test two experimental brans of outdoor pain long each wiil last befor fading . The testing lab makes six gallon s of each paint to test. The resultare Shown to see how

Answers

Answer:

The answer is "\(\bold{Brand \ A \ (35, 350, 18.7) \ \ Brand \ B \ (35, 50, 7.07)}\)"

Explanation:

Calculating the mean for brand A:

\(\to \bar{X_{A}}=\frac{10+60+50+30+40+20}{6} =\frac{210}{6}=35\)

Calculating the Variance for brand A:

\(\sigma_{A}^{2}=\frac{\left ( 10-35 \right )^{2}+\left ( 60-35 \right )^{2}+\left ( 50-35 \right )^{2}+\left ( 30-35 \right )^{2}+\left ( 40-35 \right )^{2}+\left ( 20-35 \right )^{2}}{5} \\\\\)

     \(=\frac{\left ( -25 \right )^{2}+\left ( 25 \right )^{2}+\left ( 15\right )^{2}+\left ( -5 \right )^{2}+\left ( 5 \right )^{2}+\left ( 15 \right )^{2}}{5} \\\\ =\frac{625+ 625+225+25+25+225}{5} \\\\ =\frac{1750}{50}\\\\=350\)

Calculating the Standard deviation:

\(\sigma _{A}=\sqrt{\sigma _{A}^{2}}=18.7\)

Calculating the Mean for brand B:

\(\bar{X_{B}}=\frac{35+45+30+35+40+25}{6}=\frac{210}{6}=35\)

Calculating the Variance for brand B:

\(\sigma_{B} ^{2}=\frac{\left ( 35-35 \right )^{2}+\left ( 45-35 \right )^{2}+\left ( 30-35 \right )^{2}+\left ( 35-35 \right )^{2}+\left ( 40-35 \right )^{2}+\left ( 25-35 \right )^{2}}{5}\)

    \(=\frac{\left ( 0 \right )^{2}+\left ( 10 \right )^{2}+\left ( -5 \right )^{2}+\left (0 \right )^{2}+\left ( 5 \right )^{2}+\left ( -10 \right )^{2}}{5}\\\\=\frac{0+100+25+0+25+100}{5}\\\\=\frac{100+25+25+100}{5}\\\\=\frac{250}{5}\\\\=50\)

 Calculating the Standard deviation:  

\(\sigma _{B}=\sqrt{\sigma _{B}^{2}}=7.07\)

Kerri is adding text and graphics to her presentation. She does this work in the _____. Normal (Slide) view Task pane Formatting toolbar Slide Sorter

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is Normal View.

Kerri can add text and graphics to her presentation. She does this work easily in the Normal view of the slides. In normal view, you can edit your slide by slide and navigate with the thumbnail.

while other options are not correct because:

Task pan is used to show information about the current slide.

Formatting toolbar is used for formatting the contents in the slide

Slide sorter is a view that is used to see the thumbnail of all slides in your presentation to easily rearrange them.

python program to solve the following please
4. [10 points] Use bisection method and secant method to calculate numerically root of the equation: f(x)=x²e¹-1 For bisection use a = 0, b = 1, for secant method use xº = 0 and x¹ = 1. Assume tha

Answers

Here's a Python program that uses the bisection method and secant method to numerically solve for the root of the equation f(x) = x^2 * e^(1-1), with initial values provided.

The bisection method divides the interval [a, b] iteratively until the root is found, while the secant method approximates the root using linear interpolation.

```python

import math

def f(x):

   return x**2 * math.exp(1-1)

def bisection_method(a, b, tolerance):

   if f(a) * f(b) >= 0:

       print("The bisection method cannot guarantee a root within the given interval.")

       return None

   while (b - a) >= tolerance:

       c = (a + b) / 2

       if f(c) == 0:

           return c

       elif f(c) * f(a) < 0:

           b = c

       else:

           a = c

   return (a + b) / 2

def secant_method(x0, x1, tolerance, max_iterations):

   x_prev = x0

   x_curr = x1

   for i in range(max_iterations):

       if abs(f(x_curr)) < tolerance:

           return x_curr

       else:

           x_next = x_curr - (f(x_curr) * (x_curr - x_prev)) / (f(x_curr) - f(x_prev))

           x_prev = x_curr

           x_curr = x_next

   print("The secant method did not converge within the maximum number of iterations.")

   return None

# Bisection method

a = 0

b = 1

tolerance = 0.0001

root_bisection = bisection_method(a, b, tolerance)

print("Root (Bisection Method):", root_bisection)

# Secant method

x0 = 0

x1 = 1

tolerance = 0.0001

max_iterations = 100

root_secant = secant_method(x0, x1, tolerance, max_iterations)

print("Root (Secant Method):", root_secant)

```

The given program defines two methods: `bisection_method` and `secant_method`. The `f(x)` function represents the equation x^2 * e^(1-1).

The bisection method starts with an interval [a, b] and iteratively divides it in half until the root is found or the tolerance is reached. The method checks for the sign change of f(x) within the interval and updates the interval accordingly.

The secant method uses linear interpolation to approximate the root. It starts with two initial values x0 and x1 and iterates until the tolerance or maximum number of iterations is reached. The method calculates the next approximation based on the previous two values and the function's values at those points.

The program then applies both methods using the provided initial values and displays the roots obtained.

Note: The provided equation f(x) = x^2 * e^(1-1) seems to be missing a term. Please double-check the equation to ensure accuracy.

Learn more about the bisection method here: brainly.com/question/32563551

#SPJ11

When writing a query, the name of the dataset can either be inside two backticks, or not, and the query will still run properly. A. TrueB. False

Answers

True, When writing a query, the name of the dataset can either be inside two backticks, or not, and the query will still run properly.

What is query writing?

The name "SQL," which stands for "Structured Query Language," is used to query databases. For the Microsoft SQL Server, the extended SQL implementation known as T-SQL is used. The T-SQL standards will be used in the examples in this paper.

A formal enquiry or information request is referred to as a query. A query is effectively the same thing in computer science; the only distinction is that the information that is returned comes from a database.

What is dataset?

A dataset is an organised group of data typically connected to a certain body of work. An organised collection of data kept as several datasets is called a database.

Read more about query writing:

https://brainly.com/question/25694408

#SPJ4

a specific type of data stored for a record
options:
A. Table
B. Field
c. Cell

Answers

Answer:

Table

Explanation:

A set of data is stored in a table.

Unit Test
Unit Test Active
11
12
TIME REN
16:
Which formatting elements can be included in a style Terry created?
font size, type and color
paragraph shading
line and paragraph spacing
All of the options listed above can be used to create a new style.

Answers

Answer:

d. all of the options listed above can be used to create a new style .

Explanation:

The formatting elements that can be included in a style Terry created is font size, type and color. The correct option is A.

What is formatting element?

The impression or presentation of the paper is renowned to as formatting. The layout is another word for formatting.

Most papers encompass at least four types of text: headings, regular paragraphs, quotation marks, as well as bibliographic references. Footnotes along with endnotes are also aggregable.

Document formatting is recognized to how a document is laid out on the page, how it looks, and the way it is visually organized.

It addresses issues such as font selection, font size as well as presentation like bold or italics, spacing, margins, alignment, columns, indentation, and lists.

Text formatting is a characteristic in word processors that allows people to change the appearance of a text, such as its size and color.

Most apps display these formatting options in the top toolbar and walk you through the same steps.

Thus, the correct option is A.

For more details regarding formatting element, visit:

https://brainly.com/question/8908228

#SPJ5

what is computer logic

Answers

Answer:

See definition.

Explanation:

Computer logic is an aspect of computer design concerning the fundamental operations and structures upon which all computer systems are built.

True or False? Jerry's company is beginning a new project, and he has been assigned to find a telecommunications tool that will improve operational efficiency. He lists the tasks that he wants the tool to be able to do. Then he does some research to find out what is available. The only thing remaining for Jerry to consider is where he can get the best deal on the technology.

Answers

Answer:

True

Explanation:

Answer:

It's false it took the assessment

create a spreadsheet with 15rows and 15column give their headings​

Answers

Answer:

|      |   A   |   B   |   C   |   D   |   E   |   F   |   G   |   H   |   I   |   J   |   K   |   L   |   M   |   N   |

|------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|-------|

|   1  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   2  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   3  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   4  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   5  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   6  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   7  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   8  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|   9  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  10  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  11  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  12  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  13  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  14  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

|  15  |       |       |       |       |       |       |       |       |       |       |       |       |       |       |

Explanation:

you can save the code as a text file on your computer. To do this, simply copy the code to a text editor (such as Notepad on Windows or TextEdit on Mac) and save the file with a .py extension. You can then open the file in a Python interpreter to run the code whenever you need it.

(Java) What, in your opinion, is wrong with this nested for loop?

for(int x = 0; x < 10; x++){

for(int x = 10; x > 0; x--){

System.out.println(x);

}

}

Answers

The issue with this   nested for loop in Java is the declarationof the second loop variable.

Why is this so?

Both loops   use the same variable name"x" for iteration. This creates a conflict because the inner loop re-declares the "x" variable, leading to a compilation error.

Each loop should have a unique variable name to avoid naming conflicts and ensure proper loop execution.

The corrected code will be --

for (int x =0; x < 10; x++)   {

   for (int y = 10;y > 0; y--)   {

       System.out.println(y);

   }

}

Learn more about Java at:

https://brainly.com/question/25458754

#SPJ1

which is the following about pass an entire array or an individual array element to a function is false? a. when an argument to a method is an entire array or an individual array element of a reference type, the called method receives a copy of the reference( call by reference ) b. when an argument to a method is an individual array element of a value type, the called method receives a copy of the elements value(call by value) c. pass an individual array elements to a function is always call by value d. pass ana individual array element of a value type to a function is call by value e. none

Answers

Pass an individual array element to a function is not always call by value. Therefore, Option C is false.

In the context of passing an array or an individual array element to a function, the terms "call by value" and "call by reference" refer to how the arguments are passed and handled in the function.

Option A is true. When an argument to a method is an entire array or an individual array element of a reference type, the called method receives a copy of the reference. This means that the method operates on the original array or array element, and any modifications made to the array will be reflected outside the function.

Option B is true. When an argument to a method is an individual array element of a value type, the called method receives a copy of the element's value. This means that modifications made to the individual array element within the function will not affect the original element outside the function.

Option C is false. Pass an individual array element to a function is not always call by value. If the individual array element is of a reference type, then the called method receives a copy of the reference, similar to passing an entire array. This allows modifications to the individual element to affect the original element outside the function.

Option D is true. Pass an individual array element of a value type to a function is call by value. The function receives a copy of the element's value, and any modifications made to the element within the function do not affect the original element outside the function.

Therefore, the correct answer is option C - pass an individual array element to a function is always call by value.

Learn more about array here:

https://brainly.com/question/13261246

#SPJ11

Can someone please tell me how to save a screenshot on windows 10?
I have to do this assignment for tec and I don't understand how to do it.
PLEASE DON'T USE ME FOR POINTS!! Please and Thank you!

Answers

Answer:

u just press windows botton and shift and s lol

Explanation:

u can also search up this by tyoing "How to take a screenshot on windows 10" if this does not work.

:)

Checks or safety procedures are put in place to protect the integrity of the system is referred to as?

Answers

answer:

system controls

What is an unexpected error was encountered while executing a wsl command. common causes include access rights issues, which occur after waking the computer or not being connected to your domain/active directory.

Answers

When executing a WSL (Windows Subsystem for Linux) command, encountering an unexpected error is access rights issues.

It is are one of the common causes that can lead to such errors, especially after waking the computer or when the computer is not connected to the domain or Active Directory.

Access rights issues can arise due to changes in system state or connectivity.

After waking the computer from sleep or hibernation, network connections may need to be re-established, which can impact the authentication and authorization of user access rights.

In these cases, the necessary permissions may not be properly granted or authenticated, resulting in errors when executing WSL commands.

Furthermore, when the computer is not connected to the domain or Active Directory, access rights issues may occur.

Domain-based networks utilize Active Directory to manage user and group permissions.

If the computer is disconnected from the domain, the authentication and authorization process may fail, leading to errors when running WSL commands.

To address these issues, several steps can be taken:

1)Verify network connectivity: Ensure that the computer is connected to the network and can communicate with the domain or Active Directory.

2)Re-establish authentication: If the computer has been awakened from sleep or hibernation, consider logging out and logging back in to re-establish the necessary network and domain connections.

3)Check user permissions: Confirm that the user account has the required permissions to execute WSL commands.

4)Seek IT assistance: If the issue persists, consult with your IT support team or system administrator.

For more questions on WSL

https://brainly.com/question/30214837

#SPJ8

Three of the following values could be stored as strings. When would you NOT use a
string command?
O To store a word.
O To store a list of colors.
O To store values NOT used for calculations.
O To store decimal values.

Answers

Answer:

To store decimal values

Explanation:

If values are not to be used for calculation, that is, they are not numerical data, therefore, some of them could be stored as strings. A string may contain any sequence of characters. The characters in a string may be repeated.

From the foregoing, decimals can not be stored as strings because in computer programming, a string is normally a sequence of characters, hence the answer above.

Using variable concepts, it is found that you would not use a string command to store decimal values.

---------------------------

Strings are used in programming to work with variables that are composed by text, which can include words, colors, and any variable that is not used for calculator.For decimal values, float and double variables are used, not strings, and thus, this is the option for which a string command would not be used.

A similar problem is given at https://brainly.com/question/15583814

Using 2 bytes, how many different characters can Unicode represent?

A.

2^8

B.

2

C.

2^2

D.

2^16

E.

2^10

Answers

Answer:

The anwser is 2^16

Explanation:

2-2 module two quiz: team roles and responsibilities

Answers

Module two of the quiz focuses on team roles and responsibilities. The quiz likely covers topics related to understanding the various roles within a team and the responsibilities associated with each role.

In module two of the quiz, you can expect questions that assess your knowledge and understanding of team roles and responsibilities. This module typically covers topics such as the different roles individuals can assume within a team, such as a leader, coordinator, facilitator, or specialist. It may also cover the responsibilities associated with each role, such as decision-making, communication, task allocation, and conflict resolution. It may also assess your understanding of the dynamics between different roles and how they collaborate to achieve common goals. Being familiar with concepts such as teamwork, effective communication, and coordination will be beneficial in answering the quiz questions accurately.

Learn more about communication from here:

https://brainly.com/question/29811467

#SPJ11

state the difference between Ms Word 2003, 2007 and 2010​

Answers

Answer:

Difference of File Menu between Word 2003, Word 2007 and Word 2010 There is a few difference of the File menu between Classic Menu for Word 2007/2010 and Word 2003. The File drop down menu in Word 2007 and 2010 includes 18 menu items, while 16 menu items in Word 2003.

Explanation:

True or False: Data in a smart card can be erased

Answers

Answer:

I think its true but i can't explain it

Answer:

False

Explanation:

optical memory cards can store up to 4MB of data.but once the data is written it cant be changed or erased

Computers are often used to create financial model. One of the features which make a spreadsheet suitable for this is the ability to handle both text and numbers.name three other features which make them suitable for this purpose

Answers

Explanation:

yvyvuvuvyybububububgy thewin at the end

Here are a couple reasons for using spreadsheets.

Budgeting and spending help

Business administrative tasks

Generating reports and charts

Calculation and accounting uses

Data exports, sifting, and cleanup

I hope this helps.

You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.

Answers

Answer:

in

Explanation:

Not an explanation, but here's an example:

if "mouth" in "mouthwatering":

   print("It is.")

else:

   pass

Another example:

if "water" in "mouthwatering":

   print("Yes.")

else:

   pass

what is the name of the wap found in wireshark lab 2

Answers

In Wireshark Lab 2, the WAP (Wireless Access Point) used is called Belkin N1 Vision.

The name of the WAP found in Wireshark lab 2 is "Atheros_AR5006X_Wireless_Network_Adapter." This can be found by looking at the information provided in the lab and searching for the name of the WAP in the data captured by Wireshark. Remember, Wireshark is a tool used to capture and analyze network traffic, so it is important to pay attention to the details provided in the lab in order to accurately answer this question.

Learn more about wireshark: https://brainly.com/question/13261433

#SPJ11

Apply the default name for the rule (Gloria Vivaldi) and turn it on for current and future messages.

Answers

The steps to set up a rule with the default name "Gloria Vivaldi" in Microsoft Outlook is given below.

What are the steps needed?

Open Microsoft Outlook.

Click on the "File" tab and select "Manage Rules & Alerts."

Click on the "New Rule" button to create a new rule.

In the "Rules Wizard" window, select "Apply rule on messages I receive" and click "Next."

Choose the conditions that you want to apply to the rule, such as specific senders or keywords in the subject line. Click "Next" after making your selections.

Choose the action that you want the rule to perform, such as moving the message to a specific folder or marking it as read.

Click "Next" after making your selections.

In the "Step 2: Edit the rule description" section, give your rule a name, such as "Gloria Vivaldi." You can also add any exceptions to the rule in this section. Click "Finish" when you're done.

The rule will be applied immediately to any incoming messages that meet the conditions you specified. You can also choose to run the rule on your existing messages by selecting the "Run Rules Now" option in the "Rules and Alerts" window.

Learn more about Microsoft on:

https://brainly.com/question/29576990

#SPJ1

a python program for the following output using for loop.

Output:


-13

-7

-1

Answers

Answer:

In Python

for i in range(-13,0,6):

   print(i)

Explanation:

Required: A program to display the given output

From the program, we observe the following:

The output begins at 13 i.e begin = 13

The output ends at -1 i.e end = 1

And the difference between each output is 6.

i.e. \(-1 - (-7) = -7 - (-13) = 6\)

So, the syntax of the for loop is: (begin, end + 1, difference)

The program explanation goes thus:

This iterates through the -13 to 1 with a difference of 6

for i in range(-13,0,6):

This prints the required output

   print(i)

Which of these are examples of an access control system? Check all that apply.
TACACS+
OAuth
OpenID
RADIUS

Answers

Examples of access control systems include TACACS+, RADIUS, and OAuth.

An access control system is a security mechanism that regulates and manages user access to resources within a network or system. Among the options provided, TACACS+, RADIUS, and OAuth are examples of access control systems.

TACACS+ (Terminal Access Controller Access Control System Plus) is a protocol commonly used for network access control and authentication. It provides centralized authentication, authorization, and accounting services, allowing network administrators to control access to network devices and resources.

RADIUS (Remote Authentication Dial-In User Service) is another widely used access control system. It is a client/server protocol that enables centralized authentication, authorization, and accounting for remote access users. RADIUS is commonly used in network environments where users connect via dial-up, virtual private networks (VPNs), or wireless access points.

OAuth (Open Authorization) is an open standard protocol that allows users to grant third-party applications limited access to their resources on another website, without sharing their credentials. OAuth is commonly used in scenarios such as social media logins, where users can authorize an application to access their profile information without directly providing their username and password.

These examples demonstrate how access control systems play a crucial role in securing network resources by controlling user access and providing authentication and authorization services.

Learn more about access control systems here:

https://brainly.com/question/32345316

#SPJ11

Write a function named gcd() that accepts two integers as input parameters and returns the greatest common divisor of the two numbers.

Answers

Here is a possible implementation of the gcd() function in Python:

def gcd(a, b):

   """

   Computes and returns the greatest common divisor of two integers a and b.

   """

   # Ensure that a >= b

   if b > a:

       a, b = b, a

   

   # Use the Euclidean algorithm to find the GCD

   while b != 0:

       r = a % b

       a, b = b, r

   

   # Return the result

   return a

The function takes two integers a and b as input parameters and uses the Euclidean algorithm to find their greatest common divisor (GCD). The algorithm works by repeatedly dividing the larger number by the smaller number and taking the remainder until the remainder is zero. At that point, the GCD is the last nonzero remainder.The function first checks which of the two numbers is larger and swaps them if necessary to ensure that a is greater than or equal to b. It then enters a loop that performs the division and remainder calculations until b becomes zero. Finally, the function returns the value of a, which is the GCD of a and b.

To learn more about possible click on the link below:

brainly.com/question/28066478

#SPJ11

What can you do to prevent damage to a computer? Check all of the boxes that apply.

Keep your computer in a temperature- controlled room.

Tie cords in knots so they are shorter.

Dust your computer only when you see a buildup of dust.

Use surge protectors when you are away from home or school.​

Answers

Answer:

temperature-controlled room and surge protectors

Explanation:

Answer:

Keep your computer in a temperature- controlled room

Dust your computer only when you see a buildup of dust

Use surge protectors when you are away from home or school

Explanation:

just good

Think of a binary communication channel. It carries two types of signals denoted as 0 and 1. The noise in the system occurs when a transmitted 0 is received as a 1 and a transmitted 1 is received as a 0. For a given channel, assume the probability of transmitted 0 correctly being received is 0.95 = P(R0 I T0) and the probability of transmitted 1 correctly being received is 0.90 = P(R1 I T1). Also, the probability of transmitting a 0 is 0.45= P(T0). If a signal is sent, determine the
a. Probability that a 1 is received, P(R1)
b. Probability that a 0 is received, P(R0)
c. Probability that a 1 was transmitted given that a 1 was received
d. Probability that a 0 was transmitted given that a 0 was received
e. Probability of an error

Answers

The probability that a 1 is received, P(R1), is 0.1.The probability that a 0 is received, P(R0), is 0.55.The probability that a 1 was transmitted given that a 1 was received is 0.8182 (approximately).The probability that a 0 was transmitted given that a 0 was received is 0.8936 (approximately).The probability of an error is 0.1564 (approximately).

In a binary communication channel, we are given the probabilities of correctly receiving a transmitted 0 and 1, as well as the probability of transmitting a 0.

a. To determine the probability of receiving a 1, we subtract the probability of receiving a 0 (0.45) from 1, resulting in P(R1) = 1 - P(R0) = 1 - 0.45 = 0.55.

b. To determine the probability of receiving a 0, we use the given probability of transmitted 0 correctly being received: P(R0 I T0) = 0.95. Since P(R0 I T0) is the complement of the error probability, we have P(R0) = 1 - P(error) = 1 - 0.05 = 0.55.

c. The probability that a 1 was transmitted given that a 1 was received is determined using Bayes' theorem: P(T1 I R1) = (P(R1 I T1) * P(T1)) / P(R1). Substituting the given values, we have P(T1 I R1) = (0.9 * 0.55) / 0.55 = 0.9.

d. Similarly, the probability that a 0 was transmitted given that a 0 was received is determined using Bayes' theorem: P(T0 I R0) = (P(R0 I T0) * P(T0)) / P(R0). Substituting the given values, we have P(T0 I R0) = (0.95 * 0.45) / 0.55 = 0.8936 (approximately).

e. The probability of an error is calculated as the sum of the probabilities of receiving the incorrect signal for both 0 and 1: P(error) = 1 - P(R0 I T0) + 1 - P(R1 I T1) = 1 - 0.95 + 1 - 0.9 = 0.05 + 0.1 = 0.1564 (approximately).

In summary, we determined the probabilities of receiving 1 and 0, the conditional probabilities of transmitted signals given the received signals, and the probability of an error for the given binary communication channel.

Learn more about Probability

brainly.com/question/31828911

#SPJ11

Who are The Boys? EddieVR, YourNarrator, JoshDub, Mully, and last but most certainly not least, Juicy(FruitSnacks). Green gang or purple gang? who is your favourite? who is the funniest? who is a bottom? who is your least favourite? rank their individual channels. whos channel is dying?

Answers

Answer:

yes or no

Explanation:

Answer:

I love to watch Eddievr his videos are funny and he swears in spanish and speaks in spanish

Explanation:

Other Questions
a health education specialist is planning a multilevel program to decrease rates of obesity in an urban community. community gardens are planned for empty lots, and local convenience stores have agreed to begin selling fruits and vegetables. to assist families, mobile devices will be given out and used to help deliver messages and tips, and well as to collect data. additionally, community leaders have pledged to focus on making the community safe for physical activity. volunteers are mapping out walking routes to encourage families to walk together. partnerships have formed and memorandums of understanding have been drafted. a hospital is expanding outreach services and facilities with a new unit focused on prevention and the treatment of chronic disease. the health education specialist is tasked with gathering local data on these conditions. which is the most useful? what is the charge of a fluorine (f) ion PLEASE HELP FAST WITH THIS MATH The clinic nurse is caring for a client with acute bronchitis. the client asks what may have caused the infection. what may induce acute bronchitis? draw the structure of the product(s) formed on mixing propanoic acid and aniline and then the new organic product formed on heating. be sure to show formal charges and draw the appropriate number of condensed hydrogens on oxygen and nitrogen atoms, where necessary. propanoic acid is a 3 carbon chain where carbon 1 is double bonded to oxygen and single bonded to o h. aniline is a benzene ring with an n h 2 substituent. this is in equilibrium with product 1. upon heating, product 1 is converted to product 2. Dane is training for a marathon. he runs 5 km this weekend. for the next several weeks, he will increase his distance by 10% each weekend. write an equation to show how far dane runs weekly. a (the initial value) is b (base or multiplier) is equation is growth or decay? assuming a penalty of 1 for a mismatch and a penalty of 2 for a gap, use the dynamic programming algorithm to find an optimal alignment of the following sequences:CCGGGTTACCAGGAGTTCA what is the measurement of angle 1 ? During which period did the artists create works using software such as Photoshop, without actually programming?A Paintbox eraB multimedia eraC pioneers eraITS A on Plato paintbox era Which angles are supplementary to each other? you are looking to buy a car. you can afford $500 in monthly payments for four years. in addition to the loan, you can make a $1,500 down payment. if interest rates are 8.25 percent apr, what price of car can you afford (loan plus down payment)? (do not round intermediate calculations and round your final answer to 2 decimal places.) you invest $20,000 in a fund that charges a 3% front-end load (or commission), 1% total annual expenses, and a 0% back end load (or contingent deferred sales charge) on a class a share. the same manager has a c-share class of the same fund with a 0% front-end load, 1.5% total annual expense, and a 1% back-end load. what are the total costs of owning the class a share in the first year? a. $658 b. $794 c. $885 d. $902 Review For each initial position choose the correct sketch of the mostly path of the shark toward the center of the dipole in When establishing an investment program, you should begin by monitoring your investments. b. When you are choosing an investment, you should examine only the interest rate risk factor associated with each investment. c. When establishing an investment program, you should examine the potential return offered by different investment alternatives. d. Leave the financial planning to the professionals. e. There is no need to monitor your investments after you have made your investment decision. What do these evidence mean?"I was eighteen years old and did not have a friend my own age. There wasnt a boy in Charleston who would think about inviting me to a party or to come out to spend the weekend at his familys beach house". "My mother had given up on me at such an early age that a comeback was something she no longer even prayed for in her wildest dreams. Yet in my anonymous and underachieving high school career. I laid the foundation for a strong finish without my mother noticing that I was, at last, up to some good. " How did the Savannah River play an enormous role in the creation of the colony of Georgia?A) Native Americans used its waters for food. B) Hernando de Soto was the first European to see it in 1540. C) Atlanta, the capital of Georgia, was established there in 1733. D) James Oglethorpe chose an area along its shores to found the city of Savannah. What is the range of the function f(x) = -2(6x) + 3? (-00,-2] (-0,3) [-2.co (3.c) o Treasury bills are currently paying 8 percent and the inflation rate is 3.5 percent.What is the approximate real rate of interest? (Enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.)What is the exact real rate? (Do not round intermediate calculations. Enter your answer as a percent rounded to 2 decimal places, e.g., 32.16What is the exact real rate? (Do not round intermediate calculations. Enter your answer as a percent rounded to 2 decimal places, e.g., 32.16 in a certain african population, 4% of the population is born with sickle cell anemia (aa). pretend this population is at hardy-weinberg equilibrium (whether or not that is realistic) and calculate the percentage of individuals who do not have any copies of the sickle cell allele. A treasure chest full of silver and gold coins is being lifted from a pirate ship to the shore using two ropes as shown in the figure. The mass of the treasure chest is 94.0 kg.